Search results

1 – 10 of 48
Article
Publication date: 17 May 2023

Ishita Seth, Kalpna Guleria and Surya Narayan Panda

The internet of vehicles (IoV) communication has recently become a popular research topic in the automotive industry. The growth in the automotive sector has resulted in…

28

Abstract

Purpose

The internet of vehicles (IoV) communication has recently become a popular research topic in the automotive industry. The growth in the automotive sector has resulted in significant standards and guidelines that have engaged various researchers and companies. In IoV, routing protocols play a significant role in enhancing communication safety for the transportation system. The high mobility of nodes in IoV and inconsistent network coverage in different areas make routing challenging. This paper aims to provide a lane-based advanced forwarding protocol for internet of vehicles (LAFP-IoV) for efficient data distribution in IoV. The proposed protocol’s main feature is that it can identify the destination zone by using position coordinates and broadcasting the packets toward the direction of destination. The novel suppression technique is used in the broadcast method to reduce the network routing overhead.

Design/methodology/approach

The proposed protocol considers the interferences between different road segments, and a novel lane-based forwarding model is presented. The greedy forwarding notion, the broadcasting mechanism, and the suppression approach are used in this protocol to reduce the overhead generated by standard beacon forwarding procedures. The SUMO tool and NS-2 simulator are used for the vehicle's movement pattern and to simulate LAFP-IoV.

Findings

The simulation results show that the proposed LAFP-IoV protocol performs better than its peer protocols. It uses a greedy method for forwarding data packets and a carry-and-forward strategy to recover from the local maximum stage. This protocol's low latency and good PDR make it ideal for congested networks.

Originality/value

The proposed paper provides a unique lane-based forwarding for IoV. The proposed work achieves a higher delivery ratio than its peer protocols. The proposed protocol considers the lanes while forwarding the data packets applicable to the highly dense scenarios.

Article
Publication date: 30 April 2024

C. Bharanidharan, S. Malathi and Hariprasath Manoharan

The potential of vehicle ad hoc networks (VANETs) to improve driver and passenger safety and security has made them a hot topic in the field of intelligent transportation systems…

Abstract

Purpose

The potential of vehicle ad hoc networks (VANETs) to improve driver and passenger safety and security has made them a hot topic in the field of intelligent transportation systems (ITSs). VANETs have different characteristics and system architectures from mobile ad hoc networks (MANETs), with a primary focus on vehicle-to-vehicle (V2V) and vehicle-to-infrastructure (V2I) communication. But protecting VANETs from malicious assaults is crucial because they can undermine network security and safety.

Design/methodology/approach

The black hole attack is a well-known danger to VANETs. It occurs when a hostile node introduces phony routing tables into the network, potentially damaging it and interfering with communication. A safe ad hoc on-demand distance vector (AODV) routing protocol has been created in response to this issue. By adding cryptographic features for source and target node verification to the route request (RREQ) and route reply (RREP) packets, this protocol improves upon the original AODV routing system.

Findings

Through the use of cryptographic-based encryption and decryption techniques, the suggested method fortifies the VANET connection. In addition, other network metrics are taken into account to assess the effectiveness of the secure AODV routing protocol under black hole attacks, including packet loss, end-to-end latency, packet delivery ratio (PDR) and routing request overhead. Results from simulations using an NS-2.33 simulator show how well the suggested fix works to enhance system performance and lessen the effects of black hole assaults on VANETs.

Originality/value

All things considered, the safe AODV routing protocol provides a strong method for improving security and dependability in VANET systems, protecting against malevolent attacks and guaranteeing smooth communication between cars and infrastructure.

Details

International Journal of Intelligent Unmanned Systems, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 2049-6427

Keywords

Open Access
Article
Publication date: 26 March 2024

Charles Kirschbaum and Luiz Ojima Sakuda

The purpose of the article is to explore the perceptions of Brazilian game developers about the power relations between them and the sponsors of digital game platforms. It also…

Abstract

Purpose

The purpose of the article is to explore the perceptions of Brazilian game developers about the power relations between them and the sponsors of digital game platforms. It also aims to identify forms of collective action that developers can use to counteract the asymmetry of power.

Design/methodology/approach

The research employed an abductive approach, seeking empirical evidence that would challenge consolidated theory. To achieve this, semi-structured interviews were conducted with 25 Brazilian developers. The data were analyzed qualitatively using NVivo software. The aim was to resolve theoretical ambiguities identified in the literature review and to explore unexpected findings.

Findings

The study explores Brazilian game developers' perceptions through interviews, revealing their experiences within the industry’s concentrated structure and their use of collective action to navigate power dynamics.

Research limitations/implications

The study's focus on Brazil limits the generalizability of its findings to the broader game development industry.

Practical implications

The study suggests Brazilian game devs can leverage collective action to counteract power imbalance with platforms, collaborate through events and projects and facilitate internationalization of their games.

Social implications

The study suggests collective action could empower developers to challenge platform dominance and foster a stronger community among Brazilian game developers.

Originality/value

The article’s value lies in examining Brazilian devs' experiences within their specific industry context and highlighting collective action as a potential strategy for developers.

Details

Innovation & Management Review, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 2515-8961

Keywords

Article
Publication date: 26 September 2023

Hanvedes Daovisan, Sayamol Charoenratana and Motoki Akitsu

Transnational migration is a key challenge in migrant-sending and host-receiving countries. However, relatively little is known about how migrants use network capital to foster…

Abstract

Purpose

Transnational migration is a key challenge in migrant-sending and host-receiving countries. However, relatively little is known about how migrants use network capital to foster small and medium-sized enterprises (SMEs) in the ASEAN Economic Community (AEC). Therefore, the purpose of this study is to explore how network capital fosters Laotian migrant workers in Thai family SMEs.

Design/methodology/approach

This research was conducted using qualitative network analysis (QNA). Referral snowball sampling was used to draw 20 participants from December 2021 to March 2022. Data analysis was performed using Gephi, a software package developed for QNA (coding, network features, measure nodes and network metrics).

Findings

The main findings are the following four emerging themes: chain networks, social networks, human networks and financial networks are associated with network capital for fostering Laotian migrant workers in Thai family SMEs.

Originality/value

To the best of the authors’ knowledge, this study is the first QNA to explore how Laotian migrant workers use network capital in Thai family SMEs.

Details

Journal of Asia Business Studies, vol. 18 no. 1
Type: Research Article
ISSN: 1558-7894

Keywords

Article
Publication date: 24 April 2024

Haiyan Song and Hanyuan Zhang

The aim of this paper is to provide a narrative review of previous research on tourism demand modelling and forecasting and potential future developments.

Abstract

Purpose

The aim of this paper is to provide a narrative review of previous research on tourism demand modelling and forecasting and potential future developments.

Design/methodology/approach

A narrative approach is taken in this review of the current body of knowledge.

Findings

Significant methodological advancements in tourism demand modelling and forecasting over the past two decades are identified.

Originality/value

The distinct characteristics of the various methods applied in the field are summarised and a research agenda for future investigations is proposed.

目的

本文旨在对先前关于旅游需求建模和预测的研究进行叙述性回顾并对未来潜在发展进行展望。

设计/方法

本文采用叙述性回顾方法对当前知识体系进行了评论。

研究结果

本文确认了过去二十年旅游需求建模和预测方法论方面的重要进展。

独创性

本文总结了该领域应用的各种方法的独特特征, 并对未来研究提出了建议。

Objetivo

El objetivo de este documento es ofrecer una revisión narrativa de la investigación previa sobre modelización y previsión de la demanda turística y los posibles desarrollos futuros.

Diseño/metodología/enfoque

En esta revisión del marco actual de conocimientos sobre modelización y previsión de la demanda turística y los posibles desarrollos futuros,se adopta un enfoque narrativo.

Resultados

Se identifican avances metodológicos significativos en la modelización y previsión de la demanda turística en las dos últimas décadas.

Originalidad

Se resumen las características propias de los diversos métodos aplicados en este campo y se propone una agenda de investigación para futuros trabajos.

Article
Publication date: 2 February 2024

Pushkar Pushp and Faisal Ahmed

The discourse on global value chains (GVC) is undergoing a transformation in terms of its conceptualisation, theorisation and pragmatic applications. Today, the production systems…

Abstract

Purpose

The discourse on global value chains (GVC) is undergoing a transformation in terms of its conceptualisation, theorisation and pragmatic applications. Today, the production systems have become more complex as global economic order continues to witness marked geo-economic manoeuvring. Thus, the direction of discourse on GVC ought to move from mere theoretical propositions toward becoming more evidence based. There have been recent studies that have used the governance and upgrading propositions by Gary Gereffi and others to seek quantitative evidence. This study aims to decipher the quantitative discourse on GVC and to set the emerging and future research agenda.

Design/methodology/approach

Through a systematic literature review, the authors first analyse the quantitative studies on GVC carried out during the last two decades. The authors then outline a future research agenda and examine a few relevant modelling techniques that could potentially be used to solicit newer evidence in GVC research.

Findings

The authors categorise the quantitative discourse on GVC into three crucial themes, namely, GVC framework, GVC participation and position, environmental aspects and regionalisation in GVC. The most commonly used quantitative techniques are gravity model, panel data estimation, structural decomposition analysis and computable general equilibrium modelling.

Originality/value

This paper contributes to the GVC discourse in two ways. Firstly, the authors argue that the theoretical frameworks within the GVC discourse should be complemented by evidence-based quantitative studies. Secondly, the authors suggest potential modelling techniques that can be used on the emerging and future research agenda.

Details

Critical Perspectives on International Business, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 1742-2043

Keywords

Article
Publication date: 11 October 2023

Radha Subramanyam, Y. Adline Jancy and P. Nagabushanam

Cross-layer approach in media access control (MAC) layer will address interference and jamming problems. Hybrid distributed MAC can be used for simultaneous voice, data…

Abstract

Purpose

Cross-layer approach in media access control (MAC) layer will address interference and jamming problems. Hybrid distributed MAC can be used for simultaneous voice, data transmissions in wireless sensor network (WSN) and Internet of Things (IoT) applications. Choosing the correct objective function in Nash equilibrium for game theory will address fairness index and resource allocation to the nodes. Game theory optimization for distributed may increase the network performance. The purpose of this study is to survey the various operations that can be carried out using distributive and adaptive MAC protocol. Hill climbing distributed MAC does not need a central coordination system and location-based transmission with neighbor awareness reduces transmission power.

Design/methodology/approach

Distributed MAC in wireless networks is used to address the challenges like network lifetime, reduced energy consumption and for improving delay performance. In this paper, a survey is made on various cooperative communications in MAC protocols, optimization techniques used to improve MAC performance in various applications and mathematical approaches involved in game theory optimization for MAC protocol.

Findings

Spatial reuse of channel improved by 3%–29%, and multichannel improves throughput by 8% using distributed MAC protocol. Nash equilibrium is found to perform well, which focuses on energy utility in the network by individual players. Fuzzy logic improves channel selection by 17% and secondary users’ involvement by 8%. Cross-layer approach in MAC layer will address interference and jamming problems. Hybrid distributed MAC can be used for simultaneous voice, data transmissions in WSN and IoT applications. Cross-layer and cooperative communication give energy savings of 27% and reduces hop distance by 4.7%. Choosing the correct objective function in Nash equilibrium for game theory will address fairness index and resource allocation to the nodes.

Research limitations/implications

Other optimization techniques can be applied for WSN to analyze the performance.

Practical implications

Game theory optimization for distributed may increase the network performance. Optimal cuckoo search improves throughput by 90% and reduces delay by 91%. Stochastic approaches detect 80% attacks even in 90% malicious nodes.

Social implications

Channel allocations in centralized or static manner must be based on traffic demands whether dynamic traffic or fluctuated traffic. Usage of multimedia devices also increased which in turn increased the demand for high throughput. Cochannel interference keep on changing or mitigations occur which can be handled by proper resource allocations. Network survival is by efficient usage of valid patis in the network by avoiding transmission failures and time slots’ effective usage.

Originality/value

Literature survey is carried out to find the methods which give better performance.

Details

International Journal of Pervasive Computing and Communications, vol. 20 no. 2
Type: Research Article
ISSN: 1742-7371

Keywords

Book part
Publication date: 19 March 2024

Noah McClain

In the mid-2000s, the operator of New York City’s mass transit network committed more than a half-billion dollars to military contractor Lockheed Martin for a security technology…

Abstract

In the mid-2000s, the operator of New York City’s mass transit network committed more than a half-billion dollars to military contractor Lockheed Martin for a security technology capable, in part, of inferring threats based on analysis of data streams, of developing response strategies, and taking automated action toward alerts and calamities in light of evolving circumstances. The project was a failure. This chapter explores the conceptualization and development of this technology – rooted in cybernetics – and compares its conceptual underpinnings with some situated problems of awareness, communication, coordination, and action in emergencies as they unfold in one of the busiest transport systems in the world, the New York subway. The author shows how the technology, with all the theatrical trappings of a “legitimate” security solution, was apparently conceived without a grounded understanding of actual use-cases, and the degree to which the complex interactions which give rise to subway emergency can be anticipated in – and therefore managed through – a technological system. As a case-study, the chapter illustrates the pitfalls of deploying technology against problems which are not well-defined in the first place, to the neglect of investments against much more fundamental problems – such as inadequate communication systems, and unstable relationships with emergency response agencies – which might offer guaranteed benefits, and indeed lay a firm groundwork for future deployment of more ambitious technology.

Details

Technology vs. Government: The Irresistible Force Meets the Immovable Object
Type: Book
ISBN: 978-1-83867-951-4

Keywords

Article
Publication date: 6 July 2023

Nisit Panthamit, Paisarn Panthamitr and Guowei Tian

This study aims to convey the understanding of the ecosystem – how “hundi” works on the border trade between Myanmar and northern Thailand, which is an informal transfer system…

Abstract

Purpose

This study aims to convey the understanding of the ecosystem – how “hundi” works on the border trade between Myanmar and northern Thailand, which is an informal transfer system and is widely used as an alternative banking system. Even though the role of hundi is unable to declare the sources of money under the standard settlement of formal banking system, a failure to operate of its official mechanism are carrying using hundi, as a financial platform across the border between Thailand and Myanmar. This study surveys the best practice mechanism for the regional and international cooperation.

Design/methodology/approach

This paper draws on relevant literature, open-source reporting, and interviews with more than 30 interviewees on the border between Thailand and Myanmar. Interviewees includes border-trader, money changer, money transfer operators, business leaders, hundi operators, immigrant labors, government officials and commercial banking staffs.

Findings

This study provides a unique insight of hundi system, which work as the alternative mode of formal banking. It is an informal fund transfer payment platform used on the border between Thailand and Myanmar in the past five decades. It insists that hundi plays a significant role in both substitution and complementary on the trade and payment across the border of Myanmar–Thailand. Even though confronting with the barriers of financing of terrorism (anti money laundering AML/combating the financing of terrorism CFT) risk, the competition with the expanding and modernizing formal banking sector, and the introduction of Fintech and mobile money services. In the short term, these are unlikely to eliminate the hundi system completely, but may instead push hundi operators towards adopting these networks and technologies in their own operations.

Social implications

This paper will be a useful source for academics, development professionals, policymakers, law enforcement agencies and business actors who are seeking to understand Myanmar’s informal payment system, hundi.

Originality/value

This is the latest work for border trade payment or trade financing role of hundi which has hidden under the informal market of the border for several decades. It has few research of hundi on border trade and payment, particularly after the military coup in 2021 which made hundi return to be on the spotlight and simultaneous mechanism of border trade and payment ecosystem of Myanmar. This paper will be a useful source for academics, development professionals, policymakers, law enforcement agencies and business actors who are eager to understand Myanmar’s informal payment system, hundi, especially during the hardship.

Details

Journal of Money Laundering Control, vol. 27 no. 3
Type: Research Article
ISSN: 1368-5201

Keywords

Article
Publication date: 4 April 2024

Rita Sleiman, Quoc-Thông Nguyen, Sandra Lacaze, Kim-Phuc Tran and Sébastien Thomassey

We propose a machine learning based methodology to deal with data collected from a mobile application asking users their opinion regarding fashion products. Based on different…

Abstract

Purpose

We propose a machine learning based methodology to deal with data collected from a mobile application asking users their opinion regarding fashion products. Based on different machine learning techniques, the proposed approach relies on the data value chain principle to enrich data into knowledge, insights and learning experience.

Design/methodology/approach

Online interaction and the usage of social media have dramatically altered both consumers’ behaviors and business practices. Companies invest in social media platforms and digital marketing in order to increase their brand awareness and boost their sales. Especially for fashion retailers, understanding consumers’ behavior before launching a new collection is crucial to reduce overstock situations. In this study, we aim at providing retailers better understand consumers’ different assessments of newly introduced products.

Findings

By creating new product-related and user-related attributes, the proposed prediction model attends an average of 70.15% accuracy when evaluating the potential success of new future products during the design process of the collection. Results showed that by harnessing artificial intelligence techniques, along with social media data and mobile apps, new ways of interacting with clients and understanding their preferences are established.

Practical implications

From a practical point of view, the proposed approach helps businesses better target their marketing campaigns, localize their potential clients and adjust manufactured quantities.

Originality/value

The originality of the proposed approach lies in (1) the implementation of the data value chain principle to enhance the information of raw data collected from mobile apps and improve the prediction model performances, and (2) the combination consumer and product attributes to provide an accurate prediction of new fashion, products.

Details

International Journal of Clothing Science and Technology, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 0955-6222

Keywords

1 – 10 of 48