Search results
1 – 10 of over 20000Bin Xie, Anup Kumar, Dave Cavalcanti and Dharma P. Agrawal
This paper proposes a new Heterogeneous Multi‐hop Cellular IP (MCIP) network that integrates multi‐hop communication with Cellular IP. MCIP increases the coverage of the wireless…
Abstract
This paper proposes a new Heterogeneous Multi‐hop Cellular IP (MCIP) network that integrates multi‐hop communication with Cellular IP. MCIP increases the coverage of the wireless network and improves the network robustness against adverse propagation phenomena by supporting communication in dead zones and areas with poor radio coverage. MCIP includes three components: location management, connection management and route reconfiguration. Location management is responsible for maintaining the location information for Mobile Stations (MSs) in a local domain. Connection management establishes an initial path for data transmission and a route reconfiguration mechanism is proposed to take advantage of various multi‐hop connection alternatives available based on terminal interfaces, network accessibility and topology. Our simulation results show that MCIP performs well in networks of various sizes including scalability, throughput, and packet delay.
Details
Keywords
Sajid Hussain, Firdous Kausar, Ashraf Masood and Jong Hyuk Park
As large‐scale homogeneous networks suffer from high costs of communication, computation, and storage requirements, the heterogeneous sensor networks (HSN) are preferred because…
Abstract
Purpose
As large‐scale homogeneous networks suffer from high costs of communication, computation, and storage requirements, the heterogeneous sensor networks (HSN) are preferred because they provide better performance and security solutions for scalable applications in dynamic environments. Random key pre‐distribution schemes are vulnerable to collusion attacks. The purpose of this paper is to propose an efficient collusion resistant security mechanism for heterogeneous sensor networks.
Design/methodology/approach
The authors consider a heterogeneous sensor network (HSN) consists of a small number of powerful high‐end H‐sensors and a large number of ordinary low‐end L‐sensors. However, homogeneous sensor network (MSN) consists of only L‐sensors. Since the collusion attack on key pre‐distribution scheme mainly takes advantage of the globally applicable keys, which are selected from the same key pool, they update the key ring after initial deployment and generate new key rings by using one‐way hash function on nodes' IDs and initial key rings. Further, in the proposed scheme, every node is authenticated by the BS in order to join the network.
Findings
The analysis of the proposed scheme shows that even if a large number of nodes are compromised, an adversary can only exploit a small number of keys near the compromised nodes, while other keys in the network remain safe.
Originality/value
The proposed key management scheme described in the paper outperforms the previous random key pre‐distribution schemes by: considerably reducing the storage requirement, and providing more resiliency against node capture and collusion attacks.
Details
Keywords
Svetlana Boudko, Wolfgang Leister and Stein Gjessing
Coexistence of various wireless access networks and the ability of mobile terminals to switch between them make an optimal selection of serving networks for multicast groups a…
Abstract
Purpose
Coexistence of various wireless access networks and the ability of mobile terminals to switch between them make an optimal selection of serving networks for multicast groups a challenging problem. Since optimal network selection requires large dimensions of data to be collected from several network locations and sent between several network components, the scalability can easily become a bottleneck in large-scale systems. Therefore, reducing data exchange within heterogeneous wireless networks is important. The paper aims to discuss these issues.
Design/methodology/approach
The authors study the decision-making process and the data that need to be sent between different network components. To analyze the operation of the wireless heterogeneous network, the authors built a mathematical model of the network. The objective is defined as a minimization of multicast streams in the system. To evaluate the heuristic solutions, the authors define the upper and lower bounds to their operation.
Findings
The proposed heuristic solutions substantially reduce the usage of bandwidth in mobile networks and exchange of information between the network components.
Originality/value
The authors proposed the approach that allows network selection in a decentralized manner with only limited information shared among the decision makers. The authors studied how different sets of information available to decision makers influenced the performance of the system. The work also investigates the usage of multiple paths for multicast in heterogeneous mobile environments.
Details
Keywords
Community detection is a significant research field in the study of social networks and analysis because of its tremendous applicability in multiple domains such as recommendation…
Abstract
Purpose
Community detection is a significant research field in the study of social networks and analysis because of its tremendous applicability in multiple domains such as recommendation systems, link prediction and information diffusion. The majority of the present community detection methods considers either node information only or edge information only, but not both, which can result in loss of important information regarding network structures. In real-world social networks such as Facebook and Twitter, there are many heterogeneous aspects of the entities that connect them together such as different type of interactions occurring, which are difficult to study with the help of homogeneous network structures. The purpose of this study is to explore multilayer network design to capture these heterogeneous aspects by combining different modalities of interactions in single network.
Design/methodology/approach
In this work, multilayer network model is designed while taking into account node information as well as edge information. Existing community detection algorithms are applied on the designed multilayer network to find the densely connected nodes. Community scoring functions and partition comparison are used to further analyze the community structures. In addition to this, analytic hierarchical processing-technique for order preference by similarity to ideal solution (AHP-TOPSIS)-based framework is proposed for selection of an optimal community detection algorithm.
Findings
In the absence of reliable ground-truth communities, it becomes hard to perform evaluation of generated network communities. To overcome this problem, in this paper, various community scoring functions are computed and studied for different community detection methods.
Research limitations/implications
In this study, evaluation criteria are considered to be independent. The authors observed that the criteria used are having some interdependencies, which could not be captured by the AHP method. Therefore, in future, analytic network process may be explored to capture these interdependencies among the decision attributes.
Practical implications
Proposed ranking can be used to improve the search strategy of algorithms to decrease the search time of the best fitting one according to the case study. The suggested study ranks existing community detection algorithms to find the most appropriate one.
Social implications
Community detection is useful in many applications such as recommendation systems, health care, politics, economics, e-commerce, social media and communication network.
Originality/value
Ranking of the community detection algorithms is performed using community scoring functions as well as AHP-TOPSIS methods.
Details
Keywords
Sanjay Sudhir Kulkarni and Arjav A. Bavarva
Fifth-generation (5G) networks play a significant role in handover methods. 5G wireless network is open, flexible and highly heterogeneous along with the overlay coverage and…
Abstract
Purpose
Fifth-generation (5G) networks play a significant role in handover methods. 5G wireless network is open, flexible and highly heterogeneous along with the overlay coverage and small cell deployments. Handover management is one of the main problems in the heterogeneous network. Also, handover satisfies the needs of ultra-reliable communications along with very high reliability and availability in 5G networks. Handover management deals with every active connection of a user’s device, which moves the connection between the user’s device and the counterparty from one network point to another. Thus, the handover decision determines the best access network and also decides whether the handover is performed or not.
Design/methodology/approach
The main intention of this survey is to review several existing handover technologies in 5G. Using the categories of analysis, the existing techniques are divided into different techniques such as authentication-based techniques, blockchain-based techniques, software-defined-based techniques and radio access-based techniques. The survey is made by considering the methods such as used software, categorization of methods and used in the research works. Furthermore, the handover rate is considered for performance evaluation for the handover techniques in 5G. The drawbacks present in the existing review papers are elaborated in research gaps and issues division.
Findings
Through the detailed analysis and discussion, it can be summarized that the widely concerned evaluation metric for the performance evaluation is the handover rate. It is exploited that the handover rate within the range of 91%–99% is achieved by three research papers.
Originality/value
A survey on the various handover mechanisms in 5G networks is expected in this study. The research papers used in this survey are gathered from different sources such as Google Scholar and IEEE. Also, this survey suggests a further extension for the handover mechanism in 5G networks by considering various research gaps and issues.
Details
Keywords
Mithun B. Patil and Rekha Patil
Vertical handoff mechanism (VHO) becomes very popular because of the improvements in the mobility models. These developments are less to certain circumstances and thus do not…
Abstract
Purpose
Vertical handoff mechanism (VHO) becomes very popular because of the improvements in the mobility models. These developments are less to certain circumstances and thus do not provide support in generic mobility, but the vertical handover management providing in the heterogeneous wireless networks (HWNs) is crucial and challenging. Hence, this paper introduces the vertical handoff management approach based on an effective network selection scheme.
Design/methodology/approach
This paper aims to improve the working principle of previous methods and make VHO more efficient and reliable for the HWN.Initially, the handover triggering techniques is modelled for identifying an appropriate place to initiate handover based on the computed coverage area of cellular base station or wireless local area network (WLAN) access point. Then, inappropriate networks are eliminated for determining the better network to perform handover. Accordingly, a network selection approach is introduced on the basis ofthe Fractional-dolphin echolocation-based support vector neural network (Fractional-DE-based SVNN). The Fractional-DE is designed by integrating Fractional calculus (FC) in Dolphin echolocation (DE), and thereby, modifying the update rule of the DE algorithm based on the location of the solutions in past iterations. The proposed Fractional-DE algorithm is used to train Support vector neural network (SVNN) for selecting the best weights. Several parameters, like Bit error rate (BER), End to end delay (EED), jitter, packet loss, and energy consumption are considered for choosing the best network.
Findings
The performance of the proposed VHO mechanism based on Fractional-DE is evaluated based on delay, energy consumption, staytime, and throughput. The proposed Fractional-DE method achieves the minimal delay of 0.0100 sec, the minimal energy consumption of 0.348, maximal staytime of 4.373 sec, and the maximal throughput of 109.20 kbps.
Originality/value
In this paper, a network selection approach is introduced on the basis of the Fractional-Dolphin Echolocation-based Support vector neural network (Fractional-DE-based SVNN). The Fractional-DE is designed by integrating Fractional calculus (FC) in Dolphin echolocation (DE), and thereby, modifying the update rule of the DE algorithm based on the location of the solutions in past iterations. The proposed Fractional-DE algorithm is used to train SVNN for selecting the best weights. Several parameters, like Bit error rate (BER), End to end delay (EED), jitter, packet loss, and energy consumption are considered for choosing the best network.The performance of the proposed VHO mechanism based on Fractional-DE is evaluated based on delay, energy consumption, staytime, and throughput, in which the proposed method offers the best performance.
Details
Keywords
Ghasem Shiri, Loïc Sauvée and Zam-Zam Abdirahman
The purpose of this paper is to study the impact of networks diversity on innovation activity of firms. It aims to review the structural issue in innovation networks and to…
Abstract
Purpose
The purpose of this paper is to study the impact of networks diversity on innovation activity of firms. It aims to review the structural issue in innovation networks and to distinguish different structures of networks for product and process innovation through an empirical research.
Design/methodology/approach
Using a data set of 348 European agri-food firms, the authors study the impact of bridge and redundant ties on product and process innovation of firms. This is an empirical research based on an online survey in five European countries.
Findings
The finding shows that bridge ties (measured by the number of heterogeneous networks in which firm participate) always facilitate product innovation in firms. The authors found also that a high number of heterogeneous ties in term of partners (simultaneous presence of redundant and non-redundant ties) motivate both product and process innovation in firms. Furthermore, the authors found a positive impact of network competence on process innovation.
Research limitations/implications
The measures of bridge ties and redundant ties are indirect measures. This choice is a willing choice. Direct measurement of bridge and redundant ties always requires in-depth interviews with firms managers and thereby are limited by the number of observations.
Originality/value
Research on innovations networks are dominated by case studies and researches with limited number of observations. Studying the networking behaviour, particularly the tie selection, of a wide range of firms brings additional knowledge in this field of research.
Details
Keywords
Kun You, Zubir Azhar and Qingyu Wang
This paper aims to explore how a shared service centre (SSC) is mobilised in a power-dominant context of a Chinese state-owned enterprise (SOE). Specifically, it examines the…
Abstract
Purpose
This paper aims to explore how a shared service centre (SSC) is mobilised in a power-dominant context of a Chinese state-owned enterprise (SOE). Specifically, it examines the mobilisation of SSC within this multi-divisional SOE, the role and dynamics of actors involved and the influence of changes in the integrated information system (IIS) during the mobilisation process.
Design/methodology/approach
The study follows a qualitative case study methodology. The authors draw on actor-network theory to examine the network and translation processes constructed in mobilising SSC in the chosen SOE. The data sources of this study were collected through semi-structured interviews, observations and documentary reviews.
Findings
The mobilisation of SSC is not a linear process but rather a “spiral” interplay through continuous interactions and compromises between human and non-human actors. Power gave the core actor as an orchestrator legitimacy and formality to reduce resistance and obstruction in translation for the mobilisation of SSC. The changes in IIS appear to facilitate the interaction between the heterogeneous actors.
Practical implications
This case study contributes towards understanding the mobilisation of SSC in a power-dominant context by highlighting the impact of changes in IIS and the details of the mobilisation of SSC in terms of the role played by both the individual actors and the technology.
Originality/value
This study provides a broader understanding of the interactions of the heterogeneous actors for mobilising SSC in a power-dominant context. More importantly, the study inspires future research into examining how SSC practices unfold and how the changes in IIS influence the mobilisation of SSC.
Details
Keywords
Ricky Robinson, Jadwiga Indulska and Ted McFadden
The purpose of this paper is to characterise a number of current and future computing environments and summarises their resource discovery requirements. It then seeks to analyse…
Abstract
Purpose
The purpose of this paper is to characterise a number of current and future computing environments and summarises their resource discovery requirements. It then seeks to analyse, with respect to the requirements of each environment, several established service discovery protocols and some newer protocols that are still in the research domain. In addition, the key features of a new resource discovery protocol that has been developed to operate with heterogeneous computing environments are described.
Design/methodology/approach
A comprehensive literature survey was undertaken, highlighting the shortcomings of existing resource discovery protocols with respect to large pervasive computing environments. Given the identified gaps in existing protocols, an alternative protocol is suggested.
Findings
The main findings of this paper relate to the identified shortcomings of existing resource discovery protocols. It was also found that a hybrid resource discovery protocol capable of spanning dynamic, mobile computing environments and more stable ones was able to overcome many of the challenges presented by large‐scale pervasive computing environments.
Originality/value
This paper presents comprehensive literature survey of the state‐of‐the‐art in resource discovery protocols, pointing out some of the problems that are not solved. The paper describes the design of an alternative protocol, and presents an evaluation of it. The pervasive computing research community can draw upon the survey and evaluation to guide the design of future resource discovery protocols for the increasingly dynamic world in which we live.
Details
Keywords
Chiara Luisa Cantu and Annalisa Tunisini
The research question is how can a company implement a circular innovation in a supply network context? Leveraging the main conceptual and interpretative models of the industrial…
Abstract
Purpose
The research question is how can a company implement a circular innovation in a supply network context? Leveraging the main conceptual and interpretative models of the industrial marketing and purchasing thinking, this study aims to investigate the interplay between the process of circular innovation development and the changes in the structure and dynamics of the supply network in which innovation takes place.
Design/methodology/approach
This research applies a case study design focusing on participant interaction dynamics. The case relates to an industrial company producing an innovative coating solution for compostable packaging. The data used to develop the case study came from multiple sources but primarily from semistructured interviews that cover the implementation of the circular innovation and the configuration of the circular network.
Findings
The dynamics of interconnected relationships can configure a circular network that interconnects business and non business actors through vertical, horizontal and heterogeneous relationships. The network configuration is supported by the new mobilizer actor that facilitates the sharing of circular knowledge within the circular network, together with the sharing of a market orientation and entrepreneurial orientation within the supply network, through the educational learning path.
Originality/value
This paper aims to contribute to a new understanding of how circular innovation can be developed, adopted and diffused. In a network, when circular innovation takes place, the focal issue is not the new product or technology in itself but how such innovation is developed and implemented by and through the reconfiguration of the business and non-business relationships into circular network.
Details