Search results

21 – 30 of 34
Article
Publication date: 30 October 2019

Zhenning Zhu, Lingcheng Kong, Jiaping Xie, Jing Li and Bing Cao

In the hybrid electricity market, renewable energy power generator faces the uncertainty of power market demand and the randomness of the renewable energy generation output. In…

Abstract

Purpose

In the hybrid electricity market, renewable energy power generator faces the uncertainty of power market demand and the randomness of the renewable energy generation output. In order to improve the grid-connected quantity of green power, the purpose of this paper is to design the pricing mechanism for renewable energy power generator with revenue-sharing contract in a two-stage “multi-single” electricity supply chain which contains a single dominant power retailer and two kinds of power suppliers providing different power energy species.

Design/methodology/approach

Considering the dual uncertainties of renewable energy power output and power market demand, the authors design the full-cooperative contract decision-making model, wholesale price contract decision-making model and revenue-sharing contract decision-making model to compare and optimize grid-connected pricing in order to maximize profit of different parties in power supply chain. Then, this paper performs a numerical simulation, discusses the existence of the equilibrium analytical solutions to satisfy the supply chain coordination conditions and analyzes the optimal contract parameters’ variation characteristics and their interaction relationship.

Findings

The authors find that the expected profits of the parties in the hybrid power supply chain are concave about their decision variables in each decision-making mode. The revenue-sharing contract can realize the Pareto improvement for all parties’ interest of the supply chain, and promote the grid-connected quantity of green power effectively. The grid-connected price will reduce with the increase of revenue-sharing ratio, and this impact will be greater on the renewable energy power. The greater the competition intensity in power supply side, the smaller the revenue-sharing ratio from power purchaser. And for the same rangeability of competition intensity, the revenue-sharing ratio reduction of thermal power is less than that of the green power. The more the government subsidizing green power supplier, the smaller the retailer sharing revenue to it.

Practical implications

Facing with the dual uncertainties of green power output and market demand and the competition of thermal power in hybrid electricity market, this study can provide a path to solve the problem of renewable energy power grid-connecting. The results can help green power become competitive in hybrid power market under loose regulations. And this paper suggests that the government subsidy policy should be more tactical in order to implement a revenue-sharing contract of the power supply chain.

Originality/value

This paper studies the renewable energy electricity grid-connected pricing under the uncertainty of power supply and market demand, and compares different contract decision-making strategies in order to achieve the power supply chain coordination. The paper also analyzes the competition between thermal power and renewable energy power in hybrid electricity market.

Details

Industrial Management & Data Systems, vol. 119 no. 9
Type: Research Article
ISSN: 0263-5577

Keywords

Article
Publication date: 12 July 2021

Fen Ji and Ai Tia

Accurate evaluation of the consequences of new technologies in various industries is of great significance. So, it will be essential to examine the impact of this technology on…

1101

Abstract

Purpose

Accurate evaluation of the consequences of new technologies in various industries is of great significance. So, it will be essential to examine the impact of this technology on the banking industry, representing how to create, deliver and gain value in this industry. This study aims to investigate whether blockchain can affect the business intelligence efficiency of banks. This study also aims to examine the impact of security, fraud reduction and privacy of blockchain, equal and anonymous access to the blockchain, decentralization and sustainability of blockchain, accountability and transparency of blockchain, quality, speed and efficiency of blockchain on business intelligence efficiency.

Design/methodology/approach

Technological changes are creating new challenges and opportunities for various industries. The inability of organizations to adapt to these changes may even lead to their deletion from the market. Blockchain is one of the most critical technologies in recent years. One of the sectors that will undergo significant changes in blockchain technology is the banking industry. According to the reviewed literature in this study, a comprehensive model has been proposed to examine the impact of security, fraud reduction and privacy of blockchain, equal and anonymous access to the blockchain, the decentralization and sustainability of blockchain, accountability and transparency of blockchain and quality, speed and efficiency of blockchain on business intelligence efficiency. A survey method was used to collect data from banks of the Nanjing city. The partial least square technique was used for data analysis.

Findings

The results showed that the fit of the proposed model was very good. Also, all assumptions except one were confirmed. It means that security, fraud reduction and privacy of blockchain factor have a remarkable and positive impact on all aspects of business intelligence efficiency, namely information technology, employees, competitors and customers. Also, equal and anonymous access to the blockchain factor has a positive and significant effect on all aspects of business intelligence efficiency. The decentralization and sustainability of blockchain factors have an impact on business intelligence efficiency. Also, blockchain's accountability and transparency as a fourth factor have a positive and significant impact on all aspects of business intelligence efficiency. Finally, the last factor (quality, speed and efficiency of blockchain) has a positive and significant effect on information technology, employees and customers' dimensions. But, it does not affect the competitors' dimension, and this hypothesis has not been confirmed.

Practical implications

This paper offers valuable insight for business intelligence practitioners into how blockchain technology has the potential to disrupt existing business intelligence provisions.

Originality/value

This paper is one of the first studies to examine the impact of blockchain on IT dimension, organizational employees' dimension, customer dimension and competitors' dimension. It lays a firm foundation for future research.

Details

Kybernetes, vol. 51 no. 8
Type: Research Article
ISSN: 0368-492X

Keywords

Article
Publication date: 17 May 2021

Yogambari Venkatesan and Aravindhababu Palanivelu

The purpose of the paper is to develop a simple, efficient and robust power flow (PF) method for ill-conditioned distribution networks (DNs).

Abstract

Purpose

The purpose of the paper is to develop a simple, efficient and robust power flow (PF) method for ill-conditioned distribution networks (DNs).

Design/methodology/approach

It first formulates the PF problem as an optimization problem of minimizing the node power mismatches, while treating the corrections of node voltages as problem variables and then uses soccer game optimization (SGO), an artificial intelligent algorithm simulating the behavior of soccer game players in scoring goals, in solving the formulated PF problem.

Findings

It studies the performances of the developed method on four standard test DNs and exhibits that the method is superior in respect of accuracy, robustness and computational speed than those of existing methods.

Originality/value

It suggests a novel and new PF method using SGO and portrays that the proposed method is as accurate as any other PF method, robust like non-Newton type of PF methods and faster than Newton type of PF methods.

Details

COMPEL - The international journal for computation and mathematics in electrical and electronic engineering , vol. 40 no. 3
Type: Research Article
ISSN: 0332-1649

Keywords

Article
Publication date: 30 April 2020

Mehdi Darbandi, Amir Reza Ramtin and Omid Khold Sharafi

A set of routers that are connected over communication channels can from network-on-chip (NoC). High performance, scalability, modularity and the ability to parallel the structure…

Abstract

Purpose

A set of routers that are connected over communication channels can from network-on-chip (NoC). High performance, scalability, modularity and the ability to parallel the structure of the communications are some of its advantages. Because of the growing number of cores of NoC, their arrangement has got more valuable. The mapping action is done based on assigning different functional units to different nodes on the NoC, and the way it is done contains a significant effect on implementation and network power utilization. The NoC mapping issue is one of the NP-hard problems. Therefore, for achieving optimal or near-optimal answers, meta-heuristic algorithms are the perfect choices. The purpose of this paper is to design a novel procedure for mapping process cores for reducing communication delays and cost parameters. A multi-objective particle swarm optimization algorithm standing on crowding distance (MOPSO-CD) has been used for this purpose.

Design/methodology/approach

In the proposed approach, in which the two-dimensional mesh topology has been used as base construction, the mapping operation is divided into two stages as follows: allocating the tasks to suitable cores of intellectual property; and plotting the map of these cores in a specific tile on the platform of NoC.

Findings

The proposed method has dramatically improved the related problems and limitations of meta-heuristic algorithms. This algorithm performs better than the particle swarm optimization (PSO) and genetic algorithm in convergence to the Pareto, producing a proficiently divided collection of solving ways and the computational time. The results of the simulation also show that the delay parameter of the proposed method is 1.1 per cent better than the genetic algorithm and 0.5 per cent better than the PSO algorithm. Also, in the communication cost parameter, the proposed method has 2.7 per cent better action than a genetic algorithm and 0.16 per cent better action than the PSO algorithm.

Originality/value

As yet, the MOPSO-CD algorithm has not been used for solving the task mapping issue in the NoC.

Details

International Journal of Pervasive Computing and Communications, vol. 16 no. 2
Type: Research Article
ISSN: 1742-7371

Keywords

Article
Publication date: 5 September 2016

Naraina Avudayappan and S.N. Deepa

The loading and power variations in the power system, especially for the peak hours have abundant concussion on the loading patterns of the open access transmission system. During…

227

Abstract

Purpose

The loading and power variations in the power system, especially for the peak hours have abundant concussion on the loading patterns of the open access transmission system. During such unconditional state of loading the transmission line parameters and the line voltages show a substandard profile, which depicts exaction of congestion management of the power line in such events. The purpose of this paper is to present an uncomplicated and economical model for congestion management using flexible AC transmission system (FACTS) devices.

Design/methodology/approach

The approach desires a two-step procedure, first by optimal placement of thyristor controlled series capacitor (TCSC) and static VAR compensator (SVC) as FACTS devices in the network; second tuning the control parameters to their optimized values. The optimal location and tuning of TCSC and SVC represents a hectic optimization problem, due to its multi-objective and constrained nature. Hence, a reassuring heuristic optimization algorithm inspired by behavior of cat and firefly is employed to find the optimal placement and tuning of TCSC and SVC.

Findings

The effectiveness of the proposed model is tested through simulation on standard IEEE 14-bus system. The proposed approach proves to be better than the earlier existing approaches in the literature.

Research limitations/implications

With the completed simulation and results, it is proved that the proposed scheme has reduced the congestion in line, thereby increasing the voltage stability along with improved loading capability for the congested lines.

Practical implications

The usefulness of the proposed scheme is justified with the computed results, giving convenience for implementation to any practical transmission network.

Originality/value

This paper fulfills an identified need to study exaction of congestion management of the power line.

Details

COMPEL - The international journal for computation and mathematics in electrical and electronic engineering, vol. 35 no. 5
Type: Research Article
ISSN: 0332-1649

Keywords

Article
Publication date: 7 February 2020

Haiyan Zhuang and Babak Esmaeilpour Ghouchani

Virtual machines (VMs) are suggested by the providers of cloud services as the services for the users over the internet. The consolidation of VM is the tactic of the competent and…

Abstract

Purpose

Virtual machines (VMs) are suggested by the providers of cloud services as the services for the users over the internet. The consolidation of VM is the tactic of the competent and smart utilization of resources from cloud data centers. Placement of a VM is one of the significant issues in cloud computing (CC). Physical machines in a cloud environment are aware of the way of the VM placement (VMP) as the mapping VMs. The basic target of placement of VM issue is to reduce the physical machines' items that are running or the hosts in cloud data centers. The VMP methods have an important role in the CC. However, there is no systematic and complete way to discuss and analyze the algorithms. The purpose of this paper is to present a systematic survey of VMP techniques. Also, the benefits and weaknesses connected with selected VMP techniques have been debated, and the significant issues of these techniques are addressed to develop the more efficient VMP technique for the future.

Design/methodology/approach

Because of the importance of VMP in the cloud environments, in this paper, the articles and important mechanisms in this domain have been investigated systematically. The VMP mechanisms have been categorized into two major groups, including static and dynamic mechanisms.

Findings

The results have indicated that an appropriate VMP has the capacity to decrease the resource consumption rate, energy consumption and carbon emission rate. VMP approaches in computing environment still need improvements in terms of reducing related overhead, consolidation of the cloud environment to become an extremely on-demand mechanism, balancing the load between physical machines, power consumption and refining performance.

Research limitations/implications

This study aimed to be comprehensive, but there were some limitations. Some perfect work may be eliminated because of applying some filters to choose the original articles. Surveying all the papers on the topic of VMP is impossible, too. Nevertheless, the authors are trying to present a complete survey over the VMP.

Practical implications

The consequences of this research will be valuable for academicians, and it can provide good ideas for future research in this domain. By providing comparative information and analyzing the contemporary developments in this area, this research will directly support academics and working professionals for better knowing the growth in the VMP area.

Originality/value

The gathered information in this paper helps to inform the researchers with the state of the art in the VMP area. Totally, the VMP's principal intention, current challenges, open issues, strategies and mechanisms in cloud systems are summarized by explaining the answers.

Details

Kybernetes, vol. 50 no. 2
Type: Research Article
ISSN: 0368-492X

Keywords

Article
Publication date: 25 August 2021

Nitin Tejram Deotale

To enhance the performance transmit antenna selection (TAS) of spatial modulation (SM), systems technique needs to be essential. This TAS is an effective technique for reducing…

Abstract

Purpose

To enhance the performance transmit antenna selection (TAS) of spatial modulation (SM), systems technique needs to be essential. This TAS is an effective technique for reducing the multiple input multiple output (MIMO) systems computational difficulty, and bit error rate (BER) can increase remarkably by various TAS algorithms. But these selection methods cannot provide code gain, so it is essential to join the TAS with external code to obtain cy -ode gain advantages in BER.

Design/methodology/approach

In this paper, Bose–Chaudhuri–Hocquenghem (BCH)-Turbo code TC is combined with the orthogonal space time block code system.

Findings

In some existing work, the improved BER has been perceived by joining forward error correction code and space time block code (STBC) for MIMO systems provided greater code gain. The proposed work can provide increasing code gain and the effective advantages of the TAS-OSTBC system.

Originality/value

To perform the system analysis, Rayleigh channel is used. In the case with multiple TAS-OSTBC systems, better performance can provide by this new joint of the BCH-Turbo compared to the conventional Turbo code for the Rayleigh fading.

Article
Publication date: 28 December 2020

Francis H. Shajin and Paulthurai Rajesh

This study aims to evaluate the direct trust value for each node and calculate the trust value of all nodes satisfying the condition and update the trust value and value each…

Abstract

Purpose

This study aims to evaluate the direct trust value for each node and calculate the trust value of all nodes satisfying the condition and update the trust value and value each trust update interval for a secure and efficient communication between sender and destination node. Hence, a Trusted Secure Geographic Routing Protocol (TSGRP) has been proposed for detecting attackers (presence of the hacker), considering the trust value for a node produced by combining the location trusted information and the direct trusted information.

Design/methodology/approach

Amelioration in the research studies related to mobile ad hoc networks (MANETs) and wireless sensor networks has shown greater concern in the presence of malicious nodes, due to which the delivery percentage in any given network can degrade to a larger extent, and hence make the network less reliable and more vulnerable to security.

Findings

TSGRP has outperformed the conventional protocols for detecting attacks in MANET. TSGRP is establishing a trust-based secure communication between the sender and destination node. The evaluated direct trust value is used after the transmission of route-request and route-reply packets, to evaluate the direct trust value of each node and a secure path is established between the sender and the destination node. The effectiveness of the proposed TSGRP is evaluated through NS-2 simulation.

Originality/value

The simulation results show the delay of the proposed method is 92% less than PRISM approach and the overhead of the proposed TSGRP approach is 61% less than PRISM approach.

Details

International Journal of Pervasive Computing and Communications, vol. 18 no. 5
Type: Research Article
ISSN: 1742-7371

Keywords

Article
Publication date: 3 March 2020

Xin Yang and Nazanin Rahmani

In the past, with the development of the internet of things (IoT), this paper aims to consider fog computing (FC) as an efficient accompaniment to the cloud to control the IoT’s…

Abstract

Purpose

In the past, with the development of the internet of things (IoT), this paper aims to consider fog computing (FC) as an efficient accompaniment to the cloud to control the IoT’s information and relation requirements. Wholly, FC is placed carefully around the IoT systems/sensors and develops cloud-based computing, memory and networking devices. Fog shares many similarities with the cloud, but the only difference between them is its location, in which fog devices are very close to end-users to process and respond to the client in less time. On the other hand, this system is useful for real-time flowing programs, sensor systems, and IoT that need high speed and reliable internet connectivity. However, there are many applications such as remote healthcare and medical cyber-physical systems, where low latency is needed. To reduce the latency of FC, the task scheduler plays a vital role. The task scheduling means to devote the task to fog resources in an efficient way. Yet, according to the findings, in spite of the preference of task scheduling techniques in the FC, there is not any review and research in this case. So, this paper offers systematic literature research about the available task scheduling techniques. In addition, the advantages and disadvantages associated with different task scheduling processes are considered, and the main challenges of them are addressed to design a more efficient task scheduler in the future. Additionally, according to the seen facts, future instructions are provided for these studies.

Design/methodology/approach

The paper complies with the methodological requirements of systematic literature reviews (SLR). The present paper investigates the newest systems and studies their practical techniques in detail. The applications of task scheduling mechanisms in FC have been categorized into two major groups, including heuristic and meta-heuristic.

Findings

Particularly, the replies to the project problem analyzed task scheduling are principal aim, present problems, project terminologies, methods and approaches in the fog settings. The authors tried to design his systematic discussion as precisely as possible. However, it might have still endured various confidence risks.

Research limitations/implications

This study aimed to be comprehensive but there were some limitations. First, the usage of affair scheduling in fog settings are contained in many places such as editorial notes, academic publications, technical writings, Web pages and so on. The published papers in national magazines were omitted. Also, the papers with the purpose of a special task scheduling issue, which probably consider other subjects rather than affair planning issue are omitted. So, in the competence of this study, this systematic analysis must be considered as the studies published in the central international FC journals. Second, the given issues might not have considered the general task scheduling area, which points to the possibility of describing more related questions that could be described. Third, research and publication bias: five confident electronic databases were chosen based on past study experiments. Finally, the numbers show that these five electronic databases must suggest the most related and reliable projects. Yet, selecting all main performing projects has not been confirmed. Probably some effective projects were omitted throughout the processes in Section 3. Different from the conclusion, changing from the search string to the information extraction exists, and the authors tried to exclude this by satisfying the source in central projects.

Practical implications

The results of this survey will be valuable for academicians, and it can provide visions into future research areas in this domain. Moreover, the disadvantages and advantages of the above systems have been studied, and their key issues have been emphasized to develop a more effective task scheduling mechanisms in the FC mechanisms.

Originality/value

It is useful to show the authors the state-of-the-art in the fog task scheduling area. The consequences of this project make researchers provide a more effective task planning approach in fog settings.

Details

Kybernetes, vol. 50 no. 1
Type: Research Article
ISSN: 0368-492X

Keywords

Article
Publication date: 8 February 2021

Adireddy Rajasekhar Reddy and Appini Narayana Rao

In modern technology, the wireless sensor networks (WSNs) are generally most promising solutions for better reliability, object tracking, remote monitoring and more, which is…

Abstract

Purpose

In modern technology, the wireless sensor networks (WSNs) are generally most promising solutions for better reliability, object tracking, remote monitoring and more, which is directly related to the sensor nodes. Received signal strength indication (RSSI) is main challenges in sensor networks, which is fully depends on distance measurement. The learning algorithm based traditional models are involved in error correction, distance measurement and improve the accuracy of effectiveness. But, most of the existing models are not able to protect the user’s data from the unknown or malicious data during the signal transmission. The simulation outcomes indicate that proposed methodology may reach more constant and accurate position states of the unknown nodes and the target node in WSNs domain than the existing methods.

Design/methodology/approach

This paper present a deep convolutional neural network (DCNN) from the adaptation of machine learning to identify the problems on deep ranging sensor networks and overthrow the problems of unknown sensor nodes localization in WSN networks by using instance parameters of elephant herding optimization (EHO) technique and which is used to optimize the localization problem.

Findings

In this proposed method, the signal propagation properties can be extracted automatically because of this image data and RSSI data values. Rest of this manuscript shows that the ECO can find the better performance analysis of distance estimation accuracy, localized nodes and its transmission range than those traditional algorithms. ECO has been proposed as one of the main tools to promote a transformation from unsustainable development to one of sustainable development. It will reduce the material intensity of goods and services.

Originality/value

The proposed technique is compared to existing systems to show the proposed method efficiency. The simulation results indicate that this proposed methodology can achieve more constant and accurate position states of the unknown nodes and the target node in WSNs domain than the existing methods.

Details

International Journal of Pervasive Computing and Communications, vol. 18 no. 2
Type: Research Article
ISSN: 1742-7371

Keywords

21 – 30 of 34