International Journal of Networking and Virtual Organisations最新文献

筛选
英文 中文
Energy efficient-Dynamic and Self-optimized Routing In Wireless Sensor Network Based on Ant Colony Optimization. 基于蚁群优化的无线传感器网络节能动态自优化路由。
International Journal of Networking and Virtual Organisations Pub Date : 2019-02-05 DOI: 10.1504/IJNVO.2019.10011635
Arindam Debnath, M. Debbarma
{"title":"Energy efficient-Dynamic and Self-optimized Routing In Wireless Sensor Network Based on Ant Colony Optimization.","authors":"Arindam Debnath, M. Debbarma","doi":"10.1504/IJNVO.2019.10011635","DOIUrl":"https://doi.org/10.1504/IJNVO.2019.10011635","url":null,"abstract":"A wireless sensor network (WSN) consists of low power, low cost, limited memory and small in size sensor nodes, organise them in a cooperative network and perform three basic operations - sensing data from environment, computation, and data routing. Routing in WSN mainly focuses on data dissemination, data aggregation, life time of the network and limited bandwidth constraints in order to facilitate the efficient working of the network. Due to the limited battery power, the energy conservation is a critical aspect to design an efficient routing protocol in WSN. This paper proposes the energy efficient dynamic and self-optimised routing to prolong the life time of the network, QoS and solve the stagnation problem in the network.","PeriodicalId":52509,"journal":{"name":"International Journal of Networking and Virtual Organisations","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2019-02-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"43633408","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
An Efficient Adaptive Genetic Algorithm (GA) Technique to Improve the Neural Network (NN) Performance with aid of Adaptive GA Operators 一种利用自适应遗传算法提高神经网络性能的高效自适应遗传算法
International Journal of Networking and Virtual Organisations Pub Date : 2019-02-05 DOI: 10.1504/IJNVO.2019.10007705
Katha Kishor Kumar, S. Pabboju
{"title":"An Efficient Adaptive Genetic Algorithm (GA) Technique to Improve the Neural Network (NN) Performance with aid of Adaptive GA Operators","authors":"Katha Kishor Kumar, S. Pabboju","doi":"10.1504/IJNVO.2019.10007705","DOIUrl":"https://doi.org/10.1504/IJNVO.2019.10007705","url":null,"abstract":"The neural network (NN) performance improvement is one of the major topics. Thus an adaptive genetic algorithm (AGA) technique is proposed by making adaptive with respect to genetic operators like crossover and mutation. Our adaptive GA technique starts with the generation of initial population as same as the normal GA and performs the fitness calculation for each individual generated chromosome. After that, the genetic operator's crossover and mutation will be performed on the best chromosomes. The AGA technique will be utilised in the NN performance improvement process. The AGA will utilise some parameters obtained from the NN by back propagation algorithm. The utilisation of NN parameters by AGA will improve the NN performance. Hence, the NN performance can be improved more effectively by achieving high performance ratio than the conventional GA with NN. The technique will be implemented in the working platform of MATLAB and the results will be analysed to demonstrate the performance of the proposed AGA.","PeriodicalId":52509,"journal":{"name":"International Journal of Networking and Virtual Organisations","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2019-02-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"41685445","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Adaptive modulation and interference cancellation techniques for MIMO-OFDM wireless networks MIMO-OFDM无线网络的自适应调制和干扰消除技术
International Journal of Networking and Virtual Organisations Pub Date : 2018-06-01 DOI: 10.1504/IJNVO.2018.10013255
A. M. Ahmed, E. A. Jasmin
{"title":"Adaptive modulation and interference cancellation techniques for MIMO-OFDM wireless networks","authors":"A. M. Ahmed, E. A. Jasmin","doi":"10.1504/IJNVO.2018.10013255","DOIUrl":"https://doi.org/10.1504/IJNVO.2018.10013255","url":null,"abstract":"Multiple-input multiple-output antenna-orthogonal frequency division multiplexing (MIMO-OFDM) is one of the most wanted wireless broadband technology and transmission systems that has been accepted as the basis of fourth generation (4G) wireless communication is MIMO-OFDM. It is so flexible and adaptable to stay in power even in the coming up 5G technologies. The relative motion of the transmitter and receiver can bring alteration in the channel within the time period of an OFDM, hence OFDM causes loss of orthogonally between sub carrier which results in inter-carrier interference. In order to overcome these issues, an adaptive modulation and interference cancellation technique for MIMO-OFDM wireless network are proposed. Along with interference cancellation technique, adaptive modulation is used to meet the required BER performance by selecting suitable modulation modes based on the channel condition. Doppler assisted channel estimation method is used to estimate the channel. Also, inter channel/carrier interference (ICI) cancellation scheme is used to integrate the parallel interference cancellation together with the decision statistical combining (PIC-DSC) module to detect the data and transmit it to the estimator to iteratively refine the channel and give interference free channel. Simulation results shows that the proposed method improves the BER performance of the system.","PeriodicalId":52509,"journal":{"name":"International Journal of Networking and Virtual Organisations","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2018-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"89367953","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
DCSP-MC: dependable cloud-based storage platform for mobile computing DCSP-MC:移动计算可靠的云存储平台
International Journal of Networking and Virtual Organisations Pub Date : 2013-05-01 DOI: 10.1504/IJNVO.2013.053745
Xiao Peng, Yan Guo-feng
{"title":"DCSP-MC: dependable cloud-based storage platform for mobile computing","authors":"Xiao Peng, Yan Guo-feng","doi":"10.1504/IJNVO.2013.053745","DOIUrl":"https://doi.org/10.1504/IJNVO.2013.053745","url":null,"abstract":"Recently, mobile devices have become more and more important in people's daily lives. Due to the data inflation and natural limitations of mobile devices, such as limited storage space and computing capability, data storage and sharing have become urgent issues in mobile computing environments. In this paper, we implement a lightweight cloud-based storage framework, which provides an easy-to-use file navigation service for attribute-based file querying or semantic-based data retrieving. In addition, it incorporates an effective mechanism for users to verify their data integrity, which can relieve much burden from mobile devices. Experimental evaluations show that the proposed framework is effective to provide flexible and reliable data sharing in mobile computing environments.","PeriodicalId":52509,"journal":{"name":"International Journal of Networking and Virtual Organisations","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2013-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1504/IJNVO.2013.053745","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"66787639","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Challenges of implementing innovation contests to facilitate radical innovation 实施创新竞赛以促进突破性创新的挑战
International Journal of Networking and Virtual Organisations Pub Date : 2013-03-01 DOI: 10.1504/IJNVO.2013.059681
Björn Remneland Wikhamn
{"title":"Challenges of implementing innovation contests to facilitate radical innovation","authors":"Björn Remneland Wikhamn","doi":"10.1504/IJNVO.2013.059681","DOIUrl":"https://doi.org/10.1504/IJNVO.2013.059681","url":null,"abstract":"Innovation processes have become increasingly decentralised and distributed to meet the rapidly changing and knowledge intensive markets. Innovation contests are often pointed out as tools for generating radical innovation and to aid organisations in adopting to open innovation practices. These contests cut across established organisational structures and do therefore not automatically fit into the everyday corporate processes. This paper analyses through a case study some of the difficulties that innovation contests meet when being introduced to an established, large organisation. Certain challenges are pointed out for innovation contests to act as vehicles in building dynamic capabilities for the firm.","PeriodicalId":52509,"journal":{"name":"International Journal of Networking and Virtual Organisations","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2013-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1504/IJNVO.2013.059681","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"66787647","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
A Deep Web education resources sharing solution different from China e-Learning Technology Standard 一种不同于中国电子学习技术标准的深度网络教育资源共享解决方案
International Journal of Networking and Virtual Organisations Pub Date : 2011-05-01 DOI: 10.1504/IJNVO.2011.040004
Zhang Shiming, Qin Zhen, X. He-xiang
{"title":"A Deep Web education resources sharing solution different from China e-Learning Technology Standard","authors":"Zhang Shiming, Qin Zhen, X. He-xiang","doi":"10.1504/IJNVO.2011.040004","DOIUrl":"https://doi.org/10.1504/IJNVO.2011.040004","url":null,"abstract":"In the paper, a solution based on Deep Web integration technology is designed to realise the Deep Web education resources sharing and solve the defects of China e-Learning Technology Standard. The solution supports four modules: knowledge discovery, integrated query, knowledge base and system monitor. The former two modules function based on the integration with the later two modules. The design has been applied to an inter-library search system. Four libraries are joined in the system. Good feedback has been received. The project has been awarded the 'Shanghai Science and Technology Progress Third Level Award'. The solution is still preliminary, and there are many aspects to be improved. The future research is supported by Innovation Program of Shanghai Municipal Education Commission.","PeriodicalId":52509,"journal":{"name":"International Journal of Networking and Virtual Organisations","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2011-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1504/IJNVO.2011.040004","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"66787594","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Organisational knowledge transformation and its influencing factors in individual, team and organisational level 个人、团队和组织层面的组织知识转化及其影响因素
International Journal of Networking and Virtual Organisations Pub Date : 2011-05-01 DOI: 10.1504/IJNVO.2011.039994
Wu Wei, Yezhou Yan
{"title":"Organisational knowledge transformation and its influencing factors in individual, team and organisational level","authors":"Wu Wei, Yezhou Yan","doi":"10.1504/IJNVO.2011.039994","DOIUrl":"https://doi.org/10.1504/IJNVO.2011.039994","url":null,"abstract":"Organisational knowledge transformation (OKT) influenced by many factors, usually exists at individual, team, and organisational level, which is a comprehensive process from the interaction of various tacit and explicit knowledge elements. Therefore, based on domestic and foreign research literatures, this paper firstly put forward the factors of OKT and their hypotheses in multiple levels, then utilises relevant datum of three questionnaire of every sample firm to examine the influence of those factors on OKT process by empirical analysis. Its research results show that: 1) the factors of OKT process have a construct of four variables, which are named as demand-inspirit-relation, trust, learning, and embedding; 2) demand-inspirit-relations and learning factor have a positive effect on knowledge transforming in all levels, and trust factor has a positive effect only in individual level, but no significant effects in team and organisational level, then the effects of embedding factor are also not significant in all levels.","PeriodicalId":52509,"journal":{"name":"International Journal of Networking and Virtual Organisations","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2011-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1504/IJNVO.2011.039994","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"66787569","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Consumer privacy expectations in a virtual environment: a framework for corporate risk assessment 虚拟环境中的消费者隐私期望:企业风险评估的框架
International Journal of Networking and Virtual Organisations Pub Date : 2009-08-01 DOI: 10.1504/IJNVO.2009.027789
J. Sipior, Burke T. Ward, Nicholas M. Rongione
{"title":"Consumer privacy expectations in a virtual environment: a framework for corporate risk assessment","authors":"J. Sipior, Burke T. Ward, Nicholas M. Rongione","doi":"10.1504/IJNVO.2009.027789","DOIUrl":"https://doi.org/10.1504/IJNVO.2009.027789","url":null,"abstract":"The technological capabilities in a virtual environment enable a wealth of information concerning consumer characteristics and preferences to be gathered, combined and disseminated, with relative ease, during electronic commerce (e-commerce) transactions. Consumers continue to be concerned about the corporate use of personal information collected during the course of such transactions, despite government oversight. This paper examines the types of consumer information collected and the concerns associated with such practices. Consumer concerns give rise to the necessity for corporations to self-regulate by assessing the risks associated with information privacy practices. In response, we present a conceptual framework for the corporate risk assessment of consumer privacy expectations. This framework can be used by corporations to assess and explain their self-regulation of consumer internet privacy.","PeriodicalId":52509,"journal":{"name":"International Journal of Networking and Virtual Organisations","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2009-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1504/IJNVO.2009.027789","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"66787355","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
A conceptual analysis of group privacy in the virtual environment 虚拟环境中群体隐私的概念分析
International Journal of Networking and Virtual Organisations Pub Date : 2009-08-01 DOI: 10.1504/IJNVO.2009.027788
N. Surendra, A. G. Peace
{"title":"A conceptual analysis of group privacy in the virtual environment","authors":"N. Surendra, A. G. Peace","doi":"10.1504/IJNVO.2009.027788","DOIUrl":"https://doi.org/10.1504/IJNVO.2009.027788","url":null,"abstract":"While individual privacy has been the subject of considerable research in both the face-to-face and virtual environments, the idea of 'group privacy' has received less attention. Proponents advocate the idea of group privacy on the following two principles: 1) Group privacy should protect the need of people to come together to exchange information and share feelings. In this process, people reveal themselves to one another and rely on the others in the group to keep this information within the group. 2) The combination of information disseminated about a group and the realisation that a certain individual is a member of that group can potentially violate that individual's privacy. In the virtual environment, group privacy may be as important as individual privacy, given the popularity and pervasiveness of discussion forums, e-mail listservs and 'social networking' websites, such as Facebook and MySpace. This paper provides an overview of group privacy, the impact of virtual communities on group privacy and a discussion of potential future research in this important area.","PeriodicalId":52509,"journal":{"name":"International Journal of Networking and Virtual Organisations","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2009-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1504/IJNVO.2009.027788","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"66787317","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Why should I tell you? Applying a culturally attuned privacy theory to understand global customers' online disclosure behaviours in e-commerce transactions 我为什么要告诉你?运用与文化相适应的隐私理论来理解全球消费者在电子商务交易中的在线信息披露行为
International Journal of Networking and Virtual Organisations Pub Date : 2009-08-01 DOI: 10.1504/IJNVO.2009.027791
N. Zakaria, Nasriah Zakaria, S. M. Yusof
{"title":"Why should I tell you? Applying a culturally attuned privacy theory to understand global customers' online disclosure behaviours in e-commerce transactions","authors":"N. Zakaria, Nasriah Zakaria, S. M. Yusof","doi":"10.1504/IJNVO.2009.027791","DOIUrl":"https://doi.org/10.1504/IJNVO.2009.027791","url":null,"abstract":"This paper explores the effect of cultural values and information privacy concerns on the online disclosure behaviours of global customers engaged in e-commerce activities. Hence, the general research question is as follows: In what ways do cultural values and privacy induce or deter online disclosure behaviours? To understand online disclosure behaviours from the cultural and privacy perspectives, the paper draws on two theoretical frameworks. Hall's (1976) high-context/low-context cultural theory illuminates how cultural values induce or discourage disclosure behaviours and Petronio's (2002) Communication Privacy Management (CPM) theory is useful in explaining the psychological boundaries between disclosure and privacy. Integrating these two theories offers a culturally-attuned privacy theory to understand online disclosure behaviours. Finally, the paper provides perspectives on the implications for e-commerce in its efforts to attract global customers.","PeriodicalId":52509,"journal":{"name":"International Journal of Networking and Virtual Organisations","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2009-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1504/IJNVO.2009.027791","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"66787411","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信