Search results
1 – 10 of 183Rajendran N., Jawahar P.K. and Priyadarshini R.
The purpose of this paper is to apply security policies over the mobile ad hoc networks. A mobile ad hoc network refers to infrastructure-less, persistently self-designing…
Abstract
Purpose
The purpose of this paper is to apply security policies over the mobile ad hoc networks. A mobile ad hoc network refers to infrastructure-less, persistently self-designing systems; likewise, there is a noteworthy innovation that supplies virtual equipment and programming assets according to the requirement of mobile ad hoc network.
Design/methodology/approach
It faces different execution and effectiveness-based difficulties. The major challenge is the compromise of performance because of unavailable resources with respect to the MANET. In order to increase the MANET environment’s performance, various techniques are employed for routing and security purpose. An efficient security module requires a quality-of-service (QoS)-based security policy. It performs the task of routing and of the mobile nodes, and it also reduces the routing cost by finding the most trusted node.
Findings
The experimental results specify that QoS-based security policy effectively minimizes the cost, response time as well as the mobile makespan (routing cost and response time) of an application with respect to other existing approaches.
Research limitations/implications
In this paper, the authors proposed an enhancement of Cross Centric Intrusion Detection System named as PIHNSPRA Routing Algorithm (PIHNSPRA).
Practical implications
It maps the security with the secure IDS communication and distributes the packets among different destinations, based on priority. This calculation is proposed for the purpose of routing and security by considering greatest throughput with least routing cost and reaction time.
Social implications
When the concept is applied to practical applications. Quality of Service introduced in the proposed research reduces the cost of routing and improves the throughput.
Originality/value
The proposed calculation is tested by NS2 simulator and the outcomes showed that the execution of the calculation is superior to other conventional algorithms.
Details
Keywords
Priyadarshini R., Latha Tamilselvan and Rajendran N.
The purpose of this paper is to propose a fourfold semantic similarity that results in more accuracy compared to the existing literature. The change detection in the URL and the…
Abstract
Purpose
The purpose of this paper is to propose a fourfold semantic similarity that results in more accuracy compared to the existing literature. The change detection in the URL and the recommendation of the source documents is facilitated by means of a framework in which the fourfold semantic similarity is implied. The latest trends in technology emerge with the continuous growth of resources on the collaborative web. This interactive and collaborative web pretense big challenges in recent technologies like cloud and big data.
Design/methodology/approach
The enormous growth of resources should be accessed in a more efficient manner, and this requires clustering and classification techniques. The resources on the web are described in a more meaningful manner.
Findings
It can be descripted in the form of metadata that is constituted by resource description framework (RDF). Fourfold similarity is proposed compared to three-fold similarity proposed in the existing literature. The fourfold similarity includes the semantic annotation based on the named entity recognition in the user interface, domain-based concept matching and improvised score-based classification of domain-based concept matching based on ontology, sequence-based word sensing algorithm and RDF-based updating of triples. The aggregation of all these similarity measures including the components such as semantic user interface, semantic clustering, and sequence-based classification and semantic recommendation system with RDF updating in change detection.
Research limitations/implications
The existing work suggests that linking resources semantically increases the retrieving and searching ability. Previous literature shows that keywords can be used to retrieve linked information from the article to determine the similarity between the documents using semantic analysis.
Practical implications
These traditional systems also lack in scalability and efficiency issues. The proposed study is to design a model that pulls and prioritizes knowledge-based content from the Hadoop distributed framework. This study also proposes the Hadoop-based pruning system and recommendation system.
Social implications
The pruning system gives an alert about the dynamic changes in the article (virtual document). The changes in the document are automatically updated in the RDF document. This helps in semantic matching and retrieval of the most relevant source with the virtual document.
Originality/value
The recommendation and detection of changes in the blogs are performed semantically using n-triples and automated data structures. User-focussed and choice-based crawling that is proposed in this system also assists the collaborative filtering. Consecutively collaborative filtering recommends the user focussed source documents. The entire clustering and retrieval system is deployed in multi-node Hadoop in the Amazon AWS environment and graphs are plotted and analyzed.
Details
Keywords
Varun Kumar K.A., Priyadarshini R., Kathik P.C., Madhan E.S. and Sonya A.
Data traffic through wireless communication is significantly increasing, resulting in the frequency of streaming applications as various formats and the evolution of the Internet…
Abstract
Purpose
Data traffic through wireless communication is significantly increasing, resulting in the frequency of streaming applications as various formats and the evolution of the Internet of Things (IoT), such as virtual reality, edge device based transportation and surveillance systems. Growth in kind of applications resulted in increasing the scope of wireless communication and allocating a spectrum, as well as methods to decrease the intervention between nearby-located wireless links functioning on the same spectrum bands and hence to proliferation for the spectral efficiency. Recent advancement in drone technology has evolved quickly leading on board sensors with increased energy, storage, communication and processing capabilities. In future, the drone sensor networks will be more common and energy utilization will play a crucial role to maintain a fully functional network for the longest period of time. Envisioning the aerial drone network, this study proposes a robust high level design of algorithms for the drones (group coordination). The proposed design is validated with two algorithms using multiple drones consisting of various on-board sensors. In addition, this paper also discusses the challenges involved in designing solutions. The result obtained through proposed method outperforms the traditional techniques with the transfer rate of more than 3 MB for data transfer in the drone with coordination
Design/methodology/approach
Fair Scheduling Algorithm (FSA) using a queue is a distributed slot assignment algorithm. The FSA executes in rounds. The duration of each round is dynamic based upon the delay in the network. FSA prevents the collision by ensuring that none of the neighboring node gets the same slot. Nodes (Arivudainambi et al., 2019) which are separated by two or more hopes can get assigned in the same slot, thereby preventing the collision. To achieve fairness at the scheduling level, the FSA maintains four different states for each node as IDLE, REQUEST, GRANT and RELEASE.
Findings
A multi-unmanned aerial vehicle (UAV) system can operate in both centralized and decentralized manner. In a centralized system, the ground control system will take care of drone data collection, decisions on navigation, task updation, etc. In a decentralized system, the UAVs are unambiguously collaborating on various levels as mentioned in the centralized system to achieve the goal which is represented in Figure 2.
Research limitations/implications
However, the multi-UAVs are context aware in situations such as environmental observation, UAV–UAV communication and decision-making. Independent of whether operation is centralized or decentralized, this study relates the goals of the multi-UAVs are sensing, communication and coordination among other UAVs, etc. Figure 3 shows overall system architecture.
Practical implications
The individual events attempts in the UAV’s execution are required to complete the mission in superlative manner which affects in every multi UAV system. This multi UAV systems need to take a steady resolute on what way UAV has to travel and what they need to complete to face the critical situations in changing of environments with the uncertain information. This coordination algorithm has certain dimensions including events that they needs to resolute on, the information that they used to make a resolution, the resolute making algorithm, the degree of decentralization. In multi UAV systems, the coordinated events ranges from lower motion level.
Originality/value
This study has proposed a novel self-organizing coordination algorithm for multi-UAV systems. Further, the experimental results also confirm that is robust to form network at ease. The testbed for this simulation to sensing, communication, evaluation and networking. The algorithm coordination has to testbed with multi UAVs systems. The two scheduling techniques has been used to transfer the packets using done network. The self-organizing algorithm (SOA) with fair scheduling queue outperforms the weighted queue scheduling in the transfer rate with less loss and time lag. The results obtained through from Figure 10 clearly indicates that the fair queue scheduling with SOA have several advantages over weighted fair queue in different parameters.
Details
Keywords
Rajakumar B.R., Gokul Yenduri, Sumit Vyas and Binu D.
This paper aims to propose a new assessment system module for handling the comprehensive answers written through the answer interface.
Abstract
Purpose
This paper aims to propose a new assessment system module for handling the comprehensive answers written through the answer interface.
Design/methodology/approach
The working principle is under three major phases: Preliminary semantic processing: In the pre-processing work, the keywords are extracted for each answer given by the course instructor. In fact, this answer is actually considered as the key to evaluating the answers written by the e-learners. Keyword and semantic processing of e-learners for hierarchical clustering-based ontology construction: For each answer given by each student, the keywords and the semantic information are extracted and clustered (hierarchical clustering) using a new improved rider optimization algorithm known as Rider with Randomized Overtaker Update (RR-OU). Ontology matching evaluation: Once the ontology structures are completed, a new alignment procedure is used to find out the similarity between two different documents. Moreover, the objects defined in this work focuses on “how exactly the matching process is done for evaluating the document.” Finally, the e-learners are classified based on their grades.
Findings
On observing the outcomes, the proposed model shows less relative mean squared error measure when weights were (0.5, 0, 0.5), and it was 71.78% and 16.92% better than the error values attained for (0, 0.5, 0.5) and (0.5, 0.5, 0). On examining the outcomes, the values of error attained for (1, 0, 0) were found to be lower than the values when weights were (0, 0, 1) and (0, 1, 0). Here, the mean absolute error (MAE) measure for weight (1, 0, 0) was 33.99% and 51.52% better than the MAE value for weights (0, 0, 1) and (0, 1, 0). On analyzing the overall error analysis, the mean absolute percentage error of the implemented RR-OU model was 3.74% and 56.53% better than k-means and collaborative filtering + Onto + sequential pattern mining models, respectively.
Originality/value
This paper adopts the latest optimization algorithm called RR-OU for proposing a new assessment system module for handling the comprehensive answers written through the answer interface. To the best of the authors’ knowledge, this is the first work that uses RR-OU-based optimization for developing a new ontology alignment-based online assessment of e-learners.
Details
Keywords
Leila Afshari, Muhammad Shakil Ahmad and Talha Mansoor
This paper investigates the relationships between responsible leadership and employees' knowledge sharing behavior and performance in the healthcare sector. The present study…
Abstract
Purpose
This paper investigates the relationships between responsible leadership and employees' knowledge sharing behavior and performance in the healthcare sector. The present study provides deeper insights into those relationships by uncovering the mechanisms through which relational and ethical dimensions of responsible leadership influence knowledge sharing outcomes. Drawing on the social exchange theory, this study examines the mediating role of trust in the leader and leadership support.
Design/methodology/approach
Data were collected from 445 healthcare professionals in Pakistan. Structural equation modeling was employed to analyze the data.
Findings
The study findings revealed that responsible leaders enhance knowledge worker performance and knowledge sharing behavior through enhancing trusting relationships with followers and providing support. Furthermore, the authors investigated the moderating role of goal orientation, and the results showed that the effect of responsible leadership on knowledge worker performance was stronger for highly goal-oriented employees.
Practical implications
This research suggests that human resource managers interested in fostering knowledge sharing behaviors, must focus on cultivating responsible leadership behavior within their organizations. Furthermore, this study findings propose that HRM practices should foster employee goal orientation in order to enhance knowledge workers' performance.
Originality/value
This study makes a novel contribution to the literature by shifting the research focus from the traditional view of leadership to a leadership style more responsive to the reciprocity nature of the relationships between employees and leaders. By shifting the focus to a relational-ethical based leadership style, the current study was able to fully uncover the underlying mechanisms linking responsible leadership to knowledge sharing outcomes.
Details
Keywords
Theresa Obuobisa-Darko, Frank Ohemeng, Emelia Amoako Asiedu and Kenneth Parku
The coronavirus disease (COVID-19) has resulted in a volatile, uncertain, complex and ambiguous (VUCA) work environment for employees. This environment has created a situation…
Abstract
The coronavirus disease (COVID-19) has resulted in a volatile, uncertain, complex and ambiguous (VUCA) work environment for employees. This environment has created a situation that has brought fairness into the fore, especially with respect to how employees should be managed to ensure that organisations function smoothly. This is more important in the public sector, which has become the focal point for policy development and programme implementation to meet the exigencies of the time. At the same time, ensuring organisational fairness, demands that leadership is conscious about the needs of employees and to treat them fairly. What sort of leadership then is needed in such an environment? The chapter advocates for responsible leadership as better leadership style in enhancing organisational fairness in this environment.
Details
Keywords
Chao Fu, Qing Lv and Reza G. Badrnejad
Fog computing (FC) is a new field of research and has emerged as a complement to the cloud, which can mitigate the problems inherent to the cloud computing (CC) and internet of…
Abstract
Purpose
Fog computing (FC) is a new field of research and has emerged as a complement to the cloud, which can mitigate the problems inherent to the cloud computing (CC) and internet of things (IoT) model such as unreliable latency, bandwidth constraints, security and mobility. Because there is no comprehensive study on the FC in health management processing systems techniques, this paper aims at surveying and analyzing the existing techniques systematically as well as offering some suggestions for upcoming works.
Design/methodology/approach
The paper complies with the methodological requirements of systematic literature reviews (SLR). The present paper investigates the newest systems and studies their practical techniques in detail. The applications of FC in health management systems have been categorized into three major groups, including review articles, data analysis, frameworks and models mechanisms.
Findings
The results have indicated that despite the popularity of FC as having real-time processing, low latency, dynamic configuration, scalability, low reaction time (less than a second), high bandwidth, battery life and network traffic, a few issues remain unanswered, such as security. The most recent research has focused on improvements in remote monitoring of the patients, such as less latency and rapid response. Also, the results have shown the application of qualitative methodology and case study in the use of FC in health management systems. While FC studies are growing in the clinical field, CC studies are decreasing.
Research limitations/implications
This study aims to be comprehensive, but there are some limitations. This research has only surveyed the articles that are mined, according to a keyword exploration of FC health, FC health care, FC health big data and FC health management system. Fog-based applications in the health management system may not be published with determined keywords. Moreover, the publications written in non-English languages have been ignored. Some important research studies may be printed in a language other than English.
Practical implications
The results of this survey will be valuable for academicians, and these can provide visions into future research areas in this domain. This survey helps the hospitals and related industries to identify FC needs. Moreover, the disadvantages and advantages of the above systems have been studied, and their key issues have been emphasized to develop a more effective FC in health management processing mechanisms over IoT in the future.
Originality/value
Previous literature review studies in the field of SLR have used a simple literature review to find the tasks and challenges in the field. In this study, for the first time, the FC in health management processing systems is applied in a systematic review focused on the mediating role of the IoT and thereby provides a novel contribution. An SLR is conducted to find more specific answers to the proposed research questions. SLR helps to reduce implicit researcher bias. Through the adoption of broad search strategies, predefined search strings and uniform inclusion and exclusion criteria, SLR effectively forces researchers to search for studies beyond their subject areas and networks.
Details
Keywords
Satinder Singh, Sarabjeet Singh and Tanveer Kajla
Purpose: The study aims to explore the wider acceptance of blockchain technology and growing faith in this technology among all business domains to mitigate the chances of fraud…
Abstract
Purpose: The study aims to explore the wider acceptance of blockchain technology and growing faith in this technology among all business domains to mitigate the chances of fraud in various sectors.
Design/Methodology/Approach: The authors focus on studies conducted during 2015–2022 using keywords such as blockchain, fraud detection and financial domain for Systematic Literature Review (SLR). The SLR approach entails two databases, namely, Scopus and IEEE Xplore, to seek relevant articles covering the effectiveness of blockchain technology in controlling financial fraud.
Findings: The findings of the research explored different types of business domains using blockchains in detecting fraud. They examined their effectiveness in other sectors such as insurance, banks, online transactions, real estate, credit card usage, etc.
Practical Implications: The results of this research highlight (1) the real-life applications of blockchain technology to secure the gateway for online transactions; (2) people from diverse backgrounds with different business objectives can strongly rely on blockchains to prevent fraud.
Originality/Value: The SLR conducted in this study assists in the identification of future avenues with practical implications, making researchers aware of the work so far carried out for checking the effectiveness of blockchain; however, it does not ignore the possibility of zero to less effectiveness in some businesses which is yet to be explored.
Details
Keywords
Rahul Pandey, Dipanjan Chatterjee and Manus Rungtusanatham
In this paper, the authors introduce supply disruption ambiguity as the inability of a sourcing firm to attach probability point estimates to the occurrence of and to the…
Abstract
Purpose
In this paper, the authors introduce supply disruption ambiguity as the inability of a sourcing firm to attach probability point estimates to the occurrence of and to the magnitude of loss from supply disruptions. The authors drew on the “ambiguity in decision-making” literature to define this concept formally, connected it to relevant supply disruption information deficit, positioned it relative to supply chain risk assessment and hypothesized and tested its negative associations with both supply base ties and inventory turnover.
Design/methodology/approach
The authors analysed survey data from 171 North American manufacturers and archival data for a subset (88 publicly listed) of these manufacturers via Ordinary Least Squares (OLS) estimation after ensuring that methodological concerns with survey research have been addressed. They used appropriate controls and employed the heteroskedasticity-based instrumental variable (HBIV) approach to ensure that inferences from our results are not unduly influenced by endogeneity.
Findings
Strong supply base ties decrease supply disruption ambiguity, which, in turn, increases inventory turnover. Moreover, strong supply base ties and data integration with the supply base have indirect and positive effects on inventory turnover. As sourcing firms strengthen ties and integrate data exchange with their supply base, their inventory turnover improves from access to information relevant to detect and diagnose supply disruptions effectively.
Originality/value
Research on supply disruption management has paid more attention to the “disruption recovery” stage than to the “disruption discovery” stage. In this paper, the authors add novel insights regarding the recognition and diagnosis aspects of the “disruption discovery” stage. These novel insights reveal how and why sourcing firms reduce their overall ambiguity associated with detecting and assessing losses from supply disruptions through establishing strong ties with their supply base and how and why reducing such ambiguity improves inventory turnover performance.
Details
Keywords
R.G. Priyaadarshini and Lalatendu Kesari Jena
The paper aims to propose and validate a process-based model to enhance managerial effectiveness among micro, small and medium enterprises (MSMEs). It has been observed that…
Abstract
Purpose
The paper aims to propose and validate a process-based model to enhance managerial effectiveness among micro, small and medium enterprises (MSMEs). It has been observed that business uncertainties and inadequate financial resources that MSME entrepreneurs and managers face require them to constantly engage in strong self-awareness and self-regulating behavior to enhance the efficacy in their roles and, henceforth, their role performance effectiveness.
Design/methodology/approach
The approach for data collection was based on the clustering of MSMEs belonging to the clusters machine tool, pump manufacturing, foundry, textile and auto-component clusters in India. The respondents to the study were MSME entrepreneurs and managers who oversee and manage multiple functions like operations, quality, marketing, sales, supply chain management, procurement, personnel and administration and general administration.
Findings
The self-efficacy of entrepreneurial managers of MSMEs is observed to play an integral role in enhancing the efficacy of their roles, thus highlighting the use of a process-based perspective while dealing with constant resource constraints and excessive dynamism in their business contexts. The ability to handle multiple tasks effectively and resilience to manage challenges enhances their role-making process, which is significant in achieving and sustaining goal-oriented behavior among MSME entrepreneurs and managers.
Practical implications
This paper would serve as an effective model for entrepreneurs and managers to enhance their efficacy in the individual and interdependent role context, which would help achieve their individual and organizational goals. The model emphasizes a process-based perspective that thrusts the need to relate to the organizational context, enhancing individual confidence for goal-related behavior and fulfilling their role-related expectations.
Originality/value
This paper presents a model of enhancing managerial effectiveness that discusses self-efficacy as antecedent behavior. Here, personal and environmental factors aid cognition to one’s capability to construct reality, self-regulate, encode information and engage in effective managerial action.
Details