Search results

1 – 10 of 42
Content available
Article
Publication date: 27 November 2020

Petar Jackovich, Bruce Cox and Raymond R. Hill

This paper aims to define the class of fragment constructive heuristics used to compute feasible solutions for the traveling salesman problem (TSP) into edge-greedy and vertex…

Abstract

Purpose

This paper aims to define the class of fragment constructive heuristics used to compute feasible solutions for the traveling salesman problem (TSP) into edge-greedy and vertex-greedy subclasses. As these subclasses of heuristics can create subtours, two known methodologies for subtour elimination on symmetric instances are reviewed and are expanded to cover asymmetric problem instances. This paper introduces a third novel subtour elimination methodology, the greedy tracker (GT), and compares it to both known methodologies.

Design/methodology/approach

Computational results for all three subtour elimination methodologies are generated across 17 symmetric instances ranging in size from 29 vertices to 5,934 vertices, as well as 9 asymmetric instances ranging in size from 17 to 443 vertices.

Findings

The results demonstrate the GT is the fastest method for preventing subtours for instances below 400 vertices. Additionally, a distinction between fragment constructive heuristics and the subtour elimination methodology used to ensure the feasibility of resulting solutions enables the introduction of a new vertex-greedy fragment heuristic called ordered greedy.

Originality/value

This research has two main contributions: first, it introduces a novel subtour elimination methodology. Second, the research introduces the concept of ordered lists which remaps the TSP into a new space with promising initial computational results.

Open Access
Article
Publication date: 15 March 2018

Moufida Maimour

Multipath routing holds a great potential to provide sufficient bandwidth to a plethora of applications in wireless sensor networks. In this paper, we consider the problem of…

313

Abstract

Multipath routing holds a great potential to provide sufficient bandwidth to a plethora of applications in wireless sensor networks. In this paper, we consider the problem of interference that can significantly affect the expected performances. We focus on the performance evaluation of the iterative paths discovery approach as opposed to the traditional concurrent multipath routing. Five different variants of multipath protocols are simulated and evaluated using different performance metrics. We mainly show that the iterative approach allows better performances when used jointly with an interference-aware metric or when an interference-zone marking strategy is employed. This latter appears to exhibit the best performances in terms of success ratio, achieved throughput, control messages overhead as well as energy consumption.

Details

Applied Computing and Informatics, vol. 16 no. 1/2
Type: Research Article
ISSN: 2634-1964

Keywords

Content available
Article
Publication date: 7 March 2019

Joshua R. Muckensturm and Dave C. Longhorn

This paper introduces a new heuristic algorithm that aims to solve the military route vulnerability problem, which involves assessing the vulnerability of military cargo flowing…

1148

Abstract

Purpose

This paper introduces a new heuristic algorithm that aims to solve the military route vulnerability problem, which involves assessing the vulnerability of military cargo flowing over roads and railways subject to enemy interdiction.

Design/methodology/approach

Graph theory, a heuristic and a binary integer program are used in this paper.

Findings

This work allows transportation analysts at the United States Transportation Command to identify a relatively small number of roads or railways that, if interdicted by an enemy, could disrupt the flow of military cargo within any theater of operation.

Research limitations/implications

This research does not capture aspects of time, such as the reality that cargo requirements and enemy threats may fluctuate each day of the contingency.

Practical implications

This work provides military logistics planners and decision-makers with a vulnerability assessment of theater distribution routes, including insights into which specific roads and railways may require protection to ensure the successful delivery of cargo from ports of debarkation to final destinations.

Originality/value

This work merges network connectivity and flow characteristics with enemy threat assessments to identify militarily-useful roads and railways most vulnerable to enemy interdictions. A geographic combatant command recently used this specific research approach to support their request for rapid rail repair capability.

Details

Journal of Defense Analytics and Logistics, vol. 3 no. 1
Type: Research Article
ISSN: 2399-6439

Keywords

Open Access
Article
Publication date: 8 June 2021

Shihan Meng, Wenxiang Dong, Hong Hu and Yuejiang Li

The purpose of this paper is to analyze the supply chain's resilience in crowd networks from both static and dynamic perspectives.

919

Abstract

Purpose

The purpose of this paper is to analyze the supply chain's resilience in crowd networks from both static and dynamic perspectives.

Design/methodology/approach

This paper first defines the supply chain’s resilience, then proposes a graphical and game-theoretic framework to evaluate the resilience.

Findings

In this framework, an equilibrium with high resilience will be achieved after the iterated prisoner's dilemma in the supply chain. The two-stage update mechanism contributes to higher profits, higher stability and stronger risk resistance capability. The reputation-based tit-for-tat strategy in the second stage helps to realize society cooperation.

Originality/value

This work pays more attention to the dynamic evolution of interactions between organizations in the supply chain. It provides an important theoretical basis for future work such as how to effectively control and guide the evolution of events in the intelligence network and how to stand sudden changes and avoid collapse.

Details

International Journal of Crowd Science, vol. 5 no. 2
Type: Research Article
ISSN: 2398-7294

Keywords

Open Access
Article
Publication date: 4 August 2020

Aaqil Somauroo and Vandana Bassoo

Due to its boundless potential applications, Wireless Sensor Networks have been subject to much research in the last two decades. WSNs are often deployed in remote environments…

1232

Abstract

Due to its boundless potential applications, Wireless Sensor Networks have been subject to much research in the last two decades. WSNs are often deployed in remote environments making replacement of batteries not feasible. Low energy consumption being of prime requisite led to the development of energy-efficient routing protocols. The proposed routing algorithms seek to prolong the lifetime of sensor nodes in the relatively unexplored area of 3D WSNs. The schemes use chain-based routing technique PEGASIS as basis and employ genetic algorithm to build the chain instead of the greedy algorithm. Proposed schemes will incorporate an energy and distance aware CH selection technique to improve load balancing. Clustering of the network is also implemented to reduce number of nodes in a chain and hence reduce delay. Simulation of our proposed protocols is carried out for homogeneous networks considering separately cases for a static base-station inside and outside the network. Results indicate considerable improvement in lifetime over PEGASIS of 817% and 420% for base station inside and outside the network respectively. Residual energy and delay performance are also considered.

Details

Applied Computing and Informatics, vol. 19 no. 3/4
Type: Research Article
ISSN: 2634-1964

Open Access
Article
Publication date: 10 June 2021

Yuejiang Li and Hong Zhao

The purpose of this paper is to review the recent studies on opinion polarization and disagreement.

Abstract

Purpose

The purpose of this paper is to review the recent studies on opinion polarization and disagreement.

Design/methodology/approach

In this work, recent advances in opinion polarization and disagreement and pay attention to how they are evaluated and controlled are reviewed.

Findings

In literature, three metrics: polarization, disagreement and polarization-disagreement index are usually adopted and there is a tradeoff between polarization and disagreement. Different strategies have been proposed in literature which can significantly control opinion polarization and disagreement based on these metrics.

Originality/value

This review is of crucial importance to summarize works on opinion polarization and disagreement and to the better understanding and control of them.

Details

International Journal of Crowd Science, vol. 5 no. 2
Type: Research Article
ISSN: 2398-7294

Keywords

Open Access
Article
Publication date: 9 December 2019

Qingqing Wu, Xianguan Zhao, Lihua Zhou, Yao Wang and Yudi Yang

With the rapid development of internet technology, open online social networks provide a broader platform for information spreading. While dissemination of information provides…

Abstract

Purpose

With the rapid development of internet technology, open online social networks provide a broader platform for information spreading. While dissemination of information provides convenience for life, it also brings many problems such as security risks and public opinion orientation. Various negative, malicious and false information spread across regions, which seriously affect social harmony and national security. Therefore, this paper aims to minimize negative information such as online rumors that has attracted extensive attention. The most existing algorithms for blocking rumors have prevented the spread of rumors to some extent, but these algorithms are designed based on entire social networks, mainly focusing on the microstructure of the network, i.e. the pairwise relationship or similarity between nodes. The blocking effect of these algorithms may be unsatisfactory in some networks because of the sparse data in the microstructure.

Design/methodology/approach

An algorithm for minimizing the influence of dynamic rumor based on community structure is proposed in this paper. The algorithm first divides the network into communities, and integrates the influence of each node within communities and rumor influence probability to measure the influence of each node in the entire network, and then selects key nodes and bridge nodes in communities as blocked nodes. After that, a dynamic blocking strategy is adopted to improve the blocking effect of rumors.

Findings

Community structure is one of the most prominent features of networks. It reveals the organizational structure and functional components of a network from a mesoscopic level. The utilization of community structure can provide effective and rich information to solve the problem of data sparsity in the microstructure, thus effectively improve the blocking effect. Extensive experiments on two real-world data sets have validated that the proposed algorithm has superior performance than the baseline algorithms.

Originality/value

As an important research direction of social network analysis, rumor minimization has a profound effect on the harmony and stability of society and the development of social media. However, because the rumor spread has the characteristics of multiple propagation paths, fast propagation speed, wide propagation area and time-varying, it is a huge challenge to improve the effectiveness of the rumor blocking algorithm.

Details

International Journal of Crowd Science, vol. 3 no. 3
Type: Research Article
ISSN: 2398-7294

Keywords

Open Access
Article
Publication date: 3 February 2020

Hangjing Zhang, Yan Chen and H. Vicky Zhao

The purpose of this paper is to have a review on the analysis of information diffusion based on evolutionary game theory. People now get used to interact over social networks, and…

Abstract

Purpose

The purpose of this paper is to have a review on the analysis of information diffusion based on evolutionary game theory. People now get used to interact over social networks, and one of the most important functions of social networks is information sharing. Understanding the mechanisms of the information diffusion over social networks is critical to various applications including online advertisement and rumor control.

Design/methodology/approach

It has been shown that the graphical evolutionary game theory (EGT) is a very efficient method to study this problem.

Findings

By applying EGT to information diffusion, the authors could predict every small change in the process, get the detailed dynamics and finally foretell the stable states.

Originality/value

In this paper, the authors provide a general review on the evolutionary game-theoretic framework for information diffusion over social network by summarizing the results and conclusions of works using graphical EGT.

Details

International Journal of Crowd Science, vol. 4 no. 1
Type: Research Article
ISSN: 2398-7294

Keywords

Open Access
Article
Publication date: 5 August 2021

Rui Qiu and Wen Ji

Many recommender systems are generally unable to provide accurate recommendations to users with limited interaction history, which is known as the cold-start problem. This issue…

Abstract

Purpose

Many recommender systems are generally unable to provide accurate recommendations to users with limited interaction history, which is known as the cold-start problem. This issue can be resolved by trivial approaches that select random items or the most popular one to recommend to the new users. However, these methods perform poorly in many cases. This paper aims to explore the problem that how to make accurate recommendations for the new users in cold-start scenarios.

Design/methodology/approach

In this paper, the authors propose embedded-bandit method, inspired by Word2Vec technique and contextual bandit algorithm. The authors describe user contextual information with item embedding features constructed by Word2Vec. In addition, based on the intelligence measurement model in Crowd Science, the authors propose a new evaluation method to measure the utility of recommendations.

Findings

The authors introduce Word2Vec technique for constructing user contextual features, which improved the accuracy of recommendations compared to traditional multi-armed bandit problem. Apart from this, using this study’s intelligence measurement model, the utility also outperforms.

Practical implications

Improving the accuracy of recommendations during the cold-start phase can greatly raise user stickiness and increase user favorability, which in turn contributes to the commercialization of the app.

Originality/value

The algorithm proposed in this paper reflects that user contextual features can be represented by clicked items embedding vector.

Details

International Journal of Crowd Science, vol. 5 no. 3
Type: Research Article
ISSN: 2398-7294

Keywords

Open Access
Article
Publication date: 22 August 2022

Euodia Vermeulen and Sara Grobbelaar

In this article we aim to understand how the network formed by fitness tracking devices and associated apps as a subset of the broader health-related Internet of things is capable…

Abstract

Purpose

In this article we aim to understand how the network formed by fitness tracking devices and associated apps as a subset of the broader health-related Internet of things is capable of spreading information.

Design/methodology/approach

The authors used a combination of a content analysis, network analysis, community detection and simulation. A sample of 922 health-related apps (including manufacturers' apps and developers) were collected through snowball sampling after an initial content analysis from a Google search for fitness tracking devices.

Findings

The network of fitness apps is disassortative with high-degree nodes connecting to low-degree nodes, follow a power-law degree distribution and present with low community structure. Information spreads faster through the network than an artificial small-world network and fastest when nodes with high degree centrality are the seeds.

Practical implications

This capability to spread information holds implications for both intended and unintended data sharing.

Originality/value

The analysis confirms and supports evidence of widespread mobility of data between fitness and health apps that were initially reported in earlier work and in addition provides evidence for the dynamic diffusion capability of the network based on its structure. The structure of the network enables the duality of the purpose of data sharing.

Details

Information Technology & People, vol. 35 no. 8
Type: Research Article
ISSN: 0959-3845

Keywords

1 – 10 of 42