Template-Type: ReDIF-Article 1.0 Author-Name: Haijun Tian Author-X-Name-First: Haijun Author-X-Name-Last: Tian Author-Name: Yunlong Zhou Author-X-Name-First: Yunlong Author-X-Name-Last: Zhou Author-Name: Ting Yang Author-X-Name-First: Ting Author-X-Name-Last: Yang Author-Name: Yanghui Zhao Author-X-Name-First: Yanghui Author-X-Name-Last: Zhao Title: The measurement of gas solid two-phase flow parameters based on electrical capacitance tomography technology Abstract: In order to realise visualisation measurement of gas-solid two-phase flow parameters, a gas-solid two-phase flow test-bed was developed. Polypropylene particles select as the solid phase, the air select as the gas phase. Solid phase rely on their own gravity flow through experimental device. M3C capacitance tomography device of ITS Company is used for test and research solid phase concentration, speed, mass flow rate about gas-solid two-phase flow parameters. Concentration measurement is based on the dielectric constant distribution of the pixels about image. Capacitive sensor was used to measure velocity with double layer structure. The relevant principles of measurement speed were used to compute the correlation of downstream sensor imaging pixel. Finally, his mass flow was calculated by the measured velocity and concentration distributions. The mass flow measurements were compared with the results of gravity sensor, and the results showed good agreement, measurement error was less than 10%. The experimental results show that the capacitance tomography system can be used to measure gas-solid two-phase flow parameters. Journal: Int. J. of Networking and Virtual Organisations Pages: 1-13 Issue: 1 Volume: 20 Year: 2019 Keywords: image; two-phase flow; solid concentration; concentration; volume flow; mass flow. File-URL: http://www.inderscience.com/link.php?id=96603 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:ids:ijnvor:v:20:y:2019:i:1:p:1-13 Template-Type: ReDIF-Article 1.0 Author-Name: Chunyu Yang Author-X-Name-First: Chunyu Author-X-Name-Last: Yang Title: Prediction in mobile ad hoc network based on fuzzy time series Abstract: Several parameters like routing protocol, mobility pattern, average speed of mobile nodes, path length from source to destination, previous delay, etc., affect the end-to-end packet delay in mobile ad hoc network. But the nature of relationship between end-to-end delay and those parameters is still unclear. The end-to-end delay can be represented as a fuzzy time series. In this paper, a new method to forecast the end-to-end delay is presented. The method fully capitalises on the two key technologies, automatic clustering and automatically generated weights, to handle the forecasting problems. First, the automatic clustering algorithm is utilised to generate clustering-based intervals. Then, the variation magnitudes of adjacent historical data are used to generate fuzzy variation groups. Third, the final forecasted variation can be obtained by the weights of the fuzzy variation. Finally, the phase of forecasting is performed. Based on performance evaluation criterion, we found that the predicted value of the proposed method gives satisfactory packed delay prediction in ad hoc network. Journal: Int. J. of Networking and Virtual Organisations Pages: 44-52 Issue: 1 Volume: 20 Year: 2019 Keywords: ad hoc network; fuzzy time series; fuzzy forecasting; automatic clustering. File-URL: http://www.inderscience.com/link.php?id=96605 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:ids:ijnvor:v:20:y:2019:i:1:p:44-52 Template-Type: ReDIF-Article 1.0 Author-Name: V. Rekha Author-X-Name-First: V. Author-X-Name-Last: Rekha Author-Name: M. Indiramma Author-X-Name-First: M. Author-X-Name-Last: Indiramma Title: Priority-based bandwidth allocation and load balancing for multipath IP networks Abstract: Frequent route failures are common in a multipath internet protocol (IP) network. Backup configuration is one of the techniques used to re-establish alternate path in case of route failure. The existing multi route configurations (MRC) for fast IP network does not address quality of service (QoS) issues such as bandwidth optimisation and load balancing with traffic shaping. There is a need to focus on priority-based routing and load balancing during congestion in multipath networks. In this paper, we are proposing a priority-based bandwidth allocation and load balancing (PBALB) approach for multipath routing. In order to reduce packet drop and to enhance fairness, throughput and lower delay transmissions, traffic shaping based on different type of traffic flows in differential service domain is proposed. Experimental result shows that the proposed PBALB technique improves the throughput compared to MRC. Journal: Int. J. of Networking and Virtual Organisations Pages: 53-72 Issue: 1 Volume: 20 Year: 2019 Keywords: IP; QoS; bandwidth optimisation; compression; load balancing; fairness; priority; scheduling. File-URL: http://www.inderscience.com/link.php?id=96606 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:ids:ijnvor:v:20:y:2019:i:1:p:53-72 Template-Type: ReDIF-Article 1.0 Author-Name: Voruganti Hindumathi Author-X-Name-First: Voruganti Author-X-Name-Last: Hindumathi Author-Name: Katta Rama Linga Reddy Author-X-Name-First: Katta Rama Linga Author-X-Name-Last: Reddy Title: Adaptive priority-based fair-resource allocation for MIMO-OFDM multicast networks Abstract: In MIMO-OFDM multicast networks, sub-carrier allocation for real-time and non-real time users is complex due to delay and throughput issues. In order to overcome these issues, in this paper, we propose to develop a priority-based fair-radio resource allocation for MIMO-OFDMA-based multicast system. Initially, the multicast groups are classified as RT, NRT and BE. Then priorities are assigned for the groups based on the QoS requirements such as delay tolerance, packet dropping rate and transmission rate. When the priority value of a group is greater than the priority threshold, then the resource is allocated to the relevant group as per fair resource allocation technique. Overall this technique improves the sub-carrier allocation for real-time and non-real time users in terms of spectral efficiency and fairness. By simulation results, we show that the proposed technique enhances the average throughput, spectral efficiency, sub-carrier distribution for each class of users. Journal: Int. J. of Networking and Virtual Organisations Pages: 73-89 Issue: 1 Volume: 20 Year: 2019 Keywords: MIMO-OFDM multicast networks; quality-of-service; QoS; 4G wireless communication; resource allocation. File-URL: http://www.inderscience.com/link.php?id=96609 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:ids:ijnvor:v:20:y:2019:i:1:p:73-89 Template-Type: ReDIF-Article 1.0 Author-Name: Fei Wang Author-X-Name-First: Fei Author-X-Name-Last: Wang Author-Name: Jing Zhao Author-X-Name-First: Jing Author-X-Name-Last: Zhao Author-Name: LeWei Hu Author-X-Name-First: LeWei Author-X-Name-Last: Hu Title: IT-enabled inter-organisational relationships and collaborative innovation: integration of IT design and relationships governance Abstract: Firms developing collaborative innovation from IT-enabled inter-organisational relationships (IORs) are faced with both technological and relational challenges. Drawing on knowledge-based view, this paper first proposes a model to integrate IT design with relationships governance, then investigates and compares the technological and relational antecedents of collaborative innovation for focal firms in IT-enabled IORs, and finally explores the competitive performance impact of collaborative innovation. The research model is evaluated with data collected from 191 Chinese firms that digitally collaborate with their distributors. The findings suggest that digital platforms capability and two governance mechanisms (i.e., contractual governance and relational governance) work together to influence collaborative innovation, which in turn enables focal firms to obtain competitive performance. This study provides theoretical and practical implications for collaborative innovation literature by discovering the different impacts of IT design and governance mechanisms on collaborative innovation in the context of IT-enabled IORs. Journal: Int. J. of Networking and Virtual Organisations Pages: 14-34 Issue: 1 Volume: 20 Year: 2019 Keywords: collaborative innovation; inter-organisational relationships; IORs; IT design; relationships governance. File-URL: http://www.inderscience.com/link.php?id=96610 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:ids:ijnvor:v:20:y:2019:i:1:p:14-34 Template-Type: ReDIF-Article 1.0 Author-Name: Hongxia Li Author-X-Name-First: Hongxia Author-X-Name-Last: Li Title: Construction of distance teaching platform based on mobile communication technology Abstract: With the development and application of mobile communication technology, people have higher requirements for the transmission and reception of information, and this brings opportunities for distance learning. In view of this, this article has carried on the research to the long-distance teaching platform construction based on the mobile communication technology. First of all, this paper briefly introduces the application type of mobile communication technology in distance education; and then, this paper explores the framework and function of distance learning platform based on mobile communication technology, and gives the specific platform system framework and function modules of figure; finally, the main functions of the distance learning platform based on mobile communication technology are implemented and tested in this paper. The results of this paper show that the system can meet the design requirements, and can achieve distance learning and mobile learning. At the same time, the distance education institutions can transfer more learning resources to learners at a higher speed. The distance teaching platform based on mobile communication technology has a good application prospect, and the platform can exchange information with the traditional campus network to realise the data sharing. Journal: Int. J. of Networking and Virtual Organisations Pages: 35-43 Issue: 1 Volume: 20 Year: 2019 Keywords: mobile communication technologies; distance learning platform; data sharing. File-URL: http://www.inderscience.com/link.php?id=96612 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:ids:ijnvor:v:20:y:2019:i:1:p:35-43 Template-Type: ReDIF-Article 1.0 Author-Name: Peng Xiao Author-X-Name-First: Peng Author-X-Name-Last: Xiao Author-Name: Tienan Zhang Author-X-Name-First: Tienan Author-X-Name-Last: Zhang Title: A novel replication scheme based on prediction technology in virtual P2P storage platform Abstract: Recently, peer-to-peer (P2P) platforms have emerged as promising virtual storage platforms in many areas. However, most of P2P storage platforms are facing the challenging that how to maintain the data availability in such a volunteer-participating environments. In this paper, we present a novel technique which can figure out the probability of peer's failure during a given period. Based on this technique, we are enabled to evaluate the failure probability of any groups of peers so as to estimate the optimal number of replicas that can achieve better trade-offs between performance and data availability in P2P platforms. In this way, the storage platform can improve the resource utilisation without losing data availability. Extensive experiments in a real-world P2P platform indicate that the proposed replication scheme is effective to improving the data availability. In addition, it also exhibits better adaptive when the P2P platform is working in volunteering computing paradigm. Journal: Int. J. of Networking and Virtual Organisations Pages: 90-103 Issue: 1 Volume: 20 Year: 2019 Keywords: peer-to-peer; P2P; data availability; quality of service; QoS; replication scheme. File-URL: http://www.inderscience.com/link.php?id=96615 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:ids:ijnvor:v:20:y:2019:i:1:p:90-103 Template-Type: ReDIF-Article 1.0 Author-Name: Tatiana Ermakova Author-X-Name-First: Tatiana Author-X-Name-Last: Ermakova Author-Name: Anke Hohensee Author-X-Name-First: Anke Author-X-Name-Last: Hohensee Author-Name: Ines Orlamünde Author-X-Name-First: Ines Author-X-Name-Last: Orlamünde Author-Name: Benjamin Fabian Author-X-Name-First: Benjamin Author-X-Name-Last: Fabian Title: Privacy-invading mechanisms in e-commerce - a case study on German tourism websites Abstract: Against the importance of online privacy, this paper investigates German tourism websites previously shown as actively adopting mail tracking technology. For a sample of 50 highly visited websites, we analyse the quantity and type of data both mandatory and optional for registration. We further examine the extent to which personal data is collected in the background. Finally, we explore whether this practice can be associated with visibility of a privacy policy and other website design elements. Our results show an average of 24 contacted third-party websites, 42 generated cookies and 15 active trackers. Websites with visible general terms and conditions and privacy policies are connected with a significantly higher number of third-party services. Websites inviting users to follow them on Twitter contact significantly more third-party services and store significantly more cookies. There are high correlations of over 0.7 between the numbers of contacted third-party services, generated cookies and activated trackers. Journal: Int. J. of Networking and Virtual Organisations Pages: 105-126 Issue: 2 Volume: 20 Year: 2019 Keywords: e-commerce; privacy; web tracking; personal data; data collection; Germany. File-URL: http://www.inderscience.com/link.php?id=97629 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:ids:ijnvor:v:20:y:2019:i:2:p:105-126 Template-Type: ReDIF-Article 1.0 Author-Name: Katha Kishor Kumar Author-X-Name-First: Katha Kishor Author-X-Name-Last: Kumar Author-Name: Suresh Pabboju Author-X-Name-First: Suresh Author-X-Name-Last: Pabboju Title: An efficient adaptive genetic algorithm technique to improve the neural network performance with aid of adaptive GA operators Abstract: The neural network (NN) performance improvement is one of the major topics. Thus an adaptive genetic algorithm (AGA) technique is proposed by making adaptive with respect to genetic operators like crossover and mutation. Our adaptive GA technique starts with the generation of initial population as same as the normal GA and performs the fitness calculation for each individual generated chromosome. After that, the genetic operator's crossover and mutation will be performed on the best chromosomes. The AGA technique will be utilised in the NN performance improvement process. The AGA will utilise some parameters obtained from the NN by back propagation algorithm. The utilisation of NN parameters by AGA will improve the NN performance. Hence, the NN performance can be improved more effectively by achieving high performance ratio than the conventional GA with NN. The technique will be implemented in the working platform of MATLAB and the results will be analysed to demonstrate the performance of the proposed AGA. Journal: Int. J. of Networking and Virtual Organisations Pages: 127-142 Issue: 2 Volume: 20 Year: 2019 Keywords: adaptive genetic algorithm; AGA; genetic algorithm; GA; back propagation algorithm; BPA; artificial neural network; ANN; crossover and mutation. File-URL: http://www.inderscience.com/link.php?id=97630 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:ids:ijnvor:v:20:y:2019:i:2:p:127-142 Template-Type: ReDIF-Article 1.0 Author-Name: Eliza H.A. Gomes Author-X-Name-First: Eliza H.A. Author-X-Name-Last: Gomes Author-Name: Patrícia D.M. Plentz Author-X-Name-First: Patrícia D.M. Author-X-Name-Last: Plentz Author-Name: Carlos R. De Rolt Author-X-Name-First: Carlos R. De Author-X-Name-Last: Rolt Author-Name: Mario A.R. Dantas Author-X-Name-First: Mario A.R. Author-X-Name-Last: Dantas Title: A survey on data stream, big data and real-time Abstract: Real-time concept is being widely used by a society that seeks to speed communications, decisions and their daily activities. Even though this term is not used with the necessary conceptual precision, it makes clear the importance that time exerts on computer systems. Nowadays, the big data scenario, this concept is important and used with different meanings, which can define failure or successful of applications. This article aims to present a systematic literature review on the topics of data stream, big data and real-time. For this, we developed a protocol revision in which were determined research questions, the search term, the search source and the inclusion and exclusion criteria of articles. After an extensive study, we classify the articles selected in seven categories according to real-time concept used. Finally, we present a discussion that shows that there is not convergence on real-time concepts in the big data literature. Journal: Int. J. of Networking and Virtual Organisations Pages: 143-167 Issue: 2 Volume: 20 Year: 2019 Keywords: real-time; big data; data stream; stream processing; big data stream tools; time constraint. File-URL: http://www.inderscience.com/link.php?id=97631 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:ids:ijnvor:v:20:y:2019:i:2:p:143-167 Template-Type: ReDIF-Article 1.0 Author-Name: Dongbo Liu Author-X-Name-First: Dongbo Author-X-Name-Last: Liu Author-Name: Yongjian Li Author-X-Name-First: Yongjian Author-X-Name-Last: Li Title: An adaptive redundant reservation admission in virtual cloud environment Abstract: In cloud platforms, resource reservation service is an effective approach to providing desirable quality of service (QoS) for user applications. However, conventional reservation service might result in lower resource utilisation and higher rejection rate if it is excessively applied. In this paper, we proposed an adaptive redundant reservation strategy, which uses overlapping technique to implement reservation admission and enable resource providers dynamically determine the best redundant degree at runtime. By overlapping a new reservation with an existing one, a request whose reservation requirements can not be satisfied in a traditional way might be accepted. Also, by dynamically determining the best redundant degree, the proposed strategy can obtain optimal trade-offs between performance and reliability for cloud platforms. Experimental results show that the proposed reservation service can bring about remarkably higher resource utilisation and lower rejection rate when using redundant reservation service at the price of a slightly increasing of reservation violations. Journal: Int. J. of Networking and Virtual Organisations Pages: 168-183 Issue: 2 Volume: 20 Year: 2019 Keywords: cloud computing; resource virtualisation; quality of service; resource reservation. File-URL: http://www.inderscience.com/link.php?id=97632 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:ids:ijnvor:v:20:y:2019:i:2:p:168-183 Template-Type: ReDIF-Article 1.0 Author-Name: Arindam Debnath Author-X-Name-First: Arindam Author-X-Name-Last: Debnath Author-Name: Mrinal Kanti Debbarma Author-X-Name-First: Mrinal Kanti Author-X-Name-Last: Debbarma Title: Energy efficient-dynamic and self-optimised routing in wireless sensor network based on ant colony optimisation Abstract: A wireless sensor network (WSN) consists of low power, low cost, limited memory and small in size sensor nodes, organise them in a cooperative network and perform three basic operations - sensing data from environment, computation, and data routing. Routing in WSN mainly focuses on data dissemination, data aggregation, life time of the network and limited bandwidth constraints in order to facilitate the efficient working of the network. Due to the limited battery power, the energy conservation is a critical aspect to design an efficient routing protocol in WSN. This paper proposes the energy efficient dynamic and self-optimised routing to prolong the life time of the network, QoS and solve the stagnation problem in the network. Journal: Int. J. of Networking and Virtual Organisations Pages: 184-194 Issue: 2 Volume: 20 Year: 2019 Keywords: wireless sensor network; ACO; forward ant; FA; backward ant; BA; local edge selection. File-URL: http://www.inderscience.com/link.php?id=97644 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:ids:ijnvor:v:20:y:2019:i:2:p:184-194 Template-Type: ReDIF-Article 1.0 Author-Name: LeWei Hu Author-X-Name-First: LeWei Author-X-Name-Last: Hu Author-Name: Jing Zhao Author-X-Name-First: Jing Author-X-Name-Last: Zhao Author-Name: Jiao Huang Author-X-Name-First: Jiao Author-X-Name-Last: Huang Author-Name: Yajing Li Author-X-Name-First: Yajing Author-X-Name-Last: Li Title: Driving factors of digital strategic actions in competitive dynamics Abstract: Based on the competitive dynamics theory and from the exploitation/exploration perspective, this study explored the impetus and differences in incremental and radical digital strategic actions (DSAs) using 250 cases. We found that the quantity and diversity of partners were the core factors for launching successful incremental DSAs, and partnership strength was the core condition to start successful radical DSAs. We also found that digital assets' depth and breadth was the necessary prerequisites to initiate the two types of DSAs. This study aimed to help managers formulate and initiate competitive actions more effectively in a digital environment. Journal: Int. J. of Networking and Virtual Organisations Pages: 195-214 Issue: 3 Volume: 20 Year: 2019 Keywords: digital strategic actions; digital assets; partnership; competitive dynamics; networking. File-URL: http://www.inderscience.com/link.php?id=100178 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:ids:ijnvor:v:20:y:2019:i:3:p:195-214 Template-Type: ReDIF-Article 1.0 Author-Name: Rong Wang Author-X-Name-First: Rong Author-X-Name-Last: Wang Title: Motivation, governance, efficacy and contribution: a social practice model of commons-based peer production Abstract: This study examines how individual motivation and governance structure of online collaboration affect individual contribution and efficacy in a commons-based peer production (CBPP) community. Using survey data and structural equation modelling, this study demonstrates motivational factors alone cannot fully predict CBPP outcomes. How people perceive their freedom in setting their own agenda affects their confidence in producing artefacts for reuse. It also provides evidence that how individuals perceive their own ability in peer production significantly affects their relationships with the collective. Built upon a social practice view, this study highlights that efficacy at both individual and community levels should be viewed as important outcomes of cooperative human activity. This study contributes to the literature on CBPP and virtual communities by demonstrating the value of open governance and self-efficacy. Journal: Int. J. of Networking and Virtual Organisations Pages: 245-264 Issue: 3 Volume: 20 Year: 2019 Keywords: commons-based peer production; CBPP; self-efficacy; collective efficacy; online community; collective action; governance; structural equation modelling; SEM; social practice; online collaboration. File-URL: http://www.inderscience.com/link.php?id=100179 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:ids:ijnvor:v:20:y:2019:i:3:p:245-264 Template-Type: ReDIF-Article 1.0 Author-Name: Dongbo Liu Author-X-Name-First: Dongbo Author-X-Name-Last: Liu Author-Name: Yongjian Li Author-X-Name-First: Yongjian Author-X-Name-Last: Li Title: A novel QoS negotiation model based on intelligent learning technique in clouds Abstract: As more and more high-end applications have been deployed on cloud platforms, the quality-of-service (QoS) of cloud platform has become an important issue that need to be addressed. To achieve desirable QoS, an efficient negotiation model plays a critical role because cloud application often requires plenty of resource during their execution. In this paper, we propose a novel QoS negotiation model which applies intelligent learning technique to adjust the negotiation policy, in this way, QoS agreement between application and resource provider can be quickly achieved even when multiple resource requests are involved concurrently. The proposed negotiation model is implemented in an integrated QoS negotiation framework, in which negotiation agents help to make resource reservations while allocations agents are responsible for committing those reservation requests. The proposed framework is tested in a real cloud platform, and the results indicate that it can significantly improve the negotiation efficiency comparing with other negotiation methods. In addition, the experimental results also show that by using the proposed negotiation model, large-scale workflow applications can reduce their makespan by about 7%~11%. Journal: Int. J. of Networking and Virtual Organisations Pages: 265-283 Issue: 3 Volume: 20 Year: 2019 Keywords: cloud computing; negotiation model; resource allocation; workflow. File-URL: http://www.inderscience.com/link.php?id=100181 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:ids:ijnvor:v:20:y:2019:i:3:p:265-283 Template-Type: ReDIF-Article 1.0 Author-Name: Feng Li Author-X-Name-First: Feng Author-X-Name-Last: Li Title: A novel scheduling algorithm for data-intensive workflow in virtualised clouds Abstract: In cloud platforms, workflow applications have been widely used to solve the complicated problems, which often need to process a large volume of data. However, the characteristic of data-intensive for these applications are easily to result in low execution efficiency due to networking traffic or congestion. In this paper, we present a workflow scheduling algorithm which is capable of minimising the cost of networking communication and therefore improving the execution efficiency of those workflow applications. Extensive experiments are conducted on some real-world workflows to examine the performance of the proposed algorithm, and the results show that it can significantly reduce the communication cost and improve the execution efficiency of data-intensive workflows comparing with existing algorithms. Journal: Int. J. of Networking and Virtual Organisations Pages: 284-300 Issue: 3 Volume: 20 Year: 2019 Keywords: cloud computing; virtual machine; workflow; task scheduling. File-URL: http://www.inderscience.com/link.php?id=100182 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:ids:ijnvor:v:20:y:2019:i:3:p:284-300 Template-Type: ReDIF-Article 1.0 Author-Name: Ying Hu Author-X-Name-First: Ying Author-X-Name-Last: Hu Title: An efficient replication scheme based on living-replicas estimation for distributed storage platforms Abstract: In the past few years, massive storage platforms are playing critical roles in many practical distributed systems (i.e., grid or cloud). To ensure desirable data availability, replication mechanism has been widely applied in those massive storage platforms. Meanwhile, a high level of data redundancy inevitably degrades the performance of storage management and bandwidth utilisation. In this paper, we propose an intelligent replication scheme which leverages failure pattern of storage nodes to estimate the actual number of living-replicas in a storage platform. In this way, the storage platform can make more accurate decisions on how many replicas should be generated for maintaining a given data availability. Extensive experiments based on real-world traces indicate that the proposed replication scheme can significantly reduce the overall data redundancy and maintain desirable data availability at the same time. Journal: Int. J. of Networking and Virtual Organisations Pages: 301-317 Issue: 3 Volume: 20 Year: 2019 Keywords: data replication; cloud computing; distributed storage; probability model. File-URL: http://www.inderscience.com/link.php?id=100183 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:ids:ijnvor:v:20:y:2019:i:3:p:301-317 Template-Type: ReDIF-Article 1.0 Author-Name: Jiang Ping Wan Author-X-Name-First: Jiang Ping Author-X-Name-Last: Wan Author-Name: Ya Hui Zhu Author-X-Name-First: Ya Hui Author-X-Name-Last: Zhu Author-Name: Qiao Wen Jiang Author-X-Name-First: Qiao Wen Author-X-Name-Last: Jiang Title: Study on core essential elements for O2O business model with value net theory Abstract: The O2O business model concept was given based on literature review. The O2O business model framework was established and the most basic seven major elements were identified in our research with value net theory as follow: customer, telecom operator, content provider, service provider, software provider, third-party payment platform and offline business entity. Then, we identified eight secondary elements and 22 three-level elements of O2O business model with Delphi, and the O2O business model core essential elements evaluation model was also established. We analysed the model systematically and figured out top ten core elements with analytic network process as follow: network speed and stability, mining the customer subject requirements, insight to customer demand, control the trading risk, the core technology research and development, the life service payment platform, after payment platform, financial services platform development, outburst requirements fulfilment and maintenance of direct correlation among enterprises. The top ten elements mainly concentrated in four dimensions as follow: customer, telecom operators, third-party payment platform, and software providers. We hope that the research can provide enlightenment to O2O business model essence and insight to O2O future trends. Journal: Int. J. of Networking and Virtual Organisations Pages: 215-244 Issue: 3 Volume: 20 Year: 2019 Keywords: O2O; business; core elements; value net theory; Delphi; analytic network process; ANP. File-URL: http://www.inderscience.com/link.php?id=100185 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:ids:ijnvor:v:20:y:2019:i:3:p:215-244 Template-Type: ReDIF-Article 1.0 Author-Name: Manish Kumar Author-X-Name-First: Manish Author-X-Name-Last: Kumar Author-Name: Cherian Samuel Author-X-Name-First: Cherian Author-X-Name-Last: Samuel Title: Stochastic demand side management in smart grid system Abstract: Two-way communication of smart grid allows customer to see their energy consumption in demand side, and makes the energy supplier informed to manage economic dispatch based on load demand variability. Statistical analysis of demand-side management gives us the fitness of hourly load demand with proposed probability density functions. We proposed Lognormal, Gamma and Weibull probability density function for estimating the load demand variability at Banaras Hindu University (BHU) campus. We have collected the hourly load demand data of BHU campus for a year from the Electricity % Water Supply Service Center, BHU. The fitness of data with theoretical probability density function has been analysed with three goodness-of-fit tests named Kolmogorov-Smirnov, Anderson-Darling, and Cramer-von Mises tests. Modern R programming language software has been used for the computational work and graphical analysis. With this, we can manage optimal power flow between demand and supply to increase the system reliability. Journal: Int. J. of Networking and Virtual Organisations Pages: 319-339 Issue: 4 Volume: 20 Year: 2019 Keywords: demand side management; smart grid; stochastic demand; load demand; probability distribution; goodness-of-fit test. File-URL: http://www.inderscience.com/link.php?id=100596 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:ids:ijnvor:v:20:y:2019:i:4:p:319-339 Template-Type: ReDIF-Article 1.0 Author-Name: Ning Han Author-X-Name-First: Ning Author-X-Name-Last: Han Author-Name: Dongbo Liu Author-X-Name-First: Dongbo Author-X-Name-Last: Liu Title: PTRE: a probabilistic two-phase replication elimination policy in large-scale distributed storage platforms Abstract: To support large-scale data-intensive applications, massive distributed storage platform are being widely deployed in more and more IT-infrastructures. One of the most mentioned issues on distributed storage platform is how to maintain desirable data availability without too many extra costs. Therefore, data replication service plays a key role to achieve this goal. Unfortunately, many existing replication policies are designed for small-scale or centralised storage platforms, and their performance tends to be dramatically degraded when a system consists of thousands of autonomous storage nodes. In this paper, we present a novel replication policy that allows a storage platform to eliminate useless replicas and maintain sufficient data availability at the same time. Through theoretical analysis, we have proven that the costs of the proposed policy is linearly increased with the number of underlying storage nodes, which means that it can be easily applied in large-scale distributed storage platform. The experimental results indicate that the proposed replication scheme can significant improve the effective utilisation of storage resources comparing with other existing policies. In addition, it exhibits a better robustness when the underlying storage platform is in presence of dramatically fluctuant workload. Journal: Int. J. of Networking and Virtual Organisations Pages: 340-355 Issue: 4 Volume: 20 Year: 2019 Keywords: distributed storage; replication scheme; availability; probability theory. File-URL: http://www.inderscience.com/link.php?id=100597 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:ids:ijnvor:v:20:y:2019:i:4:p:340-355 Template-Type: ReDIF-Article 1.0 Author-Name: Mohammed Hussein Author-X-Name-First: Mohammed Author-X-Name-Last: Hussein Author-Name: Abdallatif Abu-Issa Author-X-Name-First: Abdallatif Author-X-Name-Last: Abu-Issa Title: Topology-aware approach for reducing power consumption in backbone networks Abstract: According to several studies, line cards are the major source of energy savings in green networks because they contribute up to 42% of the total energy consumption of a backbone router. Since these networks are over provisioned, during periods of low-demands shutting down network links seems like a good approach to reduce energy consumption. In this paper, we propose a novel topology-aware approach to exploit the sleep mode capabilities of links in IP networks. We leverage the algebraic connectivity metric, adopted from spectral graph theory on IP networks in order to identify the set of links, that can be powered off by decreasing the network connectivity the least. Exhaustive searching for the optimal link shutting down is computationally infeasible. Hence, we propose several strategies that select single link for removal, based on topological and spectral metrics. Moreover, the proposed algorithms do not require the knowledge of traffic matrix, being able to run in real-time, where this information would not be available. Results, obtained on real topologies prove that our algorithms are able to achieve performance comparable to a pioneering more complex traffic aware approaches, called benchmark (Zhang et al., 2010) and least-flow (Chiaraviglio et al., 2009). Journal: Int. J. of Networking and Virtual Organisations Pages: 356-376 Issue: 4 Volume: 20 Year: 2019 Keywords: energy efficiency; wired networks; graph theory. File-URL: http://www.inderscience.com/link.php?id=100598 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:ids:ijnvor:v:20:y:2019:i:4:p:356-376 Template-Type: ReDIF-Article 1.0 Author-Name: Trevor Clohessy Author-X-Name-First: Trevor Author-X-Name-Last: Clohessy Author-Name: Thomas Acton Author-X-Name-First: Thomas Author-X-Name-Last: Acton Author-Name: Lorraine Morgan Author-X-Name-First: Lorraine Author-X-Name-Last: Morgan Title: (De)Mystifying the information and communication technology business model concept Abstract: Modern enterprises are currently experiencing volatile and rapid information and communication technology (ICT) change. A key challenge for business leaders is to ensure their organisations are ready for that change. This is particularly challenging when it comes to emerging ICT that may disrupt the management of existing enterprise information systems or business processes. The business model has been cited as an effective tool which organisations can use to prepare for ICT related change. However, there is evidence to suggest that the business model remains largely a nebulous concept to most organisations. This is compounded by the siloed nature of existing business model research. Using a content analysis research approach, this paper provides a holistic review of contemporary academic literature to ascertain and classify the various approaches to the study of ICT enabled business models. The literature examined is classified into nine specific thematic descriptors which underpin these specific business models. A comprehensive definition is also developed for ICT business models. This paper therefore extends our understanding of the business model concept and can be used to guide and coalesce future research on illuminating how organisations can operationalise effective business models in order to leverage new digital ICT. Journal: Int. J. of Networking and Virtual Organisations Pages: 377-399 Issue: 4 Volume: 20 Year: 2019 Keywords: business model; Information systems; information and communication technology; content analysis; thematic descriptors. File-URL: http://www.inderscience.com/link.php?id=100599 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:ids:ijnvor:v:20:y:2019:i:4:p:377-399 Template-Type: ReDIF-Article 1.0 Author-Name: Mohammad K. Al-Nawayseh Author-X-Name-First: Mohammad K. Author-X-Name-Last: Al-Nawayseh Author-Name: Aladdin Hussein Baarah Author-X-Name-First: Aladdin Hussein Author-X-Name-Last: Baarah Author-Name: Sultan A. Al-Masaeed Author-X-Name-First: Sultan A. Author-X-Name-Last: Al-Masaeed Author-Name: Mohammad M. Alnabhan Author-X-Name-First: Mohammad M. Author-X-Name-Last: Alnabhan Title: Mobile learning adoption in Jordan: technology influencing factors Abstract: Massive progress in ICT and the emergence of mobile internet as a primary platform for information delivery has spurred the development of mobile learning. In order to utilise m-learning in Jordan, it is vital to explore the factors that impact university students' adoption. This quantitative study examines factors affecting students' intention to adopt m-learning using the unified theory of acceptance and use of technology (UTAUT). The results show that students in Jordanian universities believe that m-learning performance expectancy, effort expectancy and social influence will positively affect their intension to adopt m-learning, while facilitating conditions will not. Journal: Int. J. of Networking and Virtual Organisations Pages: 400-417 Issue: 4 Volume: 20 Year: 2019 Keywords: m-learning; technology acceptance model; UTAUT model. File-URL: http://www.inderscience.com/link.php?id=100600 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:ids:ijnvor:v:20:y:2019:i:4:p:400-417 Template-Type: ReDIF-Article 1.0 Author-Name: P. Chandra Sekar Author-X-Name-First: P. Chandra Author-X-Name-Last: Sekar Author-Name: H. Mangalam Author-X-Name-First: H. Author-X-Name-Last: Mangalam Title: A power aware mechanism for energy efficient routing in MANET Abstract: In this paper, mobile ad hoc network (MANET) is used to refer a wireless network wherein there is no definite architecture and required configuration is done by itself. Multiple protocols are suggested to reduce the overall transmission power in MANET routing. Several multicasting routing protocols are available and two of them are power aware dual tree based multicast routing protocol (PDTMRP) and load balancing and power aware multicast routing in MANET (LPMR). Here, a power aware mechanism for energy efficient routing (PAMER) for MANET is designed to improve route stability as well as to obtain load balance data transmission by taking into account the energy reduction rate (ERR) as well as residual energy (RE). A suitable band width (BW) assessment is integrated to respond to network traffic as well as explore a QoS aware strategy into route discovery for appropriate traffic management. Thus, the improved system can monitor overhead, lessen the number of route reconstruction as well as improve the life span of network. Journal: Int. J. of Networking and Virtual Organisations Pages: 3-18 Issue: 1 Volume: 21 Year: 2019 Keywords: mobile ad hoc network; MANET; traffic management; QoS aware strategy; residual energy. File-URL: http://www.inderscience.com/link.php?id=101144 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:ids:ijnvor:v:21:y:2019:i:1:p:3-18 Template-Type: ReDIF-Article 1.0 Author-Name: P. Sivanesan Author-X-Name-First: P. Author-X-Name-Last: Sivanesan Title: A novel routing protocol for relay node-based energy consumption in MANET Abstract: In MANET data replication play a major role for energy conservation. Redundant data transmission makes network traffic heavier and causes unnecessary energy utilisation. This paper addresses the problems due to the network traffic and unnecessary energy utilisation. It proposes the relay node-based routing protocol (RBP) to minimise the data replication and energy consumption. The relay node is implemented to collect the data from neighbours based on the stochastic process. The data is predicted by time series forecast then an error value is found. The autocorrelation function is used to compare the current variable with the predefined one (calculated error bound). If the output error value greater than predefined error value then the received data is sent to the sink as it is; otherwise the received data is discarded and the index only transmitted to the sink. Journal: Int. J. of Networking and Virtual Organisations Pages: 19-29 Issue: 1 Volume: 21 Year: 2019 Keywords: data replication; energy consumption; relay node selection. File-URL: http://www.inderscience.com/link.php?id=101145 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:ids:ijnvor:v:21:y:2019:i:1:p:19-29 Template-Type: ReDIF-Article 1.0 Author-Name: P. Santhosh Kumar Author-X-Name-First: P. Santhosh Author-X-Name-Last: Kumar Author-Name: Latha Parthiban Author-X-Name-First: Latha Author-X-Name-Last: Parthiban Author-Name: V. Jegatheeswari Author-X-Name-First: V. Author-X-Name-Last: Jegatheeswari Title: Privacy and security issues in cloud computing using idyllic approach Abstract: Cloud provides the collection of virtual machine which have both computational and storage facility. The important aspect of cloud computing is to present effective process to hyper distributed resources. Now days, cloud system is developing and facing many challenges, two of them is scheduling process and other main challenge is a security issue. In existing approaches did not concentrate on both security and scheduling issues in the cloud computing. Scheduling refers to the scheduler adapts its scheduling strategy, according to the changing to a set of morals to control the order of work to be implemented by a computer system. In this research paper, we have implemented a scheduling algorithm of collocate FCFS of supremacy elements. Here, we improve the system efficiency by using FCFS in a parallel manner. To address this security issue, we have introduced a novel concept of Crisscross Advance Encryption Standard (CAES). In this approach, crisscross AES has implemented by increasing the security to the cloud through the grid manner. Aggregate of this proposed work is to enhance the system efficiency as well as the security by using the both crisscross AES and Collocate FCFS of supremacy elements. Journal: Int. J. of Networking and Virtual Organisations Pages: 30-42 Issue: 1 Volume: 21 Year: 2019 Keywords: virtual machine; collocate; computational; crisscross; efficiency; security; encryption; scheduling; networking; performance. File-URL: http://www.inderscience.com/link.php?id=101146 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:ids:ijnvor:v:21:y:2019:i:1:p:30-42 Template-Type: ReDIF-Article 1.0 Author-Name: Neelamadhab Padhy Author-X-Name-First: Neelamadhab Author-X-Name-Last: Padhy Author-Name: Suresh Chandra Satapathy Author-X-Name-First: Suresh Chandra Author-X-Name-Last: Satapathy Author-Name: R.P. Singh Author-X-Name-First: R.P. Author-X-Name-Last: Singh Title: Estimation of complexity by using an object oriented metrics approach and its proposed algorithm and models Abstract: The high pace emergence of software applications and associated technologies have enabled us an efficient and luxurious. This research paper focus the procedure of investigating the different object oriented metrics by taking an example and finally evaluate complexities, statistical measurements. A proposed model, flowchart and algorithm are used for measuring the metrics in the software project. Comparison done between the programming languages like C++ and Python and conclude that Python is better than C++. Journal: Int. J. of Networking and Virtual Organisations Pages: 43-62 Issue: 1 Volume: 21 Year: 2019 Keywords: object oriented metrics; OOM; CK metrics suite; object oriented programming examples; proposed algorithms and models; reusability estimation model; frame work. File-URL: http://www.inderscience.com/link.php?id=101147 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:ids:ijnvor:v:21:y:2019:i:1:p:43-62 Template-Type: ReDIF-Article 1.0 Author-Name: Xiaohong Li Author-X-Name-First: Xiaohong Author-X-Name-Last: Li Author-Name: Maolin Li Author-X-Name-First: Maolin Author-X-Name-Last: Li Title: A novel boot strapping algorithm for text extraction in a self-organising neural network model Abstract: With rapid growth in internet and its associated communication protocols, need for printed documents to be carried over from one place to another has been reduced to minimise the cost and time. Research contributions in the past have paved the way for implementation of smart and intelligent algorithms to further minimise manual intervention in processing of documents. One such area is the automation of text extraction from documents with increased accuracy and least number of false detections. A wide range of algorithms and methodologies have been reported in the past towards efficient extraction of text from documents which may be online or offline. This research paper proposes an efficient extraction algorithm of text from given set of documents which may or may not be graphic through utilisation of a hybrid SOM-ANN algorithm. The experimentation has been done over a wide variety of inputs and convergence of error in extraction is found to be minimum when compared to other conventional extractors. Journal: Int. J. of Networking and Virtual Organisations Pages: 63-75 Issue: 1 Volume: 21 Year: 2019 Keywords: extraction algorithms; intelligent extractors; neural networks; self-organising map; SOM; bootstrapping. File-URL: http://www.inderscience.com/link.php?id=101148 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:ids:ijnvor:v:21:y:2019:i:1:p:63-75 Template-Type: ReDIF-Article 1.0 Author-Name: K. Vimal Kumar Stephen Author-X-Name-First: K. Vimal Kumar Author-X-Name-Last: Stephen Author-Name: V. Mathivanan Author-X-Name-First: V. Author-X-Name-Last: Mathivanan Title: Error free backbone tree construction to expand the longevity of wireless Abstract: Wireless sensor networks (WSN) raises number of the challenges with regard to scalability and energy efficacy. Implemented of Huffman approaches one of the key variable length in the wireless sensor network is prolonging network lifetimes. To improve the lifetime of the sensor, static and movable mobile sinks are deployed. Movable sinks are used to receive sensed data from the sensor where it is located. Assigning prime number as the sensor node identity can be easily guessed by the intruder. Reusing the same identity in the cluster leads to compromising of nodes. The energy is retained when computation is reduced in cluster head thereby increases the life time of the particular cluster. Variable length gives variable length identity and avoids reusing of same identity hence it avoid network attacks such as random number length of nodes are not possible (no sensors are allowed inside the network without the knowledge of cluster head). Increasing transmission range future will consume more battery power. Journal: Int. J. of Networking and Virtual Organisations Pages: 76-88 Issue: 1 Volume: 21 Year: 2019 Keywords: component; formatting; style; styling. File-URL: http://www.inderscience.com/link.php?id=101149 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:ids:ijnvor:v:21:y:2019:i:1:p:76-88 Template-Type: ReDIF-Article 1.0 Author-Name: K.G. Preetha Author-X-Name-First: K.G. Author-X-Name-Last: Preetha Author-Name: A. Unnikrishnan Author-X-Name-First: A. Author-X-Name-Last: Unnikrishnan Title: Reduction of overhead in routing protocols for MANET using fuzzy set-based decision making Abstract: It is well-known that dynamic topology, mobility of nodes, infrastructure less property and absence of central coordinator; make the behaviour of mobile ad hoc network (MANET) uncertain. Routing is the major step in the operation of MANET and the establishment of route from source to destination thus becomes crucial. Routing decision is distributed among the nodes in the network and the reliable and effective routing predominantly depends on proper establishment of route from source to destination. Route establishment depends largely on control packets and those packets induce more overhead in the network, which in turn degrades the performance of the network. The present work proposes a novel method to reduce the control overhead by predicting the quality of the neighbouring nodes that sustain more, using a fuzzy set decision approach. The flooding of control packets is based on a fuzzy decision taken on success rate of each link in the previous trials and residual energy of the neighbouring nodes. Simulation study reveals that this approach significantly reduces the control overhead in the network and improves the overall performance. Journal: Int. J. of Networking and Virtual Organisations Pages: 89-100 Issue: 1 Volume: 21 Year: 2019 Keywords: mobile ad hoc network; MANET; fuzzy set; knowledge base; decision making. File-URL: http://www.inderscience.com/link.php?id=101150 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:ids:ijnvor:v:21:y:2019:i:1:p:89-100 Template-Type: ReDIF-Article 1.0 Author-Name: M. Vanitha Author-X-Name-First: M. Author-X-Name-Last: Vanitha Author-Name: T.R. Ganesh Babu Author-X-Name-First: T.R. Ganesh Author-X-Name-Last: Babu Title: Performance measure of routing protocol with angular coordinates and distinctive transmissions in wireless networks Abstract: This work focuses on two geographical routing protocols for proficient forwarding with minimal overhead. The first protocol namely proficient geographical routing with angular coordinates (PGRA). The protocol PGRA attains efficiency in obtaining its geographical coordinates of destination without the aid of GPS. This is done by obtaining the angular coordinates. In addition, the protocol monitors the desired throughput with exponentially weighted moving average (EWMA) method to determine whether to continue forwarding or interrupt current transmission. In the second work, proficient geographical routing with angular and vector coordinates (PGRAV) obtain the information of forwarding nodes by meticulously increasing the communication radius. The protocol limits the transmission at the advance node and refrains from flooding control packets. Performance comparison of both the proposed protocol has been done with similar geographic routing protocol with zone-based structure EEGDOA. Journal: Int. J. of Networking and Virtual Organisations Pages: 101-111 Issue: 1 Volume: 21 Year: 2019 Keywords: proficient geographical routing with angular coordinates; PGRA; proficient geographical routing with angular and vector coordinates; PGRAV; geographical routing; exponentially weighted moving average; EWMA. File-URL: http://www.inderscience.com/link.php?id=101151 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:ids:ijnvor:v:21:y:2019:i:1:p:101-111 Template-Type: ReDIF-Article 1.0 Author-Name: P. Deivendran Author-X-Name-First: P. Author-X-Name-Last: Deivendran Author-Name: Ealai Rengasari Naganathan Author-X-Name-First: Ealai Rengasari Author-X-Name-Last: Naganathan Title: Scalability assurance process in replication and migration using cloud simulator Abstract: In service-oriented computing, service customers call up services deployed by service providers and service providers are responsible to deal with the excellence of their services including scalability, accessibility and performance. In particularly, scalability is tough to get, mainly due to the unidentified nature of service customers and changeable volumes of service invocations. Services with underprivileged scalability would be defeated the consumer basis, resultant in small revenues. Predictable approach to scalability of network, database and scattered computing are hardware-oriented solutions. In this paper, we present software-oriented approaches to guarantee elevated scalability of services in cloud computing. We first identify scalability in service-oriented computing, present suitable foundation of services scalability. Then, we present two efficient scalabilities assure scheme; service replication and migration. The future schemes are well-known from predictable scalability schemes in three ways. To give you an idea about the applicability of planned schemes, we demonstrate a result of implementing the scheme and experiments with them. Through means of the methods, services scalability can be to the highest degree improved enthusiastically by using software solutions. Growth of large network infrastructures have led to several systems that design large-scale distributed systems supporting efficient, secure and available services. Journal: Int. J. of Networking and Virtual Organisations Pages: 112-126 Issue: 1 Volume: 21 Year: 2019 Keywords: cloud computing; scalability; migration; service; networks; distributed performance. File-URL: http://www.inderscience.com/link.php?id=101153 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:ids:ijnvor:v:21:y:2019:i:1:p:112-126 Template-Type: ReDIF-Article 1.0 Author-Name: Nyan Lin Author-X-Name-First: Nyan Author-X-Name-Last: Lin Author-Name: Yasuo Tan Author-X-Name-First: Yasuo Author-X-Name-Last: Tan Author-Name: Yuto Lim Author-X-Name-First: Yuto Author-X-Name-Last: Lim Title: Efficient network coding-based data transfer framework for multihop wireless communication Abstract: With the growing demands of wireless applications and mobile data connections, wireless communication is expected to provide the ever-increasing demand for higher data rate and efficient data communication. Energy is also one of the hot issues needed to be considered for future wireless networks. In this paper, an efficient network coding-based data transfer (E-neco) framework is developed to achieve more energy-saving and bandwidth-efficient data communication for data transmission, data collection and data sharing services. For these data transfer applications, we propose new network coding-based transmission schemes and medium access control protocols. Topology and network coding techniques are utilised in the framework. This is a conceptual framework developed for future generation wireless communication such as multihop communication, massive machine communication, device-to-device communication and new techniques can be added to support future demanding services. Simulation results reveal an improvement in terms of throughput, latency, fairness, energy consumption and network lifetime. Journal: Int. J. of Networking and Virtual Organisations Pages: 127-159 Issue: 1 Volume: 21 Year: 2019 Keywords: multihop wireless communication; network coding; medium access control protocol; data transfer framework; energy efficient protocols; wireless network topology; future wireless networks. File-URL: http://www.inderscience.com/link.php?id=101162 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:ids:ijnvor:v:21:y:2019:i:1:p:127-159 Template-Type: ReDIF-Article 1.0 Author-Name: A. Dinesh Kumar Author-X-Name-First: A. Dinesh Author-X-Name-Last: Kumar Author-Name: S. Smys Author-X-Name-First: S. Author-X-Name-Last: Smys Title: An energy efficient and secure data forwarding scheme for wireless body sensor network Abstract: Monitoring human bodies and collecting physiological information are the major healthcare applications for wireless body area networks (WBANs). Due to the limited energy resource of body sensors, their energy depletions will cause severe network performance degradation such as latency and energy efficiency. To solve this problem existing system introduced an energy-efficient data forwarding strategy (EDFS) to balance sensor energy consumption, improve network lifetime and collaborative operations of heterogeneous WBANs. However, the existing system only considered the energy function for optimal relay sensor node selection, does not considered the delay and hop count of node. Hence in this system, the TOPSIS-based artificial bee colony algorithm (TOPSIS-based ABC) is proposed to select the optimal path for data transmission. In order to reduce the network congestion compressed sensing (CS) is performed. To provide high security for patient related data hybrid RSA and Diffie-Hellman algorithm is used. The proposed methodology is implemented by using NS-2 simulator. Journal: Int. J. of Networking and Virtual Organisations Pages: 163-186 Issue: 2 Volume: 21 Year: 2019 Keywords: compressed sensing; networking; wireless body sensor network; security; ABC algorithm; objective function; data reconstruction; optimal path selection and sink. File-URL: http://www.inderscience.com/link.php?id=101784 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:ids:ijnvor:v:21:y:2019:i:2:p:163-186 Template-Type: ReDIF-Article 1.0 Author-Name: Mamatha Balachandra Author-X-Name-First: Mamatha Author-X-Name-Last: Balachandra Author-Name: K.V. Prema Author-X-Name-First: K.V. Author-X-Name-Last: Prema Title: Improving the performance of MANETs to suit for IoT-based applications Abstract: Computation of efficient paths is very much essential for Mobile Ad hoc Networks (MANETs) due to frequent topological changes. In the context of IoT, MANETs could represent scenarios such as military applications, disaster recovery operations etc. In AODV, since at a time only one path is identified, due to link or node failure the current path becomes invalid. In AOMDV, the paths that are existing in the routing table are not node disjoint. i.e., whenever link or node failure occurs in the network, the current path becomes invalid. In this work, route discovery of the original AODV is altered by using the path accumulation feature of DSR to compute multiple paths. Among these, only node disjoint paths are selected using the path matrix method. The modified Multipath QoSe Aware Routing Protocol (MQARP) is compared with the original AOMDV. The proposed MQARP performs better in terms of delay, PDR and control overhead. Journal: Int. J. of Networking and Virtual Organisations Pages: 187-200 Issue: 2 Volume: 21 Year: 2019 Keywords: ad hoc on-demand distance vector; AODV; dynamic source routing; DSR; AOMDV; quality of service; QoS; multipath; IoT; route discovery. File-URL: http://www.inderscience.com/link.php?id=101785 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:ids:ijnvor:v:21:y:2019:i:2:p:187-200 Template-Type: ReDIF-Article 1.0 Author-Name: Neelamadhab Padhy Author-X-Name-First: Neelamadhab Author-X-Name-Last: Padhy Author-Name: Suresh Chandra Satapathy Author-X-Name-First: Suresh Chandra Author-X-Name-Last: Satapathy Author-Name: R.P. Singh Author-X-Name-First: R.P. Author-X-Name-Last: Singh Title: Complexity estimation by using multiparadigm approach: a proposed metrics and algorithms Abstract: The factors upsetting directness of a software code were calculated manually using traditional approach which is not suitable in these days. There are numerous software tools are available in the market but they are not reliable due to vast number of metrics are available and each and every metrics are not specific definitions. This paper investigated factors which are affecting for understanding the procedural and object oriented code and found that software metrics can be calculated by using the web-engineering technology especially multiparadigm language. The most important parts of this paper are propped algorithms for estimating an object-oriented metrics. The planned metrics were empirically authenticated in diverse paradigms. The exigent task of this paper is all about the evaluation strategy of an object-oriented metrics by using multiparadigm language (JavaScript). The proposed model is developed to analyse the CK metric suite. This model extracts the number of classes available in the Java Script programs. Basically this model works in two different phases. In first phase the parser is able to find and generate the full abstract syntax tree and second stage the identification of the classes and generated the metrics itself. Journal: Int. J. of Networking and Virtual Organisations Pages: 201-220 Issue: 2 Volume: 21 Year: 2019 Keywords: code quality; meaning of software complexity; complexity measurement; multiparadigm; proposed metrics; object oriented technology. File-URL: http://www.inderscience.com/link.php?id=101786 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:ids:ijnvor:v:21:y:2019:i:2:p:201-220 Template-Type: ReDIF-Article 1.0 Author-Name: E. Sivaraman Author-X-Name-First: E. Author-X-Name-Last: Sivaraman Author-Name: R. Manickachezian Author-X-Name-First: R. Author-X-Name-Last: Manickachezian Title: Intelligent decision making service framework based on analytic hierarchy process in cloud environment Abstract: Outsourcing corporate procedures to a cloud domain is seen among the arrangements helping small and medium-sized corporate to rise in business sector and improve their additional worth. When deciding to outsource some portion of its corporate procedure to the cloud, small and medium-sized corporate ought to examine a few variables that define its particular connection. Given different variables on which depends the corporate process subcontracting to the cloud environment, a venture clearly needs a basic leadership technique. We define an endeavour setting that contains distinctive elements that help in outsourcing choice to the cloud. The manuscript demonstrates how corporate incentive model of venture additionally improves the outsourcing basic leadership by considering the corporate arrangements and vision of the undertaking. Finally, it proposes an outsourcing choice strategy that depends on expository order procedure to choose whether or not to outsource a corporate procedure to the cloud and through which administration sort. Journal: Int. J. of Networking and Virtual Organisations Pages: 221-236 Issue: 2 Volume: 21 Year: 2019 Keywords: corporate; small and medium-sized corporate; corporate process subcontracting; corporate incentive model; CIM; information and communications technology; ICT. File-URL: http://www.inderscience.com/link.php?id=101787 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:ids:ijnvor:v:21:y:2019:i:2:p:221-236 Template-Type: ReDIF-Article 1.0 Author-Name: Ramesh Palanisamy Author-X-Name-First: Ramesh Author-X-Name-Last: Palanisamy Author-Name: V. Mathivanan Author-X-Name-First: V. Author-X-Name-Last: Mathivanan Title: Future algorithm for optimised path selection and detection in MANET Abstract: The beginning of wireless communication gives birth to cognitive radio mobile ad hoc networks (CRAHNs). Routing is the main factor in both wired and wireless networks. Three major types of routing can be performed in CRAHNs such as proactive, reactive and hybrid. This research work aims in design and development of a hybrid protocol named efficient zone-based routing protocol shortly termed as EZBRP, SACBRP and BIABRP. NS2 simulation tool is used to examine the performance of the proposed protocols. Communicating systems use well-defined formats (protocol) for exchanging various messages. Efficient zone-based routing protocol (EZBRP), spectrum aware cluster-based routing protocol (SACBRP), bee inspired agent-based routing protocol (BIABRP). This research on optimised path selection and detection in MANET and a considerable research effort is still required for secured communication. Journal: Int. J. of Networking and Virtual Organisations Pages: 237-258 Issue: 2 Volume: 21 Year: 2019 Keywords: cognitive; protocol; cognitive radio mobile ad hoc networks; CRAHN; efficient zone-based routing protocol; EZBRP; spectrum aware cluster-based routing protocol; SACBRP; bee inspired agent-based routing protocol; BIABRP; ad hoc; mobile ad hoc network; MANET. File-URL: http://www.inderscience.com/link.php?id=101788 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:ids:ijnvor:v:21:y:2019:i:2:p:237-258 Template-Type: ReDIF-Article 1.0 Author-Name: Puligadda Bhanu Subrahmanyeswara Rao Author-X-Name-First: Puligadda Bhanu Subrahmanyeswara Author-X-Name-Last: Rao Author-Name: N. Srikanta Author-X-Name-First: N. Author-X-Name-Last: Srikanta Author-Name: A. Surendar Author-X-Name-First: A. Author-X-Name-Last: Surendar Title: Controlling industrial parameters through server using Li-Fi and Wi-Fi communication protocols Abstract: In the present day scenario, industrial automation is the most prominent and very common phenomena. Normally, to establish communication among different modules, in industrial applications controlled area network (CAN) protocol is very popular. As the number of devices connected to CAN bus increases, response time also increases for devices connected to CAN, which may lead to catastrophic effects in the system. As CAN deals with electrical signals it may generate electromagnetic interference (EMI) in signal sensitive areas. To avoid EMI and to reduce response time due to CAN bus protocols, other alternatives are to be thought of. So, to overcome the limitations and to resolve the problems due to CAN bus in industrial controlling a novel idea is proposed by the authors for controlling and monitoring the remote plant using Li-Fi. Remote plant is a signal sensitive area, where first a communication link based on Li-Fi is developed to monitor various modules of the plant and then collected data is stored in a server using Wi-Fi module, and necessary control signals are also sent through the Wi-Fi protocol to the plant to control it. Journal: Int. J. of Networking and Virtual Organisations Pages: 259-267 Issue: 2 Volume: 21 Year: 2019 Keywords: industrial automation; electromagnetic interference; EMI; light fidelity; controlled area network; CAN; Li-Fi; Wi-Fi module. File-URL: http://www.inderscience.com/link.php?id=101789 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:ids:ijnvor:v:21:y:2019:i:2:p:259-267 Template-Type: ReDIF-Article 1.0 Author-Name: Namita Dahiya Author-X-Name-First: Namita Author-X-Name-Last: Dahiya Author-Name: Shilpa Mahajan Author-X-Name-First: Shilpa Author-X-Name-Last: Mahajan Title: A comparative study of various existing malware analysis methods Abstract: With the advancement of technology, today's world is a digital world where digital technology is generating new world of possibilities and opportunities and we are abandoned with digital data over the network that needs to be exchanged with many organisations, devices and users. This data needs to be a secure data and malware is one type of threat to this data. There are many forms of malware that can damage this sensitive data. This paper includes various malware detection techniques to detect various known and unknown binaries and presents a detailed analysis of current methods of malware detection and a malware analyser tools. Journal: Int. J. of Networking and Virtual Organisations Pages: 268-276 Issue: 2 Volume: 21 Year: 2019 Keywords: malware; analysis; static; dynamic; hybrid; anomaly; misuse. File-URL: http://www.inderscience.com/link.php?id=101790 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:ids:ijnvor:v:21:y:2019:i:2:p:268-276 Template-Type: ReDIF-Article 1.0 Author-Name: M. Vijaya Bharathi Author-X-Name-First: M. Vijaya Author-X-Name-Last: Bharathi Author-Name: Sireesha Rodda Author-X-Name-First: Sireesha Author-X-Name-Last: Rodda Title: Survey on testing technique for modern web application-rookies vantage point Abstract: AJAX build 2.0 web applications depend in light of state full unique client and server correspondence and client side control of the DOM tree, which makes not the same as standard web applications. Provoking to more slip-ups and harder to set. Another methodology for this AJAX named ATUSA based web applications has been perceived for such accuses that can occur in any state and for making the test suite covering the ways. This approach called as ATUSA, realised by using a gadget which offers invariant checking of portions, module instrument. We portray this framework in three phases with six segments and furthermore accuse revealing limits, versatility, manual effort and level of motorisation testing. This paper mainly concentrates on rookie's vantage point of testing modern web application based on so far accomplished potential research done by software practitioners and experts. Journal: Int. J. of Networking and Virtual Organisations Pages: 277-288 Issue: 2 Volume: 21 Year: 2019 Keywords: invariants; automatic testing; document object model; DOM; AJAX. File-URL: http://www.inderscience.com/link.php?id=101792 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:ids:ijnvor:v:21:y:2019:i:2:p:277-288 Template-Type: ReDIF-Article 1.0 Author-Name: Ying Hu Author-X-Name-First: Ying Author-X-Name-Last: Hu Author-Name: Changsong Liu Author-X-Name-First: Changsong Author-X-Name-Last: Liu Title: An efficient data transfer service for scientific applications in cloud environments Abstract: Recently, more and more data-intensive scientific applications have been deployed in cloud environments. Therefore, how to improve the efficiency of data transfer becomes an important issued that needs to be addressed. In this paper, we present an efficient data transfer framework which provides an integrated platform for data transfer, data scheduling and performance monitoring. Unlike those existing studies that focus on the utilisation of bandwidth resources, the proposed framework is implemented by integrating data transfer service and data scheduling service through a performance prediction service. In this way, it provides a flexible mechanism to enable a cloud system to improve the efficiency of data transfer. The implementation of the proposed framework has been deployed in a real-world cloud system, and experimental results have shown that in can significantly improve the efficiency of massive-data transfer comparing with many existing approaches. Journal: Int. J. of Networking and Virtual Organisations Pages: 289-306 Issue: 3 Volume: 21 Year: 2019 Keywords: cloud computing; data transfer; data scheduler; performance prediction. File-URL: http://www.inderscience.com/link.php?id=103419 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:ids:ijnvor:v:21:y:2019:i:3:p:289-306 Template-Type: ReDIF-Article 1.0 Author-Name: K.M. Uma Maheswari Author-X-Name-First: K.M. Uma Author-X-Name-Last: Maheswari Author-Name: S. Govindarajan Author-X-Name-First: S. Author-X-Name-Last: Govindarajan Title: Hybridisation of oppositional centre-based genetic algorithms for resource allocation in cloud Abstract: Cloud computing is an attractive computing model since it allows for the provision of resources on-demand. In cloud computing, resource allocation is one of the challenging problems; because when the clients want to allocate the resource to particular task while attaining minimum cost. To overcome the problem, in this work we introduce a novel technique for resource allocation in cloud computing using oppositional centre-based genetic algorithm. For optimisation, we hybridise the centre-based genetic algorithm with opposition-based learning (OBL), where OBL is improving the performance of the centre-based genetic algorithm while optimising the bi-objective function. The main aim is to assign the corresponding resources to each subtask within the minimum cost. The generated solution is competent to the quality of service (QoS) and enhances IaaS suppliers' believability. For experimentation, we compare our proposed hybrid algorithm with GA and CGA algorithm. Journal: Int. J. of Networking and Virtual Organisations Pages: 307-325 Issue: 3 Volume: 21 Year: 2019 Keywords: resource allocation; cloud computing; HCFA; scheduling; deadline; hybridisation; bi-objective. File-URL: http://www.inderscience.com/link.php?id=103420 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:ids:ijnvor:v:21:y:2019:i:3:p:307-325 Template-Type: ReDIF-Article 1.0 Author-Name: Arappali Nedumaran Author-X-Name-First: Arappali Author-X-Name-Last: Nedumaran Author-Name: V. Jeyalakshmi Author-X-Name-First: V. Author-X-Name-Last: Jeyalakshmi Title: WBMR: a new communication scheme for multicast routing in MANETs Abstract: There is a great demand for multicast route deployment and time varying link strategies which makes routing difficult in ad-hoc networks. Thus, finding the optimal routes with multicast behaviour in mobile ad hoc networks (MANETs) is a critical issue. The deployed route should fulfil the necessary requirements of MANET, like power utilisation, efficient utilisation of bandwidth, loop free communication, link stability and minimised usage of control overheads. Thus in research, the proposed Weight Based Multicast Routing (WBMR) protocol addresses the critical issues like loop free communication and link stability, which simultaneously yields the optimum routes and reduced energy utilisation of the nodes in MANETs. This proposition uses the weight based routing approach which is based on the distance and signal to noise ratio (SNR) of the demanding links. This WBMR protocol minimise the number of nodes participated in the communication in association with link stability and thus minimise the unnecessary utilisation of bandwidth and energy. The simulated results show that the implemented approach outperforms well when compared with the existing approaches in multicast routing schemes. Journal: Int. J. of Networking and Virtual Organisations Pages: 326-335 Issue: 3 Volume: 21 Year: 2019 Keywords: MANET; multicast routing; SNR; distance; loop free; energy utilisation. File-URL: http://www.inderscience.com/link.php?id=103421 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:ids:ijnvor:v:21:y:2019:i:3:p:326-335 Template-Type: ReDIF-Article 1.0 Author-Name: Yuan Tian Author-X-Name-First: Yuan Author-X-Name-Last: Tian Title: A QoS-aware resource allocation framework in virtualised cloud environments Abstract: In cloud platforms, resource allocation service plays an important role for running user applications efficiently. However, current allocation mechanism in many cloud platforms only provides best-effort service for user's jobs, which means that user's quality-of-service (QoS) requirements can not be well guaranteed. In this paper, we present a novel QoS-aware resource allocation framework, which applies feedback control technique to achieve the goal of fair resource allocation between multiple virtual machine (VM) instances. Theoretical analysis of the proposed control model has proven that it can meet the feasibility and stability requirements. Experimental results conducted on a real-world cloud platform show that the proposed resource allocation framework can significantly improve the effective resource utilisation as well as the overall task execution efficiency. In addition, the proposed framework also shows better robustness when the cloud platform is in presence of highly dynamic workload. Journal: Int. J. of Networking and Virtual Organisations Pages: 336-350 Issue: 3 Volume: 21 Year: 2019 Keywords: cloud computing; virtual machine; resource allocation; quality-of-service; QoS. File-URL: http://www.inderscience.com/link.php?id=103422 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:ids:ijnvor:v:21:y:2019:i:3:p:336-350 Template-Type: ReDIF-Article 1.0 Author-Name: V.M. Gayathri Author-X-Name-First: V.M. Author-X-Name-Last: Gayathri Author-Name: R. Nedunchelian Author-X-Name-First: R. Author-X-Name-Last: Nedunchelian Title: Identification and eradication of malicious node in MANET Abstract: Mobile ad hoc network plays a vital base for the future networking ideologies. A MANET is a part of wireless network which forms a topology based on their communication range or distance. Each node in the network is responsible for efficient communication. Each node acts as router and passes data packets from source to destination. Nodes may be either in static or mobile in nature. If any malicious node enters into the network it might result in loss of data packets. However, it is possible to identify the malicious nodes based on send and receive packet information and change the route from source node to destination node. The malicious path can be identified by calculating the packet drop count. Journal: Int. J. of Networking and Virtual Organisations Pages: 351-362 Issue: 3 Volume: 21 Year: 2019 Keywords: mobile ad hoc networks; MANET; intruder; packet delivery ratio; mobility; WSN; VANET; DTN; malicious; AODV; RREP; route request; RREQ; reliability. File-URL: http://www.inderscience.com/link.php?id=103423 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:ids:ijnvor:v:21:y:2019:i:3:p:351-362 Template-Type: ReDIF-Article 1.0 Author-Name: Bhushan S. Chaudhari Author-X-Name-First: Bhushan S. Author-X-Name-Last: Chaudhari Author-Name: Rajesh S. Prasad Author-X-Name-First: Rajesh S. Author-X-Name-Last: Prasad Title: A novel approach for intrusion detection in mobile ad hoc networks Abstract: Mobile ad hoc network (MANET) consists of various nodes and they interact with each other cooperatively. However, the cooperative nature of MANET provides a gateway for intruders to interrupt the communication. Two types of approaches have been proposed for the IDS in the literature. The first approach has been used for the improvement in the conventional models and the second approach based on the unconventional models. Our focus is on the unconventional methods since they perform better in the diversified environment. A number of unconventional methods viz. Watchdog, EAACK, etc. have been discussed in the literature. However, intrusion detection model based on particle swarm optimization (PSO) for distributed and advanced attacks have not been discussed yet. In this paper, we proposed a novel approach based on PSO for the IDS in MANET. The proposed model is compared with existing models like Watchdog and EAACK. Comprehensive objective function in the evaluation of node trustworthiness is a key point of this model. Journal: Int. J. of Networking and Virtual Organisations Pages: 363-378 Issue: 3 Volume: 21 Year: 2019 Keywords: mobile ad hoc network; intrusion detection system; particle swarm optimisation; PSO; watchdog; enhanced adaptive acknowledgement; EAACK. File-URL: http://www.inderscience.com/link.php?id=103424 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:ids:ijnvor:v:21:y:2019:i:3:p:363-378 Template-Type: ReDIF-Article 1.0 Author-Name: Uri Yacobi-Keller Author-X-Name-First: Uri Author-X-Name-Last: Yacobi-Keller Author-Name: Evgeny Savin Author-X-Name-First: Evgeny Author-X-Name-Last: Savin Author-Name: Benjamin Fabian Author-X-Name-First: Benjamin Author-X-Name-Last: Fabian Author-Name: Tatiana Ermakova Author-X-Name-First: Tatiana Author-X-Name-Last: Ermakova Title: Towards geographical analysis of the autonomous system network Abstract: The internet is an important global critical infrastructure. Yet, it has remained unclear how it is organised in different regions and areas of political influence. This explorative study analyses geographic aspects of the autonomous system networks in different countries. By using Internet geolocation information for locating autonomous systems, we demonstrate the feasibility of discovering physical regions, rather than purely topological clusters, in a graph representing the backbone network of autonomous systems. We further explore the characteristics of these central regions across different countries. We identify and discuss a general pattern in the surveyed countries, but also some important exceptions. Our study can serve as a starting point for investigating potential geographical and political points of control. Journal: Int. J. of Networking and Virtual Organisations Pages: 379-397 Issue: 3 Volume: 21 Year: 2019 Keywords: internet governance; autonomous systems; geography; geolocation. File-URL: http://www.inderscience.com/link.php?id=103435 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:ids:ijnvor:v:21:y:2019:i:3:p:379-397 Template-Type: ReDIF-Article 1.0 Author-Name: Isabella Eigner Author-X-Name-First: Isabella Author-X-Name-Last: Eigner Author-Name: Andreas Hamper Author-X-Name-First: Andreas Author-X-Name-Last: Hamper Author-Name: Nilmini Wickramasinghe Author-X-Name-First: Nilmini Author-X-Name-Last: Wickramasinghe Author-Name: Freimut Bodendorf Author-X-Name-First: Freimut Author-X-Name-Last: Bodendorf Title: Success factors for national eHealth strategies: a comparative analysis of the Australian and German eHealth system Abstract: The Australian and German healthcare systems share similar traits in insurance and healthcare management. Both nations have also embarked upon national eHealth strategies to connect stakeholders and enable collaboration in healthcare services throughout their respective countries. While Australia has focused on a platform-based approach initially termed 'personally controlled electronic health record', Germany introduced the 'electronic health card', mandatory for every publicly insured person. This paper presents a comparative analysis of the Australian and German eHealth systems to determine commonalities, barriers and success factors of both strategies. A combined PESTLE/SWOT-analysis is used. Results show the key advantages and obstacles of both approaches and identify relevant areas for successful eHealth implementation. Journal: Int. J. of Networking and Virtual Organisations Pages: 399-424 Issue: 4 Volume: 21 Year: 2019 Keywords: eHealth; Australia; Germany; SWOT analysis; PESTLE analysis; PCEHR; MyHealthRecord; electronic health card; EHC. File-URL: http://www.inderscience.com/link.php?id=103681 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:ids:ijnvor:v:21:y:2019:i:4:p:399-424 Template-Type: ReDIF-Article 1.0 Author-Name: N. Divya Lakshmi Author-X-Name-First: N. Divya Author-X-Name-Last: Lakshmi Author-Name: V. Khanaa Author-X-Name-First: V. Author-X-Name-Last: Khanaa Title: Mobility and load-based vertical handoff decision in 4G networks Abstract: 4G network is the most efficient technology today. Its effectiveness in providing very high data rate and supporting various technologies simultaneously is very helpful in this fast developing world. Hence, 4G has emerged out as a highly promising network. This wireless network is capable of supporting a number of technologies and so it is necessary to assure that the mobile terminal is being handed off to the right technology. This decision has to be taken by considering several factors related to the base station, access point and received signal strength. So in this paper, we develop a vertical handoff technique which performs handover only after confirming that the handoff will be valid so as to avoid any false handoff occurrence. Then the decision related to the technology to which the mobile terminal has to be connected is made by using the decision function. Thus, in this paper the mobile terminal is handed over to the right wireless technology without carrying out any false handoff process. Journal: Int. J. of Networking and Virtual Organisations Pages: 425-437 Issue: 4 Volume: 21 Year: 2019 Keywords: 4G network; wireless technology; handoff process; mobility. File-URL: http://www.inderscience.com/link.php?id=103682 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:ids:ijnvor:v:21:y:2019:i:4:p:425-437 Template-Type: ReDIF-Article 1.0 Author-Name: Yongjian Li Author-X-Name-First: Yongjian Author-X-Name-Last: Li Author-Name: Dongbo Liu Author-X-Name-First: Dongbo Author-X-Name-Last: Liu Title: An efficient bandwidth reservation policy for data-intensive applications in cloud Abstract: Recently, more and more data-intensive applications have been deployed in cloud platforms due to its cost-effective and elastic capability. Although computing resources (i.e., CPU and RAM) can be provisioned in on-demand manner, the network bandwidth has enforce certain admission controlling for providing desirable quality-of-service (QoS). As a result, data-intensive applications often suffer from high delay during the phase of bulk data transferring between computing nodes. In this paper, we present an integrated bandwidth reservation algorithm, which combines different admission controlling policies and minimises the finishing time for all jobs in an online manner. Performance evaluation on a real-world cloud platform shows that the proposed reservation algorithm can ensure efficient bulk data transferring even when the system is facing heavy workloads. Journal: Int. J. of Networking and Virtual Organisations Pages: 438-454 Issue: 4 Volume: 21 Year: 2019 Keywords: bandwidth reservation; relaxed policy; constrained optimisation; cloud computing. File-URL: http://www.inderscience.com/link.php?id=103683 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:ids:ijnvor:v:21:y:2019:i:4:p:438-454 Template-Type: ReDIF-Article 1.0 Author-Name: Tienan Zhang Author-X-Name-First: Tienan Author-X-Name-Last: Zhang Title: A QoS ranking and controlling framework in virtualised clouds Abstract: In cloud computing, quality of service (QoS) has become an important issue either from the perspective of cloud providers or users. In this paper, we present a lightweight framework, namely cloud QoS ranking and controlling (CQRC), which integrates a QoS ranking service and a fine-grained QoS controller. The QoS ranking service provides an effective approach to quickly evaluating the QoS level of any cloud resources or services based on historical performances; the QoS controller is designed by using feedback control technique and is capable of self-tuning the underlying virtual machine (VM) configurations. The proposed framework is implemented and evaluated in a real-world cloud platform through a set of experiments and the results indicate that its QoS ranking service can significantly reduce the frequency of QoS violations and the QoS controller can achieve better tradeoffs between performance and cost for cloud providers. Journal: Int. J. of Networking and Virtual Organisations Pages: 455-470 Issue: 4 Volume: 21 Year: 2019 Keywords: resource virtualisation; virtual machine; scheduling algorithm; cloud computing. File-URL: http://www.inderscience.com/link.php?id=103684 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:ids:ijnvor:v:21:y:2019:i:4:p:455-470 Template-Type: ReDIF-Article 1.0 Author-Name: S. Karthikeyini Author-X-Name-First: S. Author-X-Name-Last: Karthikeyini Author-Name: S. Shankar Author-X-Name-First: S. Author-X-Name-Last: Shankar Title: Literature review of QoS and related issues of vehicular ad hoc network Abstract: Vehicular communication system delivers two main types of communications that is vehicle to vehicle and vehicle to infrastructure. It offers information sharing, cooperative driving, and value added services like navigation, internet access, etc. Communication between vehicle to vehicle (V2V) and vehicle to infrastructure (V2I) are ad hoc in nature that is why it's called as a vehicular ad hoc network. There is an opportunity for that it will become a world largest ad hoc network. Even though there are so many advantages in VANET, some consequences are there to defeat. In this paper, we have concentrated on a survey of VANET issues and solved by various authors. Our study demonstrates the overall works and results concerning different routing algorithms and its performance, collision issues, broadcast mechanism, message alerts creation for vehicles, cluster formation for communication, real-time emergency healthcare at vehicles and so on. Journal: Int. J. of Networking and Virtual Organisations Pages: 471-488 Issue: 4 Volume: 21 Year: 2019 Keywords: AODV; BP-MDF; DSRC; MAC protocol; PTMAC; TDMA; vehicular ad hoc networks; VANET; wireless wide area network; WWAN. File-URL: http://www.inderscience.com/link.php?id=103685 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:ids:ijnvor:v:21:y:2019:i:4:p:471-488