Search results

1 – 10 of over 19000
To view the access options for this content please click here
Book part
Publication date: 8 November 2019

Peter Simon Sapaty

In this chapter different network operations are described in SGL, which may be useful for security applications. Basic network management mechanisms are expressed…

Abstract

In this chapter different network operations are described in SGL, which may be useful for security applications. Basic network management mechanisms are expressed, capable of working on their own even if traditional communications and internet includings are damaged. These include network creation from scratch, finding paths between nodes, and creating routing tables (RT) allowing for shortest path communications. Also is shown the use of SGT for analysing distributed networks with social flavour by finding strong and weak components in them and changing their topology in crisis situations. Another example is how to outline different communities in a distributed social network, find their topographical centres and evaluate physical distances between them for predicting possible social conflicts, while doing this repeatedly together with simulation of spatial mobility of individuals in time.

Details

Complexity in International Security
Type: Book
ISBN: 978-1-78973-716-5

To view the access options for this content please click here

Abstract

Details

Knowledge Networks
Type: Book
ISBN: 978-1-83982-949-9

To view the access options for this content please click here

Abstract

Details

Operations Research for Libraries and Information Agencies: Techniques for the Evaluation of Management Decision Alternatives
Type: Book
ISBN: 978-0-12424-520-4

To view the access options for this content please click here
Article
Publication date: 17 November 2021

Zhoupeng Han, Chenkai Tian, Zihan Zhou and Qilong Yuan

Complex mechanical 3D computer-aided design (CAD) model embodies rich implicit design knowledge. Through discovering the key function parts and key function module in 3D…

Abstract

Purpose

Complex mechanical 3D computer-aided design (CAD) model embodies rich implicit design knowledge. Through discovering the key function parts and key function module in 3D CAD assembly model in advance, it can promote the designers’ understanding and reuse efficiency of 3D assembly model in design reuse.

Design/methodology/approach

An approach for discovering key function module in complex mechanical 3D CAD assembly model is proposed. First, assembly network for 3D CAD assembly model is constructed, where the topology structure characteristics of 3D assembly model are analyzed based on complex network centrality. The degree centrality, closeness centrality, betweenness centrality and mutual information of node are used to evaluate the importance of the parts in 3D assembly model. Then, a multi-attribute decision model for part-node importance is established, and the comprehensive evaluation for key function parts in 3D assembly model is accomplished by combining Analytic Hierarchy Process and Technique for Order Preference by Similarity to an Ideal Solution (TOPSIS). Subsequently, a community discovery of function module in assembly model-based Clauset–Newman–Moore (CNM)-Centrality is given in details. Finally, 3D CAD assembly model of worm gear reducer is taken as an example to verify the effectiveness and feasibility of proposed method.

Findings

The key function part in CAD assembly model is evaluated comprehensively considering assembly topology more objectively. In addition, the key function module containing key function part is discovered from CAD assembly model by using CNM-Centrality-based community discovery.

Practical implications

The approach can be used for discovering important design knowledge from complex CAD assembly model when reusing the assembly model. It can help designers capture and understand the design thinking and intent, improve the reuse efficiency and quality.

Originality/value

The paper first proposes an approach for discovering key function module in complex mechanical 3D CAD assembly model taking advantage of complex network theory, where the key function part is evaluated using node centrality and TOPSIS, and the key function module is identified based on community discovery.

Details

Assembly Automation, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 0144-5154

Keywords

To view the access options for this content please click here
Article
Publication date: 2 December 2021

Aznaoui Hanane, Arif Ullah and Said Raghay

The purpose of this paper is to design an enhanced routing protocol to minimize energy consumed and extend network lifetime in sensor network (WSN).

Abstract

Purpose

The purpose of this paper is to design an enhanced routing protocol to minimize energy consumed and extend network lifetime in sensor network (WSN).

Design/methodology/approach

With the use of appropriate routing protocols, data collected by sensor nodes reache the BS. The entire network lifetime can be extended well beyond that of its single nodes by putting the nodes in sleep state when they are not in use, and make active just a single node at a time within a given area of interest. So that, the lowest-cost routing arises by minimizing the communication cost. This paper proposes an enhanced adaptive geographic fidelity (E-GAF) routing protocol based on theory of graphs approach to improve the discovery phase, select the optimal path, reduce the energy used by nodes and therefore extend the network lifetime. Following the simulations established by varying the number of grids and tests, a comparison is made between the E-GAF and basic GAF (B-GAF) based on the number of dead nodes and energy consumption.

Findings

The results obtained show that E-GAF is better than the existing basic GAF protocol in terms of energy efficiency and network lifetime.

Originality/value

This paper adopts the latest optimization algorithm know as E-GAF, which is used to solve the problem of energy and improve the network lifetime in a WSN. This is the first work that utilizes network lifetime in WSN.

Details

International Journal of Intelligent Unmanned Systems, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 2049-6427

Keywords

To view the access options for this content please click here
Article
Publication date: 1 December 2021

Pinsheng Duan and Jianliang Zhou

The construction industry is an industry with a high incidence of safety accidents, and the interactions of unsafe behaviors of construction workers are the main cause of…

Abstract

Purpose

The construction industry is an industry with a high incidence of safety accidents, and the interactions of unsafe behaviors of construction workers are the main cause of accidents. The neglect of the interactions may lead to serious underestimation of safety risks. This research aims to analyze the cascading vulnerability of unsafe behaviors of construction workers from the perspective of network modeling.

Design/methodology/approach

An unsafe behavior network of construction workers and a cascading vulnerability analysis model were established based on 296 actual accident cases. The cascading vulnerability of each unsafe behavior was analyzed based on the degree attack strategy.

Findings

Complex network with 85 unsafe behavior nodes is established based on the collected accidents in total. The results showed that storing in improper location, does not wear a safety helmet, working with illness and working after drinking are unsafe behaviors with high cascading vulnerability. Coupling analysis revealed that differentiated management strategies of unsafe behaviors should be applied. Besides, more focus should be put on high cascading vulnerability behaviors.

Originality/value

This research proposed a method to construct the cascading failure model of unsafe behavior for individual construction workers. The key parameters of the cascading failure model of unsafe behaviors of construction workers were determined, which could provide a reference for the research of cascading failure of unsafe behaviors. Additionally, a dynamic vulnerability research framework based on complex network theory was proposed to analyze the cascading vulnerability of unsafe behaviors. The research synthesized the results of dynamic and static analysis and found the key control nodes to systematically control unsafe construction behaviors.

Details

Engineering, Construction and Architectural Management, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 0969-9988

Keywords

To view the access options for this content please click here
Article
Publication date: 27 June 2008

Giljae Lee, Yoonjoo Kwon, Woojin Seok and Minsun Lee

Recent wireless communication and electronics technology has enabled the development of low‐cost, low‐power, and multi‐functional sensor nodes. However, the fact that…

Abstract

Purpose

Recent wireless communication and electronics technology has enabled the development of low‐cost, low‐power, and multi‐functional sensor nodes. However, the fact that sensor nodes are severely energy‐constrained has been an issue and many energy‐efficient routing protocols have been proposed to resolve it. Cluster‐based routing protocol is one of them. To achieve longer lifetime, some cluster‐based routing protocols use information on GPS‐based location of each sensor node. However, because of high cost, not all sensor nodes can be GPS‐enabled. The purpose of this paper is to propose a simple dynamic clustering approach to achieve energy efficiency for wireless sensor networks (WSN).

Design/methodology/approach

Instead of using location information of each sensor node, this approach utilizes information of remaining energy of each sensor node and changes in the number of cluster head nodes dependent on the number of sensor nodes alive. Performance results are presented and compared with some related protocols.

Findings

The simulations described in the paper show that both residual energy of each sensor node and changing cluster head nodes depending on the number of sensor nodes alive are very critical factors to obtain performance enhancement in terms of lifetime and data transmission. Especially, in some special environment, the proposal has better performance than GPS‐enabled protocol.

Originality/value

The paper is of value in proposing a simple dynamic clustering approach to achieve energy efficiency for WSN.

Details

International Journal of Pervasive Computing and Communications, vol. 4 no. 2
Type: Research Article
ISSN: 1742-7371

Keywords

To view the access options for this content please click here
Article
Publication date: 6 May 2014

Sunghyuck Hong and Kun-Hee Han

– This research can contribute to design and develop wireless sensor network (WSN) routing algorithm based on the comparison data. The paper aims to discuss these issues.

Abstract

Purpose

This research can contribute to design and develop wireless sensor network (WSN) routing algorithm based on the comparison data. The paper aims to discuss these issues.

Design/methodology/approach

This research is a tree-based routing algorithm in order to reduce routing cost on WSNs.

Findings

The approach is more efficient than other cluster-based approach.

Originality/value

Originality is high because there is no other paper about cost effect and energy saving both considering at the same time.

Details

Journal of Systems and Information Technology, vol. 16 no. 2
Type: Research Article
ISSN: 1328-7265

Keywords

Content available
Article
Publication date: 4 December 2017

Se-Chang Oh, Min-Soo Kim, Yoon Park, Gyu-Tak Roh and Chin-Woo Lee

The centralized processes of today’s power trading systems are complex and pose a risk of price tampering and hacking. The decentralized and unmodifiable nature of the…

Downloads
8926

Abstract

Purpose

The centralized processes of today’s power trading systems are complex and pose a risk of price tampering and hacking. The decentralized and unmodifiable nature of the blockchain technology that has recently been highlighted offers the potential to improve this power trading process. The purpose of this study is to implement a system to apply the blockchain technology to the problem of power trading.

Design/methodology/approach

The authors modeled the power trading problem as the interaction between admin, producer and consumer nodes. And a power trading scenario has been created for this model using a blockchain platform called Multichain which is both fast and highly scalable. To verify this scenario, they implemented a trading system using Savoir, a Python-based JsonRPC module.

Findings

Experimental results show that all processes, such as blockchain creation, node connectivity, asset issuance and exchange transactions have been correctly handled according to the scenario.

Originality/value

In this study, the authors have proposed and implemented a power trading method that determines price according to the pure market principle and cannot be manipulated or hacked. It is based on the nature of blockchain technology that is decentralized and cannot be tampered.

Details

Asia Pacific Journal of Innovation and Entrepreneurship, vol. 11 no. 3
Type: Research Article
ISSN: 2071-1395

Keywords

To view the access options for this content please click here
Article
Publication date: 11 April 2018

Huiyuan Zhao, Yuxing Mao and Tao Cheng

Application environments of wireless sensor networks (WSNs) include heterogeneous nodes with different packet sizes, transmission abilities and tolerable delay times. This…

Abstract

Purpose

Application environments of wireless sensor networks (WSNs) include heterogeneous nodes with different packet sizes, transmission abilities and tolerable delay times. This study aims to design a reasonable network topology and transmission timing for these heterogeneous nodes to improve the quality of service (QoS) of networks.

Design/methodology/approach

In this paper, the authors treat node urgency and data packets as the basis of network clustering and to extend the network lifetime. The flow, energy consumption and residual energy of a node are included in the cluster head election. We also propose a delay evaluation function.

Findings

All the nodes in the network are guaranteed to transmit to the sink nodes efficiently by planning the transmission order in each cluster.

Originality/value

The simulation results show that the proposed method can balance node urgency and data packets path planning, which not only extends the lifetime of the network but also decreases network delay and improves the overall efficiency.

Details

Sensor Review, vol. 39 no. 1
Type: Research Article
ISSN: 0260-2288

Keywords

1 – 10 of over 19000