Template-Type: ReDIF-Article 1.0 Author-Name: Shan Wang Author-X-Name-First: Shan Author-X-Name-Last: Wang Author-Name: Youwei Wang Author-X-Name-First: Youwei Author-X-Name-Last: Wang Author-Name: Norm Archer Author-X-Name-First: Norm Author-X-Name-Last: Archer Title: The co-evolution of IT competence, organisational agility and entrepreneurial action: a case study of entrepreneurial e-tailers Abstract: Due to the turbulent business environment, small and medium-sized e-commerce companies tend to adopt a strategic logic that requires the support and co-evolution of organisational agility capability and information technology (IT) competence. However, the characteristics of organisational agility and IT competence and their co-evolution mechanisms are largely unknown. Based on the Sambamurthy et al. (2003), theoretical framework about the strategic logic for firms in a turbulent business environment, we undertook a case study of ten entrepreneurial e-tailers (retailers selling primarily on the internet) on a third party Chinese e-commerce platform. From these firms we identified the characteristics and the evolutionary path of entrepreneurial actions, organisation agility and IT competence for small and medium-sized entrepreneurial actions, organisation agility and IT competence from the perspective of real options and adaptive learning. This research advances our current understanding of SME e-commerce firm strategic logic and required firm capabilities. Journal: Int. J. of Networking and Virtual Organisations Pages: 1-29 Issue: 1 Volume: 18 Year: 2018 Keywords: entrepreneurial action; organisational agility; IT competence; adaptive co-evolution; real options; adaptive learning. File-URL: http://www.inderscience.com/link.php?id=90672 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:ids:ijnvor:v:18:y:2018:i:1:p:1-29 Template-Type: ReDIF-Article 1.0 Author-Name: Raju Ranjan Author-X-Name-First: Raju Author-X-Name-Last: Ranjan Author-Name: Jayanthi Ranjan Author-X-Name-First: Jayanthi Author-X-Name-Last: Ranjan Title: Data analysis to uncover critical parameters for performance appraisal of students in higher education Abstract: Performance of students sometimes gives the most committed, knowledgeable, well-intentioned teacher wondering what is wrong with his/her class or a particular student. The growing demand of information which will provide assistance to decision makers in appraisal of a student's performance is guiding a path towards extensive usage of analytical tools for revealing hidden information. The intelligent information from the data of higher education provides hidden information and pattern from students' data, and thus helps in performance appraisal in the academia which will provide avenues for overall growth of the students in the higher education field. The authors through this paper highlighted the methodology to be adapted in reduction of the various available critical parameters and thus identified the key critical parameters for the performance evaluation of the students in higher education. The authors classified the collected data variables into broad categories and applied the data mining techniques to uncover the critical parameters in higher education. Journal: Int. J. of Networking and Virtual Organisations Pages: 30-50 Issue: 1 Volume: 18 Year: 2018 Keywords: cumulative grade point average; CGPA; data analytics; data mining; artificial neural network; ANN. File-URL: http://www.inderscience.com/link.php?id=90673 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:ids:ijnvor:v:18:y:2018:i:1:p:30-50 Template-Type: ReDIF-Article 1.0 Author-Name: Tao Zhou Author-X-Name-First: Tao Author-X-Name-Last: Zhou Title: Examining users' switch from online banking to mobile banking Abstract: As an emerging service, mobile banking has received minor adoption among users. This may be for the reason that they are locked into the relationship with online banking and are unable to switch from online banking to mobile banking. Integrating both perspectives of enablers and inhibitors, this research examined users' switch from online banking to mobile banking. Enablers include relative advantage, perceived ease of use, trust, flow and social influence, whereas the inhibitor is switching costs. The results indicated that switch intention is affected by both enablers and inhibitors. Among them, flow and switching costs have the largest effects. This research provides a new perspective (switch behaviour) of examining mobile banking user behaviour, which has been mainly tested from technology adoption perspective. Journal: Int. J. of Networking and Virtual Organisations Pages: 51-66 Issue: 1 Volume: 18 Year: 2018 Keywords: online banking; mobile banking; switch intention; trust. File-URL: http://www.inderscience.com/link.php?id=90675 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:ids:ijnvor:v:18:y:2018:i:1:p:51-66 Template-Type: ReDIF-Article 1.0 Author-Name: Ying Hu Author-X-Name-First: Ying Author-X-Name-Last: Hu Author-Name: Ze Xiao Author-X-Name-First: Ze Author-X-Name-Last: Xiao Title: Virtual resource pricing scheme in cloud platforms Abstract: Recently, economic model has been widely applied in cloud platforms for regulating virtual resource sharing. In the economic model, resource pricing scheme plays a key role for managing the relationship between cloud users and cloud providers. In this paper, we present a novel pricing scheme for virtual resource provision with aiming at improving resource utilisation and reducing operational costs for cloud providers. Unlike previous studies, the proposed pricing scheme applies producer-retailer-client model to describe the procedure of virtual resource trade and provides the optimal pricing solution by using gaming theory. Extensive experiments are conducted in a real-world cloud platform, and the results demonstrate that the proposed pricing scheme outperforms other approaches in terms of the increased profit and the reduction of variance of virtual resource prices. Journal: Int. J. of Networking and Virtual Organisations Pages: 67-79 Issue: 1 Volume: 18 Year: 2018 Keywords: virtual resource; quality of service; QoS; pricing scheme; load balance. File-URL: http://www.inderscience.com/link.php?id=90676 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:ids:ijnvor:v:18:y:2018:i:1:p:67-79 Template-Type: ReDIF-Article 1.0 Author-Name: Xiaoling Ke Author-X-Name-First: Xiaoling Author-X-Name-Last: Ke Author-Name: Min Feng Author-X-Name-First: Min Author-X-Name-Last: Feng Author-Name: Meng Xiang Author-X-Name-First: Meng Author-X-Name-Last: Xiang Title: The application of analytic hierarchy process and fuzzy comprehensive evaluation in the evaluation of ecological security in coal mine areas Abstract: This article researches the current condition and problems of ecological security in coal mine areas. It adopts the pressure, status and response (P-S-R) model as its framework, establishes a coal mining area ecological security evaluative index system, which is divided into three layers: the target layer is ecological security status, the principle layer is the pressure, status and response of ecological security, the solution layer contains the corresponding measuring indices (altogether 27). It then adopts analytic hierarchy process (AHP) and fuzzy comprehensive evaluative method to establish an evaluative index model of coal mining area ecological security. It first calculates the weights of various factors in the model by AHP and then concludes the model evaluation by fuzzy comprehensive evaluation. This article uses a coal mine of a Zhengzhou Coal Mining Group as the object of analysis, conducts questionnaire and interview, and then applies the model established by this article to evaluate its ecological security, which results in a V3 level (ordinary level) in its ecological security. Journal: Int. J. of Networking and Virtual Organisations Pages: 80-96 Issue: 1 Volume: 18 Year: 2018 Keywords: analytic hierarchy process; AHP; fuzzy comprehensive evaluation; FCE; ecological security; coal mining area. File-URL: http://www.inderscience.com/link.php?id=90677 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:ids:ijnvor:v:18:y:2018:i:1:p:80-96 Template-Type: ReDIF-Article 1.0 Author-Name: Aakanksha Tewari Author-X-Name-First: Aakanksha Author-X-Name-Last: Tewari Author-Name: B.B. Gupta Author-X-Name-First: B.B. Author-X-Name-Last: Gupta Title: A lightweight mutual authentication approach for RFID tags in IoT devices Abstract: In this paper, we present an approach for mutual authentication between server and RFID tags using hash and bitwise computations. The use of RFID technology is changing frequently these days, and their use is widespread. Due to the persistent development of radio frequency identification (RFID), substantial amount of attention has been drawn towards the security issues in RFID from researchers and industries. Mutual authentication between server and the RFID tags is one of the most popular mechanisms to protect these systems from attacks, providing confidentiality, integrity and authentication. But security and privacy issues are also increasing with time as it low cost and have limited resources we need to minimise the computations and storage cost of a protocol too. Our protocol is simple and also ensures the security against various attacks. The security and performance analysis also verifies the strength of our protocol. Journal: Int. J. of Networking and Virtual Organisations Pages: 97-111 Issue: 2 Volume: 18 Year: 2018 Keywords: internet of things; IoT; radio frequency identification; RFID; authentication; forward secrecy; tracking; spoofing; eavesdropping. File-URL: http://www.inderscience.com/link.php?id=91573 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:ids:ijnvor:v:18:y:2018:i:2:p:97-111 Template-Type: ReDIF-Article 1.0 Author-Name: Peng Xiao Author-X-Name-First: Peng Author-X-Name-Last: Xiao Author-Name: Yuan Tian Author-X-Name-First: Yuan Author-X-Name-Last: Tian Title: An energy-efficient frequency scaling technique for virtualised memory in clouds Abstract: As more and more non-trivial applications have been deployed on cloud platforms, the energy consumption in cloud-based datacenters has become a critical issue that needs to be addressed. In previous studies, most of the researchers focused on improving the CPU-related energy conservation approaches while few of them take efforts on memory-related energy saving techniques. In this paper, a novel memory energy saving mechanism called frequency scaling on virtualised memory is proposed, which uses the dynamical voltage frequency scaling on memory component so as to adjust the working power of a virtualised server's memory based on the runtime characteristics of active virtual machines. In this way, the proposed mechanism can provide a fine-grained energy conservation mechanism for those virtualised servers in cloud platforms. In the experiments, we extensively investigate the effectiveness and performance of the proposed mechanism on various kinds of servers and workloads. The experimental results show that it can significantly improve the energy-efficiency of memory subsystem in virtualised servers. Journal: Int. J. of Networking and Virtual Organisations Pages: 166-181 Issue: 2 Volume: 18 Year: 2018 Keywords: cloud computing; virtualised memory; frequency scaling; energy-efficiency. File-URL: http://www.inderscience.com/link.php?id=91574 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:ids:ijnvor:v:18:y:2018:i:2:p:166-181 Template-Type: ReDIF-Article 1.0 Author-Name: Narayanan Manikandan Author-X-Name-First: Narayanan Author-X-Name-Last: Manikandan Author-Name: Srinivasan Subha Author-X-Name-First: Srinivasan Author-X-Name-Last: Subha Title: Parallel AES algorithm for performance improvement in data analytics security for IoT Abstract: In emerging computing environment like internet of things (IoT) or smart device networking, many constraint-based devices are connected with internet. The device automatically interacts with each other through the connected network and gives us new experience. In order to effectively utilise the features of IoT, it is absolutely essential to ensure the security of connected end nodes. If one of the node security is compromised, the entire process will suffer seriously. However, implementing sufficient cryptographic functions on the device is very difficult due to the limitation of resources. This paper proposes a method of injecting the high performance security algorithm in data analytics done with IOT-based devices. Parallel algorithms will improve the efficiency of security mechanism in data analysis with parallel computing devices. AES algorithm is a symmetric encryption algorithm works efficiently for hardware and software. Through parallel processing of AES algorithm, data analytics in IoT-based systems performance can be improved. This method is tested with varieties of Intel-based multi-core processing architecture and considerable performance improvement is achieved. Journal: Int. J. of Networking and Virtual Organisations Pages: 112-129 Issue: 2 Volume: 18 Year: 2018 Keywords: IoT security; parallel algorithm; AES algorithm; data analytics security; IoT performance. File-URL: http://www.inderscience.com/link.php?id=91575 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:ids:ijnvor:v:18:y:2018:i:2:p:112-129 Template-Type: ReDIF-Article 1.0 Author-Name: Asma Bouhlel Author-X-Name-First: Asma Author-X-Name-Last: Bouhlel Author-Name: Anis Sakly Author-X-Name-First: Anis Author-X-Name-Last: Sakly Author-Name: Mohamed Nejib Mansouri Author-X-Name-First: Mohamed Nejib Author-X-Name-Last: Mansouri Title: Particle swarm optimisation-based DWT for symbol detection in MIMO-OFDM system Abstract: This paper proposes a new detection algorithm called particular swarm optimisation (PSO)-based discrete wavelet transform (DWT) for multiple-input-multiple-output orthogonal frequency division multiplexing (MIMO-OFDM) system. In all previous studies, PSO detection algorithm and DWT were separately proposed for MIMO-OFDM systems. Motivated by the performances enhancement achieved by these techniques, PSO is combined to DWT transform in this work for symbol detection in MIMO-OFDM system. The simulation results show that the proposed PSO-based DWT MIMO-OFDM system boosts the performances of zeros forcing (ZF), minimum mean square error (MMSE), and even PSO-based FFT MIMO-OFDM equaliser. The proposed detector presents near optimal performances in terms of bit error rate (BER) and a significant computational complexity reduction for different constellation diagram and number of transmitting antennas compared to maximum likelihood (ML) detector. Journal: Int. J. of Networking and Virtual Organisations Pages: 130-143 Issue: 2 Volume: 18 Year: 2018 Keywords: multiple-input-multiple-output orthogonal frequency division multiplexing; MIMO-OFDM; discrete wavelet transform; DWT; particular swarm optimisation; PSO; maximum likelihood; ML. File-URL: http://www.inderscience.com/link.php?id=91581 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:ids:ijnvor:v:18:y:2018:i:2:p:130-143 Template-Type: ReDIF-Article 1.0 Author-Name: Achyut Shankar Author-X-Name-First: Achyut Author-X-Name-Last: Shankar Author-Name: N. Jaisankar Author-X-Name-First: N. Author-X-Name-Last: Jaisankar Title: Optimal cluster head selection framework to support energy aware routing protocols of wireless sensor network Abstract: Data transfer to the base station from the sensor node through the choice of an optimal cluster head is a huge challenge posed for the routing protocol, in the case of the wireless sensor network. An energy proficient clustering scheme relying on artificial bee colony algorithm and fractional artificial bee colony algorithm tends to maximise the network energy and lifetime of nodes through the selection of an optimal cluster head. However, the growing complexity of the network architecture requires substantial improvement. This paper develops a weighing model as a cost function to represent the optimal cluster head selection problem. Further, the traditional ABC is enhanced by adopting a novel adaptive concept called dynamic scout bee, and hence ABC-DS algorithm is derived in this paper. According to the concept of ABC-DS, multiplicating the scout bee generation enhances the number of alive nodes and the energy of cluster head. Comparative study between the performance of the proposed ABC-DS routing mechanism against that of ABC and FABC-based routing is conducted. The simulation results show that the proposed scheme increases the number of alive nodes with 25% of maximum normalised network energy than the existing protocols. Journal: Int. J. of Networking and Virtual Organisations Pages: 144-165 Issue: 2 Volume: 18 Year: 2018 Keywords: wireless sensor networks; cluster head selection; network lifetime; artificial bee colony. File-URL: http://www.inderscience.com/link.php?id=91605 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:ids:ijnvor:v:18:y:2018:i:2:p:144-165 Template-Type: ReDIF-Article 1.0 Author-Name: G. Lakshmi Vara Prasad Author-X-Name-First: G. Lakshmi Vara Author-X-Name-Last: Prasad Author-Name: T. Nalini Author-X-Name-First: T. Author-X-Name-Last: Nalini Author-Name: Rajendran Sugumar Author-X-Name-First: Rajendran Author-X-Name-Last: Sugumar Title: Mobility aware MAC protocol for providing energy efficiency and stability in mobile WSN Abstract: MWSNs need an efficient handling of mobility in all layers with respect to the sensor network protocol stack. The requirement to handle mobility adds another dimension to sensor network protocols, in addition to conservation of energy and computation resources. Accordingly we propose to design a mobility aware MAC protocol for providing energy efficiency and stability for MWSNs. Initially a link status history is maintained while the MoX-MAC nodes send their data to static nodes. From this the link quality issue is addressed. If the link quality is poorer the MoX-MAC will drop or ignore the packet. Next in case of energy consumption the nodes enter into the periodic sleep-awake duty cycle. If the link quality is less than the threshold value, the corresponding communication is blocked. Journal: Int. J. of Networking and Virtual Organisations Pages: 183-195 Issue: 3 Volume: 18 Year: 2018 Keywords: MAC protocol wireless mobile sensor network; MoX-MAC; mobile node; X-MAC protocol; mobility prediction; MAEES-MAC; base station; packet drop; DSMAC. File-URL: http://www.inderscience.com/link.php?id=92067 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:ids:ijnvor:v:18:y:2018:i:3:p:183-195 Template-Type: ReDIF-Article 1.0 Author-Name: Tienan Zhang Author-X-Name-First: Tienan Author-X-Name-Last: Zhang Title: EVRC: an economic-based virtual resource co-allocation middleware for clouds Abstract: In cloud platforms, resource co-allocation service plays an important role on meeting user's requirements especially for running some large-scale applications, which typically need to be deployed on several virtual organisations. In this paper, we present an economic-based virtual resource co-allocation (EVRC) middleware, which provides a set of flexible services that allows cloud applications co-allocating plenty of virtual resources across different resource providers. In the EVRC framework, resource co-allocation service is implemented by a novel auction mechanism, and cloud user's quality-of-service (QoS) requirements are guaranteed by a set of services including resource reservation, reputation manager and etc. In addition, the proposed EVRC middleware is incorporated with an online performance monitoring and profiling mechanism, which can be used to evaluate the efficiency of underlying resources and adjust up-level resource management policy. Extensive experiments are conducted to investigate the effectiveness of the EVRC middleware, and the results indicate that it can significantly improve the efficiency of virtual resource co-allocation as well as cloud user's QoS satisfactory. Journal: Int. J. of Networking and Virtual Organisations Pages: 196-210 Issue: 3 Volume: 18 Year: 2018 Keywords: cloud computing; virtualisation; co-allocation; resource market. File-URL: http://www.inderscience.com/link.php?id=92068 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:ids:ijnvor:v:18:y:2018:i:3:p:196-210 Template-Type: ReDIF-Article 1.0 Author-Name: Kavitha Bharathi Shanmugam Author-X-Name-First: Kavitha Bharathi Author-X-Name-Last: Shanmugam Author-Name: S. Vengataasalam Author-X-Name-First: S. Author-X-Name-Last: Vengataasalam Title: Fuzzy-based trusted security for mobile grid systems Abstract: In mobile grid system, the main factor to be considered while deploying in real world application is security. Otherwise, the framework would be incomplete and impractical. In order to provide full security, successful job execution and high resource availability, in this paper, we propose to design a fuzzy-based trusted security for mobile grid systems. In this technique, the trust index value of each node is estimated using fuzzy logic. Here the metrics grid residence time, reputation and degree of maliciousness are considered as input for the fuzzy logic and the trust index value is determined as output. Based on the trust index, GS allocates the grid node when it receives the service request. Also, as the trust index is calculated and updated by the GS, the malicious nodes cannot modify or destroy the values. By simulation results, we show that the proposed technique offers high security and high resource availability. Journal: Int. J. of Networking and Virtual Organisations Pages: 211-226 Issue: 3 Volume: 18 Year: 2018 Keywords: mobile grid system; real world application; trusted security; fuzzy logic. File-URL: http://www.inderscience.com/link.php?id=92069 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:ids:ijnvor:v:18:y:2018:i:3:p:211-226 Template-Type: ReDIF-Article 1.0 Author-Name: Lobel Trong-Thuy Tran Author-X-Name-First: Lobel Trong-Thuy Author-X-Name-Last: Tran Author-Name: Wan-Tran Huang Author-X-Name-First: Wan-Tran Author-X-Name-Last: Huang Title: Does social networking ultimately sustain organisational performance? Abstract: This study examines how integrated social networking sites (SNSs) affect organisational management orientation (OMO) and assesses how this relationship can have an impact on managerial performance and organisational value. The researchers conducted a questionnaire and in-depth pilot interview to obtain the data with samples being selected from a developed economy (Taiwan) and an emerging economy (Thailand) with pretest. Non-respondent bias and common method variance were tested and the model was constructed by assessing reliability, extracting average variance, and testing discriminant validity. To test the proposed hypotheses, the researchers adopted PLS procedure. SNS integration appeared to strongly affect OMO, and managerial performance mediated the relationship between OMO and organisational value in both the developed and emerging economies. Interestingly, while no direct link could be established between OMO and organisational value in the developed economy, the researchers found that OMO appears to directly affect organisational value through managerial performance in the emerging economy. Journal: Int. J. of Networking and Virtual Organisations Pages: 227-245 Issue: 3 Volume: 18 Year: 2018 Keywords: social networking site integration; organisational management orientation; managerial performance; organisational value. File-URL: http://www.inderscience.com/link.php?id=92070 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:ids:ijnvor:v:18:y:2018:i:3:p:227-245 Template-Type: ReDIF-Article 1.0 Author-Name: Ali Mundeth Ahmed Author-X-Name-First: Ali Mundeth Author-X-Name-Last: Ahmed Author-Name: Erakkath Abdu Jasmin Author-X-Name-First: Erakkath Abdu Author-X-Name-Last: Jasmin Title: Adaptive modulation and interference cancellation techniques for MIMO-OFDM wireless networks Abstract: Multiple-input multiple-output antenna-orthogonal frequency division multiplexing (MIMO-OFDM) is one of the most wanted wireless broadband technology and transmission systems that has been accepted as the basis of fourth generation (4G) wireless communication is MIMO-OFDM. It is so flexible and adaptable to stay in power even in the coming up 5G technologies. The relative motion of the transmitter and receiver can bring alteration in the channel within the time period of an OFDM, hence OFDM causes loss of orthogonally between sub carrier which results in inter-carrier interference. In order to overcome these issues, an adaptive modulation and interference cancellation technique for MIMO-OFDM wireless network are proposed. Along with interference cancellation technique, adaptive modulation is used to meet the required BER performance by selecting suitable modulation modes based on the channel condition. Doppler assisted channel estimation method is used to estimate the channel. Also, inter channel/carrier interference (ICI) cancellation scheme is used to integrate the parallel interference cancellation together with the decision statistical combining (PIC-DSC) module to detect the data and transmit it to the estimator to iteratively refine the channel and give interference free channel. Simulation results shows that the proposed method improves the BER performance of the system. Journal: Int. J. of Networking and Virtual Organisations Pages: 246-264 Issue: 3 Volume: 18 Year: 2018 Keywords: multiple-input-multiple-output; MIMO; wireless network; adaptive modulation; orthogonal frequency division multiplexing; OFDM. File-URL: http://www.inderscience.com/link.php?id=92071 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:ids:ijnvor:v:18:y:2018:i:3:p:246-264 Template-Type: ReDIF-Article 1.0 Author-Name: Chaganti B.N. Lakshmi Author-X-Name-First: Chaganti B.N. Author-X-Name-Last: Lakshmi Author-Name: S. Krishna Mohan Rao Author-X-Name-First: S. Krishna Mohan Author-X-Name-Last: Rao Title: Ant-based self-healing routing for enhancing lifetime of wireless sensor networks Abstract: In self-healing routing (SHR), receivers autonomously decide whether to forward the packet using only knowledge of their hop distances of the destination but neither energy estimation nor residual battery power is analysed. Hence, failure may occur on the intermediate nodes causing the data loss in transmission. To overcome the disadvantages of SHR and enhance the lifetime of WSN, self-healing routing using ant colony optimisation (ACO) is proposed. In our proposed solution, the RREQ and RREP procedures are executed by the forward ant (FANT) and backward ant (BANT) respectively using ACO technique. Source node broadcast a FANT to the neighbouring nodes along the destination which collects the hop distance and residual energy of each node. The next hop is selected based on the probability of pheromone. On reaching the destination, a BANT is transmitted through the reverse path. The collected hop distance and residual energy of each node by the BANT is analysed at the source. By simulation results, we show that the ant-based self-healing routing reduces the delay and energy consumption while increasing the packet delivery ratio. Journal: Int. J. of Networking and Virtual Organisations Pages: 265-278 Issue: 4 Volume: 18 Year: 2018 Keywords: self-healing routing; SHR; ant colony optimisation; ACO; packet delivery ratio. File-URL: http://www.inderscience.com/link.php?id=93648 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:ids:ijnvor:v:18:y:2018:i:4:p:265-278 Template-Type: ReDIF-Article 1.0 Author-Name: Dongbo Liu Author-X-Name-First: Dongbo Author-X-Name-Last: Liu Author-Name: Yongjian Li Author-X-Name-First: Yongjian Author-X-Name-Last: Li Title: A novel virtual machine scheduling policy based on performance prediction model Abstract: In cloud platforms, virtual machine scheduling policy plays an important role for providing desirable service quality for users. In many existing scheduling policies, the task execution time is often assumed to be constant or defined by users. However, either unpredictable workload or resource unreliability may significantly affect task execution time, which in turn results in inefficient scheduling decisions. In this paper, we first present a task execution time model by applying queue theory; then we use this model to predict the performance of application at runtime and propose a novel virtual machine scheduling policy. By conducting extensive experiments, we investigate the effectiveness and efficiency of the proposed scheduling policy. The experimental results indicate that it can significantly reduce the response time of cloud application comparing with other existing scheduling policies. Journal: Int. J. of Networking and Virtual Organisations Pages: 279-293 Issue: 4 Volume: 18 Year: 2018 Keywords: virtual machine; performance prediction; scheduling algorithm; cloud. File-URL: http://www.inderscience.com/link.php?id=93649 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:ids:ijnvor:v:18:y:2018:i:4:p:279-293 Template-Type: ReDIF-Article 1.0 Author-Name: Tienan Zhang Author-X-Name-First: Tienan Author-X-Name-Last: Zhang Title: An accuracy-enhanced cost model for virtual machine migration Abstract: In cloud platforms, virtual machine migration has become an important service which enables cloud providers to apply various resource management policies. However, the cost of migrating a virtual machine still remains high even by using the most efficient migration algorithm. More importantly, many studies have indicated that improperly using migration service will lead to significantly performance degradation. In this paper, we present a cost model for quantitatively evaluate the cost of virtual machine migration with aiming at providing an accurate and effective approach to improving the efficiency of current migration service. The proposed model only relies on the information that can be easily obtained from the underlying virtualisation platform. To investigate the effectiveness and accuracy of the cost model, plenty of experiments are conducted by using various of standard benchmarks. The results show that it can significantly improve the accuracy comparing with existing models. Journal: Int. J. of Networking and Virtual Organisations Pages: 294-306 Issue: 4 Volume: 18 Year: 2018 Keywords: virtual machine; VM; live migration; cost model; benchmark. File-URL: http://www.inderscience.com/link.php?id=93650 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:ids:ijnvor:v:18:y:2018:i:4:p:294-306 Template-Type: ReDIF-Article 1.0 Author-Name: Peng Xiao Author-X-Name-First: Peng Author-X-Name-Last: Xiao Author-Name: Dongbo Liu Author-X-Name-First: Dongbo Author-X-Name-Last: Liu Author-Name: Kaijian Liang Author-X-Name-First: Kaijian Author-X-Name-Last: Liang Title: Improving scheduling efficiency by probabilistic execution time model in cloud environments Abstract: Recently, cloud computing has become a promising paradigm for various kinds of large-scale applications. Due to the unpredictable characteristics of resource availability and workload intensity, execution latency still drastically impairs the performances of cloud applications. In this paper, we model the execution latency by a probabilistic distribution and propose a general task execution model which can be used in most of scenarios. By using the proposed execution time model, cloud administrators can easily refine their resource management or implement some fine-grained task scheduling policies for cloud applications in various cases. Massive experiments are conducted in a real-world cloud platform, and the results indicate the proposed model can be used in many existing scheduling policies for improving the efficiency of task execution. Journal: Int. J. of Networking and Virtual Organisations Pages: 307-322 Issue: 4 Volume: 18 Year: 2018 Keywords: cloud computing; resource virtualisation; virtual machine; task scheduling. File-URL: http://www.inderscience.com/link.php?id=93651 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:ids:ijnvor:v:18:y:2018:i:4:p:307-322 Template-Type: ReDIF-Article 1.0 Author-Name: Tanu Goyal Author-X-Name-First: Tanu Author-X-Name-Last: Goyal Author-Name: Sakshi Kaushal Author-X-Name-First: Sakshi Author-X-Name-Last: Kaushal Author-Name: Arun Kumar Sangaiah Author-X-Name-First: Arun Kumar Author-X-Name-Last: Sangaiah Title: Fuzzy logic-based optimised algorithm for mobility robustness and load-balancing in LTE/4G networks Abstract: With the development of new mobile communication system, telecom operators require planning, installation, testing, pre-post optimisation, monitoring, evaluation and mitigation of failure of network. All these are complicated tasks and require number of workers costly in nature, error-insensitive, customers' dissatisfaction, etc. 3GPP Release 8 for LTE defined self-organising network (SON) to maximise efficiency in planning, deployment and maintenance by doing operations automatically. Industry has identified load balancing and handover optimisation as two keys for self organising mechanisms in a network. Although, most effort in literature have been made for single entity SON and coordinate SON. In this paper, an algorithm-based on joint optimisation has been proposed using fuzzy logic and partial observed Markov decision process (POMDP). This algorithm optimises the key performance indicators (KPI), i.e., call block rate (CBR), call drop rate (CDR) and handover ratio (HOR) that are related to load balancing and handover optimisation. The results are numerically analysed and the proposed algorithm improves overall network performance and hence users will get better quality of service (QoS). Journal: Int. J. of Networking and Virtual Organisations Pages: 323-337 Issue: 4 Volume: 18 Year: 2018 Keywords: joint optimisation; partial observed Markov decision process; POMDP; handover optimisation; LTE. File-URL: http://www.inderscience.com/link.php?id=93652 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:ids:ijnvor:v:18:y:2018:i:4:p:323-337 Template-Type: ReDIF-Article 1.0 Author-Name: B. Dhanalakshmi Author-X-Name-First: B. Author-X-Name-Last: Dhanalakshmi Author-Name: Arumugam Chandra Sekar Author-X-Name-First: Arumugam Chandra Author-X-Name-Last: Sekar Title: Optimal neural network to enhance classification accuracy for mining online reviews and opinions using improved PSO Abstract: While using rapid growth from World Wide Web, there is volatile improve in the user-produced subject matter such as purchaser evaluations, websites, discussion community forums, social networks and so forth In previous work, we have implemented opinion mining using three phase. They are: 1) data pre-processing; 2) opinion extraction; 3) opinion mining. In feature extraction, features, such as term frequency, part of speech (POS), syntax, negation and term-based features beyond term unigrams were extracted from the words in documents. In the final step, ranking and classification was done. In the present work, we will implement the same three phases as previous work but with different process in each of the following steps such as: 1) data reprocessing; 2) opinion extraction; 3) opinion mining. The second phase will be classified into two, i.e., feature extraction and opinion extraction. After feature extraction, we extract useful information related to item's features and use to rate them as positive, neutral, or negative. Journal: Int. J. of Networking and Virtual Organisations Pages: 338-356 Issue: 4 Volume: 18 Year: 2018 Keywords: artificial neural network; ANN; improved PSO algorithm; decision tree algorithm; opinion extraction; opinion mining. File-URL: http://www.inderscience.com/link.php?id=93653 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:ids:ijnvor:v:18:y:2018:i:4:p:338-356 Template-Type: ReDIF-Article 1.0 Author-Name: Trevor Clohessy Author-X-Name-First: Trevor Author-X-Name-Last: Clohessy Author-Name: Thomas Acton Author-X-Name-First: Thomas Author-X-Name-Last: Acton Author-Name: Lorraine Morgan Author-X-Name-First: Lorraine Author-X-Name-Last: Morgan Title: Contemporary digital business model decision making: a cloud computing supply-side perspective Abstract: Cloud computing is an example of a promising technological paradigm which possesses the potential to act as a catalyst to drive radical innovations in the development of the networked society. While some information and communication technology (ICT) providers have reaped the rewards by transitioning from antiquated hardware and service provision to more propitious cloud-based service provision methods, others have experienced substantial difficulties related to the formulation and operationalisation of effective business models. This paper presents a research framework which can serve as a lens for exploring how digital organisations can execute their core business model decisions along increasingly specific decision making levels. Taking the perspective of an exemplar established large ICT provider, our study uses the research framework in order to provide new insight for facilitating cloud computing supply-side business model effectiveness. Journal: Int. J. of Networking and Virtual Organisations Pages: 1-20 Issue: 1 Volume: 19 Year: 2018 Keywords: business model; decision making; cloud computing; ICT provider. File-URL: http://www.inderscience.com/link.php?id=93923 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:ids:ijnvor:v:19:y:2018:i:1:p:1-20 Template-Type: ReDIF-Article 1.0 Author-Name: Victoria Garwood Author-X-Name-First: Victoria Author-X-Name-Last: Garwood Author-Name: Damian Claydon-Platt Author-X-Name-First: Damian Author-X-Name-Last: Claydon-Platt Author-Name: Nilmini Wickramasinghe Author-X-Name-First: Nilmini Author-X-Name-Last: Wickramasinghe Author-Name: John Mackay Author-X-Name-First: John Author-X-Name-Last: Mackay Author-Name: Philip J. Smart Author-X-Name-First: Philip J. Author-X-Name-Last: Smart Title: Smart phones and surgeons: privacy and legal issues in Australian healthcare Abstract: Smartphone use is widespread and increasing in health with potential to revolutionise many aspects of care. We reviewed current Australian Government legislation as well as hospital, legal and industry body guidelines to clarify best practice and identify technological solutions that satisfy both patients and clinicians alike. Most health services surveyed did not have a policy that appropriately addressed smartphone use by clinicians. Where use was addressed, it was typically banned or allowed with incomplete guidelines non-compliant with legislation. There is an urgent need to develop policies that recognise the ubiquity of smartphone use in healthcare, yet protect patient privacy. Journal: Int. J. of Networking and Virtual Organisations Pages: 21-33 Issue: 1 Volume: 19 Year: 2018 Keywords: privacy; mobile applications; cell phones; photography; mobile health; Australia. File-URL: http://www.inderscience.com/link.php?id=93924 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:ids:ijnvor:v:19:y:2018:i:1:p:21-33 Template-Type: ReDIF-Article 1.0 Author-Name: Shanmuk Srinivas Amiripalli Author-X-Name-First: Shanmuk Srinivas Author-X-Name-Last: Amiripalli Author-Name: Veeramallu Bobba Author-X-Name-First: Veeramallu Author-X-Name-Last: Bobba Title: Research on network design and analysis of TGO topology Abstract: In defense and similar kind of areas, usually we come across situations where the whole strategy cannot be identified by all the levels of subordinates in the hierarchy but can be shared by a cluster of officials in the sector. We address this problem in our previous research and we introduced a new graph called TRIMET and discussed its properties and scope. TRIMET graph has large vary of applications in computers, electronics and military operations. We are extending our research work by converting TRIMET graph into a novel topology called TRIMET graph optimisation (TGO) followed by TGO-based network model. Finally, comparison of TGO with star topology was done in NS2 simulator and theoretical analysis of TGO topology was done with standard parameters of network sciences. Journal: Int. J. of Networking and Virtual Organisations Pages: 72-86 Issue: 1 Volume: 19 Year: 2018 Keywords: TRIMET; semi-complete graph; hierarchical model; random network model; BARABASI-ALBERT model; scale-free network model; topology; graph optimisation; network sciences; network analysis. File-URL: http://www.inderscience.com/link.php?id=93925 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:ids:ijnvor:v:19:y:2018:i:1:p:72-86 Template-Type: ReDIF-Article 1.0 Author-Name: Shweta Kaushik Author-X-Name-First: Shweta Author-X-Name-Last: Kaushik Author-Name: Charu Gandhi Author-X-Name-First: Charu Author-X-Name-Last: Gandhi Title: Cloud computing security: attacks, threats, risk and solutions Abstract: Cloud computing started a new promising era in the field of IT and provided a new direction for the efficient use of resources, within the least amount. It becomes a centre of attraction for many organisations, as it allows the users to store data and use the resources dynamically, according to their requirements, from any remote location. But, the biggest challenge is to prevent data from malicious attack. Security and privacy are thus, gaining important consideration. Many researchers addressed various security requirements such as confidentiality, integrity, authenticity etc. in their work, but it is difficult to understand that which security requirements are still lacking behind to investigate. In this paper, we discuss the various possible attacks, threats, risks and security concerns with the possible countermeasures that need to be understood related to the cloud. The current research also investigates that how different cloud frameworks are affected by which network attacks. Journal: Int. J. of Networking and Virtual Organisations Pages: 50-71 Issue: 1 Volume: 19 Year: 2018 Keywords: attacks; cloud computing; infrastructure as a service; IaaS; platform as a service; PaaS; risks; security; software as a service; SaaS; threats. File-URL: http://www.inderscience.com/link.php?id=93926 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:ids:ijnvor:v:19:y:2018:i:1:p:50-71 Template-Type: ReDIF-Article 1.0 Author-Name: Mohammad M. Alnabhan Author-X-Name-First: Mohammad M. Author-X-Name-Last: Alnabhan Title: Location-based clustering and collaborative filtering for mobile learning Abstract: This paper presents a new m-learning model described as location-based collaborative M-learning (LCM). This new model exploits location information of mobile users and implements two main operations; k-means for clustering mobile users, and location-based collaborative filtering (CF) to provide learning items recommendations to clustered users. A comprehensive evaluation methodology was utilised to validate the proposed model in terms of complexity, performance and learning items' recommendations quality. Results have confirmed successful implementation of the proposed LCM model during different mobile users' settings. It was shown that LCM structure efficiently reduces processing overload and time required for users' clustering and learning content authoring, and improves learning items recommendations' accuracy. Journal: Int. J. of Networking and Virtual Organisations Pages: 34-49 Issue: 1 Volume: 19 Year: 2018 Keywords: M-learning; location-based; collaborative filtering; CF; clustering; context. File-URL: http://www.inderscience.com/link.php?id=93927 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:ids:ijnvor:v:19:y:2018:i:1:p:34-49 Template-Type: ReDIF-Article 1.0 Author-Name: Changsong Liu Author-X-Name-First: Changsong Author-X-Name-Last: Liu Title: A multi-policy adaptive scheduling framework in virtual clouds Abstract: With the development of cloud computing technology, many cloudbased data centres are beginning to connect with each other aiming at building large-scale federated cloud platforms. In such a federated cloud platform, the efficiency and effectiveness of traditional schedulers will be significantly degraded due to the unpredictable resource availability and high networking latency. In this paper, we propose a multi-policy adaptive scheduling framework, which is capable of evaluating the scheduling scheme made by existing schedulers. In this way, the proposed scheduling framework can make full use of the advantages of existing scheduling policies and avoid their shortcomings, and therefore makes the final scheduling decisions more efficient and effectiveness. In addition, the proposed scheduling framework is designed as extensible component that can be easily extended by incorporating other scheduling policies. The prototype of this scheduling framework is tested in a real-world federated cloud platform. The experimental results show that it can significantly improve the quality-of-service for the underlying cloud infrastructures as well as cloud user's satisfactory. Journal: Int. J. of Networking and Virtual Organisations Pages: 87-102 Issue: 1 Volume: 19 Year: 2018 Keywords: task scheduling; virtual organisation; cloud computing; load balance. File-URL: http://www.inderscience.com/link.php?id=93929 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:ids:ijnvor:v:19:y:2018:i:1:p:87-102 Template-Type: ReDIF-Article 1.0 Author-Name: Gatete Marcel Author-X-Name-First: Gatete Author-X-Name-Last: Marcel Author-Name: A. Kovalan Author-X-Name-First: A. Author-X-Name-Last: Kovalan Title: A full-featured efficient clustering mechanism for improving QoS in MANETs Abstract: Due to the dynamicity of MANET's topology and its infrastructureless nature, various problems arise from those inherent properties which degrade the QoS. Those negative issues are the energy constraints, problems related to broadcasting, high node mobility, unpartitioned network, and various challenges faced during the path discovery, route selection, packet scheduling and packet transmission processes, and security issues. To find an efficient solution to all those problems, in this paper, we propose a robust algorithm; Full-featured secure routing clustering algorithm with energy-aware and scheduling capabilities for highly increasing QoS in MANET (FSR-CAES), an efficient clustering technique which is a combination of numerous algorithms, each one containing one of the previously mentioned problems. The simulation results are provided with the NS-2 simulator varying the number of nodes and the evaluating parameters namely the routing overhead, packet delivery ratio, normalised routing load, and the average end-to-end delay while comparing the performance of our proposed scheme with neighbour coverage-based probabilistic rebroadcast (NCPR), a routing protocol specialised in providing high QoS in MANETs as it is efficient in reducing the routing overhead in the network. The outcomes prove that our proposed scheme outperforms NCPR for all the studied scenarios for small, medium, and large MANETs. Journal: Int. J. of Networking and Virtual Organisations Pages: 105-132 Issue: 2/3/4 Volume: 19 Year: 2018 Keywords: mobile ad hoc networks; MANET; QoS; energy-aware; security; mobility; scheduling; clustering. File-URL: http://www.inderscience.com/link.php?id=95417 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:ids:ijnvor:v:19:y:2018:i:2/3/4:p:105-132 Template-Type: ReDIF-Article 1.0 Author-Name: Uwizeyimana Faustin Author-X-Name-First: Uwizeyimana Author-X-Name-Last: Faustin Author-Name: A. Kovalan Author-X-Name-First: A. Author-X-Name-Last: Kovalan Author-Name: Rajkumar Kannan Author-X-Name-First: Rajkumar Author-X-Name-Last: Kannan Title: ASD: emotions and behavioural-based interventions through social sensor networks Abstract: In India, nowadays one per 88 children is born with autism spectrum disorder (ASD) contrary to a ratio of one per 110 children few years back. In this paper, we propose a social sensor network for individuals with ASD to offer medical promotions as intervention and first aid. They should be in care and medical surveillances. We are monitoring enjoyment, frustration, boredom, and stress by using body-worn sensors and video streaming. This sensor collects the information from the human body and transmits it to their smart phones then to the external server. We introduce an algorithm named as spectrum clustering algorithm (SCA) which clusters people based on activities of the child. Communication is provided between the clusters of people by using context recommendation algorithm. We use prerogative response algorithm (PRA) for load balancing on server while processing the requests. Our processes are simulated using Omnet++ simulator and provide effective results. Journal: Int. J. of Networking and Virtual Organisations Pages: 133-152 Issue: 2/3/4 Volume: 19 Year: 2018 Keywords: social networks; sensor networks; load balancing; zone routing protocol; clustering; autism spectrum disorder; ASD. File-URL: http://www.inderscience.com/link.php?id=95418 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:ids:ijnvor:v:19:y:2018:i:2/3/4:p:133-152 Template-Type: ReDIF-Article 1.0 Author-Name: Zaid A. Abdulkader Author-X-Name-First: Zaid A. Author-X-Name-Last: Abdulkader Author-Name: Azizol Abdullah Author-X-Name-First: Azizol Author-X-Name-Last: Abdullah Author-Name: Mohd Taufik Abdullah Author-X-Name-First: Mohd Taufik Author-X-Name-Last: Abdullah Author-Name: Zuriati Ahmad Zukarnain Author-X-Name-First: Zuriati Ahmad Author-X-Name-Last: Zukarnain Title: Malicious node identification routing and protection mechanism for vehicular ad-hoc network against various attacks Abstract: Vehicular ad-hoc network (VANET) is a promising approach that provides safety measures and other application to the drivers on the vehicles. The focus of VANETs is to fulfil user's requirements on road side area which increases the safe and comfortable journey for users. It provides good communication like mobile ad-hoc network (MANET) when there is no intruders exist in the network. In VANET, communication depends on road safety such as emergency situation, vehicles tracking, messages monitoring and tracking of vehicles. But many attackers like black hole attack, wormhole attack and Sybil attack are more vulnerable to VANET. In order to provide efficient communication, we provide a malicious node identification routing mechanism which gives the valid route between two vehicles. To avoid several attacks, we introduce a protection mechanism that includes key management for preventing our network. Our proposed system provides efficient communication on VANET that focus on throughput, end-to-end delay, packet delivery ratio, detection rate and misdetection rate. Journal: Int. J. of Networking and Virtual Organisations Pages: 153-175 Issue: 2/3/4 Volume: 19 Year: 2018 Keywords: black hole attack; Sybil attack; wormhole attack; vehicular ad-hoc network; VANET; AODV routing; elliptical curve cryptography. File-URL: http://www.inderscience.com/link.php?id=95419 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:ids:ijnvor:v:19:y:2018:i:2/3/4:p:153-175 Template-Type: ReDIF-Article 1.0 Author-Name: J. Martin Sahayaraj Author-X-Name-First: J. Martin Author-X-Name-Last: Sahayaraj Author-Name: J.M. Ganaseakar Author-X-Name-First: J.M. Author-X-Name-Last: Ganaseakar Title: Relay node selection with energy efficient routing using hidden Markov model in wireless sensor networks Abstract: Wireless sensor based routing is a challenging issue in the context of convergecast routing. In order to counter these issues the relay nodes share the burden of forwarding in multi-hop routing. In this research to counter the effect energy efficient relay node routing (ERNR) algorithm is proposed. ERNR relay nodes are found among the group of member nodes based on the residual energy of the node using Voronoi cells. The selected relay nodes with two hop neighbours form virtual subsets of cluster. The cluster head is then used to allocate the TDMA time slots to its neighbours based on the Hidden Markov prediction model. The proposed technique is evaluated with existing relay node based routing schemes and the performance of the ERNR algorithm yields significant improvements while considering energy related metrics. Journal: Int. J. of Networking and Virtual Organisations Pages: 176-186 Issue: 2/3/4 Volume: 19 Year: 2018 Keywords: WSN; routing; Markov model; relay node; energy consumption. File-URL: http://www.inderscience.com/link.php?id=95420 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:ids:ijnvor:v:19:y:2018:i:2/3/4:p:176-186 Template-Type: ReDIF-Article 1.0 Author-Name: Govindarajan Saravanan Author-X-Name-First: Govindarajan Author-X-Name-Last: Saravanan Author-Name: M.J.S. Rangachar Author-X-Name-First: M.J.S. Author-X-Name-Last: Rangachar Title: Network lifetime estimation of wireless sensor networks using communication protocols with non-parametric models Abstract: In this research, the focus lies on estimating the network lifetime in wireless sensor networks with the aid of directional antenna. Two protocols are being proposed the (NLKM) network lifetime with Kaplan-Meier and (NLNPM) network lifetime with non-parametric model. In NLKM estimates where a control packet calculates all the sensor residual energy and decides whether to transmit or not based the residual energy. The directional antenna is used to avoid forwarding of packets in all direction and focus on the direction towards the destination and increasing its communication range based on dead nodes. In the second protocol NLNPM is similar to the operation where the residual energy is calculated with two thresholds dead and almost dead. This NLNPM-based protocol with censoring there by overcomes the limitation of empirical distribution of Kaplan-Meier analysis. Both protocols were simulated in ns2 simulator and compared for network lifetime. Journal: Int. J. of Networking and Virtual Organisations Pages: 187-195 Issue: 2/3/4 Volume: 19 Year: 2018 Keywords: wireless sensor nodes; network lifetime; non-parametric models. File-URL: http://www.inderscience.com/link.php?id=95421 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:ids:ijnvor:v:19:y:2018:i:2/3/4:p:187-195 Template-Type: ReDIF-Article 1.0 Author-Name: C. Padmavathy Author-X-Name-First: C. Author-X-Name-Last: Padmavathy Author-Name: L.S. Jayashree Author-X-Name-First: L.S. Author-X-Name-Last: Jayashree Author-Name: A. Rosario Author-X-Name-First: A. Author-X-Name-Last: Rosario Title: Combined vibration and RF harvester technique for energy management in sensor device Abstract: The main objective of this research work is to increase the energy efficiency in the wireless sensor network through the energy harvesting techniques. The proposed combined vibration and RF harvester (CVRH) technique can increase the energy efficiency and reduce the energy consumption. In WSN, sensor node has high energy consumption due to the process of sensing and transferring. From the physical environmental condition, vibration and RF energy will be collected from their respective ambient source. Vibration and RF energy are in the form of an electromagnetic wave and that will be converted into DC by using the bridge wave rectifier. And that DC current will be the supply of the battery of sensor node. During the sensing process, battery will be utilised by the sensor node and in the transmission process, the battery will be charged from the energy harvester. In experimental results, results have been analysed by using the parameters such as energy consumption, energy efficiency, and average power and drop rate. Journal: Int. J. of Networking and Virtual Organisations Pages: 196-208 Issue: 2/3/4 Volume: 19 Year: 2018 Keywords: energy harvesting; vibration energy; RF energy; WSN; energy efficiency; power consumption. File-URL: http://www.inderscience.com/link.php?id=95422 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:ids:ijnvor:v:19:y:2018:i:2/3/4:p:196-208 Template-Type: ReDIF-Article 1.0 Author-Name: P. Sanjeevi Author-X-Name-First: P. Author-X-Name-Last: Sanjeevi Author-Name: P. Viswanathan Author-X-Name-First: P. Author-X-Name-Last: Viswanathan Title: DTCF: deadline task consolidation first for energy minimisation in cloud data centres Abstract: The consumption of energy is a vital issue in the cloud, when more precisely administering a large-scale data centre. The cloud data centre accommodating more hosts consume an extent of energy for computation which increases the consumption of energy. To handle this issue, we propose a heuristics energy-efficient workload consolidation with deadline constraint to optimise energy in cloud data centre. The deadline task consolidation first algorithm ranks hosts for creating virtual machines (VMs) and validates the processing time of VMs and places the VM considering deadline of tasks, VMs can be placed in an increasing order of their respective processing time. Then, the decision for migrating VMs to other hosts is evaluated using Markov decision model. Through this process, for specific virtual machine necessities of workloads, we can reduce the number of hosts. The proposed algorithm is simulated in Cloudsim shows that it improves the workload consolidation quality, and is appropriate for deadline task consolidation in cloud data centre. Journal: Int. J. of Networking and Virtual Organisations Pages: 209-233 Issue: 2/3/4 Volume: 19 Year: 2018 Keywords: cloud data centres; consolidation; energy efficiency; deadline; virtual machine. File-URL: http://www.inderscience.com/link.php?id=95423 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:ids:ijnvor:v:19:y:2018:i:2/3/4:p:209-233 Template-Type: ReDIF-Article 1.0 Author-Name: Saira Banu Author-X-Name-First: Saira Author-X-Name-Last: Banu Author-Name: K.M. Mehata Author-X-Name-First: K.M. Author-X-Name-Last: Mehata Title: SIP-based VoIP anomaly detection engine using DTV and ONR Abstract: VoIP has gained more attention in recent years due to its advantage of cheap calls when compared to the existing PSTN network. The callers such as the advertiser, telemarketers, prank callers who make use of this VoIP for generating the anomaly calls and messages are characterised as SPIT. The previous work detects the spam caller after getting the feedback from the callee. The proposed technique detects the anomaly in the call pattern without user involvement, i.e., the pre-acceptance method. This SIP-based approach relies on DTV and ONR of the caller to detect the anomaly calls and block the spammer. The parameter call duration, call count with frequency and the unique partner of the caller are used to compute the direct trust value of VoIP user. The ONR depicts the user behaviour in the digital shopping. The online shopping behaviour of the sender insists on the ONR value. The aggregation algorithm uses the DTV and ONR to measure the global reputation of the caller. This calculated global reputation value detects the anomalies and segregate the non-legitimate user during call setup using the session initiation protocol. The proposed system detects the spammer without analysing the content, without getting feedback from the user and before connecting the call. Journal: Int. J. of Networking and Virtual Organisations Pages: 234-256 Issue: 2/3/4 Volume: 19 Year: 2018 Keywords: voice over internet protocol; VoIP; spam over internet telephony; SPIT; direct trust value; DTV; online network reputation; ONR; aggregate; online shopping; global reputation. File-URL: http://www.inderscience.com/link.php?id=95424 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:ids:ijnvor:v:19:y:2018:i:2/3/4:p:234-256 Template-Type: ReDIF-Article 1.0 Author-Name: B.P. Sreejith Vignesh Author-X-Name-First: B.P. Sreejith Author-X-Name-Last: Vignesh Author-Name: M. Rajesh Babu Author-X-Name-First: M. Rajesh Author-X-Name-Last: Babu Title: Classifying the malware application in the Android-based smart phones using ensemble-ANFIS algorithm Abstract: Nowadays, the Android-based smartphones are fastest gaining in the market to date. Due to its open architecture and ease of application programming interfaces (APIs), it becomes fertile dregs for hackers to deploy malware application. This result in the burglary of personal information those are stored in smartphones, without the user knowledge unauthorised sends unintentional short message, and if the infected smart phones operate remotely it leads ways to some other malware attacks. However, many defence mechanisms were introduced against Android malware; it results in inaccuracy of classification. The contribution of this paper to detect and classify the malwares in the manifest file based on ensemble adaptive neuro-fuzzy inference system (ANFIS) technique. This proposed system is divided into three main steps to detect the malware applications they are: 1) features are extraction using the method called principal component analysis (PCA) method; 2) feature selection, using Pearson correlation coefficient (PCC) method; 3) malware applications are classified, using ensemble of ANFIS technique. The proposed system produced the best detecting malware applications classification and accuracy will be highly efficient than the other classification techniques. Journal: Int. J. of Networking and Virtual Organisations Pages: 257-269 Issue: 2/3/4 Volume: 19 Year: 2018 Keywords: Android; malware application; Pearson correlation coefficient; PCC; principal component analysis; PCA; adaptive neuro-fuzzy inference system; ANFIS. File-URL: http://www.inderscience.com/link.php?id=95425 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:ids:ijnvor:v:19:y:2018:i:2/3/4:p:257-269 Template-Type: ReDIF-Article 1.0 Author-Name: Munir Kolapo Yahya-Imam Author-X-Name-First: Munir Kolapo Author-X-Name-Last: Yahya-Imam Author-Name: Sellappan Palaniappan Author-X-Name-First: Sellappan Author-X-Name-Last: Palaniappan Author-Name: Seyed Mohammadreza Ghadiri Author-X-Name-First: Seyed Mohammadreza Author-X-Name-Last: Ghadiri Title: Hybrid model for enhancement of passenger information management system Abstract: The current booking models (systems) used by interstate bus transport service providers (operators) in Nigeria have two major drawbacks: 1) poor management of traveller information; 2) high operating costs. Although attempts have been made to address these issues, the models are far from satisfactory. The booking (and reservation) processes are still cumbersome and time consuming. Thus, there is an urgent need for an enhanced booking model. This paper presents an improved model using Dijkstra algorithm (DA) and demand responsive transport (DRT) technique. The model has three components: services, techniques and service providers. A purposive and selective sampling technique was used to gather data from 20 interstate bus transport operators and analysis of the data confirmed the need for such an improved booking model. Journal: Int. J. of Networking and Virtual Organisations Pages: 270-288 Issue: 2/3/4 Volume: 19 Year: 2018 Keywords: demand responsive transport; DRT; Dijkstra; heuristic; booking; reservation; bus transport. File-URL: http://www.inderscience.com/link.php?id=95426 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:ids:ijnvor:v:19:y:2018:i:2/3/4:p:270-288 Template-Type: ReDIF-Article 1.0 Author-Name: M. Savithri Author-X-Name-First: M. Author-X-Name-Last: Savithri Author-Name: M. Rajesh Babu Author-X-Name-First: M. Rajesh Author-X-Name-Last: Babu Title: Energy-based efficient authenticated routing protocol for MANETs for DDOS attacks with minimised power consumption Abstract: In MANET, reliable and secure communication is the most challenging task. Mobile ad hoc network (MANET) is characterised by mobile hosts, dynamic topology, multi-hop wireless connectivity and infrastructure less ad hoc environment. Limited resource availability such as battery power and security are the major issues to be handled with mobile ad hoc networks. An attacker can easily disrupt the functioning of the network by attacking the underlying routing protocol. Hence, security in ad hoc networks is still a debatable area. In this paper, we have proposed energy-based efficient authenticated routing protocol (EBEARP) for mobile ad hoc networks. Our protocol provides efficient security against route discovery attacks using hop-by-hop signatures. It quickly detects the malicious nodes, thus assisting the nodes to drop the invalid packets, earlier. It also uses an efficient node selection mechanism, which maximises network life time and minimises power consumption. With the help of detailed simulation studies, we show that EBEARP provides better packet delivery ratio with minimised energy. Journal: Int. J. of Networking and Virtual Organisations Pages: 289-304 Issue: 2/3/4 Volume: 19 Year: 2018 Keywords: energy-based efficient authenticated routing protocol; EBEARP; mobile ad hoc network; MANET; secure communication. File-URL: http://www.inderscience.com/link.php?id=95427 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:ids:ijnvor:v:19:y:2018:i:2/3/4:p:289-304 Template-Type: ReDIF-Article 1.0 Author-Name: K.R. Remesh Babu Author-X-Name-First: K.R. Remesh Author-X-Name-Last: Babu Author-Name: Philip Samuel Author-X-Name-First: Philip Author-X-Name-Last: Samuel Title: Energy aware clustered load balancing in cloud computing environment Abstract: Cloud is a collection of datacentres with heterogeneous resources, which gives services to the users based on pay-as-you-use model. Even though it has several advantages such as availability, scalability, and reliability, some performance parameters like energy consumption, load balancing, response time, resource allocation time, etc., are not properly fine tuned. This paper proposes an energy aware clustered load balancing system in which, heterogeneous resources are clustered into different groups by using a partitioning-based clustering algorithm. The clustering reduces number of resources needs to be searched and hence minimizes the time required for resource discovery. An energy aware best-fit virtual machine (VM) allocation is used for reducing the power consumption. The process allocations to VMs are done based on best-fit allocation strategy for optimal space utilisation. The results show that proposed method reduces time for resource discovery, resource allocation and response time with power consumption. Journal: Int. J. of Networking and Virtual Organisations Pages: 305-320 Issue: 2/3/4 Volume: 19 Year: 2018 Keywords: cloud computing; VM scheduling; best-fit algorithm; energy consumption; load balancing; resource allocation. File-URL: http://www.inderscience.com/link.php?id=95428 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:ids:ijnvor:v:19:y:2018:i:2/3/4:p:305-320 Template-Type: ReDIF-Article 1.0 Author-Name: R. Priyadarshini Author-X-Name-First: R. Author-X-Name-Last: Priyadarshini Author-Name: Latha Tamilselvan Author-X-Name-First: Latha Author-X-Name-Last: Tamilselvan Title: Semantic clustering approach for documents in distributed system framework with multi-node setup Abstract: Today's era is rather called big data era, data starts growing from different sources of web and such scalable data is very hard to manage with the existing frameworks and technologies. Wikipedia is a content management system where the article posted has a number of source documents. Perhaps, it is very difficult to search an exact relevant document for selected content in Wikipedia article as it has too many sources such as primary, secondary and tertiary. In order to search and retrieve relevant document in the growing content and references, clustering of documents using similarity analysis is very much essential. The existing system offers a clustering technique based on term and inverse term frequency (TfDf) scoring method. This work proposes a new clustering method for distributed framework called semantic agglomerative hierarchical (SHA) clustering algorithm. The performance testing, evaluation is implemented in multinode environment. The metrics such as recall and precision are calculated. Journal: Int. J. of Networking and Virtual Organisations Pages: 321-340 Issue: 2/3/4 Volume: 19 Year: 2018 Keywords: clustering; multi-node setup; Hadoop; semantic retrieval; similar documents; networking of nodes. File-URL: http://www.inderscience.com/link.php?id=95429 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:ids:ijnvor:v:19:y:2018:i:2/3/4:p:321-340 Template-Type: ReDIF-Article 1.0 Author-Name: Chengtao Cao Author-X-Name-First: Chengtao Author-X-Name-Last: Cao Title: Research on the intellectual traffic flow control system based on multi-agent along with self-governing vehicle and system of wireless sensor network Abstract: The manuscript proposes a novel way to deal with progressively deal with the movement lights cycles and stages in a secluded crossing point. The objective of the work is a framework that offers enhanced execution is adaptable and can be actualized on not well designed components. The proposed framework joins the upsides of the wireless sensor network with the advantages of utilizing quad parallel fuzzy regulators, at is improved execution, adaptation to non-critical failure, and backing for stage particular administration. Reproduction results demonstrate that the proposed framework beats different arrangements in the writing, altogether sinking vehicles holding up times. With a specific end goal to depict the usage process instinctively and framework administration are quickly acquainted and connected with the execution of a self-governing driving framework. We can inspect the upsides of conveyed framework design and the proposed advancement process by directing a contextual investigation on the self-governing framework execution. Journal: Int. J. of Networking and Virtual Organisations Pages: 341-356 Issue: 2/3/4 Volume: 19 Year: 2018 Keywords: road traffic; traffic flow control; self-governing vehicle; development process; distributed system; acuity; scheduling. File-URL: http://www.inderscience.com/link.php?id=95430 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:ids:ijnvor:v:19:y:2018:i:2/3/4:p:341-356 Template-Type: ReDIF-Article 1.0 Author-Name: Jie Li Author-X-Name-First: Jie Author-X-Name-Last: Li Author-Name: Ning Sun Author-X-Name-First: Ning Author-X-Name-Last: Sun Author-Name: Jianlong Zhang Author-X-Name-First: Jianlong Author-X-Name-Last: Zhang Title: A novel framework for very high resolution remote sensing image change detection Abstract: This paper proposes a novel framework for very high resolution remote sensing image change detection. The change detection technology is the goals or the phenomenon conditions of different time interval to the change that have analysed the recognition and computer image processing system, including judgement goal whether changes, to determine changes the region and the time and spatial distribution of pattern category and appraisal change of distinction change. Over the past few years, researchers from all over the world have devoted themselves to the research of change detection technology. Many detection methods based on remote sensing images have been developed successively. However, no change detection method has absolute superiority in present research. This paper obtains the inspiration from PSO and OTSU to propose the particle swarm optimisation segmentation jointed model to construct the optimal solution of generating change map and the PSO jointed OTSU is introduced to help obtain the optimal threshold. Numerical simulation proves that the proposed method can segment the changed regions accurately while keeping the high noise robustness. Journal: Int. J. of Networking and Virtual Organisations Pages: 357-372 Issue: 2/3/4 Volume: 19 Year: 2018 Keywords: very high resolution; VHR; remote sensing; wireless sensing; PSO; OTSU; change detection. File-URL: http://www.inderscience.com/link.php?id=95431 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:ids:ijnvor:v:19:y:2018:i:2/3/4:p:357-372 Template-Type: ReDIF-Article 1.0 Author-Name: B. Suseela Author-X-Name-First: B. Author-X-Name-Last: Suseela Author-Name: D. Sivakumar Author-X-Name-First: D. Author-X-Name-Last: Sivakumar Title: Certain investigations on effective rate adaptation in cognitive radio with channel characteristics Abstract: The role of cognitive radio is finding the unused spectrum and providing effective transmission. This has been investigated with the concept of multi-user multi-channel capability in terms of protocols in this work. The problem of lack of synchronisation among user leads to ineffective transmission among secondary users. This is much worse in the case of fading channel. So two protocol one based on multi user multi channel particle swarm optimisation-based cognitive radio (MUMC-PSO-CR) were the rate adaptation has been done with particle swarm optimisation technique and other multi user multi channel tree seed algorithm cognitive radio (MUMC-TSA-CR) were rate adaptation has been done with tree seed algorithm. MUMC-TSA-CR protocol implements a simple statistical analysis for the criteria of forwarding without congestion. Journal: Int. J. of Networking and Virtual Organisations Pages: 373-384 Issue: 2/3/4 Volume: 19 Year: 2018 Keywords: rate adaptation; congestion avoidance; effective transmission. File-URL: http://www.inderscience.com/link.php?id=95432 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:ids:ijnvor:v:19:y:2018:i:2/3/4:p:373-384 Template-Type: ReDIF-Article 1.0 Author-Name: J. Vijitha Ananthi Author-X-Name-First: J. Vijitha Author-X-Name-Last: Ananthi Author-Name: H. James Deva Koresh Author-X-Name-First: H. James Deva Author-X-Name-Last: Koresh Author-Name: S. Vengatesan Author-X-Name-First: S. Author-X-Name-Last: Vengatesan Author-Name: Y. Blessina Anet Glorita Author-X-Name-First: Y. Blessina Anet Author-X-Name-Last: Glorita Title: A secure communication over wireless sensor devices using intelligent arrival estimation algorithm Abstract: The major challenge in wireless sensor network is used to maintain the successful and secure communication between two different devices with lifetime enhancement. Without security communication, sensor network will spoil the overall network resources. To avoid such type of an issue, we proposed a new enhancement scheme called 'intelligent arrival estimation (IAE)', by using this scheme nodes can be successfully performing the communication from one region to the other region without any interruption. We introduced cluster head and global cluster head in sensor network, which cluster head is responsible for carry over the communication between different regions and global cluster heads. Global cluster will act as gateway between the different regions as well as which is used to maintain the node details present in different cluster regions. Journal: Int. J. of Networking and Virtual Organisations Pages: 385-394 Issue: 2/3/4 Volume: 19 Year: 2018 Keywords: cluster head; node-id; access point; global cluster head; intelligent arrival estimation; IAE. File-URL: http://www.inderscience.com/link.php?id=95448 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:ids:ijnvor:v:19:y:2018:i:2/3/4:p:385-394