Search results

1 – 10 of 84
Article
Publication date: 11 October 2023

Radha Subramanyam, Y. Adline Jancy and P. Nagabushanam

Cross-layer approach in media access control (MAC) layer will address interference and jamming problems. Hybrid distributed MAC can be used for simultaneous voice, data…

Abstract

Purpose

Cross-layer approach in media access control (MAC) layer will address interference and jamming problems. Hybrid distributed MAC can be used for simultaneous voice, data transmissions in wireless sensor network (WSN) and Internet of Things (IoT) applications. Choosing the correct objective function in Nash equilibrium for game theory will address fairness index and resource allocation to the nodes. Game theory optimization for distributed may increase the network performance. The purpose of this study is to survey the various operations that can be carried out using distributive and adaptive MAC protocol. Hill climbing distributed MAC does not need a central coordination system and location-based transmission with neighbor awareness reduces transmission power.

Design/methodology/approach

Distributed MAC in wireless networks is used to address the challenges like network lifetime, reduced energy consumption and for improving delay performance. In this paper, a survey is made on various cooperative communications in MAC protocols, optimization techniques used to improve MAC performance in various applications and mathematical approaches involved in game theory optimization for MAC protocol.

Findings

Spatial reuse of channel improved by 3%–29%, and multichannel improves throughput by 8% using distributed MAC protocol. Nash equilibrium is found to perform well, which focuses on energy utility in the network by individual players. Fuzzy logic improves channel selection by 17% and secondary users’ involvement by 8%. Cross-layer approach in MAC layer will address interference and jamming problems. Hybrid distributed MAC can be used for simultaneous voice, data transmissions in WSN and IoT applications. Cross-layer and cooperative communication give energy savings of 27% and reduces hop distance by 4.7%. Choosing the correct objective function in Nash equilibrium for game theory will address fairness index and resource allocation to the nodes.

Research limitations/implications

Other optimization techniques can be applied for WSN to analyze the performance.

Practical implications

Game theory optimization for distributed may increase the network performance. Optimal cuckoo search improves throughput by 90% and reduces delay by 91%. Stochastic approaches detect 80% attacks even in 90% malicious nodes.

Social implications

Channel allocations in centralized or static manner must be based on traffic demands whether dynamic traffic or fluctuated traffic. Usage of multimedia devices also increased which in turn increased the demand for high throughput. Cochannel interference keep on changing or mitigations occur which can be handled by proper resource allocations. Network survival is by efficient usage of valid patis in the network by avoiding transmission failures and time slots’ effective usage.

Originality/value

Literature survey is carried out to find the methods which give better performance.

Details

International Journal of Pervasive Computing and Communications, vol. 20 no. 2
Type: Research Article
ISSN: 1742-7371

Keywords

Abstract

Details

Communicating Climate
Type: Book
ISBN: 978-1-83753-643-6

Open Access
Article
Publication date: 1 April 2024

Rob Elkington, Robyn Ruttenberg-Rozen and Nadia Worthington

This paper aims to explore virtual simulations, merging artificial intelligence with real-world simulations, supporting Canadian armed forces (CAF) junior military leaders (JMLs…

82

Abstract

Purpose

This paper aims to explore virtual simulations, merging artificial intelligence with real-world simulations, supporting Canadian armed forces (CAF) junior military leaders (JMLs) leadership development. Our research questions are: (1) How do virtual simulations support CAF junior military leadership development within a globalized and complex environment in the 21st century? (2) Could virtual simulations support a leadership culture change through efficacious “soft skills” training? In this paper, we explore the efficacy of virtual simulations for enhancing or developing leadership in JMLs in the CAF through a four-day pilot project with twenty JMLs (n = 20).

Design/methodology/approach

To assess the efficacy of virtual simulations for leadership development, we designed and studied a four-day leadership workshop for JMLs in the CAF using several virtual artificial intelligence leadership role-play simulations developed by McGraw Hill in their smart book textbook (Manning & Curtis, 2022) and several non-virtual in-class simulations for comparison. We selected four twenty to thirty-minute virtual role-play simulations that synergized with the in-person morning leadership workshop. We facilitated the three-hour leadership workshops and virtual/in-class simulations over four consecutive days. We emulated the ELESS model (De Freitas & Routledge, 2013) to assess soft and leadership skills.

Findings

The participants (JMLs) reported beneficial learning utility associated with the virtual simulations. Participants also expressed that further utility might be leveraged through virtual simulations incorporating greater complexity with multiple potential outcomes. They also suggested that leadership simulations designed around military situations would prove highly beneficial, something that was outside of the scope of this small pilot project.

Research limitations/implications

Since this phase of our research is a pilot project, we secured a small amount of funding to test our hypothesis that simulations enhance leadership development for JMLs. These funding limitations resulted in several constraints in the research, such as the availability of virtual simulations articulating leadership from a military perspective. However, we believed the assigned organizational leadership simulations in the McGraw Hill Smart Book ecosystem would approximate generic leadership situations enough to test the hypothesis with the JMLs. As a pilot project, our sample size was relatively small (n = 20 JMLs) since participation was voluntary amidst a busy spring season for the JMLs. Since this is a pilot project, we suggest that twenty JMLs are an adequate sampling to test the hypothesis that simulations enhance JML leadership development. We will expand the sample size in the next phase of our research as we work with the CAF to expand the pool of participants to at least forty JML participants (n = 40). We also plan to secure further funding to collaborate with subject matter experts to design virtual simulations based on Canadian military leadership scenarios.

Practical implications

The CAF host robust simulations capabilities for combat training, but have not exploited the potential training and analytical capacity of virtual leadership simulations for leadership development within the CAF. We believe that virtual simulations provide an opportunity for the CAF to effect desired culture change through leadership development that leverages the substantial pedagogical benefits of simulations.

Social implications

The CAF encountered several detrimental leadership scandals that eroded the reputational capital of the CAF. In the current geo-political climate of an expanding North American Treaty Organization (NATO) and threats from several international actors, the CAF seeks to expand its capabilities by adding and enhancing its human capital. However, the CAF currently experiences a significant gap in its human capital aspirations. There is a unanimous consensus that the endemic traditional culture of the CAF, as expressed in the recent explosive leadership scandals, is a deterrent to recruitment and thus weakens the CAF’s capability. The CAF targets leadership development with new leadership paradigms as pivotal to culture change. The CAF suggests that by enhancing leadership development in the CAF the new cadre of leadership will change the culture of the CAF and thereby enhance the reputational capital of the CAF. It is believed that this rejuvenated culture will lead to greater recruitment and retention, leading to a strengthened military. A strengthened military is important to provide effective support and protection for the Canadian people in these volatile and uncertain times. This expanded capacity will enable the CAF to address external military threats more effectively and also the increasing operations other than war (OOTW), such as the military support of long-term care facilities during COVID-19 or the military’s support in fighting record wildfires and the military’s support in climate change related disasters such as flooding.

Originality/value

The satisfaction measures indicated by the participants are typical evaluative measures of leadership development (Noe, 2023). These satisfaction ratings do not, however, indicate whether training has produced a change in behaviour (Brown, 2022). The implications of these outcomes for leadership education are that role-player simulations are useful leadership education and development tools because they provide a theatre of practice in which mistakes are not detrimental and serve as learning moments (Moore, 2012; Piro and O’Callaghan, 2021; Riotto, 2021). Further, the importance of role-player simulations that closely approximate the sector where leadership is experienced and practiced is perceived to enhance the experience. While the CAF invest in combat related simulations, but leadership development simulations are not as evident in the training and development array. This study seeks to assess their potential value as a leadership development tool within the wider context of character development as a leadership competency.

Details

Journal of Leadership Education, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 1552-9045

Keywords

Article
Publication date: 7 December 2023

Leanne Bowler, Irene Lopatovska and Mark S. Rosin

The purpose of this study is to explore teen-adult dialogic interactions during the co-design of data literacy activities in order to determine the nature of teen thinking, their…

Abstract

Purpose

The purpose of this study is to explore teen-adult dialogic interactions during the co-design of data literacy activities in order to determine the nature of teen thinking, their emotions, level of engagement, and the power of relationships between teens and adults in the context of data literacy. This study conceives of co-design as a learning space for data literacy. It investigates the teen–adult dialogic interactions and what these interactions say about the nature of teen thinking, their emotions, level of engagement and the power relationships between teens and adults.

Design/methodology/approach

The study conceives of co-design as a learning space for teens. Linguistic Inquiry and Word Count (LIWC-22), a natural language processing (NLP) software tool, was used to examine the linguistic measures of Analytic Thinking, Clout, Authenticity, and Emotional Tone using transcriptions of recorded Data Labs with teens and adults. Linguistic Inquiry and Word Count (LIWC-22), a natural language processing (NLP) software tool, was used to examine the linguistic measures of Analytic Thinking, Clout, Authenticity and Emotional Tone using transcriptions of recorded Data Labs with teens and adults.

Findings

LIWC-22 scores on the linguistic measures Analytic Thinking, Clout, Authenticity and Emotional Tone indicate that teens had a high level of friendly engagement, a relatively low sense of power compared with the adult co-designers, medium levels of spontaneity and honesty and the prevalence of positive emotions during the co-design sessions.

Practical implications

This study provides a concrete example of how to apply NLP in the context of data literacy in the public library, mapping the LIWC-22 findings to STEM-focused informal learning. It adds to the understanding of assessment/measurement tools and methods for designing data literacy education, stimulating further research and discussion on the ways to empower youth to engage more actively in informal learning about data.

Originality/value

This study applies a novel approach for exploring teen engagement within a co-design project tasked with the creation of youth-oriented data literacy activities.

Details

Information and Learning Sciences, vol. 125 no. 3/4
Type: Research Article
ISSN: 2398-5348

Keywords

Article
Publication date: 16 January 2023

Faisal Lone, Harsh Kumar Verma and Krishna Pal Sharma

The purpose of this study is to extensively explore the vehicular network paradigm, challenges faced by them and provide a reasonable solution for securing these vulnerable…

Abstract

Purpose

The purpose of this study is to extensively explore the vehicular network paradigm, challenges faced by them and provide a reasonable solution for securing these vulnerable networks. Vehicle-to-everything (V2X) communication has brought the long-anticipated goal of safe, convenient and sustainable transportation closer to reality. The connected vehicle (CV) paradigm is critical to the intelligent transportation systems vision. It imagines a society free of a troublesome transportation system burdened by gridlock, fatal accidents and a polluted environment. The authors cannot overstate the importance of CVs in solving long-standing mobility issues and making travel safer and more convenient. It is high time to explore vehicular networks in detail to suggest solutions to the challenges encountered by these highly dynamic networks.

Design/methodology/approach

This paper compiles research on various V2X topics, from a comprehensive overview of V2X networks to their unique characteristics and challenges. In doing so, the authors identify multiple issues encountered by V2X communication networks due to their open communication nature and high mobility, especially from a security perspective. Thus, this paper proposes a trust-based model to secure vehicular networks. The proposed approach uses the communicating nodes’ behavior to establish trustworthy relationships. The proposed model only allows trusted nodes to communicate among themselves while isolating malicious nodes to achieve secure communication.

Findings

Despite the benefits offered by V2X networks, they have associated challenges. As the number of CVs on the roads increase, so does the attack surface. Connected cars provide numerous safety-critical applications that, if compromised, can result in fatal consequences. While cryptographic mechanisms effectively prevent external attacks, various studies propose trust-based models to complement cryptographic solutions for dealing with internal attacks. While numerous trust-based models have been proposed, there is room for improvement in malicious node detection and complexity. Optimizing the number of nodes considered in trust calculation can reduce the complexity of state-of-the-art solutions. The theoretical analysis of the proposed model exhibits an improvement in trust calculation, better malicious node detection and fewer computations.

Originality/value

The proposed model is the first to add another dimension to trust calculation by incorporating opinions about recommender nodes. The added dimension improves the trust calculation resulting in better performance in thwarting attacks and enhancing security while also reducing the trust calculation complexity.

Details

International Journal of Pervasive Computing and Communications, vol. 20 no. 1
Type: Research Article
ISSN: 1742-7371

Keywords

Article
Publication date: 22 April 2024

Peggy Lockyer, Deidre Le Fevre and Mark Vickers

This study sets out to investigate the elements of the collaborative culture required for the successful implementation and sustainability of programs in schools. It draws on a…

Abstract

Purpose

This study sets out to investigate the elements of the collaborative culture required for the successful implementation and sustainability of programs in schools. It draws on a case study of a student peer-led physical activity (PA) program implemented within the complex and dynamic environment of school communities in New Zealand. The article outlines four key components needed to effectively implement and impact long term sustainability of a program within the school context.

Design/methodology/approach

This qualitative case study examines the implementation of a new peer-led PA program introduced across eight New Zealand schools. Data were collected from semi-structured interviews with senior leaders, teachers and parents and analyzed through a complexity theory lens.

Findings

Effective and sustainable program implementation requires a strategic, collaborative approach through actively engaging with and resourcing four key interacting components: student choice, voice and agency; collective responsibility; shared understanding of purpose; and curriculum coherence.

Originality/value

This research offers a pragmatic approach to developing collaborative school communities that can effectively implement change by highlighting key areas of focus that policymaker, school leaders and program designers can plan for.

Details

Journal of Professional Capital and Community, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 2056-9548

Keywords

Article
Publication date: 24 October 2022

Priyanka Chawla, Rutuja Hasurkar, Chaithanya Reddy Bogadi, Naga Sindhu Korlapati, Rajasree Rajendran, Sindu Ravichandran, Sai Chaitanya Tolem and Jerry Zeyu Gao

The study aims to propose an intelligent real-time traffic model to address the traffic congestion problem. The proposed model assists the urban population in their everyday lives…

Abstract

Purpose

The study aims to propose an intelligent real-time traffic model to address the traffic congestion problem. The proposed model assists the urban population in their everyday lives by assessing the probability of road accidents and accurate traffic information prediction. It also helps in reducing overall carbon dioxide emissions in the environment and assists the urban population in their everyday lives by increasing overall transportation quality.

Design/methodology/approach

This study offered a real-time traffic model based on the analysis of numerous sensor data. Real-time traffic prediction systems can identify and visualize current traffic conditions on a particular lane. The proposed model incorporated data from road sensors as well as a variety of other sources. It is difficult to capture and process large amounts of sensor data in real time. Sensor data is consumed by streaming analytics platforms that use big data technologies, which is then processed using a range of deep learning and machine learning techniques.

Findings

The study provided in this paper would fill a gap in the data analytics sector by delivering a more accurate and trustworthy model that uses internet of things sensor data and other data sources. This method can also assist organizations such as transit agencies and public safety departments in making strategic decisions by incorporating it into their platforms.

Research limitations/implications

The model has a big flaw in that it makes predictions for the period following January 2020 that are not particularly accurate. This, however, is not a flaw in the model; rather, it is a flaw in Covid-19, the global epidemic. The global pandemic has impacted the traffic scenario, resulting in erratic data for the period after February 2020. However, once the circumstance returns to normal, the authors are confident in their model’s ability to produce accurate forecasts.

Practical implications

To help users choose when to go, this study intended to pinpoint the causes of traffic congestion on the highways in the Bay Area as well as forecast real-time traffic speeds. To determine the best attributes that influence traffic speed in this study, the authors obtained data from the Caltrans performance measurement system (PeMS), reviewed it and used multiple models. The authors developed a model that can forecast traffic speed while accounting for outside variables like weather and incident data, with decent accuracy and generalizability. To assist users in determining traffic congestion at a certain location on a specific day, the forecast method uses a graphical user interface. This user interface has been designed to be readily expanded in the future as the project’s scope and usefulness increase. The authors’ Web-based traffic speed prediction platform is useful for both municipal planners and individual travellers. The authors were able to get excellent results by using five years of data (2015–2019) to train the models and forecast outcomes for 2020 data. The authors’ algorithm produced highly accurate predictions when tested using data from January 2020. The benefits of this model include accurate traffic speed forecasts for California’s four main freeways (Freeway 101, I-680, 880 and 280) for a specific place on a certain date. The scalable model performs better than the vast majority of earlier models created by other scholars in the field. The government would benefit from better planning and execution of new transportation projects if this programme were to be extended across the entire state of California. This initiative could be expanded to include the full state of California, assisting the government in better planning and implementing new transportation projects.

Social implications

To estimate traffic congestion, the proposed model takes into account a variety of data sources, including weather and incident data. According to traffic congestion statistics, “bottlenecks” account for 40% of traffic congestion, “traffic incidents” account for 25% and “work zones” account for 10% (Traffic Congestion Statistics). As a result, incident data must be considered for analysis. The study uses traffic, weather and event data from the previous five years to estimate traffic congestion in any given area. As a result, the results predicted by the proposed model would be more accurate, and commuters who need to schedule ahead of time for work would benefit greatly.

Originality/value

The proposed work allows the user to choose the optimum time and mode of transportation for them. The underlying idea behind this model is that if a car spends more time on the road, it will cause traffic congestion. The proposed system encourages users to arrive at their location in a short period of time. Congestion is an indicator that public transportation needs to be expanded. The optimum route is compared to other kinds of public transit using this methodology (Greenfield, 2014). If the commute time is comparable to that of private car transportation during peak hours, consumers should take public transportation.

Details

World Journal of Engineering, vol. 21 no. 1
Type: Research Article
ISSN: 1708-5284

Keywords

Article
Publication date: 27 February 2024

Shefali Arora, Ruchi Mittal, Avinash K. Shrivastava and Shivani Bali

Deep learning (DL) is on the rise because it can make predictions and judgments based on data that is unseen. Blockchain technologies are being combined with DL frameworks in…

Abstract

Purpose

Deep learning (DL) is on the rise because it can make predictions and judgments based on data that is unseen. Blockchain technologies are being combined with DL frameworks in various industries to provide a safe and effective infrastructure. The review comprises literature that lists the most recent techniques used in the aforementioned application sectors. We examine the current research trends across several fields and evaluate the literature in terms of its advantages and disadvantages.

Design/methodology/approach

The integration of blockchain and DL has been explored in several application domains for the past five years (2018–2023). Our research is guided by five research questions, and based on these questions, we concentrate on key application domains such as the usage of Internet of Things (IoT) in several applications, healthcare and cryptocurrency price prediction. We have analyzed the main challenges and possibilities concerning blockchain technologies. We have discussed the methodologies used in the pertinent publications in these areas and contrasted the research trends during the previous five years. Additionally, we provide a comparison of the widely used blockchain frameworks that are used to create blockchain-based DL frameworks.

Findings

By responding to five research objectives, the study highlights and assesses the effectiveness of already published works using blockchain and DL. Our findings indicate that IoT applications, such as their use in smart cities and cars, healthcare and cryptocurrency, are the key areas of research. The primary focus of current research is the enhancement of existing systems, with data analysis, storage and sharing via decentralized systems being the main motivation for this integration. Amongst the various frameworks employed, Ethereum and Hyperledger are popular among researchers in the domain of IoT and healthcare, whereas Bitcoin is popular for research on cryptocurrency.

Originality/value

There is a lack of literature that summarizes the state-of-the-art methods incorporating blockchain and DL in popular domains such as healthcare, IoT and cryptocurrency price prediction. We analyze the existing research done in the past five years (2018–2023) to review the issues and emerging trends.

Details

International Journal of Quality & Reliability Management, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 0265-671X

Keywords

Case study
Publication date: 12 July 2023

Jamie O'Brien and Anna R. Antos

The technical report released by the National Transportation Safety Board, along with the primary flight cockpit voice recorder data and archival interview data, were used as the…

Abstract

Research methodology

The technical report released by the National Transportation Safety Board, along with the primary flight cockpit voice recorder data and archival interview data, were used as the basis for this case. Other available public data such as news reports were used to round out the synopsis of the case study.

Case overview/synopsis

United Express Flight 5925 was a scheduled commuter passenger flight operated by Great Lakes Airlines with a Beechcraft 1900 twin turboprop. It was a regularly scheduled flight from Chicago O'Hare International Airport to Quincy, Illinois, with an intermediate stop in Burlington, Iowa. Drawing from various first-hand accounts (cockpit voice recorder) and secondary evidence (news reports, archival interview data, and online sources) of the tragedy, the case provides a detailed account of the key events that took place leading up to the accident at Quincy regional airport. The case describes how the radio interactions, a jammed door and degradation of situational awareness all contributed to the accident. Through many of the quotes in the text and eyewitness accounts, readers gain an understanding of the impressions and perceptions of the pilots, including how they felt about many of the critical decisions in the last minutes of the flight and the situation at the airport.

Complexity academic level

When the authors teach this case, the students are required to read it as pre-reading before class. Various readings and materials (see supplemental readings below and Exhibit 3) are made available to students before class, and the instructor can choose to use some of these materials to further explore areas of interest. This case is best explored over a 90-min session but could be expanded to take up one 3-h session. This case can be covered in an undergraduate senior capstone organizational behaviour seminar, any general organizational behaviour class (including introductory in nature), an undergraduate communication theory class or an MBA class that focuses on applied organizational behaviour concepts. It works particularly well in the MBA class, as students with work experience can make the links between the behaviours explored in the case and their everyday workplaces.

Article
Publication date: 4 April 2024

Pablo Aránguiz Mesías, Guillermo Palau Salvador and Jordi Peris-Blanes

This paper aims to explore how young students experience the contribution of a pedagogical assemblage based on design thinking (DT) while contributing to the transition to a more…

Abstract

Purpose

This paper aims to explore how young students experience the contribution of a pedagogical assemblage based on design thinking (DT) while contributing to the transition to a more just and sustainable university.

Design/methodology/approach

This qualitative research considers the case of two pedagogical experiences developed at Universitat Politècnica de Valencià, Spain. In both experiences, a methodological proposal that includes practices of care, just transitions and DT was implemented. The data obtained through in-depth interviews, surveys and digital whiteboard labels was analyzed under the lens of three relational categories in the context of sustainability.

Findings

Learnings are acquired through five categories: place-based learning, prior learning, embodied learning, collaborative teamwork and intersectionality. The research shows how the subjective knowledge of young students positions them as co-designers and leaders of a University that drives a more just and sustainable transition.

Originality/value

The originality of the paper lies in the shift of DT from a human-based approach to a justice-oriented relational approach.

Details

International Journal of Sustainability in Higher Education, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 1467-6370

Keywords

1 – 10 of 84