Search results

1 – 10 of over 10000
Article
Publication date: 14 December 2018

De-gan Zhang, Ya-meng Tang, Yu-ya Cui, Jing-xin Gao, Xiao-huan Liu and Ting Zhang

The communication link in the engineering of Internet of Vehicle (IOV) is more frequent than the communication link in the Mobile ad hoc Network (MANET). Therefore, the highly…

Abstract

Purpose

The communication link in the engineering of Internet of Vehicle (IOV) is more frequent than the communication link in the Mobile ad hoc Network (MANET). Therefore, the highly dynamic network routing reliability problem is a research hotspot to be solved.

Design/methodology/approach

The graph theory is used to model the MANET communication diagram on the highway and propose a new reliable routing method for internet of vehicles based on graph theory.

Findings

The expanded graph theory can help capture the evolution characteristics of the network topology and predetermine the reliable route to promote quality of service (QoS) in the routing process. The program can find the most reliable route from source to the destination from the MANET graph theory.

Originality/value

The good performance of the proposed method is verified and compared with the related algorithms of the literature.

Details

Engineering Computations, vol. 36 no. 1
Type: Research Article
ISSN: 0264-4401

Keywords

Article
Publication date: 3 November 2020

Hamed Sabouhi, Aref Doroudi, Mahmud Fotuhi-Firuzabad and Mahdi Bashiri

This paper aims to propose a novel matrix-based systematic approach for vulnerability assessment.

Abstract

Purpose

This paper aims to propose a novel matrix-based systematic approach for vulnerability assessment.

Design/methodology/approach

The proposed method consists of two major steps. First, the power network is modeled as a topological combination of edges (transmission lines, transformers, etc.) and nodes (buses, substations, etc.). The second step is to use an axiomatic design-based index for topology analysis. This index is based on the systematic counting of possible routes from the start (generators) to destination (loads), considering load importance, before and after a disruption.

Findings

The effectiveness of the proposed method is demonstrated through an illustrative example and the Institute of Electrical and Electronics Engineers (IEEE) 14-bus power system. It was shown that the load’s importance influences the results of the vulnerability analysis. The proposed method has some advantages over traditional graph theory such as an explicit description of multiple transmission nodes and assets with multiple conversion processes. Furthermore, it would help the power grid operators and asset investment managers to be better to assess the vulnerable components.

Research limitations/implications

The proposed method can be used in planning, optimization, robustness and hardening of power systems.

Originality/value

The paper presents a matrix-based systematic approach to evaluate and quantify the vulnerability of the power grid’s components.

Details

COMPEL - The international journal for computation and mathematics in electrical and electronic engineering , vol. 40 no. 1
Type: Research Article
ISSN: 0332-1649

Keywords

Article
Publication date: 13 October 2023

Junjie Lv, Ruyu Yang, Jianye Yu, Wenjing Yao and Yuanzhuo Wang

Influencer marketing mediated by social media is prevalent in social commerce. Micro-, meso- and macro-influencers all play an irreplaceable role in marketing. The purpose of this…

1577

Abstract

Purpose

Influencer marketing mediated by social media is prevalent in social commerce. Micro-, meso- and macro-influencers all play an irreplaceable role in marketing. The purpose of this paper is to explore how companies with limited budgets choose influencers according to products' various levels of brand familiarity.

Design/methodology/approach

This study constructs an evolutionary game model of influencer marketing based on evolutionary game theory on complex networks. This model initiates various networks to demonstrate how influencers disseminate information and constructs update mechanisms to depict how individuals react to this information based on individuals' information utility and friends' strategies.

Findings

Simulation results suggest that companies should invest more in macro-influencers than in meso-influencers, however investing all in macro-influencers is not a good choice. The investment in meso-influencers will increase as brand familiarity decreases, whereas it will not exceed investment in macro-influencers. Furthermore, the accumulation of micro-influencers can accelerate the marketing process.

Originality/value

This study examines the combined effects of micro-influencers, meso-influencers and macro-influencers in marketing by simulating the marketing process initiated by influencers on social media.

Details

Industrial Management & Data Systems, vol. 123 no. 12
Type: Research Article
ISSN: 0263-5577

Keywords

Article
Publication date: 2 October 2007

Daniel O. Rice

The purpose of this paper is to present a P2P network security pricing model that promotes more secure online information sharing in P2P networks through the creation of networks…

1687

Abstract

Purpose

The purpose of this paper is to present a P2P network security pricing model that promotes more secure online information sharing in P2P networks through the creation of networks with increased resistance to malicious code propagation. Online information sharing is at an all‐time high partly due to the recent growth in, and use of, online peer‐to‐peer (P2P) networks.

Design/methodology/approach

The model integrates current research findings in incentive compatible network pricing with recent developments in complex network theory. File download prices in P2P networks are linked to network security using a graph theory measurement called the Pearson coefficient. The Pearson coefficient indicates a structural dimension of scale‐free networks (scale‐free networks like the internet) called preferential attachment. Preferential attachment refers to the network property where the probability for a node to connect to a new node is greater if the new node already has a high number of connections.

Findings

The P2P network security pricing model concept is illustrated to show how the model functions to create more secure P2P networks.

Research limitations/implications

Future research in P2P network security pricing should focus on testing the model presented in this paper by numerical experiments and simulation including the tracking of malicious code propagation on networks grown under the pricing model.

Originality/value

The P2P network security pricing model demonstrated here is a different approach to network security that has a strong potential to impact on the future security of P2P and other computer based networks.

Details

Online Information Review, vol. 31 no. 5
Type: Research Article
ISSN: 1468-4527

Keywords

Article
Publication date: 1 February 2023

José Leão, Leydiana de Sousa Pereira and Maria Luiza Xavier De Holanda Cavalcanti

Textile manufacturers worldwide are reformulating their networks, often outsourcing them to maintain a competitive advantage and increase market share. From this perspective, the…

Abstract

Purpose

Textile manufacturers worldwide are reformulating their networks, often outsourcing them to maintain a competitive advantage and increase market share. From this perspective, the purpose of this study is support the partnership selection process to develop a sustainable chain that effectively meets customer needs. Brazil has the largest textile and apparel chain in the West and is distinguished by its completeness, from fiber production, spinning, weaving, knitting, finishing and sewing to fashion shows. However, a firm’s relationship, especially in the production stage, is based on informal contracts, which result in a negative operational impact.

Design/methodology/approach

A methodological framework was developed based on a stable matching process to determine the optimal supplier network structure. This study presents a model application for the denim apparel chain in northeast Brazil.

Findings

In these environments, providing choices and recommending suppliers can be beneficial for effectively attending to demand requests, reducing production costs and improving quality through collaboration with sense relationships in a network. Thus, this study presents a better match from the negotiators’ perspective.

Originality/value

The findings of this research are of primary interest for guiding collaborative network composition in the textile and apparel chain. In particular, apparel domain companies can improve their effectiveness in decision-making by measuring the characteristics and potential of all companies involved in networks.

Details

Research Journal of Textile and Apparel, vol. 27 no. 3
Type: Research Article
ISSN: 1560-6074

Keywords

Article
Publication date: 21 November 2016

Yue-tang Bian, Lu Xu, Jin-Sheng Li and Xia-qun Liu

The purpose of this paper is to explore the evolvement of investors’ behavior in stock market dynamically on the basis of non-cooperative strategy applied by investors in complex…

Abstract

Purpose

The purpose of this paper is to explore the evolvement of investors’ behavior in stock market dynamically on the basis of non-cooperative strategy applied by investors in complex networks.

Design/methodology/approach

Using modeling and simulation research method, this study designs and conducts a mathematical modeling and its simulation experiment of financial market behavior according to research’s basic norms of complex system theory and methods. Thus the authors acquire needed and credible experimental data.

Findings

The conclusions drawn in this paper are as follows. The dynamical evolution of investors’ trading behavior is not only affected by the stock market network structure, but also by the risk dominance degree of certain behavior. The dynamics equilibrium of trading behavior’s evolvement is directly influenced by the risk dominance degree of certain behavior, connectivity degree and the heterogeneity of the stock market networks.

Research limitations/implications

This paper focuses on the dynamical evolvement of investors’ behavior on the basis of the hypothesis that common investors prefer to mimic their network neighbors’ behavior through different analysis by the strategy of anti-coordination game in complex network. While the investors’ preference and the beliefs among them are not easy to quantify, that is deterministic or stochastic as the environment changes, and is heterogeneous definitely. Thus, these limitations should be broken through in the future research.

Originality/value

This paper aims to address the dynamical evolvement of investors’ behavior in stock market networks on the principle of non-cooperative represented by anti-coordination game in networks for the first time, considering that investors prefer to mimic their network neighbors’ behavior through different analysis by the strategy of differential choosing in every time step. The methodology designed and used in this study is a pioneering and exploratory experiment.

Details

China Finance Review International, vol. 6 no. 4
Type: Research Article
ISSN: 2044-1398

Keywords

Article
Publication date: 1 December 2015

Parastoo Pourvahidi, Mesut B. Ozdeniz and Polat Hancer

This research will analyze the traditional Iranian buildings according to the climatic factors by the use of graph theory. By this way, the hypothesis that climate factor has a…

Abstract

This research will analyze the traditional Iranian buildings according to the climatic factors by the use of graph theory. By this way, the hypothesis that climate factor has a major effect on the organization of the spaces in traditional Iranian buildings will be tested. Access graphs have been used to clarify the connectivity and depth of a building’s spaces from the socio-cultural point of view. However, it cannot be applied to climate studies. Thus, this study developed the existing technique to define building layouts in terms of climate and thermal comfort. The thermal comfort was graphically evaluated by the two main factors like solar gain and wind effect, with the use of a simple multi-attribute rating technique. All the analysis had been done in the interval of zero (the worst condition) to three (the best condition). The proposed orientation-weighted graph method proved that the thermal comfort factors of the buildings under study match the seasonal movements of their inhabitants. Consequently, the developed orientation-weighted graph method can be used to study space organization in traditional Iranian building in terms of solar gain and wind effect.

Details

Open House International, vol. 40 no. 4
Type: Research Article
ISSN: 0168-2601

Keywords

Article
Publication date: 11 January 2022

Daniel Ashagrie Tegegne, Daniel Kitaw Azene and Eshetie Berhan Atanaw

This study aims to design a multivariate control chart that improves the applicability of the traditional Hotelling T2 chart. This new type of multivariate control chart displays…

Abstract

Purpose

This study aims to design a multivariate control chart that improves the applicability of the traditional Hotelling T2 chart. This new type of multivariate control chart displays sufficient information about the states and relationships of the variables in the production process. It is used to make better quality control decisions during the production process.

Design/methodology/approach

Multivariate data are collected at an equal time interval and are represented by nodes of the graph. The edges connecting the nodes represent the sequence of operation. Each node is plotted on the control chart based on their Hotelling T2 statistical distance. The changing behavior of each pair of input and output nodes is studied by the neural network. A case study from the cement industry is conducted to validate the control chart.

Findings

The finding of this paper is that the points and lines in the classic Hotelling T2 chart are effectively substituted by nodes and edges of the graph respectively. Nodes and edges have dimension and color and represent several attributes. As a result, this control chart displays much more information than the traditional Hotelling T2 control chart. The pattern of the plot represents whether the process is normal or not. The effect of the sequence of operation is visible in the control chart. The frequency of the happening of nodes is recognized by the size of nodes. The decision to change the product feature is assisted by finding the shortest path between nodes. Moreover, consecutive nodes have different behaviors, and that behavior change is recognized by neural network.

Originality/value

Modifying the classical Hotelling T2 control chart by integrating with the concept of graph theory and neural network is new of its kind.

Details

International Journal of Quality & Reliability Management, vol. 39 no. 7
Type: Research Article
ISSN: 0265-671X

Keywords

Book part
Publication date: 17 May 2018

Richard Marciano, Victoria Lemieux, Mark Hedges, Maria Esteva, William Underwood, Michael Kurtz and Mark Conrad

Purpose – For decades, archivists have been appraising, preserving, and providing access to digital records by using archival theories and methods developed for paper records…

Abstract

Purpose – For decades, archivists have been appraising, preserving, and providing access to digital records by using archival theories and methods developed for paper records. However, production and consumption of digital records are informed by social and industrial trends and by computer and data methods that show little or no connection to archival methods. The purpose of this chapter is to reexamine the theories and methods that dominate records practices. The authors believe that this situation calls for a formal articulation of a new transdiscipline, which they call computational archival science (CAS).

Design/Methodology/Approach – After making a case for CAS, the authors present motivating case studies: (1) evolutionary prototyping and computational linguistics; (2) graph analytics, digital humanities, and archival representation; (3) computational finding aids; (4) digital curation; (5) public engagement with (archival) content; (6) authenticity; (7) confluences between archival theory and computational methods: cyberinfrastructure and the records continuum; and (8) spatial and temporal analytics.

Findings – Each case study includes suggestions for incorporating CAS into Master of Library Science (MLS) education in order to better address the needs of today’s MLS graduates looking to employ “traditional” archival principles in conjunction with computational methods. A CAS agenda will require transdisciplinary iSchools and extensive hands-on experience working with cyberinfrastructure to implement archival functions.

Originality/Value – We expect that archival practice will benefit from the development of new tools and techniques that support records and archives professionals in managing and preserving records at scale and that, conversely, computational science will benefit from the consideration and application of archival principles.

Details

Re-envisioning the MLS: Perspectives on the Future of Library and Information Science Education
Type: Book
ISBN: 978-1-78754-884-8

Keywords

Article
Publication date: 20 August 2024

Aya Yasser Kamal and Rania Nasreldin

This paper aims to define the socio-spatial considerations of apartment users in Cairo, during their decision-making process. It provides a set of socio-spatial guidelines for…

Abstract

Purpose

This paper aims to define the socio-spatial considerations of apartment users in Cairo, during their decision-making process. It provides a set of socio-spatial guidelines for professional architecture designers that are based on regionalist sociological theories and the evaluation of participant responses. These guidelines can also help users choose better plan configurations or make socially conscious adjustments as formal residential interiors in Egypt are not arranged based on social interaction at home or the cultural specificity of the region. On the other hand, users have little clue about choosing better plan configurations for sustainable social relationships. Moreover, the private housing sector has mostly neglected the social boundaries that traditionally shaped home interiors. This is because the designers focus on physical attributes to satisfy market demand and economic aspects.

Design/methodology/approach

The research reviewed past literature on the impact of different home arrangements relative to inhabitant and social relationships. Simultaneously, preliminary open-ended sorting surveys were undertaken at the Cityscape 2020 exhibition. Based on the results, a comprehensive online survey was developed to map the socio-spatial preferences of users. Finally, a sample of 150 apartment plans was analyzed by using the justified plan graph (JPG) theory to reveal the most common arrangements in the speculative market, measuring unit depth.

Findings

The findings of this study will benefit the following: practitioners, including architects and real estate developers, will be able to learn about end-user preferences and offer better products (residential units). Designers can rely on a reference that visualizes recommended home arrangements in the form of justified graphs. This research will expose the academic theories that currently shape residential plans and those that are overlooked and need to be applied. Academics, on the other hand, will learn about the market, and the extent of the influence of architectural theory.

Originality/value

The value of this paper lies in the gathering of theoretical recommendations on traditional home arrangements and investigating the preferences of both professionals and laypeople when choosing between apartments. The open-ended study in this research will test its efficiency in the Egyptian context and serve as a reference for future social studies. It highlights the importance of cultural adequacy and how to design homes related to local residents’ natural lifestyle, by doing so, people will be able to overview the options available in the market and how to manipulate their own houses to control or encourage different social interactions.

Details

International Journal of Housing Markets and Analysis, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 1753-8270

Keywords

1 – 10 of over 10000