Search results
1 – 10 of 37Priyanka Kumari Bhansali, Dilendra Hiran and Kamal Gulati
The purpose of this paper is to secure health data collection and transmission (SHDCT). In this system, a native network consists of portable smart devices that interact with…
Abstract
Purpose
The purpose of this paper is to secure health data collection and transmission (SHDCT). In this system, a native network consists of portable smart devices that interact with multiple gateways. It entails IoMT devices and wearables connecting to exchange sensitive data with a sensor node which performs the aggeration process and then communicates the data using a Fog server. If the aggregator sensor loses the connection from the Fog server, it will be unable to submit data directly to the Fog server. The node transmits encrypted information with a neighboring sensor and sends it to the Fog server integrated with federated learning, which encrypts data to the existing data. The fog server performs the operations on the measured data, and the values are stored in the local storage area and later it is updated to the cloud server.
Design/methodology/approach
SHDCT uses an Internet-of-things (IoT)-based monitoring network, making it possible for smart devices to connect and interact with each other. The main purpose of the monitoring network has been in the collection of biological data and additional information from mobile devices to the patients. The monitoring network is composed of three different types of smart devices that is at the heart of the IoT.
Findings
It has been addressed in this work how to design an architecture for safe data aggregation in heterogeneous IoT-federated learning-enabled wireless sensor networks (WSNs), which makes use of basic encoding and data aggregation methods to achieve this. The authors suggest that the small gateway node (SGN) captures all of the sensed data from the SD and uses a simple, lightweight encoding scheme and cryptographic techniques to convey the data to the gateway node (GWN). The GWN gets all of the medical data from SGN and ensures that the data is accurate and up to date. If the data obtained is trustworthy, then the medical data should be aggregated and sent to the Fog server for further processing. The Java programming language simulates and analyzes the proposed SHDCT model for deployment and message initiation. When comparing the SHDCT scheme to the SPPDA and electrohydrodynamic atomisation (EHDA) schemes, the results show that the SHDCT method performs significantly better. When compared with the SPPDA and EHDA schemes, the suggested SHDCT plan necessitates a lower communication cost. In comparison to EHDA and SPPDA, SHDCT achieves 4.72% and 13.59% less, respectively. When compared to other transmission techniques, SHDCT has a higher transmission ratio. When compared with EHDA and SPPDA, SHDCT achieves 8.47% and 24.41% higher transmission ratios, respectively. When compared with other ways it uses less electricity. When compared with EHDA and SPPDA, SHDCT achieves 5.85% and 18.86% greater residual energy, respectively.
Originality/value
In the health care sector, a series of interconnected medical devices collect data using IoT networks in the health care domain. Preventive, predictive, personalized and participatory care is becoming increasingly popular in the health care sector. Safe data collection and transfer to a centralized server is a challenging scenario. This study presents a mechanism for SHDCT. The mechanism consists of Smart healthcare IoT devices working on federated learning that link up with one another to exchange health data. Health data is sensitive and needs to be exchanged securely and efficiently. In the mechanism, the sensing devices send data to a SGN. This SGN uses a lightweight encoding scheme and performs cryptography techniques to communicate the data with the GWN. The GWN gets all the health data from the SGN and makes it possible to confirm that the data is validated. If the received data is reliable, then aggregate the medical data and transmit it to the Fog server for further process. The performance parameters are compared with the other systems in terms of communication costs, transmission ratio and energy use.
Details
Keywords
Marya Tabassum, Muhammad Mustafa Raziq and Naukhez Sarwar
Agile project teams are self-managing and self-organizing teams, and these two characteristics are pivotal attributes of emergent leadership. Emergent leadership is thus common in…
Abstract
Purpose
Agile project teams are self-managing and self-organizing teams, and these two characteristics are pivotal attributes of emergent leadership. Emergent leadership is thus common in agile teams – however, how these (informal) emergent leaders can be identified in teams remains far from understood. The purpose of this research is to uncover techniques that enable top management to identify emergent agile leaders.
Methodology/design
We approached six agile teams from four organizations. We employ social network analysis (SNA) and aggregation approaches to identify emergent agile leaders.
Design/methodology/approach
We approached six agile teams from four organizations. We employ SNA and aggregation approaches to identify emergent agile leaders.
Findings
Seven emergent leaders are identified using the SNA and aggregation approaches. The same leaders are also identified using the KeyPlayer algorithms. One emergent leader is identified from each of the five teams, for a total of five emergent leaders from the five teams. However, two emergent leaders are identified for the remaining sixth team.
Originality/value
Emergent leadership is a relatively new phenomenon where leaders emerge from within teams without having a formal leadership assigned role. A challenge remains as to how such leaders can be identified without any formal leadership status. We contribute by showing how network analysis and aggregation approaches are suitable for the identification of emergent leadership talent within teams. In addition, we help advance leadership research by describing the network behaviors of emergent leaders and offering a way forward to identify more than one emergent leader in a team. We also show some limitations of the approaches used and offer some useful insights.
Details
Keywords
Kamalakshi Dayal and Vandana Bassoo
The performance of Wireless Sensor Networks (WSNs) applications is bounded by the limited resources of battery-enabled Sensor Nodes (SNs), which include energy and computational…
Abstract
Purpose
The performance of Wireless Sensor Networks (WSNs) applications is bounded by the limited resources of battery-enabled Sensor Nodes (SNs), which include energy and computational power; the combination of which existing research seldom focuses on. Although bio-inspired algorithms provide a way to control energy usage by finding optimal routing paths, those which converge slower require even more computational power, which altogether degrades the overall lifetime of SNs.
Design/methodology/approach
Hence, two novel routing protocols are proposed using the Red-Deer Algorithm (RDA) in a WSN scenario, namely Horizontal PEG-RDA Equal Clustering and Horizontal PEG-RDA Unequal Clustering, to address the limited computational power of SNs. Clustering, data aggregation and multi-hop transmission are also integrated to improve energy usage. Unequal clustering is applied in the second protocol to mitigate the hotspot problem in Horizontal PEG-RDA Equal Clustering.
Findings
Comparisons with the well-founded Ant Colony Optimisation (ACO) algorithm reveal that RDA converges faster by 85 and 80% on average when the network size and node density are varied, respectively. Furthermore, 33% fewer packets are lost using the unequal clustering approach which also makes the network resilient to node failures. Improvements in terms of residual energy and overall network lifetime are also observed.
Originality/value
Proposal of a bio-inspired algorithm, namely the RDA to find optimal routing paths in WSN and to enhance convergence rate and execution time against the well-established ACO algorithm. Creation of a novel chain cluster-based routing protocol using RDA, named Horizontal PEG-RDA Equal Clustering. Design of an unequal clustering equivalent of the proposed Horizontal PEG-RDA Equal Clustering protocol to tackle the hotspot problem, which enhances residual energy and overall network lifetime, as well as minimises packet loss.
Details
Keywords
Pradyumna Kumar Tripathy, Anurag Shrivastava, Varsha Agarwal, Devangkumar Umakant Shah, Chandra Sekhar Reddy L. and S.V. Akilandeeswari
This paper aims to provide the security and privacy for Byzantine clients from different types of attacks.
Abstract
Purpose
This paper aims to provide the security and privacy for Byzantine clients from different types of attacks.
Design/methodology/approach
In this paper, the authors use Federated Learning Algorithm Based On Matrix Mapping For Data Privacy over Edge Computing.
Findings
By using Softmax layer probability distribution for model byzantine tolerance can be increased from 40% to 45% in the blocking-convergence attack, and the edge backdoor attack can be stopped.
Originality/value
By using Softmax layer probability distribution for model the results of the tests, the aggregation method can protect at least 30% of Byzantine clients.
Details
Keywords
Fara Azmat, Ahmed Shahriar Ferdous, Faisal Wali, Mohammad Badrul Muttakin and Mohammed Ziaul Haque
This study examines whether engagement with Sustainable Development Goal (SDG)-focused specialized training programs enable senior public officials (focal actor) to collectively…
Abstract
Purpose
This study examines whether engagement with Sustainable Development Goal (SDG)-focused specialized training programs enable senior public officials (focal actor) to collectively deliver on public services that have a transformational societal impact over time. Further, the study explores the factors that impede and facilitate the delivery of such services. The authors do so by using service mechanics theorization and drawing on the lens of actor and collective engagement.
Design/methodology/approach
This study undertakes a longitudinal exploratory qualitative study design. SDG-focused training programs were delivered, as interventions, for two cohorts of senior public officials from Bangladesh in an Australian University in 2017 and 2019. In-depth interviews were conducted upon the training's completion and then after 8- and 12-month intervals to assess the short- and long-term impact respectively.
Findings
An empirical framework is proposed from the study findings. It shows that engagement – cognitive, emotional and behavioral – with SDG-focused specialized training programs enables focal actors (i.e. senior public officials) to engage other actors (other public officials, community members) in networks, facilitated the delivery of SDG-aligned public services. Such engagement results in a transformative impact that spans micro (individual), meso (organizational) and macro (societal) levels over time. Factors that impede and facilitate SDG-aligned delivery of public services are also identified.
Research limitations/implications
Theoretically, the authors contribute to the literature that relates to actor and collective engagement, SDG-focused capacity-building training programs and service mechanics. Practically, this study informs organizations about the ways that they can effectively engage their senior employees with capacity-building training programs that focus on sustainability.
Originality/value
This study is one of the few that connects the interface between public service delivery for enacting societal changes and SDG-focused capacity-building training programs through service mechanics theorization and using the lens of actor and collective engagement.
Details
Keywords
Akhilesh S Thyagaturu, Giang Nguyen, Bhaskar Prasad Rimal and Martin Reisslein
Cloud computing originated in central data centers that are connected to the backbone of the Internet. The network transport to and from a distant data center incurs long…
Abstract
Purpose
Cloud computing originated in central data centers that are connected to the backbone of the Internet. The network transport to and from a distant data center incurs long latencies that hinder modern low-latency applications. In order to flexibly support the computing demands of users, cloud computing is evolving toward a continuum of cloud computing resources that are distributed between the end users and a distant data center. The purpose of this review paper is to concisely summarize the state-of-the-art in the evolving cloud computing field and to outline research imperatives.
Design/methodology/approach
The authors identify two main dimensions (or axes) of development of cloud computing: the trend toward flexibility of scaling computing resources, which the authors denote as Flex-Cloud, and the trend toward ubiquitous cloud computing, which the authors denote as Ubi-Cloud. Along these two axes of Flex-Cloud and Ubi-Cloud, the authors review the existing research and development and identify pressing open problems.
Findings
The authors find that extensive research and development efforts have addressed some Ubi-Cloud and Flex-Cloud challenges resulting in exciting advances to date. However, a wide array of research challenges remains open, thus providing a fertile field for future research and development.
Originality/value
This review paper is the first to define the concept of the Ubi-Flex-Cloud as the two-dimensional research and design space for cloud computing research and development. The Ubi-Flex-Cloud concept can serve as a foundation and reference framework for planning and positioning future cloud computing research and development efforts.
Details
Keywords
Yongliang Deng, Zedong Liu, Liangliang Song, Guodong Ni and Na Xu
The purpose of this study is to identify the causative factors of metro construction safety accidents, analyze the correlation between accidents and causative factors and assist…
Abstract
Purpose
The purpose of this study is to identify the causative factors of metro construction safety accidents, analyze the correlation between accidents and causative factors and assist in developing safety management strategies for improving safety performance in the context of the Chinese construction industry.
Design/methodology/approach
To achieve these objectives, 13 types and 48 causations were determined based on 274 construction safety accidents in China. Then, 204 cause-and-effect relationships among accidents and causations were identified based on data mining. Next, network theory was employed to develop and analyze the metro construction accident causation network (MCACN).
Findings
The topological characteristics of MCACN were obtained, it is both a small-world network and a scale-free network. Controlling critical causative factors can effectively control the occurrence of metro construction accidents. Degree centrality strategy is better than closeness centrality strategy and betweenness centrality strategy.
Research limitations/implications
In practice, it is very difficult to quantitatively identify and determine the importance of different accidents and causative factors. The weights of nodes and edges are failed to be assigned when constructing MCACN.
Practical implications
This study provides a theoretical basis and feasible management reference for construction enterprises in China to control construction risks and reduce safety accidents. More safety resources should be allocated to control critical risks. It is recommended that safety managers implement degree centrality strategy when making safety-related decisions.
Originality/value
This paper establishes the MCACN model based on data mining and network theory, identifies the properties and clarifies the mechanism of metro construction accidents and causations.
Details
Keywords
The manufacturing industry and the producer service industry have a high degree of industrial correlation, and their integration will cause changes in the complex industrial…
Abstract
Purpose
The manufacturing industry and the producer service industry have a high degree of industrial correlation, and their integration will cause changes in the complex industrial network topology, which is an important reason for the synergistic effect. This paper describes the topology of industrial systems using complex network theory; further, it discusses how to identify the criticality and importance of industrial nodes, and whether node characteristics cause synergistic effects.
Design/methodology/approach
Based on the input-output data of China in 2007, 2012 and 2017, this paper constructs the industrial complex network of 30 Chinese provinces and cities, and measures the regional network characteristics of the manufacturing industry. The fixed-effect panel regression model is adopted to test the influence of agglomeration degree and centrality on synergies, and its adjustment mechanism is explored.
Findings
The degree of network agglomeration in the manufacturing industry exerts a negative impact on the synergistic effect, while the centrality of the network exerts a significant promoting effect on the synergistic effect. The results of adjustment mechanism test show that enhancing the autonomous controllable ability of the regional industrial chain in the manufacturing industry can effectively reduce the effect of network characteristics on the synergistic effect.
Research limitations/implications
Based on input-output technology, this paper constructs a complex industrial network model, however, only basic flow data are used. Considerable in-depth and detailed research on the economic and technological connections within the industry should be conducted in the future. The selection of the evaluation index of the importance of industrial nodes also needs to be further considered. For historical reasons, it is also difficult to obtain and process data when carrying out quantitative analysis; therefore, it is necessary to make further attempts from the data source and the expression form of evaluation indicators.
Practical implications
In a practical sense this has certain reference value for the formulation of manufacturing industrial policies the optimization of regional industrial layout and the improvement of the industrial development level. It is necessary to formulate targeted and specialized industrial development strategies according to the characteristics of the manufacturing industry appropriately regulate the autonomous controllable ability of the industrial chain and avoid to limit the development of industries which is in turn limited by regional resources. Industry competition and market congestion need to be reduced industry exchanges outside the region encouraged the industrial layout optimized and the construction of a modern industrial system accelerated.
Social implications
The above research results hold certain reference importance for policy formulation related to the manufacturing industry, regional industrial layout optimization and industrial development level improvement. Targeted specialized industrial development strategies need to be formulated according to the characteristics of the manufacturing industry; the autonomous controllability of the industrial chain needs to be appropriately regulated; limitation of regional resources needs to be avoided as this restricts industrial development; and industry competition and market congestion need to be reduced. Agglomeration of production factors and optimization of resource allocation is an important part of a beneficial regional economic development strategy, and it is also an inevitable choice for industrialization to develop to a certain stage under the condition of a market economy. In alignment with the research conclusions, effective suggestions can be put forward for the current major industrial policies. In the process of promoting the development of the manufacturing industry, it is necessary for regional governments to carry out unified planning and guidance on the spatial layout of each manufacturing subsector. Regional governments need to effectively allocate inter-industry resources, better share economies of scale, constantly enhance the competitive advantages and competitiveness of development zones and new districts and promote the coordinated agglomeration and development of related industries with input industries. Industrial exchanges outside the region should be encouraged, the industrial layout should be optimized and the construction of a modern industrial system should be accelerated.
Originality/value
Complex network theory is introduced to study the industrial synergy effect. A complex industrial network of China's 30 regions is built and key network nodes are measured. Based on the dimensionality of the “industrial node – industrial chain – industrial complex network”, the research path of industrial complex networks is improved.
Details
Keywords
Giulia Monteverde and Andrea Runfola
This paper aims to integrate the consumption perspective within the Industrial Marketing and Purchasing (IMP) debate. The study delves into how consumer communities can be…
Abstract
Purpose
This paper aims to integrate the consumption perspective within the Industrial Marketing and Purchasing (IMP) debate. The study delves into how consumer communities can be conceived like other network business actors. The perspective of sustainable new ventures (SNVs) in the fashion industry is adopted, considering their specific connection with consumer communities.
Design/methodology/approach
Adopting a multiple case study methodology, this paper uses a qualitative approach. Data collection mainly relies on interviews conducted with 10 SNVs in the fashion industry; this sector is a fertile ground for studying sustainability and consumer communities. For data analysis, the abductive approach of systematic combining is applied.
Findings
The paper identifies four distinct types of consumer communities and four roles that they can assume as business actors in the business network. Owing to their engagement in these specific roles, consumer communities become part of the SNVs’ network, akin to other business-to-business players.
Originality/value
This study represents one of the initial endeavors to introduce consumption into the IMP theoretical framework. In this paper’s conceptualization, consumer communities are groups of consumers and collective actors in the business network. Additionally, this study advances the research on sustainability as a network concept by including consumer communities’ roles in business networks.
Details
Keywords
Intelligent prediction of node localization in wireless sensor networks (WSNs) is a major concern for researchers. The huge amount of data generated by modern sensor array systems…
Abstract
Purpose
Intelligent prediction of node localization in wireless sensor networks (WSNs) is a major concern for researchers. The huge amount of data generated by modern sensor array systems required computationally efficient calibration techniques. This paper aims to improve localization accuracy by identifying obstacles in the optimization process and network scenarios.
Design/methodology/approach
The proposed method is used to incorporate distance estimation between nodes and packet transmission hop counts. This estimation is used in the proposed support vector machine (SVM) to find the network path using a time difference of arrival (TDoA)-based SVM. However, if the data set is noisy, SVM is prone to poor optimization, which leads to overlapping of target classes and the pathways through TDoA. The enhanced gray wolf optimization (EGWO) technique is introduced to eliminate overlapping target classes in the SVM.
Findings
The performance and efficacy of the model using existing TDoA methodologies are analyzed. The simulation results show that the proposed TDoA-EGWO achieves a higher rate of detection efficiency of 98% and control overhead of 97.8% and a better packet delivery ratio than other traditional methods.
Originality/value
The proposed method is successful in detecting the unknown position of the sensor node with a detection rate greater than that of other methods.
Details