Search results

1 – 10 of over 37000
Article
Publication date: 8 October 2018

Luitpold Babel

The purpose of this paper is to present a new approach for finding a minimum-length trajectory for an autonomous unmanned air vehicle or a long-range missile from a release point…

Abstract

Purpose

The purpose of this paper is to present a new approach for finding a minimum-length trajectory for an autonomous unmanned air vehicle or a long-range missile from a release point with specified release conditions to a destination with specified approach conditions. The trajectory has to avoid obstacles and no-fly zones and must take into account the kinematic constraints of the air vehicle.

Design/methodology/approach

A discrete routing model is proposed that represents the airspace by a sophisticated network. The problem is then solved by applying standard shortest-path algorithms.

Findings

In contrast to the most widely used grids, the generated networks allow arbitrary flight directions and turn angles, as well as maneuvers of different strengths, thus fully exploiting the flight capabilities of the aircraft. Moreover, the networks are resolution-independent and provide high flexibility by the option to adapt density.

Practical implications

As an application, a concept for in-flight replanning of flight paths to changing destinations is proposed. All computationally intensive tasks are performed in a pre-flight planning prior to the launch of the mission. The in-flight planning is based entirely on precalculated data, which are stored in the onboard computer of the air vehicle. In particular, no path finding algorithms with high or unpredictable running time and uncertain outcome have to be applied during flight.

Originality/value

The paper presents a new network-based algorithm for flight path optimization that overcomes weaknesses of grid-based approaches and allows high-quality solutions. The method can be applied for quick in-flight replanning of flight paths.

Details

Aircraft Engineering and Aerospace Technology, vol. 90 no. 8
Type: Research Article
ISSN: 1748-8842

Keywords

Article
Publication date: 28 October 2020

Leila Alinaghian, Jilin Qiu and Kamran Razmdoost

The purpose of this paper is to systematically review and assess the current status of research on supply chain sustainability from a network structural perspective and provide an…

1750

Abstract

Purpose

The purpose of this paper is to systematically review and assess the current status of research on supply chain sustainability from a network structural perspective and provide an organising framework for future scholarship in this area.

Design/methodology/approach

By adopting an evidence-based approach, this study conducts a systematic review of 73 articles from 18 peer-reviewed journals published between 2000 and 2020.

Findings

Adopting a social network analysis approach, the review identifies specific node-level (i.e. degree centrality, closeness centrality and betweenness centrality) and network-level (i.e. network density, network sub-groups and network diversity) structural properties that play a role in supply chain sustainability. The results reveal that structural properties determine the extent of perception of sustainability risks, the diffusion of sustainability targets, introduction of sustainable innovations, development of sustainability capabilities, adoption of sustainability initiatives and the monitoring of sustainability performance throughout the supply chain.

Originality/value

By distinguishing between supply network and sustainable supply network types, this study extends the existing understandings of the role of network connectivity patterns in supply chain sustainability through synthesising and evaluating the extant literature. This study further clarifies the role of these network structural properties in supply chain sustainability by describing their impact on a set of sustainable supply chain management practices through which firms achieve sustainability goals across their supply chains.

Details

Supply Chain Management: An International Journal, vol. 26 no. 2
Type: Research Article
ISSN: 1359-8546

Keywords

Article
Publication date: 3 September 2019

Shakib Zohrehvandi, Mario Vanhoucke, Roya Soltani and Mehrdad Javadi

The purpose of this paper is to introduce a reconfigurable model that is a combination of a schedule model and a queuing system M/M/m/K to reduce the duration of the wind turbine…

Abstract

Purpose

The purpose of this paper is to introduce a reconfigurable model that is a combination of a schedule model and a queuing system M/M/m/K to reduce the duration of the wind turbine construction project closure phase and reduce the project documentation waiting time in the queue.

Design/methodology/approach

This research was implemented in a wind farm project. The schedule model deals with reducing the duration of the turbines closure phase by an activity overlapping technique, and the queuing system deals with reducing the turbine documentation waiting time in the queue, as well as reducing the probability of server idleness during the closure phase.

Findings

After the implementation of the model, the obtained results were compared to those of similar previously conducted projects in terms of duration, and the model was found effective.

Research limitations/implications

Project closure is an important and mandatory process in all projects. More often than not, this process is faced with problems including prolonged project duration, disputes, lawsuits, and also in projects like the implementation of wind farms, a queue of documents at closing stage may also cause difficulties in project closure phase.

Originality/value

The contributions of this research are twofold: first, a combination of project management and queuing system is presented, and second, a reconfigurable model is introduced to enhance the performance and productivity of the closure phase of the project through reducing the implementation time and reducing the turbine documentation waiting time in the queue, as well as reducing the probability of server idleness during the closure phase of the wind farm project.

Details

Engineering, Construction and Architectural Management, vol. 27 no. 2
Type: Research Article
ISSN: 0969-9988

Keywords

Article
Publication date: 5 June 2009

Boris Mitavskiy, Jonathan Rowe and Chris Cannings

A variety of phenomena such as world wide web, social or business networks, interactions are modelled by various kinds of networks (such as the scale free or preferential…

Abstract

Purpose

A variety of phenomena such as world wide web, social or business networks, interactions are modelled by various kinds of networks (such as the scale free or preferential attachment networks). However, due to the model‐specific requirements one may want to rewire the network to optimize the communication among the various nodes while not overloading the number of channels (i.e. preserving the number of edges). The purpose of this paper is to present a formal framework for this problem and to examine a family of local search strategies to cope with it.

Design/methodology/approach

This is mostly theoretical work. The authors use rigorous mathematical framework to set‐up the model and then we prove some interesting theorems about it which pertain to various local search algorithms that work by rerouting the network.

Findings

This paper proves that in cases when every pair of nodes is sampled with non‐zero probability then the algorithm is ergodic in the sense that it samples every possible network on the specified set of nodes and having a specified number of edges with nonzero probability. Incidentally, the ergodicity result led to the construction of a class of algorithms for sampling graphs with a specified number of edges over a specified set of nodes uniformly at random and opened some other challenging and important questions for future considerations.

Originality/value

The measure‐theoretic framework presented in the current paper is original and rather general. It allows one to obtain new points of view on the problem.

Details

International Journal of Intelligent Computing and Cybernetics, vol. 2 no. 2
Type: Research Article
ISSN: 1756-378X

Keywords

Article
Publication date: 3 October 2018

Mourad Guettiche and Hamamache Kheddouci

The purpose of this paper is to study a multiple-origin-multiple-destination variant of dynamic critical nodes detection problem (DCNDP) and dynamic critical links detection…

Abstract

Purpose

The purpose of this paper is to study a multiple-origin-multiple-destination variant of dynamic critical nodes detection problem (DCNDP) and dynamic critical links detection problem (DCLDP) in stochastic networks. DCNDP and DCLDP consist of identifying the subset of nodes and links, respectively, whose deletion maximizes the stochastic shortest paths between all origins–destinations pairs, in the graph modeling the transport network. The identification of such nodes (or links) helps to better control the road traffic and predict the necessary measures to avoid congestion.

Design/methodology/approach

A Markovian decision process is used to model the shortest path problem under dynamic traffic conditions. Effective algorithms to determine the critical nodes (links) while considering the dynamicity of the traffic network are provided. Also, sensitivity analysis toward capacity reduction for critical links is studied. Moreover, the complexity of the underlying algorithms is analyzed and the computational efficiency resulting from the decomposition operation of the network into communities is highlighted.

Findings

The numerical results demonstrate that the use of dynamic shortest path (time dependency) as a metric has a significant impact on the identification of critical nodes/links and the experiments conducted on real world networks highlight the importance of sensitive links to dynamically detect critical links and elaborate smart transport plans.

Research limitations/implications

The research in this paper also revealed several challenges, which call for future investigations. First, the authors have restricted our experimentation to a small network where the only focus is on the model behavior, in the absence of historical data. The authors intend to extend this study to very large network using real data. Second, the authors have considered only congestion to assess network’s criticality; future research on this topic may include other factors, mainly vulnerability.

Practical implications

Taking into consideration the dynamic and stochastic nature in problem modeling enables to be effective tools for real-time control of transportation networks. This leads to design optimized smart transport plans particularly in disaster management, to improve the emergency evacuation effeciency.

Originality/value

The paper provides a novel approach to solve critical nodes/links detection problems. In contrast to the majority of research works in the literature, the proposed model considers dynamicity and betweenness while taking into account the stochastic aspect of transport networks. This enables the approach to guide the traffic and analyze transport networks mainly under disaster conditions in which networks become highly dynamic.

Details

International Journal of Intelligent Computing and Cybernetics, vol. 12 no. 1
Type: Research Article
ISSN: 1756-378X

Keywords

Article
Publication date: 1 February 2016

Yuxian Eugene Liang and Soe-Tsyr Daphne Yuan

What makes investors tick? Largely counter-intuitive compared to the findings of most past research, this study explores the possibility that funding investors invest in companies…

3360

Abstract

Purpose

What makes investors tick? Largely counter-intuitive compared to the findings of most past research, this study explores the possibility that funding investors invest in companies based on social relationships, which could be positive or negative, similar or dissimilar. The purpose of this paper is to build a social network graph using data from CrunchBase, the largest public database with profiles about companies. The authors combine social network analysis with the study of investing behavior in order to explore how similarity between investors and companies affects investing behavior through social network analysis.

Design/methodology/approach

This study crawls and analyzes data from CrunchBase and builds a social network graph which includes people, companies, social links and funding investment links. The problem is then formalized as a link (or relationship) prediction task in a social network to model and predict (across various machine learning methods and evaluation metrics) whether an investor will create a link to a company in the social network. Various link prediction techniques such as common neighbors, shortest path, Jaccard Coefficient and others are integrated to provide a holistic view of a social network and provide useful insights as to how a pair of nodes may be related (i.e., whether the investor will invest in the particular company at a time) within the social network.

Findings

This study finds that funding investors are more likely to invest in a particular company if they have a stronger social relationship in terms of closeness, be it direct or indirect. At the same time, if investors and companies share too many common neighbors, investors are less likely to invest in such companies.

Originality/value

The author’s study is among the first to use data from the largest public company profile database of CrunchBase as a social network for research purposes. The author ' s also identify certain social relationship factors that can help prescribe the investor funding behavior. Authors prediction strategy based on these factors and modeling it as a link prediction problem generally works well across the most prominent learning algorithms and perform well in terms of aggregate performance as well as individual industries. In other words, this study would like to encourage companies to focus on social relationship factors in addition to other factors when seeking external funding investments.

Details

Internet Research, vol. 26 no. 1
Type: Research Article
ISSN: 1066-2243

Keywords

Article
Publication date: 31 December 2006

Tassos Dimitriou and Ioannis Krontiris

Nodes in sensor networks do not have enough topology information to make efficient routing decisions. To relay messages through intermediate sensors, geographic routing has been…

Abstract

Nodes in sensor networks do not have enough topology information to make efficient routing decisions. To relay messages through intermediate sensors, geographic routing has been proposed as such a solution. Its greedy nature, however, makes routing inefficient especially in the presence of topology voids or holes. In this paper we present GRAViTy (Geographic Routing Around Voids In any TopologY of sensor networks), a simple greedy forwarding algorithm that combines compass routing along with a mechanism that allows packets to explore the area around voids and bypass them without significant communication overhead. Using extended simulation results we show that our mechanism outperforms the right‐hand rule for bypassing voids and that the resulting paths found well approximate the corresponding shortest paths. GRAViTy uses a cross‐layered approach to improve routing paths for subsequent packets based on experience gained by former routing decisions. Furthermore, our protocol responds to topology changes, i.e. failure of nodes, and efficiently adjusts routing paths towards the destination.

Details

International Journal of Pervasive Computing and Communications, vol. 2 no. 4
Type: Research Article
ISSN: 1742-7371

Keywords

Article
Publication date: 3 June 2021

Mohandas V. Pawar and Anuradha J.

This study aims to present a novel system for detection and prevention of black hole and wormhole attacks in wireless sensor network (WSN) based on deep learning model. Here…

Abstract

Purpose

This study aims to present a novel system for detection and prevention of black hole and wormhole attacks in wireless sensor network (WSN) based on deep learning model. Here, different phases are included such as assigning the nodes, data collection, detecting black hole and wormhole attacks and preventing black hole and wormhole attacks by optimal path communication. Initially, a set of nodes is assumed for carrying out the communication in WSN. Further, the black hole attacks are detected by the Bait process, and wormhole attacks are detected by the round trip time (RTT) validation process. The data collection procedure is done with the Bait and RTT validation process with attribute information. The gathered data attributes are given for the training in which long short-term memory (LSTM) is used that includes the attack details. This is used for attack detection process. Once they are detected, those attacks are removed from the network using the optimal path selection process. Here, the optimal shortest path is determined by the improvement in the whale optimization algorithm (WOA) that is called as fitness rate-based whale optimization algorithm (FR-WOA). This shortest path communication is carried out based on the multi-objective function using energy, distance, delay and packet delivery ratio as constraints.

Design/methodology/approach

This paper implements a detection and prevention of attacks model based on FR-WOA algorithm for the prevention of attacks in the WSNs. With this, this paper aims to accomplish the desired optimization of multi-objective functions.

Findings

From the analysis, it is found that the accuracy of the optimized LSTM is better than conventional LSTM. The energy consumption of the proposed FR-WOA with 35 nodes is 7.14% superior to WOA and FireFly, 5.7% superior to grey wolf optimization and 10.3% superior to particle swarm optimization.

Originality/value

This paper develops the FR-WOA with optimized LSTM detecting and preventing black hole and wormhole attacks from WSN. To the best of the authors’ knowledge, this is the first work that uses FR-WOA with optimized LSTM detecting and preventing black hole and wormhole attacks from WSN.

Article
Publication date: 27 April 2012

Min Wang, Yongsheng Qian and Xiaoping Guang

Shortest path problem has always been a hot topic in the study of graph theory, because of its wide application field, extending from operational research to the disciplines of…

416

Abstract

Purpose

Shortest path problem has always been a hot topic in the study of graph theory, because of its wide application field, extending from operational research to the disciplines of geography, automatic control, computer science and traffic. According to its concrete application, scholars in the relevant field have presented many algorithms, but most of them are solely improvements based on Dijkstra algorithm. The purpose of this paper is to enrich the kinds of (and improve the efficiency of) the shortest path algorithms.

Design/methodology/approach

This paper puts forward an improved calculation method of shortest path using cellular automata model, which is designed to search the shortest path from one node to another node. Cellular state set is adjusted with combination of breeding and mature states. Evolution rule is improved to enhance its parallelism. At the same time, recording manner of cellular state turnover is modified to record all information sources.

Findings

The result indicates that the improved algorithm is correct and more efficient, in that it could reduce the times of cellular state turnover; meanwhile, it can solve multi‐paths problem.

Originality/value

In this paper, cellular state set in exiting shortest path algorithm based on cellular automata theory is adjusted; evolution rule is improved; and recording manner of cellular state turnover is modified to record all information sources. All of which make the parallelism of this algorithm enhanced and the multi‐paths problem solved.

Article
Publication date: 7 November 2016

Yahya M. Tashtoush, Mohammad A. Alsmirat and Tasneem Alghadi

The purpose of this paper is to propose, a new multi-path routing protocol that distributes packets over the available paths between a sender and a receiver in a multi-hop ad…

Abstract

Purpose

The purpose of this paper is to propose, a new multi-path routing protocol that distributes packets over the available paths between a sender and a receiver in a multi-hop ad hoc network. We call this protocol Geometric Sequence Based Multipath Routing Protocol (GMRP).

Design/methodology/approach

GMRP distributes packets according to the geometric sequence. GMRP is evaluated using GloMoSim simulator. The authors use packet delivery ratio and end-to-end delay as the comparison performance metrics. They also vary many network configuration parameters such as number of nodes, transmission rate, mobility speed and network area.

Findings

The simulation results show that GMRP reduces the average end-to-end delay by up to 49 per cent and increases the delivery ratio by up to 8 per cent.

Originality/value

This study is the first to propose to use of geometric sequence in the multipath routing approach.

Details

International Journal of Pervasive Computing and Communications, vol. 12 no. 4
Type: Research Article
ISSN: 1742-7371

Keywords

1 – 10 of over 37000