Advances in Human Resources Management and Organizational Development - Advances in Data Communications and Networking for Digital Business Transformation
Latest Publications


TOTAL DOCUMENTS

9
(FIVE YEARS 0)

H-INDEX

2
(FIVE YEARS 0)

Published By IGI Global

9781522553236, 9781522553243

Author(s):  
Mamata Rath

Mobile ad-hoc network (MANET) has always been a challenging and pioneering wireless network providing magnificent technology support starting from everyday life to disaster and critical environment. In industrial applications and most of the real-world solicitations, the MANET technology greatly suffers due to practical challenges faced by the network, power deficiency, and dynamic topology change being the prominent factors. Many cross-layer platforms supporting real-time applications have been developed by many researchers with the basic intention being maximum utilization of resources in the resource constrained environment of MANET, minimum power consumption using limited residual battery power of the highly transferable mobile nodes. This chapter presents the design of an optimized network layer protocol with delay management and power efficiency.


Author(s):  
Fadi Alhaddadin ◽  
Jairo A. Gutiérrez ◽  
William Liu

The advancement in the field of information and communication technology has generated a great deal of information that was not possible to access earlier. Healthcare systems are one of the most beneficial applications using wireless medical sensor technologies, which can facilitate patient care within homes, hospitals, clinics, disaster sites, and the open environment. The integration and sharing of such information can contribute significantly to a better understanding of patients' health conditions and therefore to improving the quality of healthcare provided to them. However, in order to achieve sufficient levels of collaborative use of information among healthcare-related practitioners, there is a need to overcome a number of issues such as privacy and interoperability, among others. This chapter discusses two of the main challenges encountered before healthcare information systems can collaboratively share patients' records, namely privacy and interoperability.


Author(s):  
Mohamed Lahby ◽  
Abderrahim Sekkaki

The rapid evolution of wireless networks over the last decade has allowed users to reach any access network at anytime and anywhere. The main challenge in this heterogeneous network is to determine the best access network for the end user in terms of quality of service (QoS) when the vertical handover process is needed. In this chapter, the authors propose an efficient policy for vertical handover based on multi-attribute utility theory. This theory combines two approaches the utility function and multiple attributes decision making (MADM). Firstly, they apply the utility function to build the utility values which are inputted to the attributes matrix decision of MADM. Then they use the NMMD algorithm which is MADM technique to rank the interfaces according utility values. The simulation results demonstrate that the proposed policy can achieve a significant improvement concerning three parameters: the reversal phenomenon, the ping-pong effect, and the number of handoff failures.


Author(s):  
Mohamed Manoufali ◽  
Peng-Yong Kong ◽  
Shihab Jimaa ◽  
Hamada Alshaer

Maritime oil exploration and transportation has increased more steeply due to the expansion of the world crude oil and natural gas production. The probability of oilrig pollution, burning, and explosion continues to rise. All these factors stimulate a greater danger for vessels, oil operation safety, and maritime environment. The continuous surveillance of the offshore oil fields and container vessels is essential to secure the production flow, avoid trespassing, and prevent vandalism from intruders and pirates. However, developing a large-scale camera sensor network (CSN) for a maritime surveillance is a challenging problem due to the environment complexity and network connectivity. Maritime wireless mesh networks (MWMNs) are envisaged to provide network connectivity in maritime environment and enable users to access the terrestrial communication networks. The high cost and low data-rate of satellite and other legacy maritime communication technologies and systems deployed in MWMNs pose a major limitation to establishing reliable and affordable maritime communications.


Author(s):  
Isha Pathak ◽  
Deo Prakash Vidyarthi ◽  
Atul Tripathi

Business has transformed drastically over the years and cloud computing has emerged as an upcoming platform to provide all types of services, especially in the domain of digital business. Virtualization in cloud is a core activity, done at various levels, to support multiple services. Network virtualization is a significant aspect that liberates the users for seamless network access. Virtual network embedding is a process in which the demand of virtual nodes and virtual links are fulfilled by physical/substrate nodes and links while optimizing certain characteristic parameters. This chapter addresses the virtual network embedding problem to optimize parameters such as running time, residual physical network, and embedding cost using graph theory approach. It also minimizes the exhaustion of substrate network resources and still using its resources efficiently. In this chapter, a concept of graph theory has been applied for the virtual network embedding problem. The proposed model has been simulated for its performance study, and results reveal the efficacy of the method.


Author(s):  
Michail Katsigiannis

This chapter examines how to estimate and forecast the market demand of mobile data traffic in the 5G era. The research objective is to develop a demand model for forecasting the market price and quantity of traffic in the Finnish mobile data communications market for the period between 2016 and 2020. The market price of traffic unit (GB/month), quantity, revenue, and profits are empirically estimated and forecast. The results show that the improvements of network performance, reflected by the user experienced data rate, cause a drop in the price from 0.8 to 0.27 € per GB/month between 2016 and 2020 (tenfold traffic growth). Also, a more than threefold increase is shown in mobile data revenues, whereas the profitability remains at a high level for the minimum marginal cost of 0.08 €.


Author(s):  
Gianpaolo Tomaselli ◽  
Lalit Garg ◽  
Vipul Gupta ◽  
Peter A. Xuereb ◽  
Sandra C. Buttigieg

This chapter provides a review of the current state of corporate social responsibility (CSR) communication research and a theoretical framework on related topics. The analysis covers a period of twenty years (from 1997 to 2016) and statistically maps the streams of research advances on CSR communication, identifying top academic journals in the field. Moreover, the authors focus on the importance of CSR communication for businesses, the different approaches to communication, and review the literature dealing with both digital and traditional tools adopted for CSR communication. A discussion on how today's businesses are aware of the importance of communicating CSR to their stakeholders and are implementing both digital and traditional tools in a complementary way for their CSR communication strategy follows; research gaps, limitations, and further directions conclude the chapter. Finally, this chapter provides some inputs about the relevance of this topic for digital business transformation.


Author(s):  
Debashis Saha

In cloud service provisioning, spot instances are an attractive option for IT managers of small and medium enterprises (SMEs) that usually have sporadic requirements for cloud resources. Though priced dynamically, spot instances are usually cheaper. Cloud service providers (CSPs) employ the spot instance approach to sell their “idle” resources because spot instances are spare slots requiring no pre-booking, unlike reserved or on-demand instances that require prior booking. However, IT managers have to win spot instances via auctions conducted by CSPs. An SME continues to consume spot instances as long as its bid exceeds the current spot price. But, if it loses at any point in time, the unfinished task is to be put on hold by checkpoint mechanism. Optimizing both bid price and checkpoint overhead calls for strategic thinking on the part of the SME. This chapter dwells on this issue to help the IT managers of SMEs transform their business with cloud.


Author(s):  
Oshin Sharma ◽  
Hemraj Saini

The most dominant service of cloud computing is infrastructure as a service (IaaS). Virtualization is the most important feature of IaaS and it is very important for the improvement of resource utilization; but along with this, it also degrades the system's performance and makes them overutilized. Therefore, to solve the problem of overutilization or underutilization of machines and performance improvement of machine, the VMs present inside the physical machine needs to be migrated to another physical machine using the process of VM consolidation, and the reduced set of physical machines after placement needs a lesser amount of power or energy consumption, which is the main aim of energy-aware VM placement. This chapter presents a decision-making VM placement system and compares it with other predefined VM placement techniques. This analysis contributes to a better understanding of the effects of the placement strategies over the overall performance of cloud environment and also shows how the one algorithm delivers better results for VM placement than another.


Sign in / Sign up

Export Citation Format

Share Document