Search results
1 – 10 of 64Lin Kang, Junjie Chen, Jie Wang and Yaqi Wei
In order to meet the different quality of service (QoS) requirements of vehicle-to-infrastructure (V2I) and multiple vehicle-to-vehicle (V2V) links in vehicle networks, an…
Abstract
Purpose
In order to meet the different quality of service (QoS) requirements of vehicle-to-infrastructure (V2I) and multiple vehicle-to-vehicle (V2V) links in vehicle networks, an efficient V2V spectrum access mechanism is proposed in this paper.
Design/methodology/approach
A long-short-term-memory-based multi-agent hybrid proximal policy optimization (LSTM-H-PPO) algorithm is proposed, through which the distributed spectrum access and continuous power control of V2V link are realized.
Findings
Simulation results show that compared with the baseline algorithm, the proposed algorithm has significant advantages in terms of total system capacity, payload delivery success rate of V2V link and convergence speed.
Originality/value
The LSTM layer uses the time sequence information to estimate the accurate system state, which ensures the choice of V2V spectrum access based on local observation effective. The hybrid PPO framework shares training parameters among agents which speeds up the entire training process. The proposed algorithm adopts the mode of centralized training and distributed execution, so that the agent can achieve the optimal spectrum access based on local observation information with less signaling overhead.
Details
Keywords
Zhaobin Meng, Yueheng Lu and Hongyue Duan
The purpose of this paper is to study the following two issues regarding blockchain crowdsourcing. First, to design smart contracts with lower consumption to meet the needs of…
Abstract
Purpose
The purpose of this paper is to study the following two issues regarding blockchain crowdsourcing. First, to design smart contracts with lower consumption to meet the needs of blockchain crowdsourcing services and also need to design better interaction modes to further reduce the cost of blockchain crowdsourcing services. Second, to design an effective privacy protection mechanism to protect user privacy while still providing high-quality crowdsourcing services for location-sensitive multiskilled mobile space crowdsourcing scenarios and blockchain exposure issues.
Design/methodology/approach
This paper proposes a blockchain-based privacy-preserving crowdsourcing model for multiskill mobile spaces. The model in this paper uses the zero-knowledge proof method to make the requester believe that the user is within a certain location without the user providing specific location information, thereby protecting the user’s location information and other privacy. In addition, through off-chain calculation and on-chain verification methods, gas consumption is also optimized.
Findings
This study deployed the model on Ethereum for testing. This study found that the privacy protection is feasible and the gas optimization is obvious.
Originality/value
This study designed a mobile space crowdsourcing based on a zero-knowledge proof privacy protection mechanism and optimized gas consumption.
Details
Keywords
Feng Qian, Yongsheng Tu, Chenyu Hou and Bin Cao
Automatic modulation recognition (AMR) is a challenging problem in intelligent communication systems and has wide application prospects. At present, although many AMR methods…
Abstract
Purpose
Automatic modulation recognition (AMR) is a challenging problem in intelligent communication systems and has wide application prospects. At present, although many AMR methods based on deep learning have been proposed, the methods proposed by these works cannot be directly applied to the actual wireless communication scenario, because there are usually two kinds of dilemmas when recognizing the real modulated signal, namely, long sequence and noise. This paper aims to effectively process in-phase quadrature (IQ) sequences of very long signals interfered by noise.
Design/methodology/approach
This paper proposes a general model for a modulation classifier based on a two-layer nested structure of long short-term memory (LSTM) networks, called a two-layer nested structure (TLN)-LSTM, which exploits the time sensitivity of LSTM and the ability of the nested network structure to extract more features, and can achieve effective processing of ultra-long signal IQ sequences collected from real wireless communication scenarios that are interfered by noise.
Findings
Experimental results show that our proposed model has higher recognition accuracy for five types of modulation signals, including amplitude modulation, frequency modulation, gaussian minimum shift keying, quadrature phase shift keying and differential quadrature phase shift keying, collected from real wireless communication scenarios. The overall classification accuracy of the proposed model for these signals can reach 73.11%, compared with 40.84% for the baseline model. Moreover, this model can also achieve high classification performance for analog signals with the same modulation method in the public data set HKDD_AMC36.
Originality/value
At present, although many AMR methods based on deep learning have been proposed, these works are based on the model’s classification results of various modulated signals in the AMR public data set to evaluate the signal recognition performance of the proposed method rather than collecting real modulated signals for identification in actual wireless communication scenarios. The methods proposed in these works cannot be directly applied to actual wireless communication scenarios. Therefore, this paper proposes a new AMR method, dedicated to the effective processing of the collected ultra-long signal IQ sequences that are interfered by noise.
Details
Keywords
Huimin Li, Chenchen Xu, Yongchao Cao and Chengyi Zhang
The purpose of this paper is twofold: first, it explores the influencing factors of the government’s trust decision-making in the private sector; second, it explores how these…
Abstract
Purpose
The purpose of this paper is twofold: first, it explores the influencing factors of the government’s trust decision-making in the private sector; second, it explores how these influencing factors affect the government’s trust decisions.
Design/methodology/approach
A theoretical model was established, and a questionnaire survey was conducted among 152 professionals. The collected datas were analyzed by the structural equation modeling (SEM) method.
Findings
The study identified four critical factors that influence the government’s decision to trust the private sector in public-private-partnership (PPP) projects. All the four factors have a positively correlated impact on the government’s trust decision-making. The structural equation path analysis shows that the most important factor affecting the government’s trust decision-making is the trustee’s (private sector) trustworthy characteristics, and the path coefficient is 0.92. The path coefficients of risk perception and the trustor’s trust tendency are 0.83 and 0.74, respectively. The influence of the legal system environment on government trust decision-making is moderate, with a path coefficient of 0.68.
Originality/value
This paper contributes to the literature in two aspects. First, the factors influencing decision-making to government trust in the private sector in PPP projects have been identified. Second, a comprehensive view of the mechanism of government trust in the private sector in PPP projects has been theorized by the SEM method.
Details
Keywords
Ismail Abiodun Sulaimon, Hafiz Alaka, Razak Olu-Ajayi, Mubashir Ahmad, Saheed Ajayi and Abdul Hye
Road traffic emissions are generally believed to contribute immensely to air pollution, but the effect of road traffic data sets on air quality (AQ) predictions has not been fully…
Abstract
Purpose
Road traffic emissions are generally believed to contribute immensely to air pollution, but the effect of road traffic data sets on air quality (AQ) predictions has not been fully investigated. This paper aims to investigate the effects traffic data set have on the performance of machine learning (ML) predictive models in AQ prediction.
Design/methodology/approach
To achieve this, the authors have set up an experiment with the control data set having only the AQ data set and meteorological (Met) data set, while the experimental data set is made up of the AQ data set, Met data set and traffic data set. Several ML models (such as extra trees regressor, eXtreme gradient boosting regressor, random forest regressor, K-neighbors regressor and two others) were trained, tested and compared on these individual combinations of data sets to predict the volume of PM2.5, PM10, NO2 and O3 in the atmosphere at various times of the day.
Findings
The result obtained showed that various ML algorithms react differently to the traffic data set despite generally contributing to the performance improvement of all the ML algorithms considered in this study by at least 20% and an error reduction of at least 18.97%.
Research limitations/implications
This research is limited in terms of the study area, and the result cannot be generalized outside of the UK as some of the inherent conditions may not be similar elsewhere. Additionally, only the ML algorithms commonly used in literature are considered in this research, therefore, leaving out a few other ML algorithms.
Practical implications
This study reinforces the belief that the traffic data set has a significant effect on improving the performance of air pollution ML prediction models. Hence, there is an indication that ML algorithms behave differently when trained with a form of traffic data set in the development of an AQ prediction model. This implies that developers and researchers in AQ prediction need to identify the ML algorithms that behave in their best interest before implementation.
Originality/value
The result of this study will enable researchers to focus more on algorithms of benefit when using traffic data sets in AQ prediction.
Details
Keywords
C. Bharanidharan, S. Malathi and Hariprasath Manoharan
The potential of vehicle ad hoc networks (VANETs) to improve driver and passenger safety and security has made them a hot topic in the field of intelligent transportation systems…
Abstract
Purpose
The potential of vehicle ad hoc networks (VANETs) to improve driver and passenger safety and security has made them a hot topic in the field of intelligent transportation systems (ITSs). VANETs have different characteristics and system architectures from mobile ad hoc networks (MANETs), with a primary focus on vehicle-to-vehicle (V2V) and vehicle-to-infrastructure (V2I) communication. But protecting VANETs from malicious assaults is crucial because they can undermine network security and safety.
Design/methodology/approach
The black hole attack is a well-known danger to VANETs. It occurs when a hostile node introduces phony routing tables into the network, potentially damaging it and interfering with communication. A safe ad hoc on-demand distance vector (AODV) routing protocol has been created in response to this issue. By adding cryptographic features for source and target node verification to the route request (RREQ) and route reply (RREP) packets, this protocol improves upon the original AODV routing system.
Findings
Through the use of cryptographic-based encryption and decryption techniques, the suggested method fortifies the VANET connection. In addition, other network metrics are taken into account to assess the effectiveness of the secure AODV routing protocol under black hole attacks, including packet loss, end-to-end latency, packet delivery ratio (PDR) and routing request overhead. Results from simulations using an NS-2.33 simulator show how well the suggested fix works to enhance system performance and lessen the effects of black hole assaults on VANETs.
Originality/value
All things considered, the safe AODV routing protocol provides a strong method for improving security and dependability in VANET systems, protecting against malevolent attacks and guaranteeing smooth communication between cars and infrastructure.
Details
Keywords
Ngonidzashe Katsamba, Agripah Kandiero and Sabelo Chizwina
The purpose of the chapter was to examine the impact of customer care chatbots on customer satisfaction levels in the mobile telephony industry in Zimbabwe, with a special focus…
Abstract
The purpose of the chapter was to examine the impact of customer care chatbots on customer satisfaction levels in the mobile telephony industry in Zimbabwe, with a special focus on the company Econet Wireless. This chapter shows the conceptual framework used. An online questionnaire was administered to a sample of 100 Econet Wireless subscribers who were selected using probability stratified random sampling from Zimbabwe’s 10 provinces. The research data were collected and analysed for correlation, and a multiple regression analysis was carried out to identify the relationship between customer satisfaction and the three customer service improvements brought in by the introduction of customer service chatbots. The study discovered that there is a positive relationship between customer satisfaction levels and each of the three customer service improvements brought in by customer service chatbots, namely customer service convenience, speed of response, and omnichannel strategies. This study thereby proves that the introduction of customer service chatbots in the mobile telephony industry in Zimbabwe can lead to an improvement in customer satisfaction levels. However, addressing service quality only as a determinant of customer satisfaction in isolation is not sufficient to fully improve customer satisfaction levels. Therefore, organisations that seek to improve their customer satisfaction should consider strategies that address all determinants of customer satisfaction, namely price, product quality, service quality, situational factors, and personal factors. This study contributes to the body of knowledge, particularly regarding the use of artificial intelligence (AI) for customer service in developing economies.
Details
Keywords
Sophie van Roosmale, Amaryllis Audenaert and Jasmine Meysman
This paper aims to highlight the expanding link between facility management (FM) and building automation and control systems (BACS) through a review of literature. It examines the…
Abstract
Purpose
This paper aims to highlight the expanding link between facility management (FM) and building automation and control systems (BACS) through a review of literature. It examines the opportunities and challenges of BACS for facility managers and proposes solutions for mitigating the risks associated with BACS implementation.
Design/methodology/approach
This paper reviews various research papers to explore the positive influences of BACS on FM, such as support with strategic decision-making, predictive maintenance, energy efficiency and comfort improvement. It also discusses the challenges of BACS, including obsolescence, interoperability, vendor lock-in, reliability and security risks and suggests potential solutions based on existing literature.
Findings
BACS offers numerous opportunities for facility managers, such as improved decision-making, energy efficiency and comfort levels in office buildings. However, there are also risks associated with BACS implementation, including obsolescence, interoperability, vendor lock-in, reliability and security risks. These risks can be mitigated through measures such as hardware and software obsolescence management plans, functional requirement lists, wireless communication protocols, advanced feedback systems and increased awareness about BACS security.
Originality/value
To the best of the authors’ knowledge, no prior academic research has been conducted on the expanding link between FM and BACS. Although some papers have touched upon the opportunities and challenges of BACS for FM, this paper aims to provide a comprehensive overview of these findings by consolidating existing literature.
Details
Keywords
Prajakta Thakare and Ravi Sankar V.
Agriculture is the backbone of a country, contributing more than half of the sector of economy throughout the world. The need for precision agriculture is essential in evaluating…
Abstract
Purpose
Agriculture is the backbone of a country, contributing more than half of the sector of economy throughout the world. The need for precision agriculture is essential in evaluating the conditions of the crops with the aim of determining the proper selection of pesticides. The conventional method of pest detection fails to be stable and provides limited accuracy in the prediction. This paper aims to propose an automatic pest detection module for the accurate detection of pests using the hybrid optimization controlled deep learning model.
Design/methodology/approach
The paper proposes an advanced pest detection strategy based on deep learning strategy through wireless sensor network (WSN) in the agricultural fields. Initially, the WSN consisting of number of nodes and a sink are clustered as number of clusters. Each cluster comprises a cluster head (CH) and a number of nodes, where the CH involves in the transfer of data to the sink node of the WSN and the CH is selected using the fractional ant bee colony optimization (FABC) algorithm. The routing process is executed using the protruder optimization algorithm that helps in the transfer of image data to the sink node through the optimal CH. The sink node acts as the data aggregator and the collection of image data thus obtained acts as the input database to be processed to find the type of pest in the agricultural field. The image data is pre-processed to remove the artifacts present in the image and the pre-processed image is then subjected to feature extraction process, through which the significant local directional pattern, local binary pattern, local optimal-oriented pattern (LOOP) and local ternary pattern (LTP) features are extracted. The extracted features are then fed to the deep-convolutional neural network (CNN) in such a way to detect the type of pests in the agricultural field. The weights of the deep-CNN are tuned optimally using the proposed MFGHO optimization algorithm that is developed with the combined characteristics of navigating search agents and the swarming search agents.
Findings
The analysis using insect identification from habitus image Database based on the performance metrics, such as accuracy, specificity and sensitivity, reveals the effectiveness of the proposed MFGHO-based deep-CNN in detecting the pests in crops. The analysis proves that the proposed classifier using the FABC+protruder optimization-based data aggregation strategy obtains an accuracy of 94.3482%, sensitivity of 93.3247% and the specificity of 94.5263%, which is high as compared to the existing methods.
Originality/value
The proposed MFGHO optimization-based deep-CNN is used for the detection of pest in the crop fields to ensure the better selection of proper cost-effective pesticides for the crop fields in such a way to increase the production. The proposed MFGHO algorithm is developed with the integrated characteristic features of navigating search agents and the swarming search agents in such a way to facilitate the optimal tuning of the hyperparameters in the deep-CNN classifier for the detection of pests in the crop fields.
Details
Keywords
Ziyuan Ma, Huajun Gong and Xinhua Wang
The purpose of this paper is to construct an event-triggered finite-time fault-tolerant formation tracking controller, which can achieve a time-varying formation control for…
Abstract
Purpose
The purpose of this paper is to construct an event-triggered finite-time fault-tolerant formation tracking controller, which can achieve a time-varying formation control for multiple unmanned aerial vehicles (UAVs) during actuator failures and external perturbations.
Design/methodology/approach
First, this study developed the formation tracking protocol for each follower using UAV formation members, defining the tracking inaccuracy of the UAV followers’ location. Subsequently, this study designed the multilayer event-triggered controller based on the backstepping method framework within finite time. Then, considering the actuator failures, and added self-adaptive thought for fault-tolerant control within finite time, the event-triggered closed-loop system is subsequently shown to be a finite-time stable system. Furthermore, the Zeno behavior is analyzed to prevent infinite triggering instances within a finite time. Finally, simulations are conducted with external disturbances and actuator failure conditions to demonstrate formation tracking controller performance.
Findings
It achieves improved performance in the presence of external disturbances and system failures. Combining limited-time adaptive control and event triggering improves system stability, increase robustness to disturbances and calculation efficiency. In addition, the designed formation tracking controller can effectively control the time-varying formation of the leader and followers to complete the task, and by adding a fixed-time observer, it can effectively compensate for external disturbances and improve formation control accuracy.
Originality/value
A formation-following controller is designed, which can handle both external disturbances and internal actuator failures during formation flight, and the proposed method can be applied to a variety of formation control scenarios and does not rely on a specific type of UAV or communication network.
Details