Template-Type: ReDIF-Article 1.0 Author-Name: Han Catherine Lin Author-X-Name-First: Han Catherine Author-X-Name-Last: Lin Author-Name: David Phillips Author-X-Name-First: David Author-X-Name-Last: Phillips Author-Name: Nilmini Wickramasinghe Author-X-Name-First: Nilmini Author-X-Name-Last: Wickramasinghe Title: Digitising Chinese medicine clinical practice - a patient management system Abstract: Complementary medicine, such as Chinese medicine (CM), has been used for thousands of years to treat various health issues. In today's technology age, it behoves us to investigate opportunities to utilise information systems/information technology (IS/IT) to support the practices of CM. To do this, the following proffers, extending Churchman's inquiring system concepts in order to propose a CM inquiring system. This is done by incorporating Hegelian and Kantian inquiring systems with support from Singerian, Lockean, and Leibnizian inquiring systems, and key concepts of knowledge management to model the unique aspects of CM practice and thereby design and develop a possible technology solution. Combining qualitative methodology techniques with case study and design science methods, a specific CM inquiring system, a patient management system (PMS) prototype, was designed. The developed PMS represents a first step in the incorporation of IS/IT into CM practice. Journal: Int. J. of Networking and Virtual Organisations Pages: 40-66 Issue: 1 Volume: 24 Year: 2021 Keywords: clinical system; Chinese medicine; patient management system; PMS; information technology; information systems. File-URL: http://www.inderscience.com/link.php?id=111616 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:ids:ijnvor:v:24:y:2021:i:1:p:40-66 Template-Type: ReDIF-Article 1.0 Author-Name: Zhiqiang Gao Author-X-Name-First: Zhiqiang Author-X-Name-Last: Gao Title: Intelligent building BIM fusion data analysis framework based on speech recognition and sustainable computing Abstract: With the development of national economy, the level of science and technology, and the improvement of people's living standard, the amount of urban data expand at the geometric multiple growth rate, with more and complex buildings. Therefore, the traditional two-dimensional plane data is difficult to meet our data needs for such a complex urban system. BIM model has been applied to many fields, such as building engineering, model visualisation and indoor path planning. However, the BIM model has no description of geographic information, resulting in the limited application of the model in the space. The concept of smart city originated from 'Smart Earth'. 'Smart Earth' refers to the formation of internet of things and internet connection in various media such as hospitals, power grids, railways, etc., to achieve the integration of human society and physical systems. In practical application, speech recognition is usually combined with the natural language understanding, natural language generation and speech synthesis technology to provide a natural and smooth human-computer interaction platform based on speech. This paper constructs a BIM data fusion framework based on speech recognition model with sustainable computing. Experimental results show that this method can effectively analyse BIM data and obtain satisfactory result. Journal: Int. J. of Networking and Virtual Organisations Pages: 83-101 Issue: 1 Volume: 25 Year: 2021 Keywords: speech recognition; signal processing; intelligent building; BIM; data fusion; smart city. File-URL: http://www.inderscience.com/link.php?id=117760 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:ids:ijnvor:v:25:y:2021:i:1:p:83-101 Template-Type: ReDIF-Article 1.0 Author-Name: Peng Xiao Author-X-Name-First: Peng Author-X-Name-Last: Xiao Title: CWOM: a lightweight cloud-oriented workflow optimisation middleware Abstract: In recent years, more and more workflow applications have been developed to execute on various kinds of cloud platforms. Although many cloud-based workflow management and enactment systems have been proposed, there are still many challenges when deploying and executing workflows on various kinds of real-world cloud platform. In this paper, we present a lightweight framework, namely <i>cloud-oriented workflow optimisation middleware</i> (CWOM), which is designed for easing the work of optimising the workflow execution efficiency as well as the work of realising fine-grained workflow management. The proposed CWOM is implemented as a plug-in middleware that can interact with the other workflow services and therefore provide more desirable services for workflow applications. Another advantage of our CWOM is that its services are loosely coupled with other cloud services, which makes it more flexible and configurable in most of the real-world cloud platforms. To investigate the effectiveness of the proposed system, we deploy the prototype implementation of CWOM in a campus-based cloud platform, and the experimental results indicate that it can significantly improve the delivered QoS and enhance the service level offered by conventional workflow solutions. Journal: Int. J. of Networking and Virtual Organisations Pages: 67-83 Issue: 1 Volume: 24 Year: 2021 Keywords: cloud computing; workflow; virtual machine; performance monitor. File-URL: http://www.inderscience.com/link.php?id=111617 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:ids:ijnvor:v:24:y:2021:i:1:p:67-83 Template-Type: ReDIF-Article 1.0 Author-Name: S. Shinly Swarna Sugi Author-X-Name-First: S. Shinly Swarna Author-X-Name-Last: Sugi Author-Name: S. Raja Ratna Author-X-Name-First: S. Raja Author-X-Name-Last: Ratna Title: Optimal feature selection in intrusion detection using SVM-CA Abstract: Feature selection plays a vital role in toning down the effects of the curse of dimensionality in the humungous datasets seen in intrusion detection. Feature selection algorithms are used to pick the relevant features and averts the extraneous and repeated features from the dataset to improve the efficiency. It can reduce processing time, dimension of data and enhance the performance of the system in terms of precision and training time. This paper proposes a novel variant of support vector machine, known as SVM correlation algorithm (SVM-CA) to choose the relevant features. The combination of SVM with correlation algorithm enhances the classification accuracy. Our proposed SVM-CA algorithm deals with the problems faced by the existing algorithm like low accuracy and high detection time. The performance of the algorithm is appraised by five parameters including the modelling time, true positive rate (TPR), false positive rate (FPR) and accuracy. The experimental results show that our proposed technique decreases the false positive rate and processing time. Journal: Int. J. of Networking and Virtual Organisations Pages: 103-113 Issue: 2 Volume: 25 Year: 2021 Keywords: correlation algorithm feature selection; intrusion detection; support vector machine; SVM; machine learning. File-URL: http://www.inderscience.com/link.php?id=119058 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:ids:ijnvor:v:25:y:2021:i:2:p:103-113 Template-Type: ReDIF-Article 1.0 Author-Name: Hua Wang Author-X-Name-First: Hua Author-X-Name-Last: Wang Title: Sustainable data analysis framework of smart city based on wireless sensor network Abstract: Under the background of the new era, the construction of smart society has been promoted to the national level. In terms of technology, smart city applies the new generation of information and communication technology to all walks of life in the city, and transmits information through communication mechanisms, including communication network and internet. With the continuous development of wireless sensor network technology, smart phone communication technology and internet information technology, remote wireless mobile home monitoring system will become one of the mainstream of smart home network. Wireless sensor network and wireless communication technology monitor various devices and monitoring targets in the form of self-organising multi-hop. Therefore, this paper studies the sustainable data analysis model of intelligent city based on wireless sensor network. The performance of the model is validated through the public database, and the results are satisfactory. Journal: Int. J. of Networking and Virtual Organisations Pages: 114-133 Issue: 2 Volume: 25 Year: 2021 Keywords: wireless sensor network; WSN; sustainable development; smart city; energy saving measures; data analysis; smart home; monitoring. File-URL: http://www.inderscience.com/link.php?id=119059 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:ids:ijnvor:v:25:y:2021:i:2:p:114-133 Template-Type: ReDIF-Article 1.0 Author-Name: Gang Zhang Author-X-Name-First: Gang Author-X-Name-Last: Zhang Author-Name: Tiechun Li Author-X-Name-First: Tiechun Author-X-Name-Last: Li Title: Framework design of urban traffic planning based on wireless network optimisation and cognitive sustainable data retrieval Abstract: With the acceleration of urban development in China, the development of urban traffic system should be improved. Therefore, there are many problems such as traffic congestion, resource shortage and environmental pollution. Transportation is one of most basic needs for the survival and development of human society. Urban traffic planning is of great significance to the sustainable development of modern cities. It should be noted that urban traffic planning is only a part of urban planning, but there is a very close relationship between them. If in the process of urban traffic planning, the value of urban traffic planning can not be brought into full play if the coordination relationship between them is not clarified. In order to avoid the above problems, traffic management departments have established various traffic management information systems with the help of wireless network optimisation technology. The data structure and supported data types of each system are also different, which results in the operation of "island" management information system, therefore, this paper constructs a framework of urban traffic planning based on wireless network optimisation model and cognitive sustainable data retrieval. We optimise the communication model to construct the efficient system. Journal: Int. J. of Networking and Virtual Organisations Pages: 134-151 Issue: 2 Volume: 25 Year: 2021 Keywords: wireless network optimisation; cognitive model; data retrieval; sustainable development; urban traffic planning. File-URL: http://www.inderscience.com/link.php?id=119063 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:ids:ijnvor:v:25:y:2021:i:2:p:134-151 Template-Type: ReDIF-Article 1.0 Author-Name: Hanxiao Li Author-X-Name-First: Hanxiao Author-X-Name-Last: Li Title: Painting image quality on visual art analysis for information transmission of wireless networks Abstract: As a treasure of human civilisation, painting art has immeasurable artistic value. However, due to the influence of human factors, accidents and natural environment, there are different degrees of damage. Traditional image acquisition is based on RGB three channel chroma information acquisition, which can not objectively represent the colour information of painting works. In the research of computational aesthetics, it is necessary to analyse the high-resolution images of paintings. However, most of the actual paintings are low resolution, so this paper studies the influence of the quality of painting images on the visual art analysis effect. Nowadays, wireless network is widely used and has become the main way of user terminal access to the network. With the rapid development of wireless network services, especially the development of mobile services, the performance requirements of data transmission under wireless networks are becoming higher and higher. Based on the development of wireless network transmission technology, this paper studies the image quality analysis system of visual art painting. The designed system is validated through different scenarios. The experimental results have proven the effectiveness. Journal: Int. J. of Networking and Virtual Organisations Pages: 152-173 Issue: 2 Volume: 25 Year: 2021 Keywords: wireless network transmission; visual art; painting image; quality analysis; embedded system. File-URL: http://www.inderscience.com/link.php?id=119064 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:ids:ijnvor:v:25:y:2021:i:2:p:152-173 Template-Type: ReDIF-Article 1.0 Author-Name: Hanxiao Li Author-X-Name-First: Hanxiao Author-X-Name-Last: Li Title: Wireless image transmission network: 3D modelling based on 2D hand drawing with sustainable computing Abstract: Nowadays, we can describe the world in a variety of ways, such as the original text description form, and then to the voice, image, video and other multimedia forms. All these make the methods of describing the world more and more abundant. The appearance of 3D model and 3D scene extends the way of describing the world to 3D space. Because it is closer to the real world, our perception is more rich and more realistic. In the two-dimensional art creation, it is the basic operation mode for art personnel to input and draw two-dimensional images by the handwriting pad. This way is close to manual drawing, in line with the operating habits of artists. In recent years, the emerging research on computational sustainability has become an effective way and a new research hotspot of image wireless transmission. The advent of big data era brings opportunities for the research of computational sustainability, as well as new challenges such as problem complexity, computational efficiency, and method scalability. Based on this background, this paper designs the 3D modelling of 2D hand drawn wireless image transmission network based on sustainable computing model. Journal: Int. J. of Networking and Virtual Organisations Pages: 174-196 Issue: 2 Volume: 25 Year: 2021 Keywords: sustainable computing; big data; 2D image; hand-drawn graph; wireless transmission network; 3D modelling. File-URL: http://www.inderscience.com/link.php?id=119065 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:ids:ijnvor:v:25:y:2021:i:2:p:174-196 Template-Type: ReDIF-Article 1.0 Author-Name: Sun Bing Author-X-Name-First: Sun Author-X-Name-Last: Bing Title: Wireless network for computer puzzle online software cloud platform based on CBIR and sustainable computing Abstract: Wireless network for the computer puzzle online software cloud platform based on the CBIR and sustainable computing is proposed in this paper. In order to improve the ability to resist shortcut attacks, which is generally speaking, encryption algorithms, the higher the number of rounds, the better of the overall performance, because the attack from the crack encryption algorithm. On the other hand, the efficiency of shortcut attack is obviously more than that of exhaustive key search attack high. Hence, we propose two novelty aspects: 1) the CBIR is optimised using the machine learning models to enhance the computational robustness; 2) the WSN and computing models are combined to improve the robustness of the proposed methodology. Our research fins the optimal combination of the wireless systems with the CBIR system that will improve the efficiency. The experimental results have shown that the performance of the model is validated both from accuracy level and robustness level. Journal: Int. J. of Networking and Virtual Organisations Pages: 197-212 Issue: 2 Volume: 25 Year: 2021 Keywords: CBIR technology; wireless network; sustainable computing; online software; cloud platform. File-URL: http://www.inderscience.com/link.php?id=119069 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:ids:ijnvor:v:25:y:2021:i:2:p:197-212 Template-Type: ReDIF-Article 1.0 Author-Name: Ai Xu Author-X-Name-First: Ai Author-X-Name-Last: Xu Author-Name: Yijia Gao Author-X-Name-First: Yijia Author-X-Name-Last: Gao Title: Pricing and coordination with contract for the green supply chain of Chinese home appliances industry with retailer's promotional efforts Abstract: This study focuses on the decision-making about the pricing issues for home appliances companies when recycling waste home appliances. We suppose three collection methods for the recycling of waste home appliances, i.e., manufacturer collection (Model <i>M</i>), retailer collection (Model <i>R</i>) and third-party collection (Model 3<i>P</i>). Considering the effect of retailer's promotional efforts and the effective recycle behaviour on the home appliances supply chain, game models are constructed respectively according to different collection methods. The optimal recycle prices for the waste home appliances and the optimal retailer's promotional efforts can be determined by these models. To improve the game effectiveness, revenue and expense-sharing contract models are designed in order that both the revenues and expenses related to the manufacturing, retailing, promotion and recycle operations in the green supply chain can be allocated among all participant players, thus the profits and effectiveness of the whole supply chain can be better improved. Lastly, all the pricing and contract models are successfully tested by using the green supply chain of Gree freon-free and inverter air-conditioner as a case. Journal: Int. J. of Networking and Virtual Organisations Pages: 107-125 Issue: 2 Volume: 24 Year: 2021 Keywords: pricing strategies; coordination with contract; green supply chain; promotional efforts; recycling waste home appliances; game models. File-URL: http://www.inderscience.com/link.php?id=114728 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:ids:ijnvor:v:24:y:2021:i:2:p:107-125 Template-Type: ReDIF-Article 1.0 Author-Name: Kun Huang Author-X-Name-First: Kun Author-X-Name-Last: Huang Author-Name: Ning Han Author-X-Name-First: Ning Author-X-Name-Last: Han Title: DSEM-SW: a data-service enhanced scientific workflow middleware for cloud computing Abstract: As more and more scientific workflows have been deployed and executed in cloud environments, how to optimise the execution efficiency and quality of workflow applications has become an important issue that needs to be addressed. Although many workflow management systems have been proposed in recent years, the performance bottleneck when running scientific workflows is still the low-efficiency of data-related services. In this paper, we present a workflow-oriented optimisation plug-in system, namely <i>data-service enhanced middleware for scientific workflow</i> (DSEM-SW), which provides a set of mechanisms to improve the efficiency and quality of data processing when running scientific workflows. Extensive experiments are conducted to evaluate the performance of the proposed middleware in a real-world cloud test-bed. The experimental results indicate that our DSEM-SW outperforms many existing systems in terms of different performance metrics, and can significantly improve the execution efficiency of data-intensive workflows. Journal: Int. J. of Networking and Virtual Organisations Pages: 126-143 Issue: 2 Volume: 24 Year: 2021 Keywords: workflow; cloud computing; resource virtualisation; quality of data; QoD. File-URL: http://www.inderscience.com/link.php?id=114729 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:ids:ijnvor:v:24:y:2021:i:2:p:126-143 Template-Type: ReDIF-Article 1.0 Author-Name: Alhamza Munther Author-X-Name-First: Alhamza Author-X-Name-Last: Munther Author-Name: Ali Abdulrazzaq Author-X-Name-First: Ali Author-X-Name-Last: Abdulrazzaq Author-Name: Mosleh M. Abualhaj Author-X-Name-First: Mosleh M. Author-X-Name-Last: Abualhaj Author-Name: Ghada Almukhaini Author-X-Name-First: Ghada Author-X-Name-Last: Almukhaini Title: Reduce memory consumption for internet traffic classification Abstract: Application level traffic classification is an essential requirement for stable network operation and resource management. However, the classification's processing tends to face low resources when high volumes of traffic are being classified in high-speed networks in real time. Memory consumption considered to be a serious issue during classification processing time. In this paper, a data reduction method is proposed to decrease redundant data entry during the preprocessing phase with regard to accuracy classification. The proposed active build-model random forest (ABRF) eliminates redundant data-entry by utilising feature selection algorithm during the preprocessing phase. The proposed system successfully reduces the memory space of the entire classification process. The system is evaluated by comparing the proposed system against four classifiers (RF, NB, SVM and C5.0) and four features selection techniques (FCBF, SFE, Chi2 and GR). DR reported excellent results amongst the NB, C5.0 and RF. The results were optimised due to the data excluding 314,216 out of 774,013. Moreover, C5.0 consumed less memory space due to the decreased depth of C5.0 tree model. In conclusion, the DR was most effective on the RF model due to the nature of the ensemble classifier. Journal: Int. J. of Networking and Virtual Organisations Pages: 144-160 Issue: 2 Volume: 24 Year: 2021 Keywords: internet traffic classification; machine learning; feature selection techniques; supervised learning; random forest. File-URL: http://www.inderscience.com/link.php?id=114730 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:ids:ijnvor:v:24:y:2021:i:2:p:144-160 Template-Type: ReDIF-Article 1.0 Author-Name: Annapurna P. Patil Author-X-Name-First: Annapurna P. Author-X-Name-Last: Patil Author-Name: Lalitha Chinmayee M. Hurali Author-X-Name-First: Lalitha Chinmayee M. Author-X-Name-Last: Hurali Title: Analysis of routing protocols for software-defined vehicular ad hoc networks Abstract: With the rapid development of smart cities, intelligent transport systems (ITSs) have revolutionised the modern transportation system. Vehicular ad hoc networks (VANETs) have become the backbones of the ITS. These VANETs are characterised by high mobility and dynamically changing topology, leading to frequent link breaks. Thus, routing is an essential aspect of VANETs, contributing to the overall network performance. Some challenges regarding routing are diminished quality of service (QoS), heterogeneous networks, and security. These challenges are efficiently addressed by a networking paradigm called software define networking (SDN). In this paper, we present the current state of the art in SDN based routing along with its merits. Also, a novel taxonomy of such routing protocols based on the organisation of the SDN controller, QoS metric, security, heterogeneity, and type of communication is presented. We conclude the analysis with the benefits of SDN-based routing over the traditional network-based VANETs concerning QoS, security, and heterogeneity in the networks. Journal: Int. J. of Networking and Virtual Organisations Pages: 161-181 Issue: 2 Volume: 24 Year: 2021 Keywords: SDVNs; vehicular ad hoc networks; VANETs; smart cities; routing; software define networking; SDN; security; heterogeneity; intelligent transportation systems. File-URL: http://www.inderscience.com/link.php?id=114731 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:ids:ijnvor:v:24:y:2021:i:2:p:161-181 Template-Type: ReDIF-Article 1.0 Author-Name: Hani Al-Dmour Author-X-Name-First: Hani Author-X-Name-Last: Al-Dmour Author-Name: Ahmad Aloqaily Author-X-Name-First: Ahmad Author-X-Name-Last: Aloqaily Author-Name: Rawan Al-Qaimari Author-X-Name-First: Rawan Author-X-Name-Last: Al-Qaimari Author-Name: Malak Al-Hassan Author-X-Name-First: Malak Author-X-Name-Last: Al-Hassan Title: The effect of the electronic word of mouth on purchase intention via the brand image as a mediating factor: an empirical study Abstract: This study aims to investigate the impact of electronic word of mouth (eWOM) on the brand image and purchase intention in the telecommunication sector in Jordan. A quantitative-based approach was used for data collection, and a research model was suggested and tested empirically using a sample of 354 respondents who had experiences with the internet and social media. Measurement items are adopted and modified from existing scales found in the relevant prior studies to fit the study's objectives. Using multiple regression analysis, the findings show that eWOM has a positive significant effect on both purchase intention and brand image; the brand image has a significant impact on purchase intention, and eWOM has a fully indirect impact on purchase intention through the brand image as a mediating factor. The current study suggested that telecommunication service providers should wisely and professionally focus on eWOM's favourable contacts to promote a brand image that will later promote the customers' purchase intention. Journal: Int. J. of Networking and Virtual Organisations Pages: 182-199 Issue: 2 Volume: 24 Year: 2021 Keywords: regression analysis; electronic word of mouth; eWOM; brand image; purchase intention; mobile and internet; Jordanian telecommunication sector. File-URL: http://www.inderscience.com/link.php?id=114732 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:ids:ijnvor:v:24:y:2021:i:2:p:182-199 Template-Type: ReDIF-Article 1.0 Author-Name: Pith Soh Beh Author-X-Name-First: Pith Soh Author-X-Name-Last: Beh Author-Name: Suat Chin Ng Author-X-Name-First: Suat Chin Author-X-Name-Last: Ng Author-Name: Amanda Nikolic Author-X-Name-First: Amanda Author-X-Name-Last: Nikolic Author-Name: Matija Radojcic Author-X-Name-First: Matija Author-X-Name-Last: Radojcic Author-Name: Grace Chew Author-X-Name-First: Grace Author-X-Name-Last: Chew Author-Name: Nilmini Wickramasinghe Author-X-Name-First: Nilmini Author-X-Name-Last: Wickramasinghe Author-Name: Philip Smart Author-X-Name-First: Philip Author-X-Name-Last: Smart Title: The increased use of WhatsApp® application within a colorectal surgery team Abstract: The aim of this study was to analyse the volume and pattern of usage, media types and message contents of a smartphone group communication app within an acute surgical unit. WhatsApp® chatgroup history of a colorectal unit from August 2017 till January 2018 was analysed. The messages were categorised into text and multimedia messages, and further classified into groups based on contents, time of transmission and position of sender. 69% (11 of 16) of the participants were aged between 20-29 years old. 5,004 (4,498 clinical, 506 non-clinical) messages were transmitted over six months. 242 (5%) were multimedia messages or photographs. Of the clinical messages, 3,721 (83%) messages were relevant to patient care. There was significant after-hours communication (1,156, 23%). WhatsApp® usage peaked in December (1,555 messages). WhatsApp® meets the communication demands of clinical practice in a surgical unit. Its ability to support multimedia formats has significant advantage over traditional communication tools. Despite data security concerns, its usage had increased over time. Journal: Int. J. of Networking and Virtual Organisations Pages: 200-210 Issue: 2 Volume: 24 Year: 2021 Keywords: smartphone; WhatsApp®; information science; communication; surgical unit. File-URL: http://www.inderscience.com/link.php?id=114734 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:ids:ijnvor:v:24:y:2021:i:2:p:200-210 Template-Type: ReDIF-Article 1.0 Author-Name: Said Azelmad Author-X-Name-First: Said Author-X-Name-Last: Azelmad Title: eGovernment whole-of-government approach for good governance: the case of the system GID in Morocco Abstract: Public administration reforms, in Morocco, called for the use of ICTs to connect administrations in a whole-of-government approach, building a culture of collaboration and good governance. Indeed, coordination theory supports the networked bureaucracy, as a catalyst for heterogeneous multi-stakeholder management, internal auditing and synergy. Institutional networked coordination is believed to increase interoperability and integration among offices for transparency and mutual accountability. A mutual collaboration (G<SUB align="right"><SMALL>2</SMALL></SUB>G) that is deemed to better governance, streamline workflows and reduce duplication of workflows and tasks. However, stove-piped management remains always a bad omen for networked governance for its single-purpose management. It is believed to separate offices in corrupted dispersed silos and bureaucracies, operating in ambiguity, red tape and bad governance. Results from an online survey of public agents, using the GID system in Morocco (<i>n</i> = 253) was used to empirically analyse the effect of eGovernment whole-of-government approach on good governance ethics in back offices, using PLS-SEM. Journal: Int. J. of Networking and Virtual Organisations Pages: 211-234 Issue: 3 Volume: 24 Year: 2021 Keywords: eGovernment; good governance; connected governance; whole-of-government approach; silo-based approach; coordination theory; GID system; expenditure management; interoperability; integration; reforms; back office deliveries; Morocco. File-URL: http://www.inderscience.com/link.php?id=115813 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:ids:ijnvor:v:24:y:2021:i:3:p:211-234 Template-Type: ReDIF-Article 1.0 Author-Name: Mohammad Samadi Gharajeh Author-X-Name-First: Mohammad Samadi Author-X-Name-Last: Gharajeh Author-Name: Babak Jahangir Author-X-Name-First: Babak Author-X-Name-Last: Jahangir Title: A double-controller fuzzy scheme for intelligent resource discovery on IaaS cloud systems Abstract: The resource discovery process discovers appropriate computing resources (e.g., shared memory) in infrastructure as a service (IaaS) cloud systems according to user requirements. Since fuzzy systems use intelligent procedures based on humanistic experiences, they can be used in cloud computing to increase the number of completed jobs and improves the success rate. This paper proposes a double-controller fuzzy scheme for intelligent resource discovery in IaaS cloud systems, called DOCFIR. This scheme applies two fuzzy controllers to perform the intelligent resource discovery across the network. The first controller determines the number of virtual machines in the deployment phase based on the most important characteristics of the physical machines. The second controller discovers the appropriate computing resources for the user's job in the service phase based on characteristics of the physical machines and user requirements. The simulation results show that the proposed scheme surpasses some of the existing related works in terms of the number of completed jobs and success rate. Journal: Int. J. of Networking and Virtual Organisations Pages: 235-249 Issue: 3 Volume: 24 Year: 2021 Keywords: cloud computing; cloud system; distributed system; resource management; resource discovery; intelligent strategy; artificial intelligence; fuzzy logic; intelligent controller; number of completed jobs; success rate. File-URL: http://www.inderscience.com/link.php?id=115816 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:ids:ijnvor:v:24:y:2021:i:3:p:235-249 Template-Type: ReDIF-Article 1.0 Author-Name: V. Vignesh Author-X-Name-First: V. Author-X-Name-Last: Vignesh Author-Name: R. Santhosh Author-X-Name-First: R. Author-X-Name-Last: Santhosh Title: Improved grey wolf optimisation algorithm for heterogeneous cloud environment task scheduling Abstract: The attraction towards cloud computing by industry and individuals increases everyday as the benefits and advantages are much reliable and convenient to user to make the process simple. Software and data giants like Google, Microsoft, and Apple are efficiently utilising the cloud features and the research towards improving its efficiency and utilisation is going on worldwide. Cloud computing has large computational data intensive task and by reducing the complexity of task scheduling the efficiency could be improved. This research identifies the issues the existing task scheduling model and provides an optimised scheduling algorithm. Conventional models such as particle swarm optimisation and PBEES algorithm are compared with proposed improved grey wolf optimisation model experimentally to achieve 96% of utilisation efficiency. This reduces the computation cost and provides high performance computing with reliability among the clients and service providers. Journal: Int. J. of Networking and Virtual Organisations Pages: 250-266 Issue: 3 Volume: 24 Year: 2021 Keywords: cloud computing; learning-based grey wolf; reliability. File-URL: http://www.inderscience.com/link.php?id=115817 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:ids:ijnvor:v:24:y:2021:i:3:p:250-266 Template-Type: ReDIF-Article 1.0 Author-Name: Shilpa Chaudhari Author-X-Name-First: Shilpa Author-X-Name-Last: Chaudhari Title: A survey on multipath routing techniques in wireless sensor networks Abstract: Wireless sensor networks (WSNs) usually consist of tiny sensor nodes to sense the environmental data that are transferred to the sink node via route discovered using unicast/multipath routing protocol. The multipath routing protocols improve load balancing and quality of service in addition to the reliable transfer of sensed data to the sink simultaneously by reducing delay and congestion. This survey gives a brief introduction about the existing multipath routing protocols in the literature and its classifications into four categories as follows. 1) Distributed meta-heuristic-based route discovery uses intelligent algorithms for path discovery; 2) local-heuristic knowledge-based route discovery uses node level statistics to discover the route; 3) route discovery specific to multimedia applications; 4) route discovery for secure transmission of data. A comparison between these protocols in terms of various routing parameters for path discovery, traffic distribution, and path maintenance is described for each class of multipath routing protocols. Journal: Int. J. of Networking and Virtual Organisations Pages: 267-328 Issue: 3 Volume: 24 Year: 2021 Keywords: wireless sensor network; WSN; routing; multipath routing; path discovery. File-URL: http://www.inderscience.com/link.php?id=115818 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:ids:ijnvor:v:24:y:2021:i:3:p:267-328 Template-Type: ReDIF-Article 1.0 Author-Name: Phani Gannamraju Author-X-Name-First: Phani Author-X-Name-Last: Gannamraju Author-Name: Satyanarayana Yarramsetti Author-X-Name-First: Satyanarayana Author-X-Name-Last: Yarramsetti Author-Name: L.S. Kumar Author-X-Name-First: L.S. Author-X-Name-Last: Kumar Title: Radio frequency identification and internet of things-based smart library management system Abstract: Libraries are essential parts of educational institutes that provide teaching resources and information. There is a loss of library resources due to the inefficiency of manual library systems which are not updating the information regularly. This paper aims to improve the existing library management systems at the university level using radio frequency identification technology (RFID) and the internet of things (IoT). RFID is a fast emerging technology as it enhances authenticity and reliability. The proposed smart library system uses RFID tag, RFID tag reader, ESP8266, and back-end database that store the required content. It automates the issue and return of books with minimum human intervention. The designed library portal gives the availability of a variety of library resources, book transaction information, and fine details for both students and staff. The data analysis of book transaction details is done and data visualisation is also made available to both user and admin. Journal: Int. J. of Networking and Virtual Organisations Pages: 329-346 Issue: 4 Volume: 24 Year: 2021 Keywords: smart library; internet of things; IoT; library management; radio frequency identification; RFID; ESP8266; MySQL; one time password; OTP; database server; data analysis. File-URL: http://www.inderscience.com/link.php?id=116430 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:ids:ijnvor:v:24:y:2021:i:4:p:329-346 Template-Type: ReDIF-Article 1.0 Author-Name: Ninni Ylönen Author-X-Name-First: Ninni Author-X-Name-Last: Ylönen Author-Name: Matti Rissanen Author-X-Name-First: Matti Author-X-Name-Last: Rissanen Author-Name: Antti Ylä-Kujala Author-X-Name-First: Antti Author-X-Name-Last: Ylä-Kujala Author-Name: Tiina Sinkkonen Author-X-Name-First: Tiina Author-X-Name-Last: Sinkkonen Author-Name: Salla Marttonen-Arola Author-X-Name-First: Salla Author-X-Name-Last: Marttonen-Arola Author-Name: David Baglee Author-X-Name-First: David Author-X-Name-Last: Baglee Author-Name: Timo Kärri Author-X-Name-First: Timo Author-X-Name-Last: Kärri Title: A web of clues: can ecosystems be profiled similarly to criminals? Abstract: The concept of an ecosystem has raised interest in many areas of research over the decades. There is a growing need to model and guide the operations, not just in single companies but also on ecosystem level. To be able to do this, new and better tools are needed. This paper explores the ecosystems of organisations and presents the process for building an ecosystem profile. To understand ecosystems better, managers can utilise ecosystem profiles like criminal investigators utilise criminal profiles. Design science research is used to create the process, and the process steps utilise methods from web farming and social network analysis. The created process is tested with an illustrative case. The process and the profiles created with it can be used by both researchers and managers. The ecosystem profile makes sense of the complex structure and gives data-based insights into the ecosystem under review. Journal: Int. J. of Networking and Virtual Organisations Pages: 347-373 Issue: 4 Volume: 24 Year: 2021 Keywords: ecosystem profile; business ecosystem; profiling; design science research; DSR; web farming; social network analysis; SNA; visualisation; ecosystem map; ecosystem management. File-URL: http://www.inderscience.com/link.php?id=116431 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:ids:ijnvor:v:24:y:2021:i:4:p:347-373 Template-Type: ReDIF-Article 1.0 Author-Name: Ai Xu Author-X-Name-First: Ai Author-X-Name-Last: Xu Author-Name: Junsheng Kuang Author-X-Name-First: Junsheng Author-X-Name-Last: Kuang Author-Name: Zongqing Zhou Author-X-Name-First: Zongqing Author-X-Name-Last: Zhou Title: The implications of college students' online travel information seeking behaviour: a case study of why they use Ctrip OTA website in China Abstract: College students are becoming important consumers of online travel products and services. Consequently, it is important to try to understand their online travel information seeking behaviour. This paper reports a study in which a survey was conducted among college students from several Chinese universities. Data were collected using an online survey tool and posted on social media websites. A total of 206 valid responses were obtained. The descriptive statistics and the results from stepwise regression analysis show that social group influence, website information quality, website back-end support capacity, website security, and monthly living expenses are positively correlated to the students' use of the Ctrip website. Interestingly, this study shows no significant relationship between website usability and the use of the Ctrip website. This study's findings are important for tourism businesses seeking to improve their website design, marketing strategies, and online services. Journal: Int. J. of Networking and Virtual Organisations Pages: 374-386 Issue: 4 Volume: 24 Year: 2021 Keywords: online travel and tourism; travel behaviour; information seeking; tourism website; college students; Ctrip; China. File-URL: http://www.inderscience.com/link.php?id=116432 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:ids:ijnvor:v:24:y:2021:i:4:p:374-386 Template-Type: ReDIF-Article 1.0 Author-Name: Fadi Herzallah Author-X-Name-First: Fadi Author-X-Name-Last: Herzallah Author-Name: Mohannad Moufeed Ayyash Author-X-Name-First: Mohannad Moufeed Author-X-Name-Last: Ayyash Title: Understanding customers' continuous intention to use of social commerce via Facebook: a theoretical model and empirical examination Abstract: The current study proposes a model examining the impact of expectation-confirmation model-IS factors in combination with social commerce constructs to better understand the incentives behind customers' continued use of social commerce via Facebook in Palestine. The proposed model was tested by administering a survey to a number of 218 customers. The data was analysed using structural equation modelling (SEM). The findings revealed that perceived usefulness and social commerce constructs positively impact customers' satisfaction and continuous intention to use. Moreover, expectations of confirmation positively influence satisfaction and perceived usefulness. Customers' satisfaction positively impacts continuous intention to use; satisfaction is a more powerful determinant of continuous intention to use than perceived usefulness and S-commerce constructs. The findings can be used by social commerce service providers in formulating strategies toward proliferation of customers' continuous intention to use and can be useful for scholars to increase, improve and assess research on social commerce field. Journal: Int. J. of Networking and Virtual Organisations Pages: 387-407 Issue: 4 Volume: 24 Year: 2021 Keywords: electronic commerce; e-commerce; social commerce; S-commerce; Facebook; social network sites; expectation-confirmation model; continuous intention; Palestine. File-URL: http://www.inderscience.com/link.php?id=116433 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:ids:ijnvor:v:24:y:2021:i:4:p:387-407 Template-Type: ReDIF-Article 1.0 Author-Name: V. Vignesh Author-X-Name-First: V. Author-X-Name-Last: Vignesh Author-Name: R. Santhosh Author-X-Name-First: R. Author-X-Name-Last: Santhosh Title: Priority-based energy efficient multi queue heuristic scheduling for intensive data in cloud computing (PB-EES) Abstract: In general the problem-solving strategies used in heuristic approaches are different compared to conventional algorithms. They differ in handling the issues in different operating conditions thereby it enhances the overall performance of the system. In this research paper we have also implemented a heuristic scheduling approach in cloud computing environment to improve the energy efficiency. Since cloud needs a better scheduling module for intense data applications this proposed priority-based energy efficient multi queue heuristic scheduling model is suitable and provides efficient scheduling with minimum energy. Experimental results are compared with greedy and load balancing scheduler algorithms to prove that proposed model achieves 93.45% of energy efficiency. Journal: Int. J. of Networking and Virtual Organisations Pages: 1-13 Issue: 1 Volume: 25 Year: 2021 Keywords: cloud computing; heuristic model; energy efficiency; scheduling. File-URL: http://www.inderscience.com/link.php?id=117752 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:ids:ijnvor:v:25:y:2021:i:1:p:1-13 Template-Type: ReDIF-Article 1.0 Author-Name: A.G. Nagesha Author-X-Name-First: A.G. Author-X-Name-Last: Nagesha Author-Name: G. Mahesh Author-X-Name-First: G. Author-X-Name-Last: Mahesh Author-Name: Gowrishankar Author-X-Name-First: Author-X-Name-Last: Gowrishankar Title: Identifying DDoS attacks in 4G networks using artificial neural networks and principal component analysis Abstract: Denial-of-service (DoS) attack is one in which attackers make certain queries by sending messages to the remote or target servers with an intention to stop or shutdown the servers. Those messages cause such an impact to the servers that it makes no response for the users. When this DoS attack is performed using number of systems that are compromised for attacking a single system, then it is called as distributed denial-of-service (DDoS) attack. In this paper, an artificial neural network (ANN) combined with principal component analysis (PCA) is used to identify the traffic as normal or a DDoS attack in 4G networks. The feature space dimension is reduced using PCA and the dimensionally reduced features are given as input to the feed forward neural network for training. The experiment is conducted using KDD dataset. The recognition accuracy of the proposed system is improved when compared to the existing systems using RBF networks, naive Bayes and random forest. Journal: Int. J. of Networking and Virtual Organisations Pages: 14-28 Issue: 1 Volume: 25 Year: 2021 Keywords: DoS attacks; artificial neural networks; principal component analysis; 4G networks; KDD dataset. File-URL: http://www.inderscience.com/link.php?id=117753 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:ids:ijnvor:v:25:y:2021:i:1:p:14-28 Template-Type: ReDIF-Article 1.0 Author-Name: S. Kumar Chandar Author-X-Name-First: S. Kumar Author-X-Name-Last: Chandar Title: Forecasting intraday stock price using ANFIS and bio-inspired algorithms Abstract: The main focus of this study is to explore the predictability of stock price with variants of adaptive neuro-fuzzy inference system (ANFIS) and suggests a hybrid model to enhance the prediction accuracy. Two variants of ANFIS model are designed which includes genetic algorithm-ANFIS (GA-ANFIS) and particle swarm optimisation-ANFIS (PSO-ANFIS) to forecast stock price more accurately. The standard ANFIS is tuned employing GA and PSO algorithm. The experimental data used in this investigation are stocks traded per minute price of four companies from NSE. Sixteen technical indicators are calculated from the historical prices and used as inputs to the developed models. Prediction ability of the developed models is analysed by varying number of input samples. Numerical results obtained from the simulation confirmed that the PSO-ANFIS model has the potential to predict the future stock price more precisely than GA-ANFIS as well as other earlier methods. Journal: Int. J. of Networking and Virtual Organisations Pages: 29-47 Issue: 1 Volume: 25 Year: 2021 Keywords: adaptive neuro-fuzzy inference system; ANFIS; bio-inspired algorithm; genetic algorithm; intraday day; minute price; particle swarm optimisation; PSO. File-URL: http://www.inderscience.com/link.php?id=117754 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:ids:ijnvor:v:25:y:2021:i:1:p:29-47 Template-Type: ReDIF-Article 1.0 Author-Name: Indulekshmi S. Kaimal Author-X-Name-First: Indulekshmi S. Author-X-Name-Last: Kaimal Author-Name: G.S. Binu Author-X-Name-First: G.S. Author-X-Name-Last: Binu Title: A secure energy efficient event determination algorithm for underwater wireless sensor networks Abstract: Effective routing in underwater sensor networks (UWSNs) is a highly demanding task because of the weak radio channels in water and the changing topology of sensors that manoeuvre indifferently with water. Energy efficient derivative-based prediction (DBP) approach has been proposed to reduce the amount of messages required for transferring the data samples from a wireless sensor node to a base station. However, predicting sensor data is not effortless for underwater channels as they are prone to wormholes attack due to the inconsistent propagation delays. In this paper, an enhanced empirical data predicting method that not only predicts sensor data but also the topographical movements of the sensor nodes is presented. Further, a security aware locally restrained algorithm RDV-HOP is proposed to assess the influence of paths to other broadcaster nodes and to transmit the collected information to the network. The Advanced Encryption Standard (AES) algorithm is used to protect the confidentiality of data. The proposed method demonstrates a significant benefit in managing the dynamic networks with better energy efficiency even with extensive number of attackers. Extensive simulations were performed with variable number of wormhole attackers and the results show higher packet delivery ratio with reduced delay. Journal: Int. J. of Networking and Virtual Organisations Pages: 48-61 Issue: 1 Volume: 25 Year: 2021 Keywords: underwater wireless sensor network; derivative-based prediction; DBP; depth-based routing; DBR; encryption; prevention. File-URL: http://www.inderscience.com/link.php?id=117755 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:ids:ijnvor:v:25:y:2021:i:1:p:48-61 Template-Type: ReDIF-Article 1.0 Author-Name: Hamid Garmani Author-X-Name-First: Hamid Author-X-Name-Last: Garmani Author-Name: Driss Ait Omar Author-X-Name-First: Driss Ait Author-X-Name-Last: Omar Author-Name: Mohamed El Amrani Author-X-Name-First: Mohamed El Author-X-Name-Last: Amrani Author-Name: Mohamed Baslam Author-X-Name-First: Mohamed Author-X-Name-Last: Baslam Author-Name: Mostafa Jourhmane Author-X-Name-First: Mostafa Author-X-Name-Last: Jourhmane Title: A game theory approach for UAV-based flying access networks Abstract: In recent years, unmanned aerial vehicles (UAV) ad-hoc network has been receiving enormous attention from the research community, since they represent a new potential market. One promising application is to use UAVs in wireless communications field as a flying base station to extend coverage and to provide high-quality network connectivity. In this paper, we model and analyse the interactions in price, beaconing duration and quality of service among UAV. A full analysis of the game outcome, in terms of equilibrium price, equilibrium quality of service and equilibrium beaconing duration, is derived. Then we analyse the existence and uniqueness of the Nash equilibrium point under some conditions. Furthermore, we provide a learning algorithm that ensures convergence of the considered UAV with its unique Nash equilibrium operating point in a fast and distributed fashion. Finally, numerical investigations offer promising insights on how the game parameters should be chosen to efficiently control the game. Journal: Int. J. of Networking and Virtual Organisations Pages: 84-105 Issue: 1 Volume: 24 Year: 2021 Keywords: game theory; Nash equilibrium; unmanned aerial vehicle; UAV; beaconing duration; price; quality of service; QoS. File-URL: http://www.inderscience.com/link.php?id=111613 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:ids:ijnvor:v:24:y:2021:i:1:p:84-105 Template-Type: ReDIF-Article 1.0 Author-Name: Samuel Moreira Abreu Araújo Author-X-Name-First: Samuel Moreira Abreu Author-X-Name-Last: Araújo Author-Name: Fernanda Sumika Hojo De Souza Author-X-Name-First: Fernanda Sumika Hojo De Author-X-Name-Last: Souza Author-Name: Geraldo Robson Mateus Author-X-Name-First: Geraldo Robson Author-X-Name-Last: Mateus Title: On the analysis of online and periodic virtual network embedding in multi-domain environments Abstract: Network virtualisation has been seen as a key part of future networks. The virtual network embedding problem deals with the mapping of virtual network requests over a substrate composed by resources of one or more networks domains. In this problem, requests are processed individually upon arrival (online) or in batches (periodic). This work presents an analysis on how the online and periodic approaches affect the acceptance ratio, profit, energy consumption and attendance waiting metrics. An integer linear programming model is used to evaluate different simulation scenarios showing that: 1) the online and periodic approaches lead to losses of up to 25% compared to the offline one; 2) periodic approach increase acceptance, but also results in longer waiting times to fulfil a request; 3) the relation between acceptance and profit depends on the optimisation goal adopted; 4) the relation between profit and energy savings can induce a competition among different domains. Journal: Int. J. of Networking and Virtual Organisations Pages: 1-21 Issue: 1 Volume: 24 Year: 2021 Keywords: optimisation; virtual network embedding; multi-domain networks; energy saving; online and periodic approaches; simulation. File-URL: http://www.inderscience.com/link.php?id=111614 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:ids:ijnvor:v:24:y:2021:i:1:p:1-21 Template-Type: ReDIF-Article 1.0 Author-Name: Leander Luiz Klein Author-X-Name-First: Leander Luiz Author-X-Name-Last: Klein Author-Name: Breno Augusto Diniz Pereira Author-X-Name-First: Breno Augusto Diniz Author-X-Name-Last: Pereira Title: Dependence of companies on inter-organisational networks: an analysis beyond the benefits generated Abstract: The objective of this study is to verify the drivers of company-network dependency relationship and how these are evaluated in different phases of evolution of inter-organisational networks. A qualitative study was carried out through semi-structured interviews conducted with 20 entrepreneurs from ten different networks that were intentionally selected. Resources dependence theory and its assumptions, as well studies about benefits or competitive factors generated by collaborative relations between companies, were used as a base to identify and define the variables of this study. The results demonstrated that the generation of the dependence of the companies happens with the evolution of the networks and with their capacity to generate competitive advantages for them. The empirical evidences showed that the dependence of the companies with the networks is due to several resources generated by them. Journal: Int. J. of Networking and Virtual Organisations Pages: 22-39 Issue: 1 Volume: 24 Year: 2021 Keywords: small companies; dependence; resources; evolution of networks; inter-organisational networks. File-URL: http://www.inderscience.com/link.php?id=111615 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:ids:ijnvor:v:24:y:2021:i:1:p:22-39 Template-Type: ReDIF-Article 1.0 Author-Name: Kun Wang Author-X-Name-First: Kun Author-X-Name-Last: Wang Author-Name: Xiangbo Liang Author-X-Name-First: Xiangbo Author-X-Name-Last: Liang Title: Social wireless network user big data mining based on Python platform and hierarchical clustering computing Abstract: Human behaviour, because of its complexity, makes it very important and interesting to explore the law of human behaviour. In recent years, the online social network represented by online personal community, online dating network and social network makes the amount of data of network users surge. The era of big data online social network gives us unprecedented opportunities to study human behaviour. The development of information science, the emergence of computer and the development of modern data storage technology provide us with a new objective material basis for the study of human behaviour. Data mining is an interdisciplinary subject, involving statistics, pattern recognition, information retrieval, machine learning and other disciplines. Data mining has been paid more and more attention by domestic and foreign academic circles, and has become a research hotspot. Therefore, this paper studies social wireless network user big data mining based on hierarchical clustering computing, the system is implemented via Python and compared with the latest models. The convincing results have proven the effectiveness. Journal: Int. J. of Networking and Virtual Organisations Pages: 62-82 Issue: 1 Volume: 25 Year: 2021 Keywords: Python; hierarchical clustering; big data; social nature; wireless network; user data; data mining. File-URL: http://www.inderscience.com/link.php?id=117759 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:ids:ijnvor:v:25:y:2021:i:1:p:62-82