Search results

1 – 10 of 27
To view the access options for this content please click here
Article
Publication date: 15 November 2011

Martin Kuehnhausen and Victor S. Frost

Security and accountability within the transportation industry are vital because cargo theft could amount to as much as $60 billion per year. Since goods are often handled…

Abstract

Purpose

Security and accountability within the transportation industry are vital because cargo theft could amount to as much as $60 billion per year. Since goods are often handled by many different parties, it must be possible to tightly monitor the location of cargo and handovers. Tracking trade is difficult to manage in different formats and legacy applications Web services and open standards overcome these problems with uniform interfaces and common data formats. This allows consistent reporting, monitoring and analysis at each step. The purpose of this paper is to examine Transportation Security SensorNet (TSSN), the goal being to promote the use of open standards and specifications in combination with web services to provide cargo monitoring capabilities.

Design/methodology/approach

This paper describes a system architecture for the TSSN targeted for cargo monitoring. The paper discusses cargo security and reviews related literature and approaches. The paper then describes the proposed solution of developing a service‐oriented architecture (SOA) for cargo monitoring and its individual components.

Findings

Web services in a mobile sensor network environment have been seen as slow and producing significant overhead. The authors demonstrate that with proper architecture and design the performance requirements of the targeted scenario can be satisfied with web services; the TSSN then allows sensor networks to be utilized in a standardized and open way through web services.

Originality/value

The integration of SOA, open geospatial consortium (OGC) specifications and sensor networks is complex and difficult. As described in related works, most systems and research focus either on the combination of SOA and OGC specifications or on OGC standards and sensor networks. The TSSN shows that all three can be combined and that this combination provides cargo security and monitoring capabilities to the transportation and other industries that have not existed before.

To view the access options for this content please click here
Article
Publication date: 2 March 2015

Karlene Cousins and Daniel Robey

The purpose of this paper is to explore the role that mobile technologies play in mobile workers’ efforts to manage the boundaries between work and non-work domains…

Abstract

Purpose

The purpose of this paper is to explore the role that mobile technologies play in mobile workers’ efforts to manage the boundaries between work and non-work domains. Previous theories of work-life boundary management frame boundary management strategies as a range between the segmentation and integration of work-life domains, but fail to provide a satisfactory account of technology’s role.

Design/methodology/approach

The authors apply the concept of affordances, defined as the relationship between users’ abilities and features of mobile technology, in two field studies of a total of 25 mobile workers who used a variety of mobile devices and services.

Findings

The results demonstrate that the material features of mobile technologies offer five specific affordances that mobile workers use in managing work-life boundaries: mobility, connectedness, interoperability, identifiability and personalization. These affordances persist in their influence across time, despite their connection to different technology features.

Originality/value

The author found that mobile workers’ boundary management strategies do not fit comfortably along a linear segmentation-integration continuum. Rather, mobile workers establish a variety of personalized boundary management practices to match their particular situations. The authors speculate that mobile technology has core material properties that endure over time. The authors surmise that these material properties provide opportunities for users to interact with them in a manner to make the five affordances possible. Therefore, in the future, actors interacting with mobile devices to manage their work-life boundaries may experience affordances similar to those the authors observed because of the presence of the core material properties.

Details

Information Technology & People, vol. 28 no. 1
Type: Research Article
ISSN: 0959-3845

Keywords

To view the access options for this content please click here
Article
Publication date: 1 March 2013

Colin Blackman, Simon Forge and Robert Horvitz

The European telecommunications landscape has been transformed over the past 25 years, but spectrum management has remained largely unchanged. The paper seeks to highlight

Abstract

Purpose

The European telecommunications landscape has been transformed over the past 25 years, but spectrum management has remained largely unchanged. The paper seeks to highlight the need for a more flexible approach to spectrum management and, in particular, the role of shared spectrum access.

Design/methodology/approach

The paper draws on a research study to examine the value of shared spectrum access, based on a review of the literature, a survey of European national regulatory authorities, and scenario analysis.

Findings

The paper highlights trends in wireless data growth and, in particular, the impact of 4G cellular mobile technology over the next five years. With pressure also growing on the licence‐exempt bands at 2.4 and 5 GHz, a more flexible approach to spectrum management will be required in future, including light licensing, de‐licensing and spectrum sharing.

Originality/value

The paper brings together a range of evidence to show how the current approach to spectrum management is no longer able to cope with the social and economic demands for the radio spectrum. It should be of value to policy makers, industry analysts and academics.

To view the access options for this content please click here
Article
Publication date: 21 June 2019

Cristina Orsolin Klingenberg, Marco Antônio Viana Borges and José Antônio Valle Antunes Jr

The purpose of this paper is to identify current technologies related to Industry 4.0 and to develop a rationale to enhance the understanding of their functions within a…

Abstract

Purpose

The purpose of this paper is to identify current technologies related to Industry 4.0 and to develop a rationale to enhance the understanding of their functions within a data-driven paradigm.

Design/methodology/approach

A systematic literature review of 119 papers published in journals included in the Journal Citation Report (JCR) was conducted to identify Industry 4.0 technologies. A descriptive analysis characterizes the corpus, and a content analysis identifies the technologies.

Findings

The content analysis identified 111 technologies. These technologies perform four functions related to data: data generation and capture, data transmission, data conditioning, storage and processing and data application. The first three groups consist of enabling technologies and the fourth group of value-creating technologies. Results show that Industry 4.0 publications focus on enabling technologies that transmit and process data. Value-creating technologies, which apply data in order to develop new solutions, are still rare in the literature.

Research limitations/implications

The proposed framework serves as a structure for analysing the focus of publications over time, and enables the classification of new technologies as the paradigm evolves.

Practical implications

Because the technical side of the new production paradigm is complex and represents an evolving field, managers benefit from a simplified and data-driven approach. The proposed framework suggests that Industry 4.0 should be approached by looking at how data can create value and at what role each technology plays in this task.

Originality/value

The study makes a direct link between Industry 4.0 technologies and the key resource of this revolution, i.e. data. It provides a rationale that not only establishes relationships between technologies and data, but also highlights their roles as enablers or creators of value. Beyond showing the current focus of Industry 4.0 publications, this paper proposes a framework that is useful for tracking the evolution of the paradigm.

Details

Journal of Manufacturing Technology Management, vol. 32 no. 3
Type: Research Article
ISSN: 1741-038X

Keywords

To view the access options for this content please click here
Article
Publication date: 28 December 2020

Francis H. Shajin and Paulthurai Rajesh

This study aims to evaluate the direct trust value for each node and calculate the trust value of all nodes satisfying the condition and update the trust value and value…

Abstract

Purpose

This study aims to evaluate the direct trust value for each node and calculate the trust value of all nodes satisfying the condition and update the trust value and value each trust update interval for a secure and efficient communication between sender and destination node. Hence, a Trusted Secure Geographic Routing Protocol (TSGRP) has been proposed for detecting attackers (presence of the hacker), considering the trust value for a node produced by combining the location trusted information and the direct trusted information.

Design/methodology/approach

Amelioration in the research studies related to mobile ad hoc networks (MANETs) and wireless sensor networks has shown greater concern in the presence of malicious nodes, due to which the delivery percentage in any given network can degrade to a larger extent, and hence make the network less reliable and more vulnerable to security.

Findings

TSGRP has outperformed the conventional protocols for detecting attacks in MANET. TSGRP is establishing a trust-based secure communication between the sender and destination node. The evaluated direct trust value is used after the transmission of route-request and route-reply packets, to evaluate the direct trust value of each node and a secure path is established between the sender and the destination node. The effectiveness of the proposed TSGRP is evaluated through NS-2 simulation.

Originality/value

The simulation results show the delay of the proposed method is 92% less than PRISM approach and the overhead of the proposed TSGRP approach is 61% less than PRISM approach.

Details

International Journal of Pervasive Computing and Communications, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 1742-7371

Keywords

To view the access options for this content please click here
Article
Publication date: 1 February 2003

Patrick Xavier

There is growing concern that some groups without access to high‐speed broadband networks, e.g. those residing in rural and remote areas, will be unable to benefit from…

Abstract

There is growing concern that some groups without access to high‐speed broadband networks, e.g. those residing in rural and remote areas, will be unable to benefit from online education, health and government services, etc. Such concerns have led to arguments that universal service obligations (USOs) should be upgraded to include access to broadband. This paper reviews the arguments and concludes that, at this stage of broadband development and diffusion, there is no convincing case for USO‐type mandates. Since the case for broadband USOs should be intermittently revisited, the paper proceeds, nevertheless, to explore what would be involved in a systematic review of this issue.

Details

info, vol. 5 no. 1
Type: Research Article
ISSN: 1463-6697

Keywords

To view the access options for this content please click here
Article
Publication date: 1 August 2005

Fuyuki Ishikawa, Yasuyuki Tahara, Nobukazu Yoshioka and Shinichi Honiden

A general framework for mobile Web services ‐ which are Web services with the ability to migrate from one host to another ‐ is proposed. In this framework, a mobile Web…

Abstract

A general framework for mobile Web services ‐ which are Web services with the ability to migrate from one host to another ‐ is proposed. In this framework, a mobile Web service is composed of a combination of a BPEL process description, service components to be carried, and migration behavior descriptions using simple but expressive rules. The semantics of the descriptions are defined using Mobile Ambients, namely, a formal model of concurrent mobile processes. With this framework, it is thus possible to add or change migration behaviors without having to modify the BPEL process.

Details

International Journal of Pervasive Computing and Communications, vol. 1 no. 3
Type: Research Article
ISSN: 1742-7371

Keywords

To view the access options for this content please click here
Article
Publication date: 4 December 2020

M. Angulakshmi, M. Deepa, M. Vanitha, R. Mangayarkarasi and I. Nagarajan

In this study, we discuss three DTN routing protocols, these are epidemic, PRoPHET and spray and wait routing protocols. A special simulator will be used; that is…

Abstract

Purpose

In this study, we discuss three DTN routing protocols, these are epidemic, PRoPHET and spray and wait routing protocols. A special simulator will be used; that is opportunistic network environment (ONE) to create a network environment. Spray and wait has highest delivery rate and low latency in most of the cases. Hence, spray and wait have better performance than others. This analysis of the performance of DTN protocols helps the researcher to learn better of these protocols in the different environment.

Design/methodology/approach

Delay-Tolerant Network (DTN) is a network designed to operate effectively over extreme distances, such as those encountered in space communications or on an interplanetary scale. In such an environment, nodes are occasional communication and are available among hubs, and determinations of the next node communications are not confirmed. In such network environment, the packet can be transferred by searching current efficient route available for a particular node. Due to the uncertainty of packet transfer route, DTN is affected by a variety of factors such as packet size, communication cost, node activity, etc.

Findings

Spray and wait have highest delivery rate and low latency in most of the cases. Hence, spray and wait have better performance than others.

Originality/value

The primary goal of the paper is to extend these works in an attempt to offer a better understanding of the behavior of different DTN routing protocols with delivery probability, latency and overhead ratio that depend on various amounts of network parameters such as buffer size, number of nodes, movement ratio, time to live, movement range, transmission range and message generation rate. In this study, we discuss three DTN routing protocols: these are epidemic, PRoPHET and spray and wait routing protocols. A special simulator will be used; that is opportunistic network environment (ONE) to create a network environment. Spray and wait have highest delivery rate and low latency in most of the cases. Hence, spray and wait have better performance than others. This analysis of the performance of DTN protocols helps the researcher to learn better of these protocols in the different environment.

Details

International Journal of Intelligent Unmanned Systems, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 2049-6427

Keywords

To view the access options for this content please click here
Article
Publication date: 25 September 2007

Anastase Adonis and Khalil Drira

This paper aims to provide a methodological road for the next generation of e‐learning environments.

Abstract

Purpose

This paper aims to provide a methodological road for the next generation of e‐learning environments.

Design/methodology/approach

This paper considers a survey of recent publications (1995‐2002), which aim to provide practical and theoretical indications and advice, which are coupled with practical experimentations.

Findings

The paper provides road‐mapping elements, indicating the impact on services and systems to be expected by this design approach.

Research limitations/implications

The survey is based on a selection of sources and it is not exhaustive. The methodology experiments that are used for argumentation are based on the authors’ platform.

Practical implications

The paper presents a useful source of knowledge for researchers and advanced students.

Originality/value

This paper identifies a road for advanced e‐learning systems, and can help researchers and those in industry who desire to introduce and understand the design methodological context of advanced e‐learning systems.

Details

Interactive Technology and Smart Education, vol. 4 no. 2
Type: Research Article
ISSN: 1741-5659

Keywords

To view the access options for this content please click here
Article
Publication date: 1 March 2005

Jason Vaughan

To relate challenges associated with maintaining the technology involved in a modern, major academic research library.

Abstract

Purpose

To relate challenges associated with maintaining the technology involved in a modern, major academic research library.

Design/methodology/approach

Experiences from the past four years are categorized and discussed as they relate to information technology maintenance, enhancement, and future development. The narrative includes specific detailed examples, while maintaining a wide overall view, given the vast scope of what constitutes “information technology”.

Findings

Looking back at knowledge gained from four years of operating a new academic library, one can understand that technology is constantly evolving, creating numerous challenges. Such challenges include maintaining and enhancing existing systems and services, as well as introducing new systems and services. Associated with all such activities are a myriad challenges such as technology, funding, security, and overall resource management.

Practical implications

The findings serve to remind practitioners and administrators of the varied, complex, and expensive nature of maintaining a comprehensive information technology environment. Several concrete examples offer ideas that may aid with topics such as facility design planning and major project management.

Originality/value

This paper serves as a current case study useful for institutions considering a major library expansion or planning construction of a new major library, and also serves as a useful executive summary (with supporting specific examples) detailing the complex tasks associated with maintaining and enhancing information technology resources.

Details

Library Hi Tech, vol. 23 no. 1
Type: Research Article
ISSN: 0737-8831

Keywords

1 – 10 of 27