Search results

1 – 10 of 56
Open Access
Article
Publication date: 7 July 2022

Sirilak Ketchaya and Apisit Rattanatranurak

Sorting is a very important algorithm to solve problems in computer science. The most well-known divide and conquer sorting algorithm is quicksort. It starts with dividing the…

1279

Abstract

Purpose

Sorting is a very important algorithm to solve problems in computer science. The most well-known divide and conquer sorting algorithm is quicksort. It starts with dividing the data into subarrays and finally sorting them.

Design/methodology/approach

In this paper, the algorithm named Dual Parallel Partition Sorting (DPPSort) is analyzed and optimized. It consists of a partitioning algorithm named Dual Parallel Partition (DPPartition). The DPPartition is analyzed and optimized in this paper and sorted with standard sorting functions named qsort and STLSort which are quicksort, and introsort algorithms, respectively. This algorithm is run on any shared memory/multicore systems. OpenMP library which supports multiprocessing programming is developed to be compatible with C/C++ standard library function. The authors’ algorithm recursively divides an unsorted array into two halves equally in parallel with Lomuto's partitioning and merge without compare-and-swap instructions. Then, qsort/STLSort is executed in parallel while the subarray is smaller than the sorting cutoff.

Findings

In the authors’ experiments, the 4-core Intel i7-6770 with Ubuntu Linux system is implemented. DPPSort is faster than qsort and STLSort up to 6.82× and 5.88× on Uint64 random distributions, respectively.

Originality/value

The authors can improve the performance of the parallel sorting algorithm by reducing the compare-and-swap instructions in the algorithm. This concept can be used to develop related problems to increase speedup of algorithms.

Details

Applied Computing and Informatics, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 2634-1964

Keywords

Open Access
Book part
Publication date: 4 October 2019

Benjamin Schiemer, Elke Schüßler and Gernot Grabher

This chapter advances our understanding of collaborative innovation processes that span across organizational boundaries by providing an ethnographic account of idea generation…

Abstract

This chapter advances our understanding of collaborative innovation processes that span across organizational boundaries by providing an ethnographic account of idea generation dynamics in a member-initiated online songwriting community. Applying a science and technology studies perspective on processes “in the making,” the findings of this chapter reveal the generative entanglements of three processes of content-in-the-making, skill-in-the-making, and community-in-the-making that were triggered and maintained over time by temporary stabilizations of provisional, interim outcomes. These findings also elucidate interferences between these three processes, particularly when an increased focus on songs as products undermines the ongoing collaborative production of ideas. Regular interventions in the community design were necessary to simultaneously stimulate the three processes and counteract interfering tendencies that either prioritized content production, community building, or skill development, respectively. The authors conclude that firms seeking to tap into online communities’ innovative potential need to appreciate community and skill development as creative processes in their own right that have to be fostered and kept in sync with content production.

Details

Managing Inter-organizational Collaborations: Process Views
Type: Book
ISBN: 978-1-78756-592-0

Keywords

Open Access
Article
Publication date: 1 May 2018

N.M. Fonseca Ferreira, André Araujo, M.S. Couceiro and David Portugal

This paper describes a two-month summer intensive course designed to introduce participants with a hands-on technical craft on robotics and to acquire experience in the low-level…

Abstract

This paper describes a two-month summer intensive course designed to introduce participants with a hands-on technical craft on robotics and to acquire experience in the low-level details of embedded systems. Attendants started this course with a brief introduction to robotics; learned to draw, design and create a personalized 3D structure for their mobile robotic platform and developed skills in embedded systems. They were familiarize with the practices used in robotics, learning to connect all sensors and actuator, developing a typical application on differential kinematic using Arduino, exploring ROS features under Raspberry Pi environment and Arduino – Raspberry Pi communication. Different paradigms and some real applications and programming were addressed on the topic of Artificial Intelligence. Throughout the course, participants were introduced to programming languages (including Python and C++), advanced programming concepts such as ROS, basic API development, system concepts such as I2C and UART serial interfaces, PWM motor control and sensor fusion to improve robotic navigation and localization. This paper describes not just the concept, layout and methodology used on RobotCraft 2017 but also presents the participants knowledge background and their overall opinions, leading to focus on lessons learned and suggestions for future editions.

Details

Applied Computing and Informatics, vol. 16 no. 1/2
Type: Research Article
ISSN: 2634-1964

Keywords

Open Access
Article
Publication date: 6 June 2018

Jaafar EL Bakkali, Hamid Mansouri and Abderrahim Doudouh

In this work, a user-friendly Java-based open-source software has been developed for internal radiation dosimetry. Based on values published by the International Commission on…

Abstract

In this work, a user-friendly Java-based open-source software has been developed for internal radiation dosimetry. Based on values published by the International Commission on Radiological Protection (ICRP), the software calculates the estimated absorbed dose for each organ and also the estimated effective dose, this for about forty of the most known radioactive drugs. In addition, the present software offers many features which include: 1) a very friendly graphical user-interface (GUI) designed to facilitate the process of selecting mandatory input data such as radiopharmaceutical product, administered activity and patient's data, 2) a tool for generating a medical report, which can be exported as PDF file or printed directly and then incorporated into the patient's record, 3) a SQLite database for storing patient's specific and dosimetric data. We believe that the present software can be a useful tool for nuclear medicine workers. It is freely available for download on GitHub (https://github.com/EL-Bakkali-Jaafar/RadioPharmaDose).

Details

Applied Computing and Informatics, vol. 16 no. 1/2
Type: Research Article
ISSN: 2634-1964

Keywords

Open Access
Article
Publication date: 22 July 2020

Nsikak P. Owoh and M. Mahinderjit Singh

The proliferation of mobile phones with integrated sensors makes large scale sensing possible at low cost. During mobile sensing, data mostly contain sensitive information of…

2118

Abstract

The proliferation of mobile phones with integrated sensors makes large scale sensing possible at low cost. During mobile sensing, data mostly contain sensitive information of users such as their real-time location. When such information are not effectively secured, users’ privacy can be violated due to eavesdropping and information disclosure. In this paper, we demonstrated the possibility of unauthorized access to location information of a user during sensing due to the ineffective security mechanisms in most sensing applications. We analyzed 40 apps downloaded from Google Play Store and results showed a 100% success rate in traffic interception and disclosure of sensitive information of users. As a countermeasure, a security scheme which ensures encryption and authentication of sensed data using Advanced Encryption Standard 256-Galois Counter Mode was proposed. End-to-end security of location and motion data from smartphone sensors are ensured using the proposed security scheme. Security analysis of the proposed scheme showed it to be effective in protecting Android based sensor data against eavesdropping, information disclosure and data modification.

Details

Applied Computing and Informatics, vol. 18 no. 1/2
Type: Research Article
ISSN: 2210-8327

Keywords

Open Access
Article
Publication date: 13 May 2024

Khaled Abed Alghani, Marko Kohtamäki and Sascha Kraus

The proliferation of industry platforms has disrupted several industries. Firms adopting a platform business model have experienced a substantial expansion in size and scale…

Abstract

Purpose

The proliferation of industry platforms has disrupted several industries. Firms adopting a platform business model have experienced a substantial expansion in size and scale, positioning themselves as the foremost valuable entities in market capitalization. Over the past two decades, there has been a substantial expansion in the body of literature dedicated to platforms, and different streams of research have emerged. Despite considerable efforts and the significant progress made in recent years toward a comprehensive understanding of industry platforms, there is still room for further harnessing the field’s diversity. As a result, the aim of this article is to examine the field’s structure, identify research concerns and provide suggestions for future research, thereby enhancing the overall understanding of industry platforms.

Design/methodology/approach

We conducted a thorough examination of 458 articles on the topic using bibliometric methods and systematic review techniques.

Findings

Through co-citation analysis, we identified five distinct clusters rooted in various bodies of literature: two-sided markets, industry platforms, digital platforms, innovation platforms and two-sided networks. Furthermore, the examination of these five clusters has revealed three key areas that demand further consideration: (1) terminologies, (2) classifications and (3) perspectives.

Originality/value

While previous reviews have provided valuable insights into the topic of industry platforms, none have explored the structure of the field so far. Consequently, as a first step toward advancing the field, we uncover the structure of the literature, identifying three major areas of concern. By addressing these concerns, our goal is to converge different clusters, thereby harnessing the diversity in the field and enhancing the overall understanding of industry platforms.

Details

European Journal of Innovation Management, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 1460-1060

Keywords

Open Access
Article
Publication date: 28 March 2022

Yunfei Li, Shengbo Eben Li, Xingheng Jia, Shulin Zeng and Yu Wang

The purpose of this paper is to reduce the difficulty of model predictive control (MPC) deployment on FPGA so that researchers can make better use of FPGA technology for academic…

1352

Abstract

Purpose

The purpose of this paper is to reduce the difficulty of model predictive control (MPC) deployment on FPGA so that researchers can make better use of FPGA technology for academic research.

Design/methodology/approach

In this paper, the MPC algorithm is written into FPGA by combining hardware with software. Experiments have verified this method.

Findings

This paper implements a ZYNQ-based design method, which could significantly reduce the difficulty of development. The comparison with the CPU solution results proves that FPGA has a significant acceleration effect on the solution of MPC through the method.

Research limitations implications

Due to the limitation of practical conditions, this paper cannot carry out a hardware-in-the-loop experiment for the time being, instead of an open-loop experiment.

Originality value

This paper proposes a new design method to deploy the MPC algorithm to the FPGA, reducing the development difficulty of the algorithm implementation on FPGA. It greatly facilitates researchers in the field of autonomous driving to carry out FPGA algorithm hardware acceleration research.

Details

Journal of Intelligent and Connected Vehicles, vol. 5 no. 2
Type: Research Article
ISSN: 2399-9802

Keywords

Open Access
Article
Publication date: 4 April 2023

Osman Imoro and Nampombe Saurombe

Ghanaian public universities have fully embraced the concept of open access. This is evident in the increasing numbers of institutional repositories (IRs) by universities in…

1349

Abstract

Purpose

Ghanaian public universities have fully embraced the concept of open access. This is evident in the increasing numbers of institutional repositories (IRs) by universities in Ghana. However, to ensure the sustainability of these IRs, it is vital the current IR infrastructure is capable of responding to current and future demands. The purpose of this study is to investigate the sustainability of the current IR infrastructure of public universities in Ghana.

Design/methodology/approach

The convergent parallel mixed methods design was adopted. A total of 830 respondents comprising IR managers, library staff (digitisation and e-resources units), postgraduate students, lecturers and university librarians from five public universities in Ghana were sampled for this study. A questionnaire and a semi-structured interview guide were the main instruments used for data collection.

Findings

The findings of this study revealed that the IR infrastructure of public universities in Ghana is robust and has the capacity to expand when the need arises. However, funding, cost of internet connectivity, personnel and erratic power supply were identified as major challenges confronting IRs in Ghana.

Originality/value

This study highlighted Ghana's existing IR infrastructure situation. This study is a significant contribution to the literature from West Africa because there is not much research on IR infrastructure from this part of the world.

Details

Collection and Curation, vol. 43 no. 1
Type: Research Article
ISSN: 2514-9326

Keywords

Open Access
Article
Publication date: 7 April 2020

Fatima M. Isiaka, Salihu Abdullahi Audu and Mustafa Ahmed Umar

The dependence on the use of information systems for nearly every activity and functions in the internet is increasingly high. This form of interconnectedness has bolstered…

2303

Abstract

Purpose

The dependence on the use of information systems for nearly every activity and functions in the internet is increasingly high. This form of interconnectedness has bolstered national economies, enhanced how governments interact with their citizens and how ordinary people connect with friends and family. However, this dependence has equally resulted to a high rise in vulnerability, threat and risk associated with more use of information and communication technology. Cyber-attacks that have the potential to disrupt or damage information system infrastructure are getting more complex with some level of sophistication. Traditional protection of information system infrastructure is no longer sufficient; systems have proven to be immune to failure or incidents. This paper aims to ensure that there is a continuous availability of services through a fail-safe proof.

Design/methodology/approach

MYSQL replication technique was used to develop a model based on three-tier layers using the principle of network interdependency and the replication techniques. Tier 1 depicts a Telecom organization serving as service provider that provides internet service to Tier 2 organization – a Bank; Tier 3 is the financial App that can be used by bank staff and customers. The fail-safe mode integrated mechanism enables Tier 3 to continue to render its services in the event of an attack on Tier 1 such as DDoS without disruption.

Findings

This technique succeeded in mitigating the loss of data if cyber incident occurred or reception of uninterrupted services is countered, which give rise to future master-to-master architecture.

Research limitations/implications

The study conducted is limited to the design and development of a fail-safe system for interdependent networks or systems using MYSQL replication technique.

Originality/value

In an interdependent environment such as the cyberspace, the sectors are interdependent for optimal results. The originality of the work ensures that there is availability of services which is sustained and that data integrity is assured using the fail-safe technique based on MySQL replication method.

Details

International Journal of Crowd Science, vol. 4 no. 2
Type: Research Article
ISSN: 2398-7294

Keywords

Open Access
Article
Publication date: 1 August 2016

Chew Bee Leng, Kamsiah Mohd Ali and Ch’ng Eng Hoo

Triggered by the advancement of information and communications technology, open access repositories (a variant of digital libraries) is one of the important changes impacting…

4545

Abstract

Purpose

Triggered by the advancement of information and communications technology, open access repositories (a variant of digital libraries) is one of the important changes impacting library services. In the context of openness to a wider community to access free resources, Wawasan Open University Library initiated a research project to build open access repositories on open educational resources. Open educational resources (OER) is an area of a multifaceted open movement in education. The purpose of this paper is to show how two web portal repositories on OER materials were developed adopting a Japanese open source software, called WEKO.

Design/methodology/approach

The design approach is based on a pull to push strategy whereby metadata of scholarly open access materials kept within the institution and network communities’ digital databases were harvested using the Open Archives Initiatives Protocol for Metadata Harvesting method into another open knowledge platform for discovery by other users.

Findings

Positive results emanating from the university open access repositories development showed how it strengthen the role of the librarian as manager of institutional assets and successfully making the content freely available from this open knowledge platform for reuse in learning and teaching.

Research limitations/implications

Developing further programmes to encourage, influence faculty members and prospective stakeholders to use and contribute content to the valuable repositories is indeed a challenging task.

Originality/value

This paper provides insight for academic libraries on how open access repositories development and metadata analysis can enhance new professional challenges for information professionals in the field of data management, data quality and intricacies of supporting data repositories and build new open models of collaboration across institutions and libraries. This paper also describes future collaboration work with institutions in sharing their open access resources.

Details

Asian Association of Open Universities Journal, vol. 11 no. 1
Type: Research Article
ISSN: 1858-3431

Keywords

1 – 10 of 56