Search results
1 – 7 of 7Anubha Anubha, Govind Nath Srivastava and Daviender Narang
The Metaverse and Internet of Things (IoT) have emerged like a tidal wave, and it is creating a transformative impact on society and industry. The metaverse and IoT changed the…
Abstract
The Metaverse and Internet of Things (IoT) have emerged like a tidal wave, and it is creating a transformative impact on society and industry. The metaverse and IoT changed the way companies were operating earlier and customers were living their lives. On the other hand, Metaverse enriches the customer experience by offering a matchless virtual experience using augmented reality and state-of-the-art technology. The metaverse and the IoT can be used in various sectors such as manufacturing, transportation, retailing, health care, banking, and automobiles to make cities smart. Metaverse and IoT provide real-time data, reduces operational cost and errors, improves efficiency, and helps industries to make intelligent decisions. Although the IoT and Metaverse offer significant benefits, it is not free from limitations. Ethical dilemmas, privacy issues, data breaches, and difficulty in extracting relevant data impose serious challenges that need to be addressed. There is an urgent and dire need to create a trade-off between the interest of the business and the privacy and security of customers. This chapter aims to discover the potential of Metaverse and IoT in various sectors (e.g., healthcare, transportation, and electronics). This study will bring significant insights to researchers and policymakers by exploring the likely benefits of IoT and metaverse in diverse sectors to develop smart cities. This chapter will also explain the challenges of metaverse and IoT, which can be addressed by integrating data analytics tools optimally and efficiently.
Details
Keywords
Abstract
Purpose
This study investigates the relationships among digital transformation, technological innovation, industry–university–research collaborations and labor income share in manufacturing firms.
Design/methodology/approach
The relationships are tested using an empirical method, constructing regression models, by collecting 1,240 manufacturing firms and 9,029 items listed on the A-share market in China from 2013 to 2020.
Findings
The results indicate that digital transformation has a positive effect on manufacturing companies’ labor income share. Technological innovation can mediate the effect of digital transformation on labor income share. Industry–university–research cooperation can positively moderate the promotion effect of digital transformation on labor income share but cannot moderate the mediating effect of technological innovation. Heterogeneity analysis also found that firms without service-based transformation and nonstate-owned firms are better able to increase their labor income share through digital transformation.
Originality/value
This study provides a new path to increase the labor income share of enterprises to achieve common prosperity, which is important for manufacturing enterprises to better transform and upgrade to achieve high-quality development.
Details
Keywords
Ibrahim Abaasi Musenze, Thomas Sifuna Mayende, Mercy Wanyana and Joseph Kasango
Drawing from the social exchange theory and leadership-making model, this study aimed to develop a research model where innovation climate (IC) mediates the servant leadership…
Abstract
Purpose
Drawing from the social exchange theory and leadership-making model, this study aimed to develop a research model where innovation climate (IC) mediates the servant leadership (SL) influence on innovative work behavior (IWB).
Design/methodology/approach
Through structural equation modeling, we evaluated the aforementioned links using data gathered from 324 employees drawn from Uganda’s local government (LG) employees.
Findings
The findings show that the impact of SL on IWB is mediated by IC. An IC within the organization is made possible by effective SL ethos; moreover, this climate promotes IWB. Also, the innovative nature of LG employees promotes IWB.
Research limitations/implications
LG leadership ought to be committed to the SL philosophy since it fosters an environment that encourages IWB. To spark IWB, it should also take advantage of the innovative environment. Management must make sure that in such a setting, supervisors are construed as servant leaders and low cadre staff have the capacity to be servant leaders. Employees will be more motivated to contribute to the organization by engaging in high IWB once they have received the training, empowerment and rewards they deserve in a setting that emphasizes effective SL principles.
Originality/value
Despite the existence of numerous studies, there is little empirical evidence that SL influences IWB within the setting of the LG sector. Evidence for the underlying mechanism by which SL promotes IWB is still lacking. Third, we explicitly test the IWB model developed based on euro-leaning theories using the LG context. Finally, there is a dearth of data relevant to how IC affects IWB. The research addresses these gaps.
Details
Keywords
Sijie Tong, Qingchen Liu, Qichao Ma and Jiahu Qin
This paper aims to address the safety concerns of path-planning algorithms in dynamic obstacle warehouse environments. It proposes a method that uses improved artificial potential…
Abstract
Purpose
This paper aims to address the safety concerns of path-planning algorithms in dynamic obstacle warehouse environments. It proposes a method that uses improved artificial potential fields (IAPF) as expert knowledge for an improved deep deterministic policy gradient (IDDPG) and designs a hierarchical strategy for robots through obstacle detection methods.
Design/methodology/approach
The IAPF algorithm is used as the expert experience of reinforcement learning (RL) to reduce the useless exploration in the early stage of RL training. A strategy-switching mechanism is introduced during training to adapt to various scenarios and overcome challenges related to sparse rewards. Sensor inputs, including light detection and ranging data, are integrated to detect obstacles around waypoints, guiding the robot toward the target point.
Findings
Simulation experiments demonstrate that the integrated use of IDDPG and the IAPF method significantly enhances the safety and training efficiency of path planning for mobile robots.
Originality/value
This method enhances safety by applying safety domain judgment rules to improve APF’s security and designing an obstacle detection method for better danger anticipation. It also boosts training efficiency through using IAPF as expert experience for DDPG and the classification storage and sampling design for the RL experience pool. Additionally, adjustments to the actor network’s update frequency expedite convergence.
Details
Keywords
Xiaoli Li, Zihan Peng and Kun Li
This study aims to explore the mechanism of boundary-spanning search on firm’s innovation performance under environmental dynamics from the perspective of strategic knowledge…
Abstract
Purpose
This study aims to explore the mechanism of boundary-spanning search on firm’s innovation performance under environmental dynamics from the perspective of strategic knowledge integration.
Design/methodology/approach
A survey was conducted among Chinese firm managers and R&D personnel, resulting in the collection of 315 valid samples. Hierarchical regression analysis was mainly adopted to demonstrate the hypothesized relationships, while the Sobel test and bootstrap method were used to further validate the mediating effects.
Findings
The results demonstrate that boundary-spanning search in different dimensions is a critical factor in the improvement of firm innovation performance (FIP). Two types of strategic knowledge integration are the main factors causing FIP and mediate the influence of boundary-spanning search on FIP. Furthermore, environmental dynamics moderate the relationship among boundary-spanning search, strategic knowledge integration and FIP.
Practical implications
Managers need to strengthen the boundary-spanning search for market and technical knowledge, which will promote firm innovative performance. Managers also need to implement strategic knowledge integration, which specifically includes using planned strategic knowledge integration to compensate for knowledge deficiencies, thereby achieving predetermined objectives; and using emergent strategic knowledge integration to update their understanding of internal and external environments, and to reset strategic objectives. In dynamic environments, managers should emphasize strategic knowledge management activities more.
Originality/value
From a strategic management perspective, this study categorizes strategic knowledge integration into planned and emergent forms. By applying the logic of knowledge acquisition, integration and creation, it explores how boundary-spanning search affects FIP through strategic knowledge integration as the intermediary and the boundary conditions of environmental dynamics. This not only provides a deeper understanding of the nature and effects of boundary-spanning research but also enhances the theory of strategic knowledge management.
Details
Keywords
Liqiong Chen, Lei Yunjie and Sun Huaiying
This study aims to solve the problems of large training sample size, low data sample quality, low efficiency of the currently used classical model, high computational complexity…
Abstract
Purpose
This study aims to solve the problems of large training sample size, low data sample quality, low efficiency of the currently used classical model, high computational complexity of the existing concern mechanism, and high graphics processing unit (GPU) occupancy in the current visualization software defect prediction, proposing a method for software defect prediction termed recurrent criss-cross attention for weighted activation functions of recurrent SE-ResNet (RCCA-WRSR). First, following code visualization, the activation functions of the SE-ResNet model are replaced with a weighted combination of Relu and Elu to enhance model convergence. Additionally, an SE module is added before it to filter feature information, eliminating low-weight features to generate an improved residual network model, WRSR. To focus more on contextual information and establish connections between a pixel and those not in the same cross-path, the visualized red as integer, green as integer, blue as integer images are inputted into a model incorporating a fused RCCA module for defect prediction.
Design/methodology/approach
Software defect prediction based on code visualization is a new software defect prediction technology, which mainly realizes the defect prediction of code by visualizing code as image, and then applying attention mechanism to extract the features of image. However, the challenges of current visualization software defect prediction mainly include the large training sample size and low sample quality of the data, and the classical models used today are not efficient, and the existing attention mechanisms have high computational complexity and high GPU occupancy.
Findings
Experimental evaluation using ten open-source Java data sets from PROMISE and five existing methods demonstrates that the proposed approach achieves an F-measure value of 0.637 in predicting 16 cross-version projects, representing a 6.1% improvement.
Originality/value
RCCA-WRSR is a new visual software defect prediction based on recurrent criss-cross attention and improved residual network. This method effectively enhances the performance of software defect prediction.
Details
Keywords
Huaiyu Jia, Dajiang Chen, Zhidong Xie and Zhiguang Qin
This paper aims to provide a secure and efficient pairing protocol for two devices. Due to the large amount of data involving sensitive information transmitted in Internet of…
Abstract
Purpose
This paper aims to provide a secure and efficient pairing protocol for two devices. Due to the large amount of data involving sensitive information transmitted in Internet of Things (IoT) devices, generating a secure shared key between smart devices for secure data sharing becomes essential. However, existing smart devices pairing schemes require longer pairing time and are difficult to resist attacks caused by context, as the secure channel is established based on restricted entropy from physical context.
Design/methodology/approach
This paper proposes a fuzzy smart IoT device pairing protocol via speak to microphone, FS2M. In FS2M, the device pairing is realized from the speaking audio of humans in the environment around the devices, which is easily implemented in the vast majority of Internet products. Specifically, to protect the privacy of secret keys and improve efficiency, this paper presents a single-round pairing protocol by adopting a recently published asymmetric fuzzy encapsulation mechanism (AFEM), which allows devices with similar environmental fingerprints to successfully negotiate the shared key. To instantiate AFEM, this paper presents a construction algorithm, the AFEM-ECC, based on elliptic curve cryptography.
Findings
This paper analyzes the security of the FS2M and its pairing efficiency with extensive experiments. The results show that the proposed protocol can achieve a secure device pairing between two IoT devices with high efficiency.
Originality/value
In FS2M, a novel cryptographic primitive (i.e., AFEM-ECC) are designed for IoT device pairing by using a new context-environment (i.e., human voice) . The experimental results show that FS2M has a good performance in both communication cost (i.e., 130 KB) and running time (i.e., 10 S).
Details