Search results

1 – 10 of 21
Article
Publication date: 25 April 2024

Tulsi Pawan Fowdur and Ashven Sanghan

The purpose of this paper is to develop a blockchain-based data capture and transmission system that will collect real-time power consumption data from a household electrical…

Abstract

Purpose

The purpose of this paper is to develop a blockchain-based data capture and transmission system that will collect real-time power consumption data from a household electrical appliance and transfer it securely to a local server for energy analytics such as forecasting.

Design/methodology/approach

The data capture system is composed of two current transformer (CT) sensors connected to two different electrical appliances. The CT sensors send the power readings to two Arduino microcontrollers which in turn connect to a Raspberry-Pi for aggregating the data. Blockchain is then enabled onto the Raspberry-Pi through a Java API so that the data are transmitted securely to a server. The server provides real-time visualization of the data as well as prediction using the multi-layer perceptron (MLP) and long short term memory (LSTM) algorithms.

Findings

The results for the blockchain analysis demonstrate that when the data readings are transmitted in smaller blocks, the security is much greater as compared with blocks of larger size. To assess the accuracy of the prediction algorithms data were collected for a 20 min interval to train the model and the algorithms were evaluated using the sliding window approach. The mean average percentage error (MAPE) was used to assess the accuracy of the algorithms and a MAPE of 1.62% and 1.99% was obtained for the LSTM and MLP algorithms, respectively.

Originality/value

A detailed performance analysis of the blockchain-based transmission model using time complexity, throughput and latency as well as energy forecasting has been performed.

Details

Sensor Review, vol. 44 no. 3
Type: Research Article
ISSN: 0260-2288

Keywords

Article
Publication date: 30 April 2024

Andrew C. Billings

The purpose of this essay is to explore the ramifications of Web 3.0 on sports media and the desire for the ultimate fan experience.

Abstract

Purpose

The purpose of this essay is to explore the ramifications of Web 3.0 on sports media and the desire for the ultimate fan experience.

Design/methodology/approach

The essay explains how Web 3.0 will influence (1) the social TV experience, (2) the drive for zero latency in sports streaming, (3) the desire for exclusive sports memorabilia and experiences, (4) artificial intelligence-driven content and (5) the potential decentralization of certain elements within the sports media ecosphere.

Findings

The core fan experience will still be recognizable, but AI, VR, blockchain and other elements will be infused within it.

Originality/value

Ramifications on sports media scholarships are offered.

Details

International Journal of Sports Marketing and Sponsorship, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 1464-6668

Keywords

Article
Publication date: 30 April 2024

C. Bharanidharan, S. Malathi and Hariprasath Manoharan

The potential of vehicle ad hoc networks (VANETs) to improve driver and passenger safety and security has made them a hot topic in the field of intelligent transportation systems…

Abstract

Purpose

The potential of vehicle ad hoc networks (VANETs) to improve driver and passenger safety and security has made them a hot topic in the field of intelligent transportation systems (ITSs). VANETs have different characteristics and system architectures from mobile ad hoc networks (MANETs), with a primary focus on vehicle-to-vehicle (V2V) and vehicle-to-infrastructure (V2I) communication. But protecting VANETs from malicious assaults is crucial because they can undermine network security and safety.

Design/methodology/approach

The black hole attack is a well-known danger to VANETs. It occurs when a hostile node introduces phony routing tables into the network, potentially damaging it and interfering with communication. A safe ad hoc on-demand distance vector (AODV) routing protocol has been created in response to this issue. By adding cryptographic features for source and target node verification to the route request (RREQ) and route reply (RREP) packets, this protocol improves upon the original AODV routing system.

Findings

Through the use of cryptographic-based encryption and decryption techniques, the suggested method fortifies the VANET connection. In addition, other network metrics are taken into account to assess the effectiveness of the secure AODV routing protocol under black hole attacks, including packet loss, end-to-end latency, packet delivery ratio (PDR) and routing request overhead. Results from simulations using an NS-2.33 simulator show how well the suggested fix works to enhance system performance and lessen the effects of black hole assaults on VANETs.

Originality/value

All things considered, the safe AODV routing protocol provides a strong method for improving security and dependability in VANET systems, protecting against malevolent attacks and guaranteeing smooth communication between cars and infrastructure.

Details

International Journal of Intelligent Unmanned Systems, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 2049-6427

Keywords

Article
Publication date: 30 April 2024

Jacqueline Humphries, Pepijn Van de Ven, Nehal Amer, Nitin Nandeshwar and Alan Ryan

Maintaining the safety of the human is a major concern in factories where humans co-exist with robots and other physical tools. Typically, the area around the robots is monitored…

Abstract

Purpose

Maintaining the safety of the human is a major concern in factories where humans co-exist with robots and other physical tools. Typically, the area around the robots is monitored using lasers. However, lasers cannot distinguish between human and non-human objects in the robot’s path. Stopping or slowing down the robot when non-human objects approach is unproductive. This research contribution addresses that inefficiency by showing how computer-vision techniques can be used instead of lasers which improve up-time of the robot.

Design/methodology/approach

A computer-vision safety system is presented. Image segmentation, 3D point clouds, face recognition, hand gesture recognition, speed and trajectory tracking and a digital twin are used. Using speed and separation, the robot’s speed is controlled based on the nearest location of humans accurate to their body shape. The computer-vision safety system is compared to a traditional laser measure. The system is evaluated in a controlled test, and in the field.

Findings

Computer-vision and lasers are shown to be equivalent by a measure of relationship and measure of agreement. R2 is given as 0.999983. The two methods are systematically producing similar results, as the bias is close to zero, at 0.060 mm. Using Bland–Altman analysis, 95% of the differences lie within the limits of maximum acceptable differences.

Originality/value

In this paper an original model for future computer-vision safety systems is described which is equivalent to existing laser systems, identifies and adapts to particular humans and reduces the need to slow and stop systems thereby improving efficiency. The implication is that computer-vision can be used to substitute lasers and permit adaptive robotic control in human–robot collaboration systems.

Details

Technological Sustainability, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 2754-1312

Keywords

Article
Publication date: 14 November 2023

Barkha Dhingra, Shallu Batra, Vaibhav Aggarwal, Mahender Yadav and Pankaj Kumar

The increasing globalization and technological advancements have increased the information spillover on stock markets from various variables. However, there is a dearth of a…

Abstract

Purpose

The increasing globalization and technological advancements have increased the information spillover on stock markets from various variables. However, there is a dearth of a comprehensive review of how stock market volatility is influenced by macro and firm-level factors. Therefore, this study aims to fill this gap by systematically reviewing the major factors impacting stock market volatility.

Design/methodology/approach

This study uses a combination of bibliometric and systematic literature review techniques. A data set of 54 articles published in quality journals from the Australian Business Deans Council (ABDC) list is gathered from the Scopus database. This data set is used to determine the leading contributors and contributions. The content analysis of these articles sheds light on the factors influencing market volatility and the potential research directions in this subject area.

Findings

The findings show that researchers in this sector are becoming more interested in studying the association of stock markets with “cryptocurrencies” and “bitcoin” during “COVID-19.” The outcomes of this study indicate that most studies found oil prices, policy uncertainty and investor sentiments have a significant impact on market volatility. However, there were mixed results on the impact of institutional flows and algorithmic trading on stock volatility, and a consensus cannot be established. This study also identifies the gaps and paves the way for future research in this subject area.

Originality/value

This paper fills the gap in the existing literature by comprehensively reviewing the articles on major factors impacting stock market volatility highlighting the theoretical relationship and empirical results.

Details

Journal of Modelling in Management, vol. 19 no. 3
Type: Research Article
ISSN: 1746-5664

Keywords

Article
Publication date: 28 March 2022

Philip Hong Wei Jiang and William Yu Chung Wang

The purpose of this paper is to explain how enterprise resource planning (ERP) implementation evolves by cloud computing in different industries with different delivery models of…

Abstract

Purpose

The purpose of this paper is to explain how enterprise resource planning (ERP) implementation evolves by cloud computing in different industries with different delivery models of cloud ERP. This paper also investigates infrastructure as a service (IaaS) as a delivery approach for cloud ERP. Case research on IaaS is rarely found in the literature. In addition, this paper intends to reveal how this transformation from on-premises to the cloud would influence the ERP implementation process.

Design/methodology/approach

A multiple-case study is conducted to identify the different deployed models of cloud ERP systems in the implementation projects. The influences of emerging cloud computing technology on ERP implementation are investigated by interviewing consultants related to the projects.

Findings

The findings illustrate that not only software as a service (SaaS) but also IaaS and platform as a service cloud computing services are widely applied in cloud ERP implementation. This study also indicates that certain technical limitations of cloud ERP might have a positive effect on the outcome of ERP implementation.

Originality/value

This study investigates how cloud computing influences ERP implementation from different aspects. The result identifies both SaaS and IaaS as two different approaches widely adopted in cloud ERP implementation. Besides, this study has discussed in-depth and analyzed these two cloud ERP paradigms in five factors, including functionality, performance, portability, security, cost and customization. The classification and suggestions are original to the literature.

Details

VINE Journal of Information and Knowledge Management Systems, vol. 54 no. 3
Type: Research Article
ISSN: 2059-5891

Keywords

Article
Publication date: 2 May 2024

Bolaji David Oladokun, Oluwole Olumide Durodolu, Adeyinka Tella, Yusuf Ayodeji Ajani and Abayomi Kehinde Owolabi

This paper aims to explore the decline of the metaverse and the concurrent growth of online videos, examining their implications for libraries. It analyzes factors contributing to…

Abstract

Purpose

This paper aims to explore the decline of the metaverse and the concurrent growth of online videos, examining their implications for libraries. It analyzes factors contributing to the metaverse decline, such as technical issues and privacy concerns, and explores the emergence and popularity of online video platforms.

Design/methodology/approach

This study applied the interpretive content/document analysis of literature harvested from different databases of Scopus, Web of Science and Directory of Open Access Journals. Given the shift in digital consumption patterns and their impact on libraries, the paper systematically reviews the literature to elucidate the changing landscape of digital engagement and its implications for library services and outreach efforts.

Findings

The paper identifies technical issues, privacy concerns and a lack of interoperability as key factors contributing to the decline of the metaverse. Conversely, the growth of online videos is driven by the emergence of platforms, increasing accessibility to high-speed internet and a diversification of content offerings. These trends reshape user preferences and behaviors, presenting both challenges and opportunities for libraries.

Originality/value

The decline of the metaverse and the rise of online videos underscore the importance of adaptation and innovation for libraries. To remain relevant in the digital age, libraries must transform their services to meet the demand for on-demand content and multimedia resources. The findings highlight the need for libraries to invest in digital literacy and media literacy programs, embrace emerging technologies and forge strategic partnerships with online video platforms. By adapting to changing trends and user preferences, libraries will continue to fulfill their mission of providing access to information and knowledge in the digital age.

Details

Library Hi Tech News, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 0741-9058

Keywords

Article
Publication date: 30 April 2024

Baoxu Tu, Yuanfei Zhang, Kang Min, Fenglei Ni and Minghe Jin

This paper aims to estimate contact location from sparse and high-dimensional soft tactile array sensor data using the tactile image. The authors used three feature extraction…

Abstract

Purpose

This paper aims to estimate contact location from sparse and high-dimensional soft tactile array sensor data using the tactile image. The authors used three feature extraction methods: handcrafted features, convolutional features and autoencoder features. Subsequently, these features were mapped to contact locations through a contact location regression network. Finally, the network performance was evaluated using spherical fittings of three different radii to further determine the optimal feature extraction method.

Design/methodology/approach

This paper aims to estimate contact location from sparse and high-dimensional soft tactile array sensor data using the tactile image.

Findings

This research indicates that data collected by probes can be used for contact localization. Introducing a batch normalization layer after the feature extraction stage significantly enhances the model’s generalization performance. Through qualitative and quantitative analyses, the authors conclude that convolutional methods can more accurately estimate contact locations.

Originality/value

The paper provides both qualitative and quantitative analyses of the performance of three contact localization methods across different datasets. To address the challenge of obtaining accurate contact locations in quantitative analysis, an indirect measurement metric is proposed.

Details

Industrial Robot: the international journal of robotics research and application, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 0143-991X

Keywords

Article
Publication date: 30 April 2024

Abhishek Barwar, Prateek Kala and Rupinder Singh

Some studies have been reported in the past on diaphragmatic hernia (DH) surgery techniques using additive manufacturing (AM) technologies, symptoms of a hernia and post-surgery…

Abstract

Purpose

Some studies have been reported in the past on diaphragmatic hernia (DH) surgery techniques using additive manufacturing (AM) technologies, symptoms of a hernia and post-surgery complications. But hitherto little has been reported on bibliographic analysis (BA) for health monitoring of bovine post-DH surgery for long-term management. Based on BA, this study aims to explore the sensor fabrication integrated with innovative AM technologies for health monitoring assistance of bovines post-DH surgery.

Design/methodology/approach

A BA based on the data extracted through the Web of Science database was performed using bibliometric tools (R-Studio and Biblioshiny).

Findings

After going through the BA and a case study, this review provides information on various 3D-printed meshes used over the sutured site and available Internet of Things-based solutions to prevent the recurrence of DH.

Originality/value

Research gaps exist for 3D-printed conformal sensors for health monitoring of bovine post-DH surgery.

Details

Rapid Prototyping Journal, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 1355-2546

Keywords

Article
Publication date: 30 April 2024

Lin Kang, Junjie Chen, Jie Wang and Yaqi Wei

In order to meet the different quality of service (QoS) requirements of vehicle-to-infrastructure (V2I) and multiple vehicle-to-vehicle (V2V) links in vehicle networks, an…

Abstract

Purpose

In order to meet the different quality of service (QoS) requirements of vehicle-to-infrastructure (V2I) and multiple vehicle-to-vehicle (V2V) links in vehicle networks, an efficient V2V spectrum access mechanism is proposed in this paper.

Design/methodology/approach

A long-short-term-memory-based multi-agent hybrid proximal policy optimization (LSTM-H-PPO) algorithm is proposed, through which the distributed spectrum access and continuous power control of V2V link are realized.

Findings

Simulation results show that compared with the baseline algorithm, the proposed algorithm has significant advantages in terms of total system capacity, payload delivery success rate of V2V link and convergence speed.

Originality/value

The LSTM layer uses the time sequence information to estimate the accurate system state, which ensures the choice of V2V spectrum access based on local observation effective. The hybrid PPO framework shares training parameters among agents which speeds up the entire training process. The proposed algorithm adopts the mode of centralized training and distributed execution, so that the agent can achieve the optimal spectrum access based on local observation information with less signaling overhead.

Details

International Journal of Intelligent Computing and Cybernetics, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 1756-378X

Keywords

1 – 10 of 21