{"title":"Energy efficient-Dynamic and Self-optimized Routing In Wireless Sensor Network Based on Ant Colony Optimization.","authors":"Arindam Debnath, M. Debbarma","doi":"10.1504/IJNVO.2019.10011635","DOIUrl":"https://doi.org/10.1504/IJNVO.2019.10011635","url":null,"abstract":"A wireless sensor network (WSN) consists of low power, low cost, limited memory and small in size sensor nodes, organise them in a cooperative network and perform three basic operations - sensing data from environment, computation, and data routing. Routing in WSN mainly focuses on data dissemination, data aggregation, life time of the network and limited bandwidth constraints in order to facilitate the efficient working of the network. Due to the limited battery power, the energy conservation is a critical aspect to design an efficient routing protocol in WSN. This paper proposes the energy efficient dynamic and self-optimised routing to prolong the life time of the network, QoS and solve the stagnation problem in the network.","PeriodicalId":52509,"journal":{"name":"International Journal of Networking and Virtual Organisations","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2019-02-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"43633408","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"An Efficient Adaptive Genetic Algorithm (GA) Technique to Improve the Neural Network (NN) Performance with aid of Adaptive GA Operators","authors":"Katha Kishor Kumar, S. Pabboju","doi":"10.1504/IJNVO.2019.10007705","DOIUrl":"https://doi.org/10.1504/IJNVO.2019.10007705","url":null,"abstract":"The neural network (NN) performance improvement is one of the major topics. Thus an adaptive genetic algorithm (AGA) technique is proposed by making adaptive with respect to genetic operators like crossover and mutation. Our adaptive GA technique starts with the generation of initial population as same as the normal GA and performs the fitness calculation for each individual generated chromosome. After that, the genetic operator's crossover and mutation will be performed on the best chromosomes. The AGA technique will be utilised in the NN performance improvement process. The AGA will utilise some parameters obtained from the NN by back propagation algorithm. The utilisation of NN parameters by AGA will improve the NN performance. Hence, the NN performance can be improved more effectively by achieving high performance ratio than the conventional GA with NN. The technique will be implemented in the working platform of MATLAB and the results will be analysed to demonstrate the performance of the proposed AGA.","PeriodicalId":52509,"journal":{"name":"International Journal of Networking and Virtual Organisations","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2019-02-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"41685445","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Adaptive modulation and interference cancellation techniques for MIMO-OFDM wireless networks","authors":"A. M. Ahmed, E. A. Jasmin","doi":"10.1504/IJNVO.2018.10013255","DOIUrl":"https://doi.org/10.1504/IJNVO.2018.10013255","url":null,"abstract":"Multiple-input multiple-output antenna-orthogonal frequency division multiplexing (MIMO-OFDM) is one of the most wanted wireless broadband technology and transmission systems that has been accepted as the basis of fourth generation (4G) wireless communication is MIMO-OFDM. It is so flexible and adaptable to stay in power even in the coming up 5G technologies. The relative motion of the transmitter and receiver can bring alteration in the channel within the time period of an OFDM, hence OFDM causes loss of orthogonally between sub carrier which results in inter-carrier interference. In order to overcome these issues, an adaptive modulation and interference cancellation technique for MIMO-OFDM wireless network are proposed. Along with interference cancellation technique, adaptive modulation is used to meet the required BER performance by selecting suitable modulation modes based on the channel condition. Doppler assisted channel estimation method is used to estimate the channel. Also, inter channel/carrier interference (ICI) cancellation scheme is used to integrate the parallel interference cancellation together with the decision statistical combining (PIC-DSC) module to detect the data and transmit it to the estimator to iteratively refine the channel and give interference free channel. Simulation results shows that the proposed method improves the BER performance of the system.","PeriodicalId":52509,"journal":{"name":"International Journal of Networking and Virtual Organisations","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2018-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"89367953","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"DCSP-MC: dependable cloud-based storage platform for mobile computing","authors":"Xiao Peng, Yan Guo-feng","doi":"10.1504/IJNVO.2013.053745","DOIUrl":"https://doi.org/10.1504/IJNVO.2013.053745","url":null,"abstract":"Recently, mobile devices have become more and more important in people's daily lives. Due to the data inflation and natural limitations of mobile devices, such as limited storage space and computing capability, data storage and sharing have become urgent issues in mobile computing environments. In this paper, we implement a lightweight cloud-based storage framework, which provides an easy-to-use file navigation service for attribute-based file querying or semantic-based data retrieving. In addition, it incorporates an effective mechanism for users to verify their data integrity, which can relieve much burden from mobile devices. Experimental evaluations show that the proposed framework is effective to provide flexible and reliable data sharing in mobile computing environments.","PeriodicalId":52509,"journal":{"name":"International Journal of Networking and Virtual Organisations","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2013-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1504/IJNVO.2013.053745","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"66787639","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Challenges of implementing innovation contests to facilitate radical innovation","authors":"Björn Remneland Wikhamn","doi":"10.1504/IJNVO.2013.059681","DOIUrl":"https://doi.org/10.1504/IJNVO.2013.059681","url":null,"abstract":"Innovation processes have become increasingly decentralised and distributed to meet the rapidly changing and knowledge intensive markets. Innovation contests are often pointed out as tools for generating radical innovation and to aid organisations in adopting to open innovation practices. These contests cut across established organisational structures and do therefore not automatically fit into the everyday corporate processes. This paper analyses through a case study some of the difficulties that innovation contests meet when being introduced to an established, large organisation. Certain challenges are pointed out for innovation contests to act as vehicles in building dynamic capabilities for the firm.","PeriodicalId":52509,"journal":{"name":"International Journal of Networking and Virtual Organisations","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2013-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1504/IJNVO.2013.059681","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"66787647","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Deep Web education resources sharing solution different from China e-Learning Technology Standard","authors":"Zhang Shiming, Qin Zhen, X. He-xiang","doi":"10.1504/IJNVO.2011.040004","DOIUrl":"https://doi.org/10.1504/IJNVO.2011.040004","url":null,"abstract":"In the paper, a solution based on Deep Web integration technology is designed to realise the Deep Web education resources sharing and solve the defects of China e-Learning Technology Standard. The solution supports four modules: knowledge discovery, integrated query, knowledge base and system monitor. The former two modules function based on the integration with the later two modules. The design has been applied to an inter-library search system. Four libraries are joined in the system. Good feedback has been received. The project has been awarded the 'Shanghai Science and Technology Progress Third Level Award'. The solution is still preliminary, and there are many aspects to be improved. The future research is supported by Innovation Program of Shanghai Municipal Education Commission.","PeriodicalId":52509,"journal":{"name":"International Journal of Networking and Virtual Organisations","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2011-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1504/IJNVO.2011.040004","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"66787594","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Organisational knowledge transformation and its influencing factors in individual, team and organisational level","authors":"Wu Wei, Yezhou Yan","doi":"10.1504/IJNVO.2011.039994","DOIUrl":"https://doi.org/10.1504/IJNVO.2011.039994","url":null,"abstract":"Organisational knowledge transformation (OKT) influenced by many factors, usually exists at individual, team, and organisational level, which is a comprehensive process from the interaction of various tacit and explicit knowledge elements. Therefore, based on domestic and foreign research literatures, this paper firstly put forward the factors of OKT and their hypotheses in multiple levels, then utilises relevant datum of three questionnaire of every sample firm to examine the influence of those factors on OKT process by empirical analysis. Its research results show that: 1) the factors of OKT process have a construct of four variables, which are named as demand-inspirit-relation, trust, learning, and embedding; 2) demand-inspirit-relations and learning factor have a positive effect on knowledge transforming in all levels, and trust factor has a positive effect only in individual level, but no significant effects in team and organisational level, then the effects of embedding factor are also not significant in all levels.","PeriodicalId":52509,"journal":{"name":"International Journal of Networking and Virtual Organisations","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2011-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1504/IJNVO.2011.039994","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"66787569","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Consumer privacy expectations in a virtual environment: a framework for corporate risk assessment","authors":"J. Sipior, Burke T. Ward, Nicholas M. Rongione","doi":"10.1504/IJNVO.2009.027789","DOIUrl":"https://doi.org/10.1504/IJNVO.2009.027789","url":null,"abstract":"The technological capabilities in a virtual environment enable a wealth of information concerning consumer characteristics and preferences to be gathered, combined and disseminated, with relative ease, during electronic commerce (e-commerce) transactions. Consumers continue to be concerned about the corporate use of personal information collected during the course of such transactions, despite government oversight. This paper examines the types of consumer information collected and the concerns associated with such practices. Consumer concerns give rise to the necessity for corporations to self-regulate by assessing the risks associated with information privacy practices. In response, we present a conceptual framework for the corporate risk assessment of consumer privacy expectations. This framework can be used by corporations to assess and explain their self-regulation of consumer internet privacy.","PeriodicalId":52509,"journal":{"name":"International Journal of Networking and Virtual Organisations","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2009-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1504/IJNVO.2009.027789","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"66787355","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A conceptual analysis of group privacy in the virtual environment","authors":"N. Surendra, A. G. Peace","doi":"10.1504/IJNVO.2009.027788","DOIUrl":"https://doi.org/10.1504/IJNVO.2009.027788","url":null,"abstract":"While individual privacy has been the subject of considerable research in both the face-to-face and virtual environments, the idea of 'group privacy' has received less attention. Proponents advocate the idea of group privacy on the following two principles: 1) Group privacy should protect the need of people to come together to exchange information and share feelings. In this process, people reveal themselves to one another and rely on the others in the group to keep this information within the group. 2) The combination of information disseminated about a group and the realisation that a certain individual is a member of that group can potentially violate that individual's privacy. In the virtual environment, group privacy may be as important as individual privacy, given the popularity and pervasiveness of discussion forums, e-mail listservs and 'social networking' websites, such as Facebook and MySpace. This paper provides an overview of group privacy, the impact of virtual communities on group privacy and a discussion of potential future research in this important area.","PeriodicalId":52509,"journal":{"name":"International Journal of Networking and Virtual Organisations","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2009-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1504/IJNVO.2009.027788","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"66787317","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Why should I tell you? Applying a culturally attuned privacy theory to understand global customers' online disclosure behaviours in e-commerce transactions","authors":"N. Zakaria, Nasriah Zakaria, S. M. Yusof","doi":"10.1504/IJNVO.2009.027791","DOIUrl":"https://doi.org/10.1504/IJNVO.2009.027791","url":null,"abstract":"This paper explores the effect of cultural values and information privacy concerns on the online disclosure behaviours of global customers engaged in e-commerce activities. Hence, the general research question is as follows: In what ways do cultural values and privacy induce or deter online disclosure behaviours? To understand online disclosure behaviours from the cultural and privacy perspectives, the paper draws on two theoretical frameworks. Hall's (1976) high-context/low-context cultural theory illuminates how cultural values induce or discourage disclosure behaviours and Petronio's (2002) Communication Privacy Management (CPM) theory is useful in explaining the psychological boundaries between disclosure and privacy. Integrating these two theories offers a culturally-attuned privacy theory to understand online disclosure behaviours. Finally, the paper provides perspectives on the implications for e-commerce in its efforts to attract global customers.","PeriodicalId":52509,"journal":{"name":"International Journal of Networking and Virtual Organisations","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2009-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1504/IJNVO.2009.027791","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"66787411","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}