International Journal of Networking and Virtual Organisations
These articles have been peer-reviewed and accepted for publication but are pending final changes, are not yet published and may not appear here in their final order of publication until they are assigned to issues. Therefore, the content conforms to our standards but the presentation (e.g. typesetting and proof-reading) is not necessarily up to the Inderscience standard. Additionally, titles, authors, abstracts and keywords may change before publication. Articles will not be published until the final proofs are validated by their authors.
Forthcoming articles must be purchased for the purposes of research, teaching and private study only. These articles can be cited using the expression "in press". For example: Smith, J. (in press). Article Title. Journal Title.
Articles marked with this shopping trolley icon are available for purchase - click on the icon to send an email request to purchase.
Register for our alerting service, which notifies you by email when new issues are published online.
International Journal of Networking and Virtual Organisations (61 papers in press)
Special Issue on: 31st Bled eConference Digital Transformations in Healthcare
Abstract: Medical equipment is implemented in highly complex hospital environments, such as operating rooms, in hospitals around the world. In operating rooms (ORs), technological equipment is used for surgical activities and activities in support of surgeries. The implementation of government policies in hospitals has resulted in varying implementation activities for (medical) equipment. These result in varying lead times and success rates. An integral and holistic protocol for implementation does not yet exist. In this study, we introduce a protocol for the implementation of (medical) equipment in ORs that consists of implementation factors and implementation activities. Factors and activities are based on data from a systematic literature review and an explorative survey among surgical support staff on factors for the successful implementation of technological and (medical) equipment in ORs. The protocol consists of five factors and related implementation activities: the establishment of a project plan, organisational preparation, technological preparation, maintenance, and training.
Keywords: implementation; protocol; medical technology; (medical) equipment; health care; hospital; operating room; operating theatre; integration; scrub nurse; circulating nurse.
by Ying Hu, Changsong Liu
Abstract: Recently, more and more data-intensive scientific applications have been deployed in cloud environments. Therefore, how to improve the efficiency of data transfer becomes an important issued that needs to be addressed. In this paper, we present an efficient data transfer framework which provides an integrated platform for data transfer, data scheduling and performance monitoring. Unlike those existing studies that focus on the utilization of bandwidth resources, the proposed framework is implemented by integrating data transfer service and data scheduling service through a performance prediction service. In this way, it provides a flexible mechanism to enable a cloud system to improve the efficiency of data transfer. The implementation of the proposed framework has been deployed in a real-world cloud system, and experimental results have shown that in can significantly improve the efficiency of massive-data transfer comparing with many existing approaches.
Keywords: cloud computing; data transfer; data scheduler; performance prediction.
Hybridization of Oppositional Center based Genetic algorithms for resource allocation in cloud
by Uma Maheswari K.M., Govindarajan S.
Abstract: Cloud computing is an attractive computing model since it allows for the provision of resources on-demand. In cloud computing, resource allocation is one of the challenging problems; because when the clients want to allocate the resource to particular task while attaining minimum cost. To overcome the problem, in this work we introduce a novel technique for resource allocation in cloud computing using Oppositional Center based Genetic algorithm. For optimization, we hybridize the center based genetic algorithm with Opposition-based learning (OBL), where OBL is improving the performance of the center based genetic algorithm while optimizing the bi-objective function. The main aim is to assign the corresponding resources to each subtask within the minimum cost. The generated solution is competent to the quality of service (QoS) and enhances IaaS suppliers believability. For experimentation, we compare our proposed hybrid algorithm with GA, and CGA algorithm.
Keywords: Resource allocation; cloud computing; HCFA; Scheduling; deadline; hybridization; bi-objective.
WBMR: A new Communication Scheme for Multicast Routing in MANETs
by Arappali Nedumaran, V. Jeyalakshmi
Abstract: There is a great demand for multicast route deployment and time varying link strategies which makes routing difficult in ad-hoc networks. Thus finding the optimal routes with multicast behavior in Mobile Ad-Hoc Networks (MANETs) is a critical issue. The deployed route should fulfil the necessary requirements of MANET, like power utilization, efficient utilization of bandwidth, loop free communication, link stability and minimized usage of control overheads. Thus in research, the proposed Weight Based Multicast Routing (WBMR) protocol addresses the critical issues like loop free communication and link stability, which simultaneously yields the optimum routes and reduced energy utilization of the nodes in MANETs. This proposition uses the weight based routing approach which is based on the distance and (Signal to Noise Ratio) SNR of the demanding links. This WBMR protocol minimize the number of nodes participated in the communication in association with link stability and thus minimize the unnecessary utilization of bandwidth and energy. The simulated results show that the implemented approach outperforms well when compared with the existing approaches in multicast routing schemes.
Keywords: MANET; Multicast Routing; SNR; Distance; Loop free; Energy Utilization.
A QoS-aware resource allocation framework in virtualized cloud environments
by Yuan Tian
Abstract: In cloud platforms, resource allocation service plays an important role for running user applications efficiently. However, current allocation mechanism in many cloud platforms only provides best-effort service for users jobs, which means that users quality-of-service (QoS) requirements can not be well guaranteed. In this paper, we present a novel QoS-aware resource allocation framework, which applies feedback control technique to achieve the goal of fair resource allocation between multiple virtual machine (VM) instances. Theoretical analysis of the proposed control model has proven that it can meet the feasibility and stability requirements. Experimental results conducted on a real-world cloud platform show that the proposed resource allocation framework can significantly improve the effective resource utilization as well as the overall task execution efficiency. In addition, the proposed framework also shows better robustness when the cloud platform is in presence of highly dynamic workload.
Keywords: cloud computing; virtual machine; resource allocation; quality of service.
IDENTIFICATION AND ERADICATION OF MALICIOUS NODE IN MANET
by Gayathri VM, Nedunchelian R
Abstract: Mobile ad-hoc network plays a vital base for the future networking ideologies. A MANET is a part of wireless network which forms a topology based on their communication range or distance. Each node in the network is responsible for efficient communication. Each node acts as router and passes data packets from source to destination. Nodes may be either in static or mobile in nature. If any malicious node enters into the network it might result in loss of data packets. However, it is possible to identify the malicious nodes based on send and receive packet information and change the route from source node to destination node. The malicious path can be identified by calculating the packet drop count.
Keywords: MANET;Intruder;Packet delivery ratio;Mobility;WSN;VANET;DTN.
A Novel Approach for Intrusion Detection in Mobile Ad-hoc Networks
by Bhushan Chaudhari, Rajesh Prasad
Abstract: Mobile Ad-hoc Network (MANET) consists of various nodes and they interact with each other cooperatively. However, the cooperative nature of MANET provides a gateway for intruders to interrupt the communication. Two types of approaches have been proposed for the IDS in the literature. The first approach has been used for the improvement in the conventional models and the second approach based on the unconventional models. Our focus is on the unconventional methods since they perform better in the diversified environment. A number of unconventional methods viz. Watchdog, EAACK etc have been discussed in the literature. However, intrusion detection model based on Particle Swarm Optimization (PSO) for distributed and advanced attacks have not been discussed yet. In this paper, we proposed a novel approach based on PSO for the IDS in MANET. The proposed model is compared with existing models like Watchdog and EAACK. Comprehensive objective function in the evaluation of node trustworthiness is a key point of this model.
Keywords: Mobile Ad-Hoc Network; Intrusion Detection System; Particle Swarm Optimization; Watchdog; EAACK.
Towards Geographical Analysis of the Autonomous System Network
by Uri Yacobi-Keller, Evgeny Savin, Benjamin Fabian, Tatiana Ermakova
Abstract: The Internet is an important global critical infrastructure. Yet, it has remained unclear how it is organized in different regions and areas of political influence. This explorative study analyses geographic aspects of the Autonomous System networks in different countries. By using Internet geolocation information for locating autonomous systems, we demonstrate the feasibility of discovering physical regions, rather than purely topological clusters, in a graph representing the backbone network of autonomous systems. We further explore the characteristics of these central regions across different countries. We identify and discuss a general pattern in the surveyed countries, but also some important exceptions. Our study can serve as a starting point for investigating potential geographical and political points of control.
Keywords: Internet Governance; Autonomous Systems; Geography; Geolocation.
Success factors for national eHealth strategies: A comparative analysis of the Australian and German eHealth system
by Isabella Eigner, Andreas Hamper, Nilmini Wickramasinghe, Freimut Bodendorf
Abstract: The Australian and German healthcare systems share similar traits in insurance and healthcare management. Both nations have also embarked upon national eHealth strategies to connect stakeholders and enable collaboration in healthcare services throughout their respective countries. While Australia has focused on a platform-based approach initially termed Personally Controlled Electronic Health Record, Germany introduced the Electronic Health Card, mandatory for every publicly insured person. This paper presents a comparative analysis of the Australian and German eHealth systems to determine commonalities, barriers and success factors of both strategies. A combined PESTLE/SWOT-analysis is used. Results show the key advantages and obstacles of both approaches and identify relevant areas for successful eHealth implementation.
Keywords: eHealth; Australia; Germany; SWOT analysis; PESTLE analysis; PCEHR; MyHealthRecord; Electronic health card.
Mobility and Load Based Vertical Handoff Decision in 4G Networks
by N. Divya Lakshmi, V. Khanaa
Abstract: 4G network is the most efficient technology today. Its effectiveness in providing very high data rate and supporting various technologies simultaneously is very helpful in this fast developing world. Hence 4G has emerged out as a highly promising network. This wireless network is capable of supporting a number of technologies and so it is necessary to assure that the mobile terminal is being handed off to the right technology. This decision has to be taken by considering several factors related to the base station, access point and received signal strength. So, in this paper, we develop a vertical handoff technique which performs handover only after confirming that the handoff will be valid so as to avoid any false handoff occurrence. Then the decision related to the technology to which the mobile terminal has to be connected is made by using the decision function. Thus, in this paper the mobile terminal is handed over to the right wireless technology without carrying out any false handoff process.
Keywords: 4G network; wireless technology; handoff process; Mobility.
An efficient bandwidth reservation policy for data-intensive applications in cloud
by Yongjian Li, Dongbo Liu
Abstract: Recently, more and more data-intensive applications have been deployed in cloud platforms due to its cost-effective and elastic capability. Although computing resources (i.e., CPU and RAM) can be provisioned in on-demand manner, the network bandwidth has enforce certain admission controlling for providing desirable quality-of-service (QoS). As a result, data-intensive applications often suffer from high delay during the phase of bulk data transferring between computing nodes. In this paper, we present an integrated bandwidth reservation algorithm, which combines different admission controlling policies and minimizes the finishing time for all jobs in an online manner. Performance evaluation on a real-world cloud platform shows that the proposed reservation algorithm can ensure efficient bulk data transferring even when the system is facing heavy workloads.
Keywords: cloud computing; bandwidth reservation; relaxed policy; constrained optimization.
A QoS ranking and controlling framework in virtualized clouds
by Tienan Zhang
Abstract: In cloud computing, quality of service (QoS) has become an important issue either from the perspective of cloud providers or users. In this paper, we present a lightweight framework, namely Cloud QoS Ranking and Controlling (CQRC), which integrates a QoS ranking service and a fine-grained QoS controller. The QoS ranking service provides an effective approach to quickly evaluating the QoS level of any cloud resources or services based on historical performances; the QoS controller is designed by using feedback control technique and is capable of self-tuning the underlying virtual machine (VM) configurations. The proposed framework is implemented and evaluated in a real-world cloud platform through a set of experiments, and the results indicate that its QoS ranking service can significantly reduce the frequency of QoS violations, and the QoS controller can achieve better tradeoffs between performance and cost for cloud providers.
Keywords: cloud computing; resource virtualization; virtual machine; scheduling algorithm.
A QoS-enhanced data replication service in virtualized cloud environments
by Tienan Zhang
Abstract: In recent cloud systems, data-intensive applications have been widely deployed for solving non-trivial problems, which often involve large amount of dataset. As a standard service for offering data availability and reliability, data replication service plays an important role and is proven to be effective in many real-world cloud environments. However, many existing replication services are designed for improving the system-oriented metrics instead of user-oriented metrics. In this paper, we first formulate the quality-of-service (QoS) constrained replication placing problem in different manners, and then a novel replication service is proposed which uses multi-objective technique to solve the replica placement problem via a time-efficient approach. A set of experiments are conducted to evaluate the effectiveness and efficiency of the proposed service, and the results indicate it can significantly reduce the average response time metric comparing with other existing replication services and therefore improve the QoS for user applications. In addition, it also exhibits a good robustness when the cloud storage system is facing intensive replication workloads.
Keywords: cloud computing; data replication; quality-of-service; response time.
A novel Machine Learning based Attacker Detection (MLAD) system to secure Location Aided Routing in MANETs
by Suma R, Premasudha B G, Ravi Ram V
Abstract: The proposed work deals with the improvisation of the performance of location based routing in Mobile Ad-Hoc Network (MANET). A Machine Learning Based Attacker Detection (MLAD) algorithm that uses multipath routing is proposed to facilitate efficient routing even in the presence of attackers. The proposed algorithm adopts the Location-Aided Routing (LAR) to optimize the search process and to reduce the search area for new routes in MANETs. Learning Automata (LA) is implemented to optimize the path selection and to reduce overhead in the network. Extended Identity-Base Cryptography (EIBC) is used for efficient key management in providing system security. The proposed system implements Privacy Preserving Communication System (PPCS) for maintaining privacy in end-to-end communication. This method decouples the location information from the nodes identifier and abstracts the communication happening among nodes. The simulation results of the proposed method reveal its reliability and strength in securing LAR in MANETs.
Keywords: MANET; Learning Automata; Optimization; Routing; Fault tolerance; Identity Based Cryptography; Key Management; Privacy Preservation.
Literature Review of QoS and Related Issues of Vehicular Adhoc Network
by Sivasubramanian Karthikeyini, Subramanian Shankar
Abstract: Vehicular communication system delivers two main types of communications that is vehicle to vehicle and vehicle to infrastructure. It offers information sharing, cooperative driving, and value added services like navigation, internet access and etc. Communication between V2V and V2I are ad hoc in nature that is why it's called as a vehicular ad hoc network. There is an opportunity for that it will become a world largest ad hoc network. Even though there is so many advantages in VANET, some consequences are there to defeat. In this paper, we have concentrated on a survey study of VANET issues and solved by various authors. Our study demonstrates the overall works and results concerning different routing algorithms and its performance, collision issues, broadcast mechanism, message alerts creation for vehicles, cluster formation for communication, real time emergency health care at vehicles and so on.
Keywords: AODV; BP-MDF; DSRC; MAC protocol; PTMAC; TDMA; VANET; WWAN.
QoS Integrated Energy Aware Routing for Wireless Sensor Networks
by Satish Kumar T, Reshma J, Krishna Prasad R
Abstract: Quality of Service (QoS) in Wireless Sensor Networks (WSN) has got limited attention due to multiple bottlenecks such as limited bandwidth and energy storage. Until now, most of the focus has been to develop energy efficient routing schemes for WSN. It is important to provide effective QoS mechanism along with energy efficient data transmission. In this work, QoS mechanism is incorporated inside energy aware routing protocol proposed in (Rahul et.al, 2011). This new integrated protocol achieves dual goal of energy efficient data transmission and effective QoS functionalities. Empirical results are demonstrated on NS3 simulator. The proposed approach is compared against existing state of the art technique. The proposed approach outperforms the existing state of the art technique in prolonging the network lifetime.
Keywords: Quality of Service ;Energy Aware Routing ; WSN.
Implementation of inter-organizational mediums: Synthesizing framework as a design exemplar
by Antti Ylä-Kujala, Salla Marttonen-Arola, Tiina Sinkkonen, Timo Kärri
Abstract: The field of management research has a utilization problem. A considerable avenue in which the translation from theory to practice has been only partial is the management control of inter-organizational relationships. In this particular stream of management (accounting) research, open-book accounting (OBA) is a key concept. Based on the OBA literature, our ambition is to develop an implementation framework for inter-organizational mediums (IFFIM). The first part of the framework, IFFIM_1: the relational view, is concerned with the multidimensional nature of inter-organizational relationships by illustrating relational complexities through the OBA dimensions. The second part of the framework, IFFIM_2: the process view, is an outlook to the stepwise implementation process, where the factors that influence OBA implementation have been integrated to the phases of the so-called enterprise system experience cycle. Unlike most contemporary research, our work is based on the idea of design science, the aim of which is to develop general knowledge to support the design of solutions to field problems. IFFIM is a design exemplar to practitioners, i.e. a guideline to follow in the design of interventions.
Keywords: inter-organizational relationships; inter-organizational mediums; open-book accounting; implementation framework; implementation; framework; design science; design exemplar.
Unified Enterprise Modelling Language Based interoperability for collaborative access control framework in Critical Infrastructures
by Amine BAINA, Khalid BENALI, Mostafa BELLAFKIH, Nawal AIT AALI
Abstract: Due to physical and logical vulnerabilities, a Critical Infrastructure (CI) can encounter failures of various degrees of severity, and since there are many interdependencies between CIs, simple failures can have dramatic consequences on the whole infrastructure. In this paper, we mainly focus on malicious threats that might affect the communication and information systems (the Critical Information Infrastructure, or CII) dedicated to Critical Infrastructures. We define a new collaborative access control framework called PolyOrBAC, to address the security problems that are specific of CIIs. This approach offers each organisation taking part in the CII the capacity of collaborating with the other ones, while maintaining a control on its resources and on its internal security policy. The approach is demonstrated on a practical scenario, based on real emergency actions in an electric power grid infrastructure.
Keywords: Critical Infrastructure; Critical Information Infrastructure; Security; Access Control Policies and Models; Collaboration; and Interoperability.
An efficiency virtual resource auction mechanism based on reserve-price strategy in cloud environments
by Peng Xiao
Abstract: In economic-based cloud models, resource pricing mechanism plays a key role to regulate the supply and demand for resources, provides an incentive for providers, and motivates the users to trade-off between deadline, budget, and the required level of quality of service. In this paper, we formulate the problem of resource auction as a distributed constrained programming problem; then we propose an effective and efficient auction algorithm, which use reserve-price strategy to guarantee that users pay at least a given amount determined by cloud providers. In this way, we can significantly improve the efficiency of auction process as well as provide sufficient incentive for cloud providers to share their spare resources. To evaluate the proposed auction algorithm, extensive experiments are conducted in a real-world cloud platform, and the results indicate that it can significantly increase the provider revenue as well as improve the quality-of-service (QoS) satisfactory.
Keywords: cloud computing; resource market; auction model; resource price.
A reliable peer-to-peer storage framework based on virtual peers model
by Hong He
Abstract: Peer-to-peer (P2P) networks have become popular applications due to their ease of communication and resource sharing patterns in unfixed network infrastructures. However, typical P2P systems often suffer from the problem of unreliable network transferring and unstable availability of data files. In this paper, we propose a novel P2P-based storage framework, which introduces a set of virtual peers to improve the reliability of networking transferring and storage by using the networking coding technology. Also, we present a detailed theoretical analysis on storage performance and management cost, which indicates that the proposed framework is capable of achieving better tradeoffs between reliability and efficiency. To evaluate the effectiveness of the proposed framework, extensive experiments are conducted in a real-world P2P storage platform, and the experimental results show that our P2P storage framework outperforms the existing solutions in terms of many performance metrics, including data availability, resource utilization, and communication cost.
Keywords: distributed storage; virtual peer; data availability; communication cost.
A novel replica placement algorithm for minimizing communication cost in distributed storage platform
by Changsong Liu
Abstract: In large-scale distributed systems, replication service has been playing a critical role to improve the availability and reliability of user data. Conventionally, the existing replication services mainly concentrate on how many replicas are needed to maintain desirable availability and reliability rather than how to place replicas on the most suitable storage nodes. As a result, the communication-related costs when accessing data are significantly increased, which in turn degrades the execution performance of user applications. In this paper, we propose a novel replica placement algorithm which is designed to minimize the communication cost when accessing or managing replicas in a large-scale storage platform. In the proposed algorithm, the replica placement problem is formulized a classical multi-knapsack problem, and two heuristic metrics are introduced to obtain the sub-optimal solution of this problem. A lot of experiments are conducted to investigate the performance of the proposed algorithm. The experimental results indicate that our replica placement algorithm outperforms many existing approaches in terms of different performance metrics. In addition, the proposed algorithm can also significantly improve the execution efficiency for data-intensive applications, which are very common in nowadays large-scale distributed systems, such as grid and cloud.
Keywords: data replication; replica service; distributed storage; cloud computing.
A novel virtual resource pricing policy based on game model in federated clouds
by Yuan Tian
Abstract: In recent years, more and more cloud providers are unified together to form a federated cloud market, where a suitable pricing strategy plays a key role to help they attracting more users. However, many existing pricing policies can not deal with the competition between different cloud providers. In this study, we take efforts on the resource pricing policy in federated cloud market. To obtain an optimal pricing scheme among multiple ISPs, we firstly use learning curve model to model the production supply behaviours of ISPs, and then we use a standard Markov decision process to describe the pricing game model and present an efficient algorithm to solve this game model in a distributed manner. The proposed pricing model has been fully investigated and evaluated in a real-world federated cloud platform, and the results indicate that it can significantly improve the profits of ISPs comparing to several existing pricing mechanisms.
Keywords: cloud computing; virtual machine; pricing scheme; federated market.
Technology-induced Job Anxiety during Non-work Time: Examining Conditional Effect of Techno-invasion on Job Anxiety
by Jinnan Wu, Nannan Wang, Wenjuan Mei, Lin Liu
Abstract: Although work-related use of information and communication technologies (ICTs) during non-work time leads to techno-invasion, little is known whether employee techno-invasion causes job anxiety. Also, it remains unclear when techno-invasion is particularly or less correlated to job anxiety. Based on the stress, appraisal and coping theory and the theory of conservation of resources, we examined whether techno-invasion increases employee job anxiety, and investigated whether computer self-efficacy and perceived organizational support can buffer this effect. The results show that techno-invasion positively predicts job anxiety, while both employee computer self-efficacy and perceived organizational support can significantly weaken this association. More importantly, we find a larger moderating effect of computer self-efficacy when employee perceived a low level of perceived organizational support.
Keywords: techno-invasion; job anxiety; computer self-efficacy; perceived organizational support; stress; appraisal and coping theory; conservation of resources; technostress; work-life balance; moderating effect; China.
A fairness-enhanced resource trading system in federated cloud environments
by Tienan Zhang
Abstract: As more and more complicated applications are deployed on federated cloud infrastructures, resource provisioning and allocation across multiple resource providers become a challenging issue. However, most of existing studies focused on how to improve resource utility or resource revenue, while ignores the efficiency and fairness of the resource market. In this study, we mainly focus on these two issues when trading and allocating resources in a federated cloud environment. We first introduce the definitions of efficient market and fairness criterion based on the classical economic theory; then, we design a distributed resource trading protocol which is capable of offering topology-wide efficiency and fairness as long as the resource providers follow certain payment rules in resource market. Theoretical analysis indicates that the proposed resource trading model is beneficial for pushing resources to resource providers who value them more, which in turn means that resource providers can always increase the social welfare by repeatedly performing ration deals. To evaluate the effectiveness and efficiency of the proposed resource trading model, plenty of experiments are conducted in a real-world cloud platform. The experimental results show that it can significantly improve the resource revenues for resource providers and make better task mapping decisions for upper level applications.
Keywords: cloud computing; resource trading model; virtual machine; multi-agent model.
A Multilayer Graph Model of the Internet Topology
by Georg Tilch, Tatiana Ermakova, Benjamin Fabian
Abstract: The application of Internet maps for developing more effective routing algorithms, security mechanisms, and resilience management for both companies and Internet service providers can be advanced through their more detailed structural decomposition. This article carefully integrates traceroute datasets from various large-scale measurement campaigns such as iPlane, CAIDA, Carna, DIMES, RIPE Atlas, and RIPE IPv6L into Internet graphs of a previously unknown large and thus solid scale. It further works with different well-established abstraction levels such as the IP interface, router, Point of Presence (PoP), Autonomous System (AS), and Internet Service Provider (ISP). Finally, by employing a broad diversity of graph measures, this study creates an exhaustive snapshot of the global Internet topology. This work creates a baseline for future Internet research. Repeated measurements and automated data integration could enable a better understanding of the Internet dynamics.
Keywords: Internet; Internet topology; Computer networks ; Graph analysis; Complex networks.
Formal and relational mechanisms of network governance and their relationship with trust: substitutes or complementary in Brazilian real estate transactions?
by Adriano Carnauba, Joao Boaventura, Cristina Pereira, Ana Azevedo, Emanuela Todeva
Abstract: The objective of this study was to investigate whether formal and relational mechanisms of network governance act as substitutes or are complementary in their relationship with trust in the intermediation activity of real estate transactions. A quantitative research was conducted to test the hypotheses. Data was collected via a survey and the context was Brazilian real estate business networks. A non-parametric approach was used to investigate the associations among the key variables indicated in the theory. The results confirm the hypothesis that formal and relational mechanisms of network governance act as complementary and reject the possibility of substitution between them. Both mechanisms are important to build trust-based relationships between actors, and formal governance mechanisms have a significant positive relationship with interorganisational trust, while relational mechanisms are positively associated with interpersonal trust. This study not only contributes to the discussion of governance mechanisms and their relationship with trust, but also broadens this debate by considering trust at different levels and present in more complex structures where these relationships are still little explored, such as is the case of business networks.
Keywords: Network; Mechanisms of Governance; Trust; Inter-Organisational Relationships; Real Estate Network; Brazil.
Causal Cross-Impact Analysis for Identification and Assessment of Strategic Options for Industrial Clusters
by Heiko Duin
Abstract: Strategic planning for industrial clusters differs compared to strategic planning for corporations. Industrial clusters are characterised by the existence of non-focal organisational networks within the cluster representing different roles like manufacturing companies, suppliers, research institutions and regional development agencies. This paper shows how strategic planning can be carried out with the help of cross-impact analysis in networked structures found in such clusters using a German aviation cluster as an example. For this purpose, a planning team of ten persons was put together, which unifies the different perspectives of the different types of partners. Using an adapted strategic planning process, the team developed, analysed and used a causal cross-impact model to derive strategic options for the cluster. These options were further developed into sets of measures and integrated into the cross-impact model. This approach allowed the review of the effectiveness of the various strategic options including the assessment of their robustness.
Keywords: Industrial cluster; aviation cluster; causal cross-impact analysis; enterprise networks; networked organisations; strategic planning.
HOW CAN the COORDINATION of the PROCESSES be ACHIEVED in VIRTUAL TEAMS?: IMPLICATIONS for VIRTUAL ORGANIZATIONS
by Demokaan Demirel
Abstract: Improvements in today's information society have also changed the working styles of the organizations. Organizations are more focused on services and operate in a virtual environment. In an environment where organizational innovation takes place rapidly, virtual teams can perform activities with their expertise. In the emergence of virtual teams, increasing competition, changing customer needs, positive developments in information technologies and the widespread use of the internet in the business world have been effective. In virtual teams, staffs don't meet in a specific the place; teams in different venues coordinate each other with communication channels. The origins of virtual teams are knowledge and expertise, and they also depend on the basic abilities of a virtual team's members. In virtual teams, the needs of team members are constantly considered and members can work in multiple projects and organizations at the same time. In this respect, the organizational structures of virtual teams are more flexible. The aim of this study is to determine how to achieve coordination in processes such as communication, trust, technology usage, leadership, and differences while performing the activities of virtual teams. The main problem of the work is which process and/or processes affect the functioning of the virtual teams and which play a more important role in team effectiveness. The study is based on qualitative methodological evaluations and has a rich literature references about the subject. Empirical researches in other academic articles are also mentioned and the coordination of virtual teams has been analysed. Finally, it is recommended that processes be supported with result-oriented practices and that team members should be interdependent with a strong communication network.
Keywords: Virtual Organization; Virtual Team; Trust; Communication; Leadership; Technology.
QoS-enhanced bandwidth reallocation mechanism based on auction model in mobile clouds
by Ning Han
Abstract: In recent years, mobile cloud has become a promising platform to offer elastic and scalable service for our daily life. Even so, the features of mobile communication introduce a series of new challenges to conventional bandwidth allocation service. In this paper, we propose an auction-based bandwidth reallocation mechanism to handle the bandwidth shifting issue which may significantly degrade the users QoS satisfactory. To take both resource providers revenue and users QoS requirement into consideration, we formulate the bandwidth reallocation problem as constrained optimization problem, and then design an auction model which introduces a trade-off parameter to adjust the auction price with aiming at improving the user QoS satisfactory in terms of resource cost. Theoretical analysis indicates that the proposed auction model is capable of balancing the benefits between cloud providers and mobile users. Performance evaluation in a realistic mobile cloud shows that the proposed bandwidth reallocation mechanism outperforms existing approaches in terms of various performance metrics.
Keywords: mobile cloud; bandwidth allocation; auction model; utility function.
Engaging global virtual teams: a theoretical framework proposal on employee engagement predictors in global virtual settings.
by Marc Marti Toro, Ibon Zamanillo Elguezabal, Gaizka Garechana Anacabe
Abstract: In a globalized world, where technology, processes and information are more accessible than ever, the differential factor between success or failure is the human capital. Yet, if our workforce is not engaged we will not be able to obtain its full potential or simply the talent will flee to greener pastures. Another trait of the globalization is the increasing use of global virtual teams (GVTs) to manage a great variety of projects and endeavours in our organizations across multiple cultures, but we are still failing to recognize their different needs and challenges. This paper aims to be a first step towards filling this gap and reviews the existing literature on GVTs in order to propose a framework of predictors of employee engagement, from which to set a model describing the drivers behind employee engagement in virtual and multicultural environments.
Keywords: global virtual teams; virtual organizations; virtual teams; GVTs; employee engagement; work engagement; predictor; job demands; job resources; information & communication technology; ICT; intercultural; social capital; trust; transformational leadership.
Virtual Organizations For Effective Economic and Technological Sustainable Development Policies in The Commercial Egyptian Public Banking Sector
by Naglaa Fathy El Dessouky
Abstract: Nowadays, the concept of Virtual Organization (VO) denotes a paradigm shift for policymakers and managers targeting to increase the effectiveness of economic and technological sustainable development. Although the growing number of studies devoted to the topic of VO in developed countries, few studies have been directed to study developing countries, especially the MENA region. This study was inspired by the theoretical research framework proposed by Fathy El Dessouky (2011) to examine the relationship between virtual organizations and the effectiveness of economic and technological sustainable development policies in the commercial public banking sector in Egypt. The research examined four distinguished Egyptian commercial public sector banks which have taken serious steps towards e-banking system. A questionnaire with pre-prepared closed-ended questions was distributed to a random sample of 600 employees at the top, middle and executive levels of management but only 500 employees responded to the questionnaire. The results presented and demonstrated the need for specific areas of improvement regarding the VO, in particular, to satisfy the requirements of economic and technological sustainable development policies in developing countries.
Keywords: Virtual Organization (VO); Effectiveness of Economic and Technological Sustainable Development Policies; MENA region (Egypt); Egyptian Commercial Public Banking Sector.
Improving the scalability of cloud monitoring service by low communication overhead mechanisms
by Peng Xiao
Abstract: With the rapid growth of cloud platforms, an effective monitoring service is playing a more and more important role to provide enhanced-QoS for a variety of cloud users and providers. Unfortunately, the overhead of large-scale monitoring on a large number of cloud resources tends to be prohibitive and brings a lot of negative effects. In this paper, we present three effective mechanisms, including sliding-window monitoring mechanism, monitoring event mining and filtering mechanism, and self-tuning data transferring mechanism, to handle with different kinds of communication overhead. A set of experiments are conducted to evaluate the proposed mechanisms in a real-world cloud platform, and the results indicate these mechanisms are very helpful to reduce the communication overhead in different monitoring scenarios.
Keywords: cloud computing; information monitoring; quality of service; scalability.
Virtual resource auction based on bayesian incentive strategy in large-scale clouds
by Saifeng Zeng
Abstract: In cloud platforms, resource pricing service plays a key role to regulate the behaviours of both resource providers and consumers. However, the increasing diversity of user quality-of-service (QoS) requirements makes existing pricing models difficult to be implemented in an efficient manner. In this paper, we design an auction model which is not only useful for cloud clients but also can significantly increase the resource revenue for providers. To support QoS-aware resource pricing, we normalize QoS parameters based users scores and use the Bayesian incentive strategy to regulate resource auctions. The key advantage of this auction model is that it supports multi-attributes auction and budget-balancing among bidders. Extensive experiments are conducted in a campus-based cloud, and the results are compared with other existing pricing models. The results indicate that the proposed auction model can significantly improve the resource revenue of cloud providers as well as maintain desirable QoS level for cloud clients.
Keywords: cloud computing; virtual resource; auction model; Bayesian incentive strategy.
An extensible and scalable cloud information monitoring middleware
by Peng Xiao
Abstract: With the increasing complexity of cloud systems, how to efficiently manage cloud infrastructures has become a challenging task, while an effective monitoring service plays a crucial role to achieve this goal. In this paper, we present an extensible and scalable cloud monitoring middleware called Extensible Cloud Monitoring Service (ECMS), which is designed for offering online monitoring service to different monitoring requests from either cloud users or resource providers. In ECMS, a layered monitoring framework is introduced with aiming to cover different aspects of cloud monitoring requests. The implementation of ECMS is evaluated in a real-world cloud test-bed, and the results indicate that it can efficiently provide online monitoring services to different kinds of clients, and exhibits better scalability and robustness comparing with other monitoring systems.
Keywords: cloud computing; monitoring service; resource allocation; performance prediction.
The effect of privacy risk on users social commerce intention
by Tao Zhou
Abstract: Due to the disclosure of personal information, users may face privacy risk associated with social commerce transactions. At the same time, they may obtain benefits such as social rewards from interacting with other members. Drawing on a cost-benefit perspective, this research examined the effect of privacy risk on users social commerce intention. The results indicated that privacy assurances and social interaction have significant effects on privacy risk and social rewards, both of which in turn affect users social commerce intention. The results imply that service providers need to adopt privacy assurances and facilitate users social interaction in order to promote their social commerce intention.
eHealth WhatsApp for Social Support; Design Lessons
by Luuk Simons, Wouter A.C. Van Den Heuvel, Catholijn M. Jonker
Abstract: WhatsApp was evaluated as group support tool for a high impact healthy lifestyle intervention, with 11 young professionals. Users valued the WhatsApp group as an attractive social support addition to the existing eTools and personal coaching. Based on preliminary results: a) the WhatsApp group generated higher participation than most other social media, b) deploying social media use motives, c) possibly due to the relatively high presence and engagement attributes of WhatsApp, and d) contributing to healthy behaviours and health advocacy. Peer coaching was confirmed as promising. However, participation declined after the initial weeks. A design lesson was that users wanted more support for community forming. Several improvement suggestions are provided.
Keywords: eHealth; WhatsApp Group; Peer Coaching; Service Design; Healthy Lifestyle; Work site health; Blended care; Social media; Social support; Motivation; Efficacy;.
Shall we ever meet; does it matter: Unfreezing the Constructs of Virtual Team Effectiveness
by Sonali Bhattacharya
Abstract: Virtual team has gained significant research attention world over due to its potential to reduce cost and increase productivity. However, virtual teams have its own challenges which is quite different from face-to face or onsite teams. Parameters that determine effectiveness of face-to-face teams does not necessarily encompass requisites for a virtual team success. The present study develops a multidimensional virtual team effectiveness scale to measure virtual team members perceived level of performance. The scale considers virtual team effectiveness as a multidimensional second order construct comprising goal orientation, interdependency, knowledge sharing, empowerment and preparedness. The study also reveals that not only organizational support and motivation that would determine effectiveness of virtual team but also other factors such as on task characteristic (e.g. interdependency) and team characteristic (e.g. goal orientation). Researchers could examine the considered dimensions of the scale further with respect to other constructs organizational performance. : Literature adequately speaks about various scales on team effectiveness, but there no scale developed keeping virtual team. This is thus unique contribution of the present study. The scale can be used to assess virtual teams perception towards team performance or effectiveness. Such information would help in formulating strategies on what should be the structure and characteristics of the virtual team and what values can be inculcated on teams before task allotment
Keywords: Goal orientation; interdependency; knowledge sharing; empowerment and preparedness.
A Model for Studying the Value of the Inter-Organizational Information Systems' Implementation-Case Study: Tourism Industry
by Seyedeh Nahid Alavi, Neda Abdolvand, Neda Abdolvand, Saeedeh Rajaee Harandi, Saeedeh Rajaee Harandi
Abstract: The deployment of inter-organizational information systems and information sharing in the supply-chain to gain strategic benefits has become more important than ever. Although, inter-organizational information systems are essential in creating coordination between members of the supply-chain, managers are reluctant to use these systems due to the significant changes in structure, culture and business relationships. The lack of utilization of these systems owing to environmental uncertainty in each industry, especially in the tourism industry. Hence, this study aims to examine the factors influencing the establishment of these systems. By literature review of previous studies, some factors have been derived for the development model. The results indicate that the role of environmental uncertainty is critical in achieving the benefits of inter-organizational information systems implementation. Moreover, it is suggested that implementation of inter-organizational information systems and integration of information between supply chain members has a positive impact on the overall chain performance.
Keywords: Information System; Inter-organizational Information System; Supply-chain Management; Tourism Industry; Environmental Uncertainty; Information Technology Assets.
Flexible collaboration infrastructures and healthcare information exchange in hospitals: an empirical resource-based perspective
by Rogier Van De Wetering, Johan Versendaal
Abstract: Exchanging health information and data will enhance the efficiency, quality, cost-effectiveness, and even safety of healthcare practices. However, views and strategies differ on how hospitals can facilitate or enable this exchange process. This study explores a relationship between two constructs, i.e., a flexible collaboration infrastructurean integrated set of IT assets and networking functionalities that support applications and enable business collaborationand health information exchange. Second, we argue that the strength of this relationship is influenced by the degree to which hospitals deploy security measures. Findingsbased on an SEM-PLS analysis on a sample of 983 European hospitalsshow a positive relationship between the two constructs. We additionally find that hospitals security measures to protect the confidentiality, integrity, and availability of the data condition this particular relationship. Our findings contribute to the literature and provide valuable insights for hospitals.
Keywords: Flexible collaboration infrastructure; IT flexibility; IT capability; Health information and data exchange (HIDE); PLS-MGA; Data security; Electronic Medical record (EMR); resource-based view of the firm (RBV); hospitals.
CORPORATE ACQUISITION NETWORKS AND ORGANIZATIONAL PERFORMANCE: A DYNAMIC MODEL OF PARTNER SELECTION AND NETWORK INFLUENCE
by Mohamed Boukhris
Abstract: This paper combines theory and empirical evidence to develop an analytical framework examining the dynamic relationship between organizational performance and patterns of change in interorganizational network ties. My framework posits that organizational performance is influenced by patterns of network relations among organizations. For these reasons, organizations are likely to take into account performance considerations when establishing or changing their network ties. But if organizational performance is influenced by network ties and, at the same time, performance is a basis for partner selection then interorganizational network structures and individual organizational performance are only sub-components of a more general evolutionary process linking network structure and individual behavior over time. In this paper I report clear evidence of directional network effects on individual performance. Over time the performance of acquiring companies tends to become increasingly similar to the performance of their target companies. I have also found that network activities influence individual company performance in a variety of ways. For example, companies targets of multiple acquisitions tend to attain higher levels of performance. Finally, I confirmed my performance homophily hypothesis by demonstrating that companies prefer to acquire other companies with a similar level of performance. Interpreted together these results reveal the presence of a complex dynamism of mutual dependence between acquisition network structures and individual organizational performance.
Keywords: Interorganizational networks; partner selection; network influence; coevolution; stochastic actor-oriented model.
Modelling Organizational Value Realization in E-prescribing Exchanges as a Service Value Network
by NELSON KING
Abstract: The digital network structure of e-prescribing creates a new organizational form that, to date has failed to reconcile the imbalance of those who bear the costs of creating value for other members of the system. A conceptual framework built on the service value network examines exchanges between the network enabler, which provides the e-prescribing service, and the service providers who temporarily join together to virtually process an e-prescribing transaction. Each of these exchanges is assessed using value network analysis, which determines the value created for both individual actors and the network enablers. The description of these exchanges and the context in which they are carried out are developed through interpretive synthesis that pieces together hundreds of medication management articles related to e-prescribing. The paper seeks a value-driven explanation for adoption challenges faced by e-prescribing in the United States.
Keywords: Service Value Network; Value Exchange; Healthcare IT; Inter-organizational Network; Organizational Design; Micro-organization; Interpretive Synthesis; IT Governance.
An Application Study Case Tradeoff Between Throughput and Latency on Fog-Cloud Cooperation
by Mario Antonio Ribeiro Dantas
Abstract: Nowadays, several research works are targeting fog-cloud environments cooperation. Examples of well-known challenges are workload offloading, shared services, power consumption, security and communication delays. The communication subject is an essential metric to be observed in this cooperation. Bandwidth, throughput and latency are important parameters that affect the fog-cloud cooperation and are frequently misunderstood. In this paper, it is presented a research work, in which we took in consideration a real Information System (IS) application which could execute under a cooperation of a fog-cloud configuration. Therefore, we conceived a case study to investigate specially the tradeoff between the throughput and latency parameters and provide more accurate idea of an application requirements in a fog-cloud cooperation scenario.
Keywords: Fog-Cloud Cooperation; Distributed Information System Applications; Throughtput and Latency; Storage and Processing.
Development of an Activity Theory based Framework for the Analysis and Design of Socio-Technical Systems
by Carolin Durst, Fabian Wiser, Sebastian Luber, Nilmini Wickramasinghe
Abstract: The design of socio-technical systems is a challenging task due to diverse stakeholders and complex processes that have to be mapped into software. Following a socio-technical approach for information system analysis and design results in more user-friendly systems accompanying various benefits for associated stakeholders. However, there is a lack of theories and methods which consider technical, social and organizational factors. Researchers recommended activity theory as a rich framework to study socio-technical systems. While the benefits trigger increased use of activity theory, there seems to be a shared heritage of disadvantages linked to its nature and hence its application. This article introduces a novel conceptual activity theory framework to resolve these problems and evaluates it within a case study in the context of innovation management. For the development of the framework a design science research methodology approach is followed.
Keywords: Activity Theory; Socio-technical Systems; System Design and Analysis; Design Science.
A game theory approach for UAV based flying access networks
by Hamid GARMANI, Driss Ait Omar, Mohamed El Amrani, Mohamed Baslam, Mostafa Jourhmane
Abstract: In recent years, Unmanned Aerial Vehicles (UAV) ad-hoc network has been receiving enormous attention from the research community, since they represent a new potential market. One promising application is to use UAVs in Wireless communications field as a flying base station to extend coverage and to provide high-quality network connectivity. In this paper, we model and analyze the interactions in price, beaconing duration and quality of service among UAV. A full analysis of the game outcome, in terms of equilibrium price, equilibrium quality of service and equilibrium beaconing duration, is derived. Then we analyze the existence and uniqueness of the Nash equilibrium point under some conditions. Furthermore, we provide a learning algorithm that ensures convergence of the considered UAV with its unique Nash equilibrium operating point in a fast and distributed fashion. Finally, numerical investigations offer promising insights on how the game parameters should be chosen to efficiently control the game.
Keywords: Game theory; Nash equilibrium; UAV; beaconing duration; price; QoS.
Special Issue on: Sustainable Networking, Cloud and Wireless Systems
by Surekha Lanka, Ilogu Ikechukwu
Abstract: Mobile ad hoc network (MANET) is a popular emerging wireless network and plays vital role to maintain the routing demands in wireless network. AODV and DYMO are on-demand routing protocols that was designed to meet various needs of Mobile ad hoc network such as security, mobility, flexibility etc. IETF listed on-demand routing protocols in a varying speed of nodes, mobility, and performance metrics. In this paper, we discussed behavior of the two main on-demand routing protocols in network simulation environment, while sending packets from source to destination under free space and two ray propagation models by varying packet rate. We analyzed the performance metrics of mobile ad hoc network in the following heading; average jitter, average end-to-end delay, packet delivery ratio, and throughput are compared with percentage of nodes packet drops.
Keywords: On demand routing protocols; AODV; DYMO; NS2; Ad hoc; Route discovery; Route request; Route Error; two ray propagation model; Constant bit rate; Performance Metrics.
Using MLPA for Smart Mushroom Farm Monitoring system based on IoT
by Velliangiri S, Sekar R, Anbhazhagan P
Abstract: Mushroom has turned out to be a standout amongst the most fundamental consumable items in our everyday life. To increase mushroom production and to reduce manual work smart mushroom monitoring has been proposed with the assistance of IoT (Internet of Things) and Machine Learning (ML) algorithms called MLPA (Machine Learning with Prediction Analysis) technique. In this proposed MLPA technique, Sensors mounted in the mushroom farm collect moisture, temperature and humidity data from soil and air, which is used to predict disease for mushroom from past history data. Based on the sensor value and prediction by ML algorithm, the farmer can predict weekly irrigation plan. The sensors are connected to IoT device, which sends collected data for analysis using ML algorithms. Three main tasks of ML algorithms are Regression, Classification and Clustering. The main objective of our research work is to compress sensor data using kalman filter and classify using decision tree algorithm. Our proposed MLPA technique shows better accuracy than any other normal ML algorithms.
Keywords: Internet of Things; Machine Learning; Prediction Analysis; mushroom monitoring.
SCM: Secured Communication Model for urban VANET applications
by Ravi Ram V, Premasudha B G, Suma R
Abstract: The primary concern of any Vehicular Ad-hoc Network (VANET) application is to offer safety and infotainment related services to commuters in a dynamic and reliable way. The characteristics of both VANET environment and the participating vehicles raise several challenges for the application development. The success of any application depends on the strength of the underlying communication model. Thus scalable, secure and robust communication models that work well with different traffic conditions and varying mobility speeds are required. We have proposed a Secured Communication Model (SCM) for VANETs to facilitate Dedicated Short Range Communication (DSRC). The model was designed based on the specifications of IEEE 802.11p standard and the security component was offered through ID-based encryption and signature schemes. Several urban communication scenarios with different vehicle densities were created in EXata emulator. These scenarios were emulated on the proposed SCM using four routing protocols- AODV, Bellman Ford, OLSR and LAR. At higher vehicle densities the proposed model had resulted in good throughput with an acceptable delay. Out of the four routing protocols, Location Aided Routing (LAR) protocol was found efficient on the proposed SCM.
Keywords: VANET; security; routing; communication model; evaluation; urban applications; EXata; simulation; emulation; performance analysis.
A MULTI-OBJECTIVE EBCO-TS ALGORITHM FOR EFFICIENT TASK SCHEDULING IN MOBILE CLOUD COMPUTING
by Arun Chandran, Prabu K
Abstract: Nowadays cloud computing is a technology which is rapidly developing in computing arena. It provides various benefits to the consumers. In this approach cloud computing proposals a novel service to the smart users to permitting for consume the distant resources due to some faults faced in smart devices, like lacking storage space, small amount of battery energy, mobile applications faces many confronts in energy management, security issues, mobility management, and so on. This causes to the emergence of the newest computing model known as Mobile Cloud Computing (MCC). This kind of computation supports to the end user that the smart/mobile devices not require to execute the application in user device as a replacement of some jobs will be execute in distant cloud / cloudlet is named as offloading jobs which is the nearby to the device . At the similar time job scheduling is more critical commonly at both the mobile devices and the mobile cloud. In this work, to solving the task scheduling problem, we propose Enhanced Bee Colony Optimization based Task Scheduling [EBCO-TS] algorithm for priority based task scheduling with load balancing model. The proposed EBCO-TS consume the power only 85% compared to the existing methods like Bee colony, FCFS, Min-Min, SJF, LBA. In addition, the proposed EBCO-TS shows better load balancing when the number of request increases in the cloudlet. Sequences of repetitions were completed to estimate the recital of the algorithm efficiency and the results are enormously greater and acceptable in contrast to previews methods.
Keywords: Mobile Cloud Computing; Cloud Computing; Priority Based Task Scheduling; Task Scheduling; Enhanced Bee Colony Optimization Based Task Scheduling Algorithm; Load Balancing.
An Efficient Cache Management Algorithm for Streaming Workloads
by Kyungwoon Cho, Hyokyung Bahn
Abstract: In this paper, we present a novel cache management algorithm for real-world streaming workloads. Streaming workloads are believed to exhibit very large and sequential access patterns, which has been the main consideration in designing media caching algorithms. However, legacy caching algorithms do not fully utilize fine-grained access patterns of streaming workloads and also tend to ignore human interactivity. In this paper, we present the LEF (Least Expectation First) algorithm, which manages a large number of block caches as two-level grouping. Specifically, we select caching and eviction targets based on the expected gain of the cached data blocks, thereby improving the cache hit ratio significantly. Experimental results show that the proposed algorithm performs better than well-known interval caching and LRU algorithms with respect to the hit ratio and the I/O bandwidth.
Keywords: caching algorithm; interval caching; LRU algorithm; streaming workload.
Energy Efficient Dynamic Clustering Routing Protocol in Underwater Wireless Sensor Networks
by Gomathi Rm, Martin Leo Manickam J, Sivasangari A, Ajitha P
Abstract: In Underwater wireless sensor networks (UWSN), energy control is a vital issue. Few UWSN applications include both dynamic and static sensor nodes within the same networks. The mobility of dynamic nodes can lead to performance related issues as these nodes include small memory, battery power, short range communication, and low speed calculation ability. Hence, an energy efficient routing protocol is important to direct the incoming packet. Dynamic Cluster technology utilizing cluster based network arrangement is mainly learned in routing protocol. In this paper, proposed a unique routing algorithm called as Energy Efficient and Mobility based Dynamic Cluster Head Selection Routing Protocol (EE-MDCHSRP) is suggested for Underwater Wireless Sensor Networks for successful dynamic cluster head choices. Simulation test and data analysis results prove that the overall performance of proposed or projected routing method is 96.98% more effective when compared to existing routing protocols of the Underwater Wireless Sensor Networks.
Keywords: UWSN ;Cluster Head; Cluster Head selection; Base Station; Energy; dynamic clustering; Intersect Node Selection; Mobility.
LIGHT WEIGHT SECURITY SCHEME IN WIRELESS BODY AREA SENSOR NETWORK USING LOGISTIC CHAOTIC SCHEME
by Sivasangari A, Ajitha P, Gomathi R M
Abstract: WBAN is a boon to humanity that can track the physiological activities of humans irrespective of location and time. However, the major concern about WBAN are the security and privacy of the health data. The health data should be secured to ensure prevention of misuse of data. On the other hand, the health data about the patient must reach the physician at the right time, without any delay. As security impact over the lives of human, an effective model named as SEKBAN (Secure Key Management in WBAN) is presented that concerns about security at three phases. This proposed approach ensures the security of the data by establishing keys based on the ECG signal.
Keywords: ECG Signal; Logistic Chaotic RC7 algorithm; PRESENT.
A NOVEL EVOLUTIONARY ALGORITHM (MFO) WITH RATE MONOTIC SCHEDULING FOR LOAD BALANCING IN LTE ADVANCED NETWORKS
by Pradeep Shanmugam, L. Lakshminarasimman
Abstract: In recent days, instruct for load balancing is not easy one in LTE network environment. LTE-Long Term Evolution-Advanced is the newest 4G technology. In this cellular network, the femto cells offered a viable and cost-effective method of enhancing the cellular reporting and capability for each WLAN and WiMAX consider to its minimum cost and easy employment. However, network allocates resource dissimilar to each and every users. To overcome this difficulty, in this paper, proposed the Moth Flame Optimization (MFO) technique is used to provide equal resource allocation to user. The resources are WLAN, and WiMAX, in this process two WLAN, and WiMax is used in LTE Network. The load balancing is difficult task for LTE, Using this MFO method to balance the load for routing process. Therefore at this point, Rate-Monotonic Scheduling (RMS) algorithm is applied to share the load equally to available user, which increases the throughput and control the overload during communication time instance. The simulation results show that the proposed MFO technique has achieved improved network performance is distinguished than existing HMFQ-RR-Hybrid Multilevel Feedback Queue with Round Robin than HWRR-SJF-Hybrid Weighted Round Robin with Shortest Job First in terms to reduce packet loss rate, packet delay, and end to end delay, as well as to improve fairness, spectral efficiency parameters are analyzed based on bit rate by using MATLAB.
Keywords: LTE; femto cells; macro cells; cluster; WLAN; WiMAX; Moth Flame optimization; rate-monotonic scheduling.
Petri Net Model for Resource Scheduling with Auto scaling in Elastic Cloud
by K. R. Remesh Babu Raman, Philip Samuel
Abstract: Cloud service vendors offer wide range of services in a pay per use paradigm to the customers. The aim of cloud resource management is to speed up the execution of tasks and efficient usage of computing resources. The main benefit of optimal scheduling policy is reduced makespan, energy as well as cost with minimum number of Service Level Agreement (SLA) violations. In market oriented cloud the service vendors offer vivid variety of purchasing options and also dynamic prices to the customers. Inorder to incorporate these purchase-promotional offers and dynamic prices, this paper propose a Petri Net model for scheduling the workload across physical servers. Here, SLA requirements considered are CPU speed, memory, makespan and bandwidth with fewer virtual machine migrations. The experimental results indicate that the proposed system efficiently performs dynamic provisioning and elasticity in multiple public clouds with auto scaling that reduces makespan, number of SLA violations, penalty cost and maximizes the profit.
Keywords: Cloud computing; Petri Nets; Scheduling; Migration; Autoscaling.
Special Issue on: ICICCT 2019 Sustainable Computing and Wireless Networks
by Muralidhar K., Madhavi K.
Abstract: Nodes in Mobile ad hoc networks (MANETs) sometimes do not have a completely connected path between them because the connectivity of a mobile network cannot be maintained for long periods. An intermittently connected MANET (ICMANET) is usually a delay tolerant network (DTN), which is capable of tolerating lengthy delays. It is not possible to achieve full connection with a DTN. The probabilistic routing protocol using the history of encounters and transitivity (PRoPHET) is the most popular DTN routing protocol. However, PRoPHET has demerits such as high resource consumption, message spread, and duplication. To overcome these disadvantages, this paper proposes a method for selecting an intermediate node as an optimal carrier to disseminate messages from the source to the destination. Simulation results indicate that the proposed method provides improved delivery ratio, fewer delays, and lower resource consumption, message spread, and duplication than the conventional PRoPHET and fuzzy PRoPHET protocols.
Keywords: mobile ad hoc network; delay tolerant network; intermittently connected network; message dissemination; PRoPHET protocol; equal delivery predictability value; optimal carrier.
Robust Intrusion Detection System based on Fuzzy C Means clustering scheme implemented in IoT based Wireless Sensor Networks
by Ezhilarasi M., Krishnaveni V.
Abstract: Research in wireless networks and communication protocols have reached new heights in recent times with the advent of state-of-the-art communication techniques and gadgets. They have found widespread utility in recent times especially with the advent of cloud computing and Internet of Things (IoT). IoTs offer immense potential in todays scenario aiding in smart computing and automation of things focused to making life of consumers easier and simpler. However, security of information transmitted and received over wireless networks is an essential concern to preserve privacy and authenticity of information. This research issue is however quite complex as it involves security of bulk information quite private and confidential to be delivered in a wireless medium prone to hackers. This research article has investigated the various issues related to security of IoT based wireless sensor networks and proposed a fuzzy based clustering algorithm to effectively detect an intrusion and make the information secure. An important aspect of nodes in a WSN is that they need to be quite cooperative due to their interdependency over another node for communication of information packets. This paper has presented a model and experimental justifications to improve the efficiency of the algorithm by minimizing the number of false detections of intrusions.
Keywords: Wireless sensor networks; Intrusion detection systems; Internet of Things; Fuzzy clustering.
AN IMPROVED VERTICAL HANDOFF DECISION BASED ON THE MODULAR NEURAL NETWORK WITH FUZZY LOGIC FOR WIRELESS HETEROGENEOUS NETWORK
by Ganesan Ravindran, Sowmya Sowmya
Abstract: In recent times, provision of required services to consumers on an anyplace any time basis is limited by several constraints one among which is the issue of call drop. In order to eliminate this situation, the network operator should enhance vertical handoff (VHO) mechanism. VHO is the process of exchanging the ongoing wireless link to any of the wireless technologies in heterogeneous to support node mobility without fail. Normally, a mobile user can achieve VHO process by utilizing the Received Signal Strength (RSS) as single criteria. But sometimes it leads to abortive handoff, service disruption and unbalanced network load. In this paper, a modified Modular Neural Network into Fuzzy Logic (MNN-FL) by using multi criteria metrics in the mobile environment is proposed. State of Mobile Terminal (MT) is evaluated by Fuzzy Logic (FL) by comparing the battery level and the mobility of MT in which identification of best access network is achieved. The high value SNRs are considered for choosing the best network access to accomplish higher data rates and throughput. The performance results demonstrates that MNN-FL based VHDA shows well-organized network concert in terms of handoff dropping rate and enhanced throughput than existing VHO algorithms.
Keywords: Heterogeneous Network; Vertical Handoff (VHO); Fuzzy logic (FL); Modular Neural Network (MNN); Mobile Terminal(MT).
A Novel adaptive Fuzzy Based sliding mode control for Channel state estimation in Cognitive radio for reduction of Interference
by Vadivukkarasi S.
Abstract: Research in spectrum availability and its effective utilization is becoming an epicenter of research in recent times with the increasing scarcity of radio spectrum. An effective solution is in the form of Cognitive radios (CRs) which are quite intelligent to effectively utilize the scarcely available spectrum in an efficient and economic manner. Apart from being intelligent, they represent reconfigurable wireless communication systems, which are self-aware of their environment and learn to adapt it for dynamic changes. They are characteristic of efficient spectrum utilization. This research paper defines the objective of determining the channel state information through sliding model control based intelligent adaptive fuzzy algorithm. The CR has ability to operate in a particular radio configuration based on device status and environmental aspects including interference noise. The proposed Adaptive fuzzy SMC based channel state estimation has been compared against conventional and recent techniques and outputs established in terms of bit error rate and mean squared error. The proposed sliding rule method is quite an ideal choice for the proposed scenario characterized by dynamically changing input conditions to the sensing components of the CR network.
Keywords: Cognitive Radio (CR); Channel state information; sliding mode control (SMC); Adaptive fuzzy; bit error rate.
Non-orthogonal Filter Bank Multi Carrier Systems with higher Overlap Factor Filters for 5G Communications and Beyond
by Ravi Sekhar Yarrabothu, Usha Rani Nelakuditi
Abstract: Technology has become so much integral part of our daily life that each aspect of life including vehicular communications; so the need for existing cellular communications to include the Vehicle to Vehicle (V2V) communication in its evolution. So, cellular industry has been addressing some of the limitations in the current 4G Long Term Evolution (LTE) system such as lower spectral efficiency, no support for asynchronous data transfer, high out-of-band emissions. Filter Bank Multi Carrier (FBMC) technique is getting used as one of the 5G waveform modulations to overcome the above mentioned limitations. FBMC with prototype filter spreading factor 4 is extensively researched in most of the literature, which was initially proposed in PHYDYAS project. The aim of this paper is to design and simulate the FBMC based 5G communication system with proto type filters of higher order spreading factors. In this paper, the performance of FBMC based 5G communication system with spreading factors 4, 6 and 8 along with Orthogonal frequency division multiplexing (OFDM) based LTE is studied in terms of spectral efficiency, out of band emissions, Peak to Average Power ratio (PAPR) and Bit Error Rate (BER) under AWGN and outdoor Line of Sight fading conditions such as Rural (RLOS), Highway (HLOS) and Urban Approaching (UALOS). The results show that the higher order spreading factors resulting in to good spectral efficiency, very minimal out-of-band emissions result in to lesser Adjacent Channel Power Ratio (ACPR) at the same time having comparable BER and slightly better PAPR than that of LTE systems. Keysight Test bed with Vector Signal Generator hardware as Transmitter and Vector Signal Analyzer hardware as receiver has been implemented and verified the BER and PAPR analysis against the simulated values. The simulated and real values are closely matching. These results make a compelling case for the consideration of FBMC system with higher order filters, for 5G and future communications. As of now the FBMC systems are little bit complex than OFDM systems, but with advances in the processing device technologies may soon make a way for the FBMC.
Keywords: FBMC; HLOS; LTE; OFDM; OQAM; PPN; RLOS; UALOS.
Filter based Optimal Transmission Path Scheduling (FOTPS) in MIMO LTE and LTE-A Networks
by Paparao Ch, Sumitha Bashini, Putta Chandrasekhar Reddy
Abstract: The present reputable method of wireless communication is Multi-In and Multi-Out (MIMO) transmission of the signals between antennas. Though the MIMO allowing to signify the wireless communication with robust performance, often evincing the considerable bit error rate due to the imbalance signal against to noise, contention due to load, and poor bandwidth share. The contemporary methods are optimistic to reduce the bit error rate at receiver end, but their performance is out of scope in regard to the limits claimed in this description. Hence, it is obvious to define novel methods to select the transmission channel between the source and destination that incorporates multiple antennas in sequence. In order to this, a filter-based technique that filters the unimaginative direct transmission channels between any two antennas in sequence is proposed and explored in this manuscript. The filter that portrayed is an extended version of the wiener filter that boosted up with novel distribution diversity measure called KS-Test. This filter works on transceiver side to estimate the significance of the transmission channel under defined constraints of the communication and they are noise, load and bandwidth sharing. The experimental study denoting that the proposed filter is outperforming the contemporary models in regard to minimize the bit error rate and other quality metrics.
Keywords: OFDM; Uplink; Third Generation Partnership Project; Long-Term Evolution; Self-Organizing Network.
Design and Investigations of Novel Compact RSS Antenna for Ultra-Wide Band Applications
by Amir Anton Jone A., Anita Jones Mary Pushpa T.
Abstract: In current scenario, many researchers are focused on antenna design with an emerging technology of ultra-wide band (UWB) applications. UWB provides many advantages such as high gain, low VSWR, minimum return loss and Omni-direction radiation pattern which are best suitable for medical applications. The US Federal Communications Commission (FCC) has a frequency band of (3.1 10.6) GHz for this research. In this paper, a novel rectangular stair slot (RSS) antenna is proposed to achieve UWB with simple structure and compact size. The overall size of the designed antenna is 33 x 19 x 1.9 mm3 with FR4 substrate. It is fed with 50 Ω micro-strip lines with a truncated ground line. In addition, bandwidth is enhanced by introducing the step-cut in the left corner of radiating patch. The proposed antenna is simulated in Ansoft HFSS simulator. The performance of antenna is exhibited by investigating a various parameters such as return loss, VSWR, gain, directivity, impedance, group delay and radiation pattern. The designed antenna is fabricated with Eleven Lab and measured with the help of vector network analyzer.
Keywords: ultra-wideband (UWB); rectangular stair slot (RSS); gain; VSWR; return loss.
Special Issue on: Exploring Emerging Verticals in the Future of Wireless Technology
by Feng Cui
Abstract: Building Information Modellingalso popularly known as the BIM is emerging to be one of the most rapidly advancing modelling techniques used in a wide range of applications. BIM drastically reduces the time involved in manual work which is characteristic of the past and completes automates the process of managing and disbursing required data for modelling and construction of civic structures. There has been a widespread investment in BIM by clients prior to commencement of new projects, pre construction analysis, interior designing and post construction. Since BIM is a recent trend, the motivation for the proposed work has been derived an exhaustive literature survey in key areas for research contributions which could greatly increase the quality and importance of BIM. The proposed work focuses on the input side of BIM system involved with acquisition and processing of information before being exported into the database management system. 3D to 2D modelling and feature extraction has been proposed in this paper with dimensionality reduction technique which drastically reduces the feature data set before being exported in to the BIS management system. A Principal component analysis (PCA) has been implemented in this paper and the two dimensional features have been exported into the BIM database. The most appropriate texture image is selected from aerial images according to geometry between building faces and external parameters of thephotos. The method has been tested with LIDAR data of two building images and extraction accuracy determined.
Keywords: 3D image modelling and extraction; Polgonization; multi resolution approximation; feature import in BIS.