Search results
1 – 10 of 48Ishita Seth, Kalpna Guleria and Surya Narayan Panda
The internet of vehicles (IoV) communication has recently become a popular research topic in the automotive industry. The growth in the automotive sector has resulted in…
Abstract
Purpose
The internet of vehicles (IoV) communication has recently become a popular research topic in the automotive industry. The growth in the automotive sector has resulted in significant standards and guidelines that have engaged various researchers and companies. In IoV, routing protocols play a significant role in enhancing communication safety for the transportation system. The high mobility of nodes in IoV and inconsistent network coverage in different areas make routing challenging. This paper aims to provide a lane-based advanced forwarding protocol for internet of vehicles (LAFP-IoV) for efficient data distribution in IoV. The proposed protocol’s main feature is that it can identify the destination zone by using position coordinates and broadcasting the packets toward the direction of destination. The novel suppression technique is used in the broadcast method to reduce the network routing overhead.
Design/methodology/approach
The proposed protocol considers the interferences between different road segments, and a novel lane-based forwarding model is presented. The greedy forwarding notion, the broadcasting mechanism, and the suppression approach are used in this protocol to reduce the overhead generated by standard beacon forwarding procedures. The SUMO tool and NS-2 simulator are used for the vehicle's movement pattern and to simulate LAFP-IoV.
Findings
The simulation results show that the proposed LAFP-IoV protocol performs better than its peer protocols. It uses a greedy method for forwarding data packets and a carry-and-forward strategy to recover from the local maximum stage. This protocol's low latency and good PDR make it ideal for congested networks.
Originality/value
The proposed paper provides a unique lane-based forwarding for IoV. The proposed work achieves a higher delivery ratio than its peer protocols. The proposed protocol considers the lanes while forwarding the data packets applicable to the highly dense scenarios.
Details
Keywords
C. Bharanidharan, S. Malathi and Hariprasath Manoharan
The potential of vehicle ad hoc networks (VANETs) to improve driver and passenger safety and security has made them a hot topic in the field of intelligent transportation systems…
Abstract
Purpose
The potential of vehicle ad hoc networks (VANETs) to improve driver and passenger safety and security has made them a hot topic in the field of intelligent transportation systems (ITSs). VANETs have different characteristics and system architectures from mobile ad hoc networks (MANETs), with a primary focus on vehicle-to-vehicle (V2V) and vehicle-to-infrastructure (V2I) communication. But protecting VANETs from malicious assaults is crucial because they can undermine network security and safety.
Design/methodology/approach
The black hole attack is a well-known danger to VANETs. It occurs when a hostile node introduces phony routing tables into the network, potentially damaging it and interfering with communication. A safe ad hoc on-demand distance vector (AODV) routing protocol has been created in response to this issue. By adding cryptographic features for source and target node verification to the route request (RREQ) and route reply (RREP) packets, this protocol improves upon the original AODV routing system.
Findings
Through the use of cryptographic-based encryption and decryption techniques, the suggested method fortifies the VANET connection. In addition, other network metrics are taken into account to assess the effectiveness of the secure AODV routing protocol under black hole attacks, including packet loss, end-to-end latency, packet delivery ratio (PDR) and routing request overhead. Results from simulations using an NS-2.33 simulator show how well the suggested fix works to enhance system performance and lessen the effects of black hole assaults on VANETs.
Originality/value
All things considered, the safe AODV routing protocol provides a strong method for improving security and dependability in VANET systems, protecting against malevolent attacks and guaranteeing smooth communication between cars and infrastructure.
Details
Keywords
Charles Kirschbaum and Luiz Ojima Sakuda
The purpose of the article is to explore the perceptions of Brazilian game developers about the power relations between them and the sponsors of digital game platforms. It also…
Abstract
Purpose
The purpose of the article is to explore the perceptions of Brazilian game developers about the power relations between them and the sponsors of digital game platforms. It also aims to identify forms of collective action that developers can use to counteract the asymmetry of power.
Design/methodology/approach
The research employed an abductive approach, seeking empirical evidence that would challenge consolidated theory. To achieve this, semi-structured interviews were conducted with 25 Brazilian developers. The data were analyzed qualitatively using NVivo software. The aim was to resolve theoretical ambiguities identified in the literature review and to explore unexpected findings.
Findings
The study explores Brazilian game developers' perceptions through interviews, revealing their experiences within the industry’s concentrated structure and their use of collective action to navigate power dynamics.
Research limitations/implications
The study's focus on Brazil limits the generalizability of its findings to the broader game development industry.
Practical implications
The study suggests Brazilian game devs can leverage collective action to counteract power imbalance with platforms, collaborate through events and projects and facilitate internationalization of their games.
Social implications
The study suggests collective action could empower developers to challenge platform dominance and foster a stronger community among Brazilian game developers.
Originality/value
The article’s value lies in examining Brazilian devs' experiences within their specific industry context and highlighting collective action as a potential strategy for developers.
Details
Keywords
Hanvedes Daovisan, Sayamol Charoenratana and Motoki Akitsu
Transnational migration is a key challenge in migrant-sending and host-receiving countries. However, relatively little is known about how migrants use network capital to foster…
Abstract
Purpose
Transnational migration is a key challenge in migrant-sending and host-receiving countries. However, relatively little is known about how migrants use network capital to foster small and medium-sized enterprises (SMEs) in the ASEAN Economic Community (AEC). Therefore, the purpose of this study is to explore how network capital fosters Laotian migrant workers in Thai family SMEs.
Design/methodology/approach
This research was conducted using qualitative network analysis (QNA). Referral snowball sampling was used to draw 20 participants from December 2021 to March 2022. Data analysis was performed using Gephi, a software package developed for QNA (coding, network features, measure nodes and network metrics).
Findings
The main findings are the following four emerging themes: chain networks, social networks, human networks and financial networks are associated with network capital for fostering Laotian migrant workers in Thai family SMEs.
Originality/value
To the best of the authors’ knowledge, this study is the first QNA to explore how Laotian migrant workers use network capital in Thai family SMEs.
Details
Keywords
The aim of this paper is to provide a narrative review of previous research on tourism demand modelling and forecasting and potential future developments.
Abstract
Purpose
The aim of this paper is to provide a narrative review of previous research on tourism demand modelling and forecasting and potential future developments.
Design/methodology/approach
A narrative approach is taken in this review of the current body of knowledge.
Findings
Significant methodological advancements in tourism demand modelling and forecasting over the past two decades are identified.
Originality/value
The distinct characteristics of the various methods applied in the field are summarised and a research agenda for future investigations is proposed.
目的
本文旨在对先前关于旅游需求建模和预测的研究进行叙述性回顾并对未来潜在发展进行展望。
设计/方法
本文采用叙述性回顾方法对当前知识体系进行了评论。
研究结果
本文确认了过去二十年旅游需求建模和预测方法论方面的重要进展。
独创性
本文总结了该领域应用的各种方法的独特特征, 并对未来研究提出了建议。
Objetivo
El objetivo de este documento es ofrecer una revisión narrativa de la investigación previa sobre modelización y previsión de la demanda turística y los posibles desarrollos futuros.
Diseño/metodología/enfoque
En esta revisión del marco actual de conocimientos sobre modelización y previsión de la demanda turística y los posibles desarrollos futuros,se adopta un enfoque narrativo.
Resultados
Se identifican avances metodológicos significativos en la modelización y previsión de la demanda turística en las dos últimas décadas.
Originalidad
Se resumen las características propias de los diversos métodos aplicados en este campo y se propone una agenda de investigación para futuros trabajos.
Details
Keywords
Pushkar Pushp and Faisal Ahmed
The discourse on global value chains (GVC) is undergoing a transformation in terms of its conceptualisation, theorisation and pragmatic applications. Today, the production systems…
Abstract
Purpose
The discourse on global value chains (GVC) is undergoing a transformation in terms of its conceptualisation, theorisation and pragmatic applications. Today, the production systems have become more complex as global economic order continues to witness marked geo-economic manoeuvring. Thus, the direction of discourse on GVC ought to move from mere theoretical propositions toward becoming more evidence based. There have been recent studies that have used the governance and upgrading propositions by Gary Gereffi and others to seek quantitative evidence. This study aims to decipher the quantitative discourse on GVC and to set the emerging and future research agenda.
Design/methodology/approach
Through a systematic literature review, the authors first analyse the quantitative studies on GVC carried out during the last two decades. The authors then outline a future research agenda and examine a few relevant modelling techniques that could potentially be used to solicit newer evidence in GVC research.
Findings
The authors categorise the quantitative discourse on GVC into three crucial themes, namely, GVC framework, GVC participation and position, environmental aspects and regionalisation in GVC. The most commonly used quantitative techniques are gravity model, panel data estimation, structural decomposition analysis and computable general equilibrium modelling.
Originality/value
This paper contributes to the GVC discourse in two ways. Firstly, the authors argue that the theoretical frameworks within the GVC discourse should be complemented by evidence-based quantitative studies. Secondly, the authors suggest potential modelling techniques that can be used on the emerging and future research agenda.
Details
Keywords
Radha Subramanyam, Y. Adline Jancy and P. Nagabushanam
Cross-layer approach in media access control (MAC) layer will address interference and jamming problems. Hybrid distributed MAC can be used for simultaneous voice, data…
Abstract
Purpose
Cross-layer approach in media access control (MAC) layer will address interference and jamming problems. Hybrid distributed MAC can be used for simultaneous voice, data transmissions in wireless sensor network (WSN) and Internet of Things (IoT) applications. Choosing the correct objective function in Nash equilibrium for game theory will address fairness index and resource allocation to the nodes. Game theory optimization for distributed may increase the network performance. The purpose of this study is to survey the various operations that can be carried out using distributive and adaptive MAC protocol. Hill climbing distributed MAC does not need a central coordination system and location-based transmission with neighbor awareness reduces transmission power.
Design/methodology/approach
Distributed MAC in wireless networks is used to address the challenges like network lifetime, reduced energy consumption and for improving delay performance. In this paper, a survey is made on various cooperative communications in MAC protocols, optimization techniques used to improve MAC performance in various applications and mathematical approaches involved in game theory optimization for MAC protocol.
Findings
Spatial reuse of channel improved by 3%–29%, and multichannel improves throughput by 8% using distributed MAC protocol. Nash equilibrium is found to perform well, which focuses on energy utility in the network by individual players. Fuzzy logic improves channel selection by 17% and secondary users’ involvement by 8%. Cross-layer approach in MAC layer will address interference and jamming problems. Hybrid distributed MAC can be used for simultaneous voice, data transmissions in WSN and IoT applications. Cross-layer and cooperative communication give energy savings of 27% and reduces hop distance by 4.7%. Choosing the correct objective function in Nash equilibrium for game theory will address fairness index and resource allocation to the nodes.
Research limitations/implications
Other optimization techniques can be applied for WSN to analyze the performance.
Practical implications
Game theory optimization for distributed may increase the network performance. Optimal cuckoo search improves throughput by 90% and reduces delay by 91%. Stochastic approaches detect 80% attacks even in 90% malicious nodes.
Social implications
Channel allocations in centralized or static manner must be based on traffic demands whether dynamic traffic or fluctuated traffic. Usage of multimedia devices also increased which in turn increased the demand for high throughput. Cochannel interference keep on changing or mitigations occur which can be handled by proper resource allocations. Network survival is by efficient usage of valid patis in the network by avoiding transmission failures and time slots’ effective usage.
Originality/value
Literature survey is carried out to find the methods which give better performance.
Details
Keywords
In the mid-2000s, the operator of New York City’s mass transit network committed more than a half-billion dollars to military contractor Lockheed Martin for a security technology…
Abstract
In the mid-2000s, the operator of New York City’s mass transit network committed more than a half-billion dollars to military contractor Lockheed Martin for a security technology capable, in part, of inferring threats based on analysis of data streams, of developing response strategies, and taking automated action toward alerts and calamities in light of evolving circumstances. The project was a failure. This chapter explores the conceptualization and development of this technology – rooted in cybernetics – and compares its conceptual underpinnings with some situated problems of awareness, communication, coordination, and action in emergencies as they unfold in one of the busiest transport systems in the world, the New York subway. The author shows how the technology, with all the theatrical trappings of a “legitimate” security solution, was apparently conceived without a grounded understanding of actual use-cases, and the degree to which the complex interactions which give rise to subway emergency can be anticipated in – and therefore managed through – a technological system. As a case-study, the chapter illustrates the pitfalls of deploying technology against problems which are not well-defined in the first place, to the neglect of investments against much more fundamental problems – such as inadequate communication systems, and unstable relationships with emergency response agencies – which might offer guaranteed benefits, and indeed lay a firm groundwork for future deployment of more ambitious technology.
Details
Keywords
Nisit Panthamit, Paisarn Panthamitr and Guowei Tian
This study aims to convey the understanding of the ecosystem – how “hundi” works on the border trade between Myanmar and northern Thailand, which is an informal transfer system…
Abstract
Purpose
This study aims to convey the understanding of the ecosystem – how “hundi” works on the border trade between Myanmar and northern Thailand, which is an informal transfer system and is widely used as an alternative banking system. Even though the role of hundi is unable to declare the sources of money under the standard settlement of formal banking system, a failure to operate of its official mechanism are carrying using hundi, as a financial platform across the border between Thailand and Myanmar. This study surveys the best practice mechanism for the regional and international cooperation.
Design/methodology/approach
This paper draws on relevant literature, open-source reporting, and interviews with more than 30 interviewees on the border between Thailand and Myanmar. Interviewees includes border-trader, money changer, money transfer operators, business leaders, hundi operators, immigrant labors, government officials and commercial banking staffs.
Findings
This study provides a unique insight of hundi system, which work as the alternative mode of formal banking. It is an informal fund transfer payment platform used on the border between Thailand and Myanmar in the past five decades. It insists that hundi plays a significant role in both substitution and complementary on the trade and payment across the border of Myanmar–Thailand. Even though confronting with the barriers of financing of terrorism (anti money laundering AML/combating the financing of terrorism CFT) risk, the competition with the expanding and modernizing formal banking sector, and the introduction of Fintech and mobile money services. In the short term, these are unlikely to eliminate the hundi system completely, but may instead push hundi operators towards adopting these networks and technologies in their own operations.
Social implications
This paper will be a useful source for academics, development professionals, policymakers, law enforcement agencies and business actors who are seeking to understand Myanmar’s informal payment system, hundi.
Originality/value
This is the latest work for border trade payment or trade financing role of hundi which has hidden under the informal market of the border for several decades. It has few research of hundi on border trade and payment, particularly after the military coup in 2021 which made hundi return to be on the spotlight and simultaneous mechanism of border trade and payment ecosystem of Myanmar. This paper will be a useful source for academics, development professionals, policymakers, law enforcement agencies and business actors who are eager to understand Myanmar’s informal payment system, hundi, especially during the hardship.
Details
Keywords
Rita Sleiman, Quoc-Thông Nguyen, Sandra Lacaze, Kim-Phuc Tran and Sébastien Thomassey
We propose a machine learning based methodology to deal with data collected from a mobile application asking users their opinion regarding fashion products. Based on different…
Abstract
Purpose
We propose a machine learning based methodology to deal with data collected from a mobile application asking users their opinion regarding fashion products. Based on different machine learning techniques, the proposed approach relies on the data value chain principle to enrich data into knowledge, insights and learning experience.
Design/methodology/approach
Online interaction and the usage of social media have dramatically altered both consumers’ behaviors and business practices. Companies invest in social media platforms and digital marketing in order to increase their brand awareness and boost their sales. Especially for fashion retailers, understanding consumers’ behavior before launching a new collection is crucial to reduce overstock situations. In this study, we aim at providing retailers better understand consumers’ different assessments of newly introduced products.
Findings
By creating new product-related and user-related attributes, the proposed prediction model attends an average of 70.15% accuracy when evaluating the potential success of new future products during the design process of the collection. Results showed that by harnessing artificial intelligence techniques, along with social media data and mobile apps, new ways of interacting with clients and understanding their preferences are established.
Practical implications
From a practical point of view, the proposed approach helps businesses better target their marketing campaigns, localize their potential clients and adjust manufactured quantities.
Originality/value
The originality of the proposed approach lies in (1) the implementation of the data value chain principle to enhance the information of raw data collected from mobile apps and improve the prediction model performances, and (2) the combination consumer and product attributes to provide an accurate prediction of new fashion, products.
Details