Search results

1 – 10 of over 2000
Open Access
Article
Publication date: 4 April 2023

Ana Isabel Polo-Peña, Hazel Andrews and Javier Torrico-Jódar

This paper examines whether following a health crisis the use of health and safety protocols and hotel brand awareness influences hotel perceived value and intention to visit.

Abstract

Purpose

This paper examines whether following a health crisis the use of health and safety protocols and hotel brand awareness influences hotel perceived value and intention to visit.

Design/methodology/approach

Using an experimental design, the study evaluates the effectiveness of the use of health and safety protocols and the moderating effect of brand awareness on perceived value and intention to visit.

Findings

The results show that the hotels using health and safety protocols (compared to those that do not use them) will achieve a higher perceived value and intention to visit. In addition, the awareness of brand does not moderate the effect of the health and safety protocols on perceived value and intention to visit.

Practical implications

This research identifies mechanisms for future consideration by hotel companies to promote the recovery of their activity after a health crisis. Specifically, using health and safety protocols will result in the market evaluating the brand more highly and produce a greater intention to visit. At the same time, the research indicates that regardless of whether the brand is well-known or not, the use of a health and safety protocol is advantageous.

Originality/value

This study offers new insights that can be useful for developing a resilient hotel sector in the face of future health crises. Specifically, the results show progress in understanding the effects that the use of health and safety protocols and brand awareness have on key consumer variables for the recovery of the sector in a post-pandemic context.

Details

Journal of Hospitality and Tourism Insights, vol. 7 no. 1
Type: Research Article
ISSN: 2514-9792

Keywords

Open Access
Article
Publication date: 26 October 2020

Mohammed S. Al-kahtani, Lutful Karim and Nargis Khan

Designing an efficient routing protocol that opportunistically forwards data to the destination node through nearby sensor nodes or devices is significantly important for an…

Abstract

Designing an efficient routing protocol that opportunistically forwards data to the destination node through nearby sensor nodes or devices is significantly important for an effective incidence response and disaster recovery framework. Existing sensor routing protocols are mostly not effective in such disaster recovery applications as the networks are affected (destroyed or overused) in disasters such as earthquake, flood, Tsunami and wildfire. These protocols require a large number of message transmissions to reestablish the clusters and communications that is not energy efficient and result in packet loss. This paper introduces ODCR - an energy efficient and reliable opportunistic density clustered-based routing protocol for such emergency sensor applications. We perform simulation to measure the performance of ODCR protocol in terms of network energy consumptions, throughput and packet loss ratio. Simulation results demonstrate that the ODCR protocol is much better than the existing TEEN, LEACH and LORA protocols in term of these performance metrics.

Details

Applied Computing and Informatics, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 2634-1964

Keywords

Open Access
Article
Publication date: 4 March 2022

Caroline B. Ncube

This paper aims to explore the contours of the future intellectual property (IP) protocol of the African Continental Free Trade Area (AfCFTA) Agreement.

3739

Abstract

Purpose

This paper aims to explore the contours of the future intellectual property (IP) protocol of the African Continental Free Trade Area (AfCFTA) Agreement.

Design/methodology/approach

This paper frames the IP protocol within the architecture of the AfCFTA Agreement, meaning that it will follow the structure of other protocols and will be guided by the Agreement’s foundational principles and objectives. With the place, shape and form of the protocol so established, the paper considers the substantive aspects that ought to be addressed. It also considers provisions on technical assistance, capacity building and cooperation.

Findings

The paper finds that the Tripartite Free Trade Phase 2 IP agenda is a credible starting place, which must be broadened to better meet gendered challenges and the continent’s developmental priorities. This will entail including provisions on specific aspects enumerated in the paper, which must be aligned with provisions on technical assistance, capacity building and cooperation to enhance implementation. The best outcomes in the negotiation, adoption and implementation of the IP protocol will be achieved by an inclusive approach incorporating all national, sub-regional and regional institutions guided by coherent policy and coordinated to ensure efficiency in resources and capacity mobilisation.

Originality/value

To the best of the author’s knowledge, this is the first paper to formally consider both the architecture and substantive provisions of the future AfCFTA IP protocol with specific focus on gendered dimensions.

Details

Journal of International Trade Law and Policy, vol. 21 no. 2
Type: Research Article
ISSN: 1477-0024

Keywords

Open Access
Article
Publication date: 30 March 2020

Hamenudin Hamzah, Rosnah Sutan, Azmi Mohd Tamil, Aminah Bee Mohd Kassim, Adliah Mohamed Soid and Amar Singh HSS

The aim of this study is to assess healthcare workers' behavior on the congenital hypothyroidism screening program implementation based on a framework protocol and its associated…

1533

Abstract

Purpose

The aim of this study is to assess healthcare workers' behavior on the congenital hypothyroidism screening program implementation based on a framework protocol and its associated factors.

Design/methodology/approach

A cross-sectional study was conducted using the multistage random sampling method in recruiting health clinic workers and purposive sampling techniques for hospital workers. The demographics, providers' characteristic, occupational profile, attitude, perceived behavior control (PBC), knowledge, behavioral intention and adherence to protocol were gathered using validated and reliable self-administered questionnaires.

Findings

Partial intention to adhere to protocol was 25.7%. Weak attitude (adjusted odds ratio [AOR]: 5.48, 95% confidence interval [CI]: 3.32–9.06), low PBC score (AOR: 0.91, 95% CI: 0.86–0.95) and low knowledge score (AOR: 0.85, 95% CI: 0.75–0.96) were associated with partial intention to adhere to protocol. In the self-rated adherence assessment, 92.6% of participants from health clinics, 79.1% from pediatric and 61.1% from pathology were found not adhering to protocol. There was a significant association between intention and adherence to protocol.

Research limitations/implications

Documentations and observations in assessing program implementation were limited to perform in the present study. Using self-rated instruments and focusing on healthcare workers alone did not provide a comprehensive assessment.

Practical implications

Availability of a training module at site and regular refreshing course training should be made available to harness knowledge, attitude and behavioral perception in implementing the program activities.

Originality/value

Integrating the Logical Framework Approach in assessing program implementation and application of the Theory of Planned Behavior and Attitude, Subjective Norms, Self-Efficacy Model in this study were beneficial.

Details

Journal of Health Research, vol. 35 no. 2
Type: Research Article
ISSN: 0857-4421

Keywords

Open Access
Article
Publication date: 22 April 2022

Kamalakshi Dayal and Vandana Bassoo

The performance of Wireless Sensor Networks (WSNs) applications is bounded by the limited resources of battery-enabled Sensor Nodes (SNs), which include energy and computational…

Abstract

Purpose

The performance of Wireless Sensor Networks (WSNs) applications is bounded by the limited resources of battery-enabled Sensor Nodes (SNs), which include energy and computational power; the combination of which existing research seldom focuses on. Although bio-inspired algorithms provide a way to control energy usage by finding optimal routing paths, those which converge slower require even more computational power, which altogether degrades the overall lifetime of SNs.

Design/methodology/approach

Hence, two novel routing protocols are proposed using the Red-Deer Algorithm (RDA) in a WSN scenario, namely Horizontal PEG-RDA Equal Clustering and Horizontal PEG-RDA Unequal Clustering, to address the limited computational power of SNs. Clustering, data aggregation and multi-hop transmission are also integrated to improve energy usage. Unequal clustering is applied in the second protocol to mitigate the hotspot problem in Horizontal PEG-RDA Equal Clustering.

Findings

Comparisons with the well-founded Ant Colony Optimisation (ACO) algorithm reveal that RDA converges faster by 85 and 80% on average when the network size and node density are varied, respectively. Furthermore, 33% fewer packets are lost using the unequal clustering approach which also makes the network resilient to node failures. Improvements in terms of residual energy and overall network lifetime are also observed.

Originality/value

Proposal of a bio-inspired algorithm, namely the RDA to find optimal routing paths in WSN and to enhance convergence rate and execution time against the well-established ACO algorithm. Creation of a novel chain cluster-based routing protocol using RDA, named Horizontal PEG-RDA Equal Clustering. Design of an unequal clustering equivalent of the proposed Horizontal PEG-RDA Equal Clustering protocol to tackle the hotspot problem, which enhances residual energy and overall network lifetime, as well as minimises packet loss.

Details

Applied Computing and Informatics, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 2634-1964

Keywords

Open Access
Article
Publication date: 14 August 2017

Jose Ignacio Tamayo Segarra, Bilal Al Jammal and Hakima Chaouchi

Internet of Things’ (IoT’s) first wave started with tracking services for better inventory management mainly using radio frequency identification (RFID) technology. Later on…

2879

Abstract

Purpose

Internet of Things’ (IoT’s) first wave started with tracking services for better inventory management mainly using radio frequency identification (RFID) technology. Later on, monitoring services became one of the major interests, including sensing technologies, and then more actuation for remote control-type of IoT applications such as smart homes, smart cities and Industry 4.0. In this paper, the authors focus on the RFID technology impairment. They propose to take advantage of the mature IoT technologies that offer native service discovery such as blutooth or LTE D2D ProSe or Wifi Direct. Using the automatic service discovery in the new framework will make heterogeneous readers aware of the presence of other readers and this will be used by the proposed distributed algorithm to better control the multiple RFID reader interference problem. The author clearly considers emerging Industry 4.0 use case, where RFID technology is of major interest for both identification and tracking. To enhance the RFID tag reading performance, collisions in the RFID frequency should be minimized with reader-to-reader coordination protocols. In this paper, the author proposes a simple distributed reader anti-collision protocol named DiSim that makes use of proximity services of IoT network and is compliant with the current RFID standards. The author evaluates the efficiency of the proposal via simulation.

Design/methodology/approach

In this paper, the author proposes a simple distributed reader anti-collision protocol named DiSim that makes use of proximity services of IoT network and is compliant with the current RFID standards. The author evaluates the efficiency of the proposal via simulation to study its behavior in very dense and heterogeneous RFID environments. Specifically, the author explores the coexistence of powerful static readers and small mobile readers, comparing the proposal with a standard ETSI CSMA method. The proposal reduces significantly the number of access attempts, which are resource-expensive for the readers. The results show that the objectives of DiSim are met, producing low reader collision probability and, however, having lower average readings per reader per time.

Findings

DiSim is evaluated with the ETSI standard LBT protocol for multi-reader environments in several environments with varied levels of reader and tag densities, having both static powerful RFID readers and heterogeneous randomly moving mobile RFID readers. It effectively reduces the number of backoffs or contentions for the RFID channel. This has high reading success rate due to the avoided collisions; however, the readers are put to wait, and DiSim has less average readings per reader per time. As an additional side evaluation, the ETSI standard LBT mechanism was found to present a good performance for low-density mid-coverage scenarios, however, with high variability on the evaluation results.

Research limitations/implications

To show more results, the author needs to do real experimentation in a warehouse, such as Amazon warehouse, where he expects to have more and more robots, start shelves, automatic item finding on the shelve, etc.

Practical implications

Future work considers experimentation in a real warehouse equipped with heterogeneous RFID readers and real-time analysis of RFID reading efficiency also combined with indoor localization and navigation for warehouse mobile robots.

Social implications

More automatization is expected in the future; this work makes the use of RFID technology more efficient and opens more possibilities for services deployment in different domains such as the industry which was considered not only in this paper but also in smart cites and smart homes.

Originality/value

Compared to the literature, the proposal offers the advantage to not be dependent on a centralized server controlling the RFID readers. It also offers the possibility for an existing RFID architecture to add new readers from a different manufacturer, as the readers using the approach will have the possibility to discover the capabilities of the new interaction other RFID readers. This solution takes advantage of the available proximity service that will be more and more offered by the IoT technologies.

Open Access
Article
Publication date: 15 March 2018

Moufida Maimour

Multipath routing holds a great potential to provide sufficient bandwidth to a plethora of applications in wireless sensor networks. In this paper, we consider the problem of…

313

Abstract

Multipath routing holds a great potential to provide sufficient bandwidth to a plethora of applications in wireless sensor networks. In this paper, we consider the problem of interference that can significantly affect the expected performances. We focus on the performance evaluation of the iterative paths discovery approach as opposed to the traditional concurrent multipath routing. Five different variants of multipath protocols are simulated and evaluated using different performance metrics. We mainly show that the iterative approach allows better performances when used jointly with an interference-aware metric or when an interference-zone marking strategy is employed. This latter appears to exhibit the best performances in terms of success ratio, achieved throughput, control messages overhead as well as energy consumption.

Details

Applied Computing and Informatics, vol. 16 no. 1/2
Type: Research Article
ISSN: 2634-1964

Keywords

Open Access
Book part
Publication date: 4 May 2018

Salahuddin, Bakhtiar, Yusman and Fadhli

Purpose – This study aims to design and build a wireless supervisory control and data acquisition (SCADA) system based on Protocol AX.25 with the aim of monitoring the performance…

Abstract

Purpose – This study aims to design and build a wireless supervisory control and data acquisition (SCADA) system based on Protocol AX.25 with the aim of monitoring the performance of several parameters in Microhydro Power Plant (MHPP). This system can monitor several MHPP parameters such as voltage, current, frequency, and turbine rotation so that it can be accessed directly at one central location.

Design/Methodology/Approach – The design is done by taking into account the real parameters that exist in the MHPP. Some parameters that become the main object to see the performance of MHPP are voltage, current, frequency, and turbine rotation. The voltage generated by the MHPP must be adjusted to the voltage supplied by State Electricity Company to the consumer, including the phase used. The resulting stream should also be monitored for power to be adjusted to the turbine spin. The generator frequency is kept stable according to the standard frequency of the State Electricity Company generator.

Findings – The remote terminal unit (RTU) system has been simulated using 2 ACS712 current sensors, voltage sensor, zero crossing point, frequency sensor, and rotation sensor functionalized to monitor MHPP parameters. The AX.25 protocol has been applicable in the wireless SCADA network for monitoring the performance of MHPP by embedding in KYL-1020UA transceiver radio using the 433 MHz frequency and the audio frequency shift keying modulation system. Radio transmitter KYL-1020UA has been successfully simulated to send data from sensors to display on the computer through SCADA built applications. The data changes in the RTU section can be displayed properly on the graphic user interface in accordance with the existing display at the MHPP location.

Research Limitations/Implications – There are only two RTUs that will be connected to communicate, in this case MHPP-1 with callsign “RTU-001” and MHPP-2 with callsign “RTU-002.” While the existing devices in the data access section parameters MHPP as master station with callsign “MSSCADA” monitoring the performance of parameters sent from the RTU. There is no collision or error in data transmission. Baudrate is varied at 1,200 bps, 2,400 bps, 4,800 bps, and 9,600 bps for effective throughput calculation and AX.25 protocol efficiency. The transmission distance is varied at 100 m, 200 m, 300 m, and 500 m to see the bit error rate with baudrate 1,200 bps and 9,600 bps.

Practical Implications – This product is expected to be applied to several MHPP locations in Aceh Province so that its monitoring system is more centralized and efficient.

Originality/Value – This research if for the efficient monitoring of several MHPP located far apart and can be monitored in one central location so that operators do not have to be located at the plant site.

Open Access
Article
Publication date: 4 August 2020

Aaqil Somauroo and Vandana Bassoo

Due to its boundless potential applications, Wireless Sensor Networks have been subject to much research in the last two decades. WSNs are often deployed in remote environments…

1238

Abstract

Due to its boundless potential applications, Wireless Sensor Networks have been subject to much research in the last two decades. WSNs are often deployed in remote environments making replacement of batteries not feasible. Low energy consumption being of prime requisite led to the development of energy-efficient routing protocols. The proposed routing algorithms seek to prolong the lifetime of sensor nodes in the relatively unexplored area of 3D WSNs. The schemes use chain-based routing technique PEGASIS as basis and employ genetic algorithm to build the chain instead of the greedy algorithm. Proposed schemes will incorporate an energy and distance aware CH selection technique to improve load balancing. Clustering of the network is also implemented to reduce number of nodes in a chain and hence reduce delay. Simulation of our proposed protocols is carried out for homogeneous networks considering separately cases for a static base-station inside and outside the network. Results indicate considerable improvement in lifetime over PEGASIS of 817% and 420% for base station inside and outside the network respectively. Residual energy and delay performance are also considered.

Details

Applied Computing and Informatics, vol. 19 no. 3/4
Type: Research Article
ISSN: 2634-1964

Open Access
Article
Publication date: 24 January 2022

Yu Xiang

This paper aims to examine the recommendation system of the video-sharing website YouTube to study how control of users is effected on online platforms.

1734

Abstract

Purpose

This paper aims to examine the recommendation system of the video-sharing website YouTube to study how control of users is effected on online platforms.

Design/methodology/approach

This paper conceptualises algorithmic systems as protocols – technological and social infrastructures that both facilitate and govern interactions between autonomous actors (Galloway and Thacker, 2004, 2007). It adopts a netnographic approach (Kozinets, 2002) to study not only the formal, technological systems of the platform but also the systems as they were made sense of, understood and enacted upon by actors. It relies both on information as revealed by the organisation itself, as well as discussions between lay users in online forums and press coverage.

Findings

The results of this study indicate that the ways in which platforms selectively facilitate interactions between users constitute a form of control. While maintaining the appearance of an open and neutral marketplace, interactions on the platform are in fact highly structured. The system relies on the surveillance of user interactions to rapidly identify and propagate marketable contents, so as to maximise user “engagement” and ad revenue. The systems place few demands or restrictions on individual users, instead control is effected in a probabilistic fashion, over the population of users as a whole, so as to, in aggregate, accomplish organisational goal.

Originality/value

This paper contributes to the literature on accounting and control practices in online spaces, by extending the notion of control beyond overt rankings and evaluations, to the underlying technical and social infrastructures that facilitate and shape interactions.

Details

Qualitative Research in Accounting & Management, vol. 19 no. 3
Type: Research Article
ISSN: 1176-6093

Keywords

1 – 10 of over 2000