Search results

1 – 10 of 14
Article
Publication date: 11 October 2023

Radha Subramanyam, Y. Adline Jancy and P. Nagabushanam

Cross-layer approach in media access control (MAC) layer will address interference and jamming problems. Hybrid distributed MAC can be used for simultaneous voice, data…

Abstract

Purpose

Cross-layer approach in media access control (MAC) layer will address interference and jamming problems. Hybrid distributed MAC can be used for simultaneous voice, data transmissions in wireless sensor network (WSN) and Internet of Things (IoT) applications. Choosing the correct objective function in Nash equilibrium for game theory will address fairness index and resource allocation to the nodes. Game theory optimization for distributed may increase the network performance. The purpose of this study is to survey the various operations that can be carried out using distributive and adaptive MAC protocol. Hill climbing distributed MAC does not need a central coordination system and location-based transmission with neighbor awareness reduces transmission power.

Design/methodology/approach

Distributed MAC in wireless networks is used to address the challenges like network lifetime, reduced energy consumption and for improving delay performance. In this paper, a survey is made on various cooperative communications in MAC protocols, optimization techniques used to improve MAC performance in various applications and mathematical approaches involved in game theory optimization for MAC protocol.

Findings

Spatial reuse of channel improved by 3%–29%, and multichannel improves throughput by 8% using distributed MAC protocol. Nash equilibrium is found to perform well, which focuses on energy utility in the network by individual players. Fuzzy logic improves channel selection by 17% and secondary users’ involvement by 8%. Cross-layer approach in MAC layer will address interference and jamming problems. Hybrid distributed MAC can be used for simultaneous voice, data transmissions in WSN and IoT applications. Cross-layer and cooperative communication give energy savings of 27% and reduces hop distance by 4.7%. Choosing the correct objective function in Nash equilibrium for game theory will address fairness index and resource allocation to the nodes.

Research limitations/implications

Other optimization techniques can be applied for WSN to analyze the performance.

Practical implications

Game theory optimization for distributed may increase the network performance. Optimal cuckoo search improves throughput by 90% and reduces delay by 91%. Stochastic approaches detect 80% attacks even in 90% malicious nodes.

Social implications

Channel allocations in centralized or static manner must be based on traffic demands whether dynamic traffic or fluctuated traffic. Usage of multimedia devices also increased which in turn increased the demand for high throughput. Cochannel interference keep on changing or mitigations occur which can be handled by proper resource allocations. Network survival is by efficient usage of valid patis in the network by avoiding transmission failures and time slots’ effective usage.

Originality/value

Literature survey is carried out to find the methods which give better performance.

Details

International Journal of Pervasive Computing and Communications, vol. 20 no. 2
Type: Research Article
ISSN: 1742-7371

Keywords

Article
Publication date: 22 August 2023

D.S. Vohra, Pradeep Kumar Garg and Sanjay Ghosh

The purpose is to derive the most effective place in the air for an aerial robot, viz., drone to use as an alternative communication system during disasters.

1478

Abstract

Purpose

The purpose is to derive the most effective place in the air for an aerial robot, viz., drone to use as an alternative communication system during disasters.

Design/methodology/approach

In this technology-driven era, various concepts are becoming the area of interest for multiple researchers. Drone technology is also one of them. The researchers, with interest in drones, are therefore trying to understand the various uses of employing drones in diverse applications which are mind-boggling, starting from civil applications (viz., an inspection of power lines, counting wildlife, delivering medical supplies to inaccessible regions, forest fire detection, and landslide measurement) to military applications (viz., real-time monitoring, surveillance, patrolling, and demining). However, one area where its usage is still to be exploited in many countries is using drones as a relay when communication lines are disrupted due to natural calamities. This will be particularly helpful in rescuing the affected people as the aerial node will enable them to communicate to the rescue team using mobiles/ordinary landline telephones even when regular communication towers are destroyed due to disastrous natural calamities, for example, tsunamis, earthquakes, and floods. Various algorithms, namely, water filling algorithm, advanced water filling algorithm, equal power distribution algorithm, and particle swarm optimization, were therefore studied and analyzed using simulation in addition to various path loss models to realize the desired place for an aerial robot, viz., drone in the air, which will eventually be used as an alternative communication system for badly hit ground users due to any disaster.

Findings

It was found that the effective combination of the water filling algorithm and particle swarm optimization algorithm may be done to place the drone in the air to increase the overall throughput of the affected ground users.

Originality/value

The research is original. None of the parts of this research paper has been published anywhere.

Details

International Journal of Intelligent Unmanned Systems, vol. 12 no. 2
Type: Research Article
ISSN: 2049-6427

Keywords

Article
Publication date: 3 July 2023

Mohammed-Alamine El Houssaini, Abdellah Nabou, Abdelali Hadir, Souad El Houssaini and Jamal El Kafi

Ad hoc mobile networks are commonplace in every aspect of our everyday life. They become essential in many industries and have uses in logistics, science and the military…

Abstract

Purpose

Ad hoc mobile networks are commonplace in every aspect of our everyday life. They become essential in many industries and have uses in logistics, science and the military. However, because they operate mostly in open spaces, they are exposed to a variety of dangers. The purpose of this study is to introduce a novel method for detecting the MAC layer misbehavior.

Design/methodology/approach

The proposed novel approach is based on exponential smoothing for throughput prediction to address this MAC layer misbehavior. The real and expected throughput are processed using an exponential smoothing algorithm to identify this attack, and if these metrics exhibit a trending pattern, an alarm is then sent.

Findings

The effect of the IEEE 802.11 MAC layer misbehavior on throughput was examined using the NS-2 network simulator, as well as the approval of our novel strategy. The authors have found that a smoothing factor value that is near to 0 provides a very accurate throughput forecast that takes into consideration the recent history of the updated values of the real value. As for the smoothing factor values that are near to 1, they are used to identify MAC layer misbehavior.

Originality/value

According to the authors’ modest knowledge, this new scheme has not been proposed in the state of the art for the detection of greedy behavior in mobile ad hoc networks.

Details

International Journal of Pervasive Computing and Communications, vol. 20 no. 2
Type: Research Article
ISSN: 1742-7371

Keywords

Article
Publication date: 25 April 2024

Tulsi Pawan Fowdur and Ashven Sanghan

The purpose of this paper is to develop a blockchain-based data capture and transmission system that will collect real-time power consumption data from a household electrical…

Abstract

Purpose

The purpose of this paper is to develop a blockchain-based data capture and transmission system that will collect real-time power consumption data from a household electrical appliance and transfer it securely to a local server for energy analytics such as forecasting.

Design/methodology/approach

The data capture system is composed of two current transformer (CT) sensors connected to two different electrical appliances. The CT sensors send the power readings to two Arduino microcontrollers which in turn connect to a Raspberry-Pi for aggregating the data. Blockchain is then enabled onto the Raspberry-Pi through a Java API so that the data are transmitted securely to a server. The server provides real-time visualization of the data as well as prediction using the multi-layer perceptron (MLP) and long short term memory (LSTM) algorithms.

Findings

The results for the blockchain analysis demonstrate that when the data readings are transmitted in smaller blocks, the security is much greater as compared with blocks of larger size. To assess the accuracy of the prediction algorithms data were collected for a 20 min interval to train the model and the algorithms were evaluated using the sliding window approach. The mean average percentage error (MAPE) was used to assess the accuracy of the algorithms and a MAPE of 1.62% and 1.99% was obtained for the LSTM and MLP algorithms, respectively.

Originality/value

A detailed performance analysis of the blockchain-based transmission model using time complexity, throughput and latency as well as energy forecasting has been performed.

Details

Sensor Review, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 0260-2288

Keywords

Article
Publication date: 26 April 2022

Elham Kariri and Kusum Yadav

In the final step, the trust model is applied to the on-demand federated multipath distance vector routing protocol (AOMDV) to introduce path trust as a foundation for routing…

Abstract

Purpose

In the final step, the trust model is applied to the on-demand federated multipath distance vector routing protocol (AOMDV) to introduce path trust as a foundation for routing selection in the route discovery phase, construct a trusted path, and implement a path warning mechanism to detect malicious nodes in the route maintenance phase, respectively.

Design/methodology/approach

A trust-based on-demand multipath distance vector routing protocol is being developed to address the problem of flying ad-hoc network being subjected to internal attacks and experiencing frequent connection interruptions. Following the construction of the node trust assessment model and the presentation of trust evaluation criteria, the data packet forwarding rate, trusted interaction degree and detection packet receipt rate are discussed. In the next step, the direct trust degree of the adaptive fuzzy trust aggregation network compute node is constructed. After then, rely on the indirect trust degree of neighbouring nodes to calculate the trust degree of the node in the network. Design a trust fluctuation penalty mechanism, as a second step, to defend against the switch attack in the trust model.

Findings

When compared to the lightweight trust-enhanced routing protocol (TEAOMDV), it significantly improves the data packet delivery rate and throughput of the network significantly.

Originality/value

Additionally, it reduces the amount of routing overhead and the average end-to-end delay.

Details

International Journal of Pervasive Computing and Communications, vol. 20 no. 2
Type: Research Article
ISSN: 1742-7371

Keywords

Article
Publication date: 6 October 2023

Omotayo Farai, Nicole Metje, Carl Anthony, Ali Sadeghioon and David Chapman

Wireless sensor networks (WSN), as a solution for buried water pipe monitoring, face a new set of challenges compared to traditional application for above-ground infrastructure…

Abstract

Purpose

Wireless sensor networks (WSN), as a solution for buried water pipe monitoring, face a new set of challenges compared to traditional application for above-ground infrastructure monitoring. One of the main challenges for underground WSN deployment is the limited range (less than 3 m) at which reliable wireless underground communication can be achieved using radio signal propagation through the soil. To overcome this challenge, the purpose of this paper is to investigate a new approach for wireless underground communication using acoustic signal propagation along a buried water pipe.

Design/methodology/approach

An acoustic communication system was developed based on the requirements of low cost (tens of pounds at most), low power supply capacity (in the order of 1 W-h) and miniature (centimetre scale) size for a wireless communication node. The developed system was further tested along a buried steel pipe in poorly graded SAND and a buried medium density polyethylene (MDPE) pipe in well graded SAND.

Findings

With predicted acoustic attenuation of 1.3 dB/m and 2.1 dB/m along the buried steel and MDPE pipes, respectively, reliable acoustic communication is possible up to 17 m for the buried steel pipe and 11 m for the buried MDPE pipe.

Research limitations/implications

Although an important first step, more research is needed to validate the acoustic communication system along a wider water distribution pipe network.

Originality/value

This paper shows the possibility of achieving reliable wireless underground communication along a buried water pipe (especially non-metallic material ones) using low-frequency acoustic propagation along the pipe wall.

Details

International Journal of Pervasive Computing and Communications, vol. 20 no. 2
Type: Research Article
ISSN: 1742-7371

Keywords

Open Access
Article
Publication date: 28 March 2024

Hans Voordijk, Seirgei Miller and Faridaddin Vahdatikhaki

Using real-time support systems may help operators in road construction to improve paving and compaction operations. Nowadays, these systems transform from descriptive to…

Abstract

Purpose

Using real-time support systems may help operators in road construction to improve paving and compaction operations. Nowadays, these systems transform from descriptive to prescriptive systems. Prescriptive or operator guidance systems propose operators actionable compaction strategies and guidance, based on the data collected. It is investigated how these systems mediate the perceptions and actions of operators in road pavement practice.

Design/methodology/approach

A case study is conducted on the specific application of an operator guidance system in a road pavement project. In this case study, comprehensive information is presented regarding the process of converting input in the form of data from cameras and sensors into useful output. The ways in which the operator guidance systems translate data into actionable guidance for operators are analyzed from the technological mediation perspective.

Findings

Operator guidance systems mediate actions of operators physically, cognitively and contextually. These different types of action mediation are related to preconditions for successful implementation and use of these systems. Coercive interventions only succeed if there is widespread agreement among the operators. Persuasive interventions are most effective when collective and individual interests align. Contextual influence relates to designs of the operator guidance systems that determine human-technology interactions when using them.

Originality/value

This is the first study that analyzes the functioning of an operator guidance system using the technological mediation approach. It adds a new perspective on the interaction between this system and its users in road pavement practice.

Details

Frontiers in Engineering and Built Environment, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 2634-2499

Keywords

Article
Publication date: 12 January 2024

Mathew B. Fukuzawa, Brandon M. McConnell, Michael G. Kay, Kristin A. Thoney-Barletta and Donald P. Warsing

Demonstrate proof-of-concept for conducting NFL Draft trades on a blockchain network using smart contracts.

Abstract

Purpose

Demonstrate proof-of-concept for conducting NFL Draft trades on a blockchain network using smart contracts.

Design/methodology/approach

Using Ethereum smart contracts, the authors model several types of draft trades between teams. An example scenario is used to demonstrate contract interaction and draft results.

Findings

The authors show the feasibility of conducting draft-day trades using smart contracts. The entire negotiation process, including side deals, can be conducted digitally.

Research limitations/implications

Further work is required to incorporate the full-scale depth required to integrate the draft trading process into a decentralized user platform and experience.

Practical implications

Cutting time for the trade negotiation process buys decision time for team decision-makers. Gains are also made with accuracy and cost.

Social implications

Full-scale adoption may find resistance due to the level of fan involvement; the draft has evolved into an interactive experience for both fans and teams.

Originality/value

This research demonstrates the new application of smart contracts in the inter-section of sports management and blockchain technology.

Details

International Journal of Sports Marketing and Sponsorship, vol. 25 no. 2
Type: Research Article
ISSN: 1464-6668

Keywords

Article
Publication date: 31 October 2023

Nadine Anik Leduc, Stephen Czarnuch and Rosemary Ricciardelli

Public safety (communicators; e.g. 9-1-1, police, fire and ambulance call-takers and dispatchers), like many other public safety personnel (e.g. police, paramedics), (re)suffer…

Abstract

Purpose

Public safety (communicators; e.g. 9-1-1, police, fire and ambulance call-takers and dispatchers), like many other public safety personnel (e.g. police, paramedics), (re)suffer operational stress injuries (OSIs) that are too often hidden and at a prevalence higher than the general population. Unfortunately, there are very little data for OSI rates in Canadian communicators. To the authors’ knowledge, this is the only pan-Canadian study focusing on organizational culture, and its potential influence on OSIs, within the communicator context.

Design/methodology/approach

The authors conducted a 179-item online survey of Canadian communicators comprising 17 validated screenings for occupational stress injuries and symptoms and four open-ended questions relating to their agency's organizational culture. The authors thematically analysed participants' open-ended responses and their screening scores.

Findings

A semi-grounded thematic approach revealed that managers and supervisors were significant contributors to negative perceptions (n = 165) of organizational culture, potentially resulting in or worsening existing OSIs. Specifically, leadership was viewed as ineffective, inconsistent, unsupportive, abusive and toxic, with limited understanding of communicator roles. Communicators described feeling devalued, particularly when leaders fail to recognize communicator OSIs, which can perpetuate stigma. Conversely, positive leaders (n = 24) were described as supportive, communicative and encouraging.

Originality/value

The findings suggest that while leadership behaviours are a key factor in employee well-being, it varies considerably across agencies, impacting treatment-seeking behaviours. The authors’ new understandings of leaders' roles in OSIs may help reduce the frequency and severity of communicator OSIs, helping ensure that emergency services are delivered to Canadians.

Details

International Journal of Emergency Services, vol. 13 no. 1
Type: Research Article
ISSN: 2047-0894

Keywords

Open Access
Article
Publication date: 14 November 2023

Hajer Chenini and Anis Jarboui

A separate study of the different behavioral biases does not allow for a full understanding of the complexity and stability of the heterogeneity of beliefs. Therefore, through a…

Abstract

Purpose

A separate study of the different behavioral biases does not allow for a full understanding of the complexity and stability of the heterogeneity of beliefs. Therefore, through a more global view of these anomalies, the authors wish to show that they can converge on a single concept, which is the heterogeneity of beliefs.

Design/methodology/approach

It is therefore essential to stress that the importance of this study is mainly reflected in the methodological approach used in the construction and analysis of the map and not only in the results achieved. This contribution states that structural analysis, as a means of building the cognitive map, can facilitate the task of investors and other decision-makers, in the identification and analysis of the heterogeneity of beliefs that can therefore guide investors' strategy in decision-making.

Findings

The authors have studied the behavior of the investor and its way of interpreting the information and the authors have emphasized the value of studying the concept of heterogeneity of beliefs in its complexity. So that part of the work seems to be relevant and crucial to filling, if you will, that void. In this sense, the authors have shown that behavioral abnormalities are multidimensional concepts: “self-deception”, “cognitive bias”, “emotional bias” and “social bias”.

Originality/value

In particular, this article will aim to achieve the objective of proposing a model for measuring the heterogeneity of beliefs. Thus, the authors want to show that the heterogeneity of beliefs can be measured directly through the different behavioral anomalies.

Details

Journal of Economics, Finance and Administrative Science, vol. 29 no. 57
Type: Research Article
ISSN: 2077-1886

Keywords

1 – 10 of 14