Your browser doesn't support javascript.
loading
Show: 20 | 50 | 100
Results 1 - 18 de 18
Filter
Add more filters










Publication year range
1.
IEEE Trans Cybern ; 53(2): 1222-1234, 2023 Feb.
Article in English | MEDLINE | ID: mdl-34587107

ABSTRACT

This article mainly studies the projective quasisynchronization for an array of nonlinear heterogeneous-coupled neural networks with mixed time-varying delays and a cluster-tree topology structure. For the sake of the mismatched parameters and the mutual influence among distinct clusters, the exponential and global quasisynchronization within a prescribed error bound instead of complete synchronization for the coupled neural networks with clustering trees is investigated. A kind of pinning impulsive controllers is designed, which will be imposed on the selected neural networks with some largest norms of error states at each impulsive instant in different clusters. By employing the concept of the average impulsive interval, the matrix measure method, and the Lyapunov stability theorem, sufficient conditions for the realization of the cluster projective quasisynchronization are derived. Meanwhile, in terms of the formula of variation of parameters and the comparison principle for the impulsive systems with mixed time-varying delays, the convergence rate and the synchronization error bound are precisely estimated. Furthermore, the synchronization error bound is efficiently optimized based on different functions of the impulsive effects. Finally, a numerical experiment is given to prove the results of theoretical analysis.

2.
Animals (Basel) ; 12(4)2022 Feb 13.
Article in English | MEDLINE | ID: mdl-35203167

ABSTRACT

Visual identification of cattle in the wild provides an essential way for real-time cattle monitoring applicable to precision livestock farming. Chinese Simmental exhibit a yellow or brown coat with individually characteristic white stripes or spots, which makes a biometric identifier for identification possible. This work employed the observable biometric characteristics to perform cattle identification with an image from any viewpoint. We propose multi-center agent loss to jointly supervise the learning of DCNNs by SoftMax with multiple centers and the agent triplet. We reformulated SoftMax with multiple centers to reduce intra-class variance by offering more centers for feature clustering. Then, we utilized the agent triplet, which consisted of the features and the agents, to enforce separation among different classes. As there are no datasets for the identification of cattle with multi-view images, we created CNSID100, consisting of 11,635 images from 100 Chinese Simmental identities. Our proposed loss was comprehensively compared with several well-known losses on CNSID100 and OpenCows2020 and analyzed in an engineering application in the farming environment. It was encouraging to find that our approach outperformed the state-of-the-art models on the datasets above. The engineering application demonstrated that our pipeline with detection and recognition is promising for continuous cattle identification in real livestock farming scenarios.

3.
IEEE Trans Neural Netw Learn Syst ; 33(8): 3961-3973, 2022 Aug.
Article in English | MEDLINE | ID: mdl-33606639

ABSTRACT

Knowledge graph (KG) embedding aims to study the embedding representation to retain the inherent structure of KGs. Graph neural networks (GNNs), as an effective graph representation technique, have shown impressive performance in learning graph embedding. However, KGs have an intrinsic property of heterogeneity, which contains various types of entities and relations. How to address complex graph data and aggregate multiple types of semantic information simultaneously is a critical issue. In this article, a novel heterogeneous GNNs framework based on attention mechanism is proposed. Specifically, the neighbor features of an entity are first aggregated under each relation-path. Then the importance of different relation-paths is learned through the relation features. Finally, each relation-path-based features with the learned weight values are aggregated to generate the embedding representation. Thus, the proposed method not only aggregates entity features from different semantic aspects but also allocates appropriate weights to them. This method can capture various types of semantic information and selectively aggregate informative features. The experiment results on three real-world KGs demonstrate superior performance when compared with several state-of-the-art methods.

4.
Sensors (Basel) ; 18(12)2018 Dec 12.
Article in English | MEDLINE | ID: mdl-30545075

ABSTRACT

In virtualized sensor networks, virtual machines (VMs) share the same hardware for sensing service consolidation and saving power. For those VMs that reside in the same hardware, frequent interdomain data transfers are invoked for data analytics, and sensor collaboration and actuation. Traditional ways of interdomain communications are based on virtual network interfaces of bilateral VMs for data sending and receiving. Since these network communications use TCP/IP (Transmission Control Protocol/Internet Protocol) stacks, they result in lengthy communication paths and frequent kernel interactions, which deteriorate the I/O (Input/Output) performance of involved VMs. In this paper, we propose an optimized interdomain communication approach based on shared memory to improve the interdomain communication performance of multiple VMs residing in the same sensor hardware. In our approach, the sending data are shared in memory pages maintained by the hypervisor, and the data are not transferred through the virtual network interface via a TCP/IP stack. To avoid security trapping, the shared data are mapped in the user space of each VM involved in the communication, therefore reducing tedious system calls and frequent kernel context switches. In implementation, the shared memory is created by a customized shared-device kernel module that has bidirectional event channels between both communicating VMs. For performance optimization, we use state flags in a circular buffer to reduce wait-and-notify operations and system calls during communications. Experimental results show that our proposed approach can provide five times higher throughput and 2.5 times less latency than traditional TCP/IP communication via a virtual network interface.

5.
Sensors (Basel) ; 18(11)2018 Nov 20.
Article in English | MEDLINE | ID: mdl-30463381

ABSTRACT

By using Software Defined Network (SDN) technology, senor nodes can get updated program code which can provide new features, so it has received extensive attention. How to effectively spread code to each node fast is a challenge issue in wireless sensor networks (WSNs). In this paper, an Adding Active Slot joint Larger Broadcast Radius (AAS-LBR) scheme is proposed for fast code dissemination. The AAS-LBR scheme combines the energy of data collection and code dissemination, making full use of the remaining energy in the far-sink area to increase the active slot and the broadcast radius to speed up the code dissemination. The main contributions of the proposed AAS-LBR scheme are the following: (1) Make full use of the remaining energy of the far sink area to expand the broadcast radius, so that the node broadcasts a longer distance. The wide range of broadcasts makes the number of nodes receiving code more, which speeds up the spread of code dissemination. (2) AAS-LBR uses two improved methods to further reduce the number of broadcasts and speed up the code dissemination: (a) When constructing the broadcast backbone whose nodes dominate all nodes in network and are responsible for broadcasting code, the active slot is added to the next hop node in a pipeline style on the diffusion path, which enables the code dissemination process to continue without pause. Thus, the code can quickly spread to the entire broadcast backbone. (b) For the nodes in the non-broadcast backbone whose nodes are dominated by the broadcast backbone and only for receiving code, an active slot is added coincident with its broadcast backbone' active slot, which can reduce the time required for code dissemination and reduce the number of broadcasts. A lot of performance analysis and simulation results show that compared to previous schemed, the AAS-LBR scheme can balance energy consumption, the transmission delay can be reduced 43.09⁻78.69%, the number of broadcasts can be reduced 44.51⁻86.18% and the energy efficiency is improved by about 24.5%.

6.
Sensors (Basel) ; 18(11)2018 Nov 13.
Article in English | MEDLINE | ID: mdl-30428580

ABSTRACT

RGB-D cameras offer both color and depth images of the surrounding environment, making them an attractive option for robotic and vision applications. This work introduces the BRISK_D algorithm, which efficiently combines Features from Accelerated Segment Test (FAST) and Binary Robust Invariant Scalable Keypoints (BRISK) methods. In the BRISK_D algorithm, the keypoints are detected by the FAST algorithm and the location of the keypoint is refined in the scale and the space. The scale factor of the keypoint is directly computed with the depth information of the image. In the experiment, we have made a detailed comparative analysis of the three algorithms SURF, BRISK and BRISK_D from the aspects of scaling, rotation, perspective and blur. The BRISK_D algorithm combines depth information and has good algorithm performance.

7.
Sensors (Basel) ; 18(10)2018 Oct 18.
Article in English | MEDLINE | ID: mdl-30340393

ABSTRACT

Software defined networks brings greater flexibility to networks and therefore generates new vitality. Thanks to the ability to update soft code to sensor nodes, wireless sensor networks (WSNs) brings profound changes to Internet of Things. However, it is a challenging issue to minimize delay and transmission times and maintain long lifetime when broadcasting data packets in high loss ratio and low duty cycle WSNs. Although there have been some research concerning code dissemination, those schemes can only achieve a tradeoff between different performances, instead of optimizing all these important performances at the same time. Therefore, in this paper we propose a new strategy that can reduce delay and transmission times simultaneously. In traditional method, the broadcasting nature of wireless communication is not sufficiently utilized. By allowing sons of the same parent node to share awake slots, the broadcasting nature is well exploited and delay is thus reduced as well as transmission times with lifetime not affected. And, as we discover there is energy surplus when collecting data in area away from sink, we further improve this strategy so that all the performances can be further bettered. Compared with traditional method, the methods we design (IFAS, BTAS and AAPS) can respectively reduce delay by 20.56%, 31.59%, 55.16% and reduce transmission times by 29.53%, 43.93%, 42.04%, while not reducing lifetime.

8.
Sensors (Basel) ; 18(9)2018 Aug 31.
Article in English | MEDLINE | ID: mdl-30200347

ABSTRACT

In energy harvesting wireless sensor networks (EHWSNs), the energy tension of the network can be relieved by obtaining the energy from the surrounding environment, but the cost on hardware cannot be ignored. Therefore, how to minimize the cost of energy harvesting hardware to reduce the network deployment cost, and further optimize the network performance, is still a challenging issue in EHWSNs. In this paper, an energy conserving and transmission radius adaptive (ECTRA) scheme is proposed to reduce the cost and optimize the performance of solar-based EHWSNs. There are two main innovations of the ECTRA scheme. Firstly, an energy conserving approach is proposed to conserve energy and avoid outage for the nodes in hotspots, which are the bottleneck of the whole network. The novelty of this scheme is adaptively rotating the transmission radius. In this way, the nodes with maximum energy consumption are rotated, balancing energy consumption between nodes and reducing the maximum energy consumption in the network. Therefore, the battery storage capacity of nodes and the cost on hardware. Secondly, the ECTRA scheme selects a larger transmission radius for rotation when the node can absorb enough energy from the surroundings. The advantages of using this method are: (a) reducing the energy consumption of nodes in near-sink areas, thereby reducing the maximum energy consumption and allowing the node of the hotspot area to conserve energy, in order to prevent the node from outage. Hence, the network deployment costs can be further reduced; (b) reducing the network delay. When a larger transmission radius is used to transmit data in the network, fewer hops are needed by data packet to the sink. After the theoretical analyses, the results show the following advantages compared with traditional method. Firstly, the ECTRA scheme can effectively reduce deployment costs by 29.58% without effecting the network performance as shown in experiment analysis; Secondly, the ECTRA scheme can effectively reduce network data transmission delay by 44⁻71%; Thirdly, the ECTRA scheme shows a better balance in energy consumption and the maximum energy consumption is reduced by 27.89%; And lastly, the energy utilization rate is effectively improved by 30.09⁻55.48%.

9.
Sensors (Basel) ; 18(7)2018 Jul 19.
Article in English | MEDLINE | ID: mdl-30029552

ABSTRACT

Data aggregation is a widely adopted method to effectively reduce the data transmission volume and improve the lifetime of wireless sensor networks (WSNs). In the data aggregation networks, some parameters directly determine the delay of aggregation. In industrial applications, the data generated by different sensors have different requirements for delay or other QoS performance. In the previous study, a common strategy is that all kinds of data is aggregated into one frame when the condition is satisfied with a QoS requirement, which causes excessive energy consumption and severely impairs the lifetime of network. A Differentiated Data Aggregation Routing (DDAR) scheme is proposed to reduce energy consumption and guarantee that the delay could be controlled within the corresponding QoS requirement constraint. The primary contributions of the DDAR scheme are the following: (a) The DDAR scheme makes data with different QoS requirement route to the sink along the different paths. The parameters of the aggregators in each path, such as aggregation deadline (Tt) and the aggregation threshold (Nt), are configured according to the QoS requirements. Accordingly, energy consumption can be reduced without degrading the performance of data transmission. (b) Based on DDAR scheme, an improved DDAR scheme is proposed to further improve performance through fully utilize the residual energy in the nodes which are far from the sink. The frequency of aggregation of these nodes increases by reducing the value of Tt and Nt so as to further improve the energy efficiency and reduce delay. Simulation results demonstrate that compared with the previous scheme, this scheme reduces the delay by 25.01%, improves the lifetime by 55.45%, and increases energy efficiency by 83.99%. The improved DDAR scheme improves the energy efficiency by 33.97% and service guarantee rate by 10.11%.

10.
Sensors (Basel) ; 18(5)2018 May 12.
Article in English | MEDLINE | ID: mdl-29757236

ABSTRACT

For Industrial Wireless Sensor Networks (IWSNs), sending data with timely style to the stink (or control center, CC) that is monitored by sensor nodes is a challenging issue. However, in order to save energy, wireless sensor networks based on a duty cycle are widely used in the industrial field, which can bring great delay to data transmission. We observe that if the duty cycle of a small number of nodes in the network is set to 1, the sleep delay caused by the duty cycle can be effectively reduced. Thus, in this paper, a novel Portion of Nodes with Larger Duty Cycle (PNLDC) scheme is proposed to reduce delay and optimize energy efficiency for IWSNs. In the PNLDC scheme, a portion of nodes are selected to set their duty cycle to 1, and the proportion of nodes with the duty cycle of 1 is determined according to the energy abundance of the area in which the node is located. The more the residual energy in the region, the greater the proportion of the selected nodes. Because there are a certain proportion of nodes with the duty cycle of 1 in the network, the PNLDC scheme can effectively reduce delay in IWSNs. The performance analysis and experimental results show that the proposed scheme significantly reduces the delay for forwarding data by 8.9~26.4% and delay for detection by 2.1~24.6% without reducing the network lifetime when compared with the fixed duty cycle method. Meanwhile, compared with the dynamic duty cycle strategy, the proposed scheme has certain advantages in terms of energy utilization and delay reduction.

11.
Sensors (Basel) ; 18(5)2018 May 03.
Article in English | MEDLINE | ID: mdl-29751589

ABSTRACT

In wireless sensor networks (WSNs), communication links are typically error-prone and unreliable, so providing reliable and timely data routing for loss- and delay-sensitive applications in WSNs it is a challenge issue. Additionally, with specific thresholds in practical applications, the loss and delay sensitivity implies requirements for high reliability and low delay. Opportunistic Routing (OR) has been well studied in WSNs to improve reliability for error-prone and unreliable wireless communication links where the transmission power is assumed to be identical in the whole network. In this paper, a Cross-layer Optimized Opportunistic Routing (COOR) scheme is proposed to improve the communication link reliability and reduce delay for loss-and-delay sensitive WSNs. The main contribution of the COOR scheme is making full use of the remaining energy in networks to increase the transmission power of most nodes, which will provide a higher communication reliability or further transmission distance. Two optimization strategies referred to as COOR(R) and COOR(P) of the COOR scheme are proposed to improve network performance. In the case of increasing the transmission power, the COOR(R) strategy chooses a node that has a higher communication reliability with same distance in comparison to the traditional opportunistic routing when selecting the next hop candidate node. Since the reliability of data transmission is improved, the delay of the data reaching the sink is reduced by shortening the time of communication between candidate nodes. On the other hand, the COOR(P) strategy prefers a node that has the same communication reliability with longer distance. As a result, network performance can be improved for the following reasons: (a) the delay is reduced as fewer hops are needed while the packet reaches the sink in longer transmission distance circumstances; (b) the reliability can be improved since it is the product of the reliability of every hop of the routing path, and the count is reduced while the reliability of each hop is the same as the traditional method. After analyzing the energy consumption of the network in detail, the value of optimized transmission power in different areas is given. On the basis of a large number of experimental and theoretical analyses, the results show that the COOR scheme will increase communication reliability by 36.62⁻87.77%, decrease delay by 21.09⁻52.48%, and balance the energy consumption of 86.97% of the nodes in the WSNs.

12.
Sensors (Basel) ; 18(4)2018 Apr 16.
Article in English | MEDLINE | ID: mdl-29659535

ABSTRACT

The quality of service (QoS) regarding delay, lifetime and reliability is the key to the application of wireless sensor networks (WSNs). Data aggregation is a method to effectively reduce the data transmission volume and improve the lifetime of a network. In the previous study, a common strategy required that data wait in the queue. When the length of the queue is greater than or equal to the predetermined aggregation threshold ( N t ) or the waiting time is equal to the aggregation timer ( T t ), data are forwarded at the expense of an increase in the delay. The primary contributions of the proposed Adaptive Aggregation Routing (AAR) scheme are the following: (a) the senders select the forwarding node dynamically according to the length of the data queue, which effectively reduces the delay. In the AAR scheme, the senders send data to the nodes with a long data queue. The advantages are that first, the nodes with a long data queue need a small amount of data to perform aggregation; therefore, the transmitted data can be fully utilized to make these nodes aggregate. Second, this scheme balances the aggregating and data sending load; thus, the lifetime increases. (b) An improved AAR scheme is proposed to improve the QoS. The aggregation deadline ( T t ) and the aggregation threshold ( N t ) are dynamically changed in the network. In WSNs, nodes far from the sink have residual energy because these nodes transmit less data than the other nodes. In the improved AAR scheme, the nodes far from the sink have a small value of T t and N t to reduce delay, and the nodes near the sink are set to a large value of T t and N t to reduce energy consumption. Thus, the end to end delay is reduced, a longer lifetime is achieved, and the residual energy is fully used. Simulation results demonstrate that compared with the previous scheme, the performance of the AAR scheme is improved. This scheme reduces the delay by 14.91%, improves the lifetime by 30.91%, and increases energy efficiency by 76.40%.

13.
Sensors (Basel) ; 18(3)2018 Mar 01.
Article in English | MEDLINE | ID: mdl-29494561

ABSTRACT

The Internet of things (IoT) is composed of billions of sensing devices that are subject to threats stemming from increasing reliance on communications technologies. A Trust-Based Secure Routing (TBSR) scheme using the traceback approach is proposed to improve the security of data routing and maximize the use of available energy in Energy-Harvesting Wireless Sensor Networks (EHWSNs). The main contributions of a TBSR are (a) the source nodes send data and notification to sinks through disjoint paths, separately; in such a mechanism, the data and notification can be verified independently to ensure their security. (b) Furthermore, the data and notification adopt a dynamic probability of marking and logging approach during the routing. Therefore, when attacked, the network will adopt the traceback approach to locate and clear malicious nodes to ensure security. The probability of marking is determined based on the level of battery remaining; when nodes harvest more energy, the probability of marking is higher, which can improve network security. Because if the probability of marking is higher, the number of marked nodes on the data packet routing path will be more, and the sink will be more likely to trace back the data packet routing path and find malicious nodes according to this notification. When data packets are routed again, they tend to bypass these malicious nodes, which make the success rate of routing higher and lead to improved network security. When the battery level is low, the probability of marking will be decreased, which is able to save energy. For logging, when the battery level is high, the network adopts a larger probability of marking and smaller probability of logging to transmit notification to the sink, which can reserve enough storage space to meet the storage demand for the period of the battery on low level; when the battery level is low, increasing the probability of logging can reduce energy consumption. After the level of battery remaining is high enough, nodes then send the notification which was logged before to the sink. Compared with past solutions, our results indicate that the performance of the TBSR scheme has been improved comprehensively; it can effectively increase the quantity of notification received by the sink by 20%, increase energy efficiency by 11%, reduce the maximum storage capacity needed by nodes by 33.3% and improve the success rate of routing by approximately 16.30%.

14.
Sensors (Basel) ; 17(8)2017 Aug 04.
Article in English | MEDLINE | ID: mdl-28777325

ABSTRACT

This paper aims to develop a low-cost, high-performance and high-reliability computing system to process large-scale data using common data mining algorithms in the Internet of Things (IoT) computing environment. Considering the characteristics of IoT data processing, similar to mainstream high performance computing, we use a GPU (Graphics Processing Unit) cluster to achieve better IoT services. Firstly, we present an energy consumption calculation method (ECCM) based on WSNs. Then, using the CUDA (Compute Unified Device Architecture) Programming model, we propose a Two-level Parallel Optimization Model (TLPOM) which exploits reasonable resource planning and common compiler optimization techniques to obtain the best blocks and threads configuration considering the resource constraints of each node. The key to this part is dynamic coupling Thread-Level Parallelism (TLP) and Instruction-Level Parallelism (ILP) to improve the performance of the algorithms without additional energy consumption. Finally, combining the ECCM and the TLPOM, we use the Reliable GPU Cluster Architecture (RGCA) to obtain a high-reliability computing system considering the nodes' diversity, algorithm characteristics, etc. The results show that the performance of the algorithms significantly increased by 34.1%, 33.96% and 24.07% for Fermi, Kepler and Maxwell on average with TLPOM and the RGCA ensures that our IoT computing system provides low-cost and high-reliability services.

15.
Sensors (Basel) ; 16(11)2016 Nov 03.
Article in English | MEDLINE | ID: mdl-27827878

ABSTRACT

This paper considers the distributed access and control problem of massive wireless sensor networks' data access center for the Internet of Things, which is an extension of wireless sensor networks and an element of its topology structure. In the context of the arrival of massive service access requests at a virtual data center, this paper designs a massive sensing data access and control mechanism to improve the access efficiency of service requests and makes full use of the available resources at the data access center for the Internet of things. Firstly, this paper proposes a synergistically distributed buffer access model, which separates the information of resource and location. Secondly, the paper divides the service access requests into multiple virtual groups based on their characteristics and locations using an optimized self-organizing feature map neural network. Furthermore, this paper designs an optimal scheduling algorithm of group migration based on the combination scheme between the artificial bee colony algorithm and chaos searching theory. Finally, the experimental results demonstrate that this mechanism outperforms the existing schemes in terms of enhancing the accessibility of service requests effectively, reducing network delay, and has higher load balancing capacity and higher resource utility rate.

16.
J Med Syst ; 39(12): 190, 2015 Dec.
Article in English | MEDLINE | ID: mdl-26490148

ABSTRACT

With the pervasiveness of smart phones and the advance of wireless body sensor network (BSN), mobile Healthcare (m-Healthcare), which extends the operation of Healthcare provider into a pervasive environment for better health monitoring, has attracted considerable interest recently. However, the flourish of m-Healthcare still faces many challenges including information security and privacy preservation. In this paper, we propose a secure and privacy-preserving framework combining with multilevel trust management. In our scheme, smart phone resources including computing power and energy can be opportunistically gathered to process the computing-intensive PHI (personal health information) during m-Healthcare emergency with minimal privacy disclosure. In specific, to leverage the PHI privacy disclosure and the high reliability of PHI process and transmission in m-Healthcare emergency, we introduce an efficient lightweight encryption for those users whose trust level is low, which is based on mix cipher algorithms and pair of plain text and cipher texts, and allow a medical user to decide who can participate in the opportunistic computing to assist in processing his overwhelming PHI data. Detailed security analysis and simulations show that the proposed framework can efficiently achieve user-centric privacy protection in m-Healthcare system.


Subject(s)
Computer Security/instrumentation , Confidentiality , Remote Sensing Technology/instrumentation , Telemedicine/instrumentation , Wireless Technology/instrumentation , Algorithms , Humans , Privacy , Reproducibility of Results
17.
Sensors (Basel) ; 14(11): 21174-94, 2014 Nov 10.
Article in English | MEDLINE | ID: mdl-25390407

ABSTRACT

Privacy-preserving data aggregation in wireless sensor networks (WSNs) with mobile nodes is a challenging problem, as an accurate aggregation result should be derived in a privacy-preserving manner, under the condition that nodes are mobile and have no pre-specified keys for cryptographic operations. In this paper, we focus on the SUM aggregation function and propose two privacy-preserving data aggregation protocols for two-tiered sensor networks with mobile nodes: Privacy-preserving Data Aggregation against non-colluded Aggregator and Sink (PDAAS) and Privacy-preserving Data Aggregation against Colluded Aggregator and Sink (PDACAS). Both protocols guarantee that the sink can derive the SUM of all raw sensor data but each sensor's raw data is kept confidential. In PDAAS, two keyed values are used, one shared with the sink and the other shared with the aggregator. PDAAS can protect the privacy of sensed data against external eavesdroppers, compromised sensor nodes, the aggregator or the sink, but fails if the aggregator and the sink collude. In PDACAS, multiple keyed values are used in data perturbation, which are not shared with the aggregator or the sink. PDACAS can protect the privacy of sensor nodes even the aggregator and the sink collude, at the cost of a little more overhead than PDAAS. Thorough analysis and experiments are conducted, which confirm the efficacy and efficiency of both schemes.

18.
ScientificWorldJournal ; 2014: 321710, 2014.
Article in English | MEDLINE | ID: mdl-25147845

ABSTRACT

Stage financing is the basic operation of venture capital investment. In investment, usually venture capitalists use different strategies to obtain the maximum returns. Due to its advantages to reduce the information asymmetry and agency cost, stage financing is widely used by venture capitalists. Although considerable attentions are devoted to stage financing, very little is known about the risk aversion strategies of IT projects. This paper mainly addresses the problem of risk aversion of venture capital investment in IT projects. Based on the analysis of characteristics of venture capital investment of IT projects, this paper introduces a real option pricing model to measure the value brought by the stage financing strategy and design a risk aversion model for IT projects. Because real option pricing method regards investment activity as contingent decision, it helps to make judgment on the management flexibility of IT projects and then make a more reasonable evaluation about the IT programs. Lastly by being applied to a real case, it further illustrates the effectiveness and feasibility of the model.


Subject(s)
Investments , Models, Theoretical , Humans
SELECTION OF CITATIONS
SEARCH DETAIL
...