Search results

1 – 10 of 37
Article
Publication date: 10 July 2023

Fatimah De’nan, Chong Shek Wai and Nor Salwani Hashim

Various designs of corrugated webs include trapezoidal, sinusoidal, triangular and rectangular profiles. The increasing use of curved plates has prompted the creation of…

Abstract

Purpose

Various designs of corrugated webs include trapezoidal, sinusoidal, triangular and rectangular profiles. The increasing use of curved plates has prompted the creation of I-sections made of steel with a corrugated web design. This study aims to examine the effectiveness of an I-beam steel section that features a perforated-triangular web profile.

Design/methodology/approach

In the current study, finite element analysis was conducted on corrugated-perforated steel I-sections using ANSYS software. The study focused on inspecting the design of the perforations, including their shape (circle, square, hexagon, diamond and octagon), size of perforations (80 mm, 100 mm and 120 mm) and layout (the position of web perforation), as well as examining the geometric properties of the section in term of bending, lateral torsional buckling, torsion and shear behavior.

Findings

The study revealed that perforations with diamond, circle and hexagon shapes exhibit good performance, whereas the square shape performs poorly. Moreover, the steel section’s performance decreases with an increase in perforation size, regardless of loading conditions. In addition, the shape of the web perforations can also influence its stress distribution. For example, diamond-shaped perforations have been found to perform better than square-shaped perforations in terms of stress distribution and overall performance. This was because of their ability to distribute stress more evenly and provide greater support to the surrounding material. The diagonal alignment of the diamond shape aligns with principal stress directions, allowing for efficient load transfer and reduced stress concentrations. Additionally, diamond-shaped perforations offer a larger effective area, better shear transfer and improved strain redistribution, resulting in enhanced structural integrity and increased load-carrying capacity.

Originality/value

Hence, the presence of lateral-torsional buckling and torsional loading conditions significantly impacts the performance of corrugated-perforated steel I-sections.

Details

World Journal of Engineering, vol. 21 no. 5
Type: Research Article
ISSN: 1708-5284

Keywords

Article
Publication date: 1 February 2014

A. El-Hadidy, A. Fadel and H. Fadel

Multilayer technical fabrics are an important part of fibrous filters used in raw water filtration systems. The implementation of the filtration process depends on the structure…

Abstract

Multilayer technical fabrics are an important part of fibrous filters used in raw water filtration systems. The implementation of the filtration process depends on the structure of the fabric system, water particle deposition mechanisms and water flow conditions. This paper discusses, in terms of theoretical models, the results of an investigation on the flow resistance and efficiency of raw water filtration at the initial stage, in which the dispersed phase consists of liquid particles, through a multilayer technical fabric system with different structural parameters.

The research results indicate the functional dependence of filtering properties on thestructural parameters of the fibres studied (primarily, fabric packing density coefficient,fabric tightness, and raw water flow parameters, such as the water flow rate (time)). The results of the research on multilayer technical fabrics with particular focus on the analysis of pore fraction distribution may be of crucial importance in forecasting the use of multilayer technical fabrics as filtering media for raw water filtration processing, considering that the conditions are sufficient

Article
Publication date: 1 August 2016

Selin Hanife Eryuruk and Fatma Kalaoglu

Knitted fabrics containing elastane provide high level of comfort and ease of usage because of the elastic and drape properties over the body. Knitted fabrics respond to every…

885

Abstract

Purpose

Knitted fabrics containing elastane provide high level of comfort and ease of usage because of the elastic and drape properties over the body. Knitted fabrics respond to every movement of the body and return back to its original shape easily so they are used widely for apparel production. The most important properties required from the elastic knitted garments are wear comfort, fit, breathability and durability. The purpose of this paper is to analyse the effect of elastane yarn count and ground yarn count on the performance properties of 12 single jersey knitted fabrics were analysed after dying.

Design/methodology/approach

The research design for this study consists an experimental study. In all, 12 fabrics containing half plating and full plating elastane were produced using 30/1-40/1 Ne yarn counts. Bursting strength, stretch recovery, residual extension, air permeability, spirality and drape properties of fabrics were evaluated.

Findings

As a result of study it was found a certain effect as the elastane amount and count changed. For all types of knitted fabrics, bursting strength values increased and fabric spirality values decreased as the elastane amount and elastane yarn count increased. Also it was found a significant relationship between elastane amount and count with air permeability, spirality, bursting strength and drape.

Originality/value

As a result of the literature review, it was seen that the effects of elastane amount, elastane yarn count and fabric yarn count on the performance properties of knitted fabrics has not been studied broadly.

Details

International Journal of Clothing Science and Technology, vol. 28 no. 4
Type: Research Article
ISSN: 0955-6222

Keywords

Article
Publication date: 18 April 2017

Sandeep W. Dahake, Abhaykumar M. Kuthe, Jitendra Chawla and Mahesh B. Mawale

The purpose of this paper is to develop a workflow for design and fabrication of customized surgical guides (CSGs) for placement of the bidirectional extraoral distraction…

191

Abstract

Purpose

The purpose of this paper is to develop a workflow for design and fabrication of customized surgical guides (CSGs) for placement of the bidirectional extraoral distraction instruments (EDIs) in bilateral mandibular distraction osteogenesis (MDO) surgery to treat the bilateral temporomandibular joint ankylosis with zero mouth opening.

Design/methodology/approach

The comprehensive workflow consists of six steps: medical imaging; virtual surgical planning (VSP); computer aided design; rapid prototyping (RP); functional testing of CSGs and mock surgery; and clinical application. Fused deposition modeling, an RP process was used to fabricate CSGs in acrylonitrile butadiene styrene material. Finally, mandibular reconstruction with MDO was performed successfully using RP-assisted CSGs.

Findings

Design and development of CSGs prior to the actual MDO surgery improves accuracy, reduces operation time and decreases patient morbidity, hence improving the quality of surgery. Manufacturing of CSG is easy using RP to transfer VSP into the actual surgery.

Originality/value

This study describes an RP-assisted CSGs fabrication for exact finding of both; osteotomy site and drilling location to fix EDI’s pins accurately in the mandible; for accurate osteotomy and placement of the bidirectional EDIs in MDO surgery to achieve accurate distraction.

Details

Rapid Prototyping Journal, vol. 23 no. 3
Type: Research Article
ISSN: 1355-2546

Keywords

Book part
Publication date: 26 November 2021

Beata Jałocha, Ewa Bogacz-Wojtanowska, Anna Góral, Grażyna Prawelska-Skrzypek and Piotr Jedynak

In this chapter we discuss how, as a tool for organizational change, action research can affect the development of cooperation between a traditional university and the external…

Abstract

In this chapter we discuss how, as a tool for organizational change, action research can affect the development of cooperation between a traditional university and the external environment. The case analyzed was a two-year action research project carried out in cooperation with over 20 employers. This project was carried out at multiple levels and had several essential goals. Apart from its emancipatory role in the shift in the way students carry out their master's theses (toward application, implementation, where organizations become the research subject instead of the research object), the project's aim was to open up the university to cooperation with its environment and conduct useful research. The results indicate that action research through the democratization of the process of introducing changes and its bottom-up nature influences the development of real cooperation between the university and external organizations. Additionally, they contribute to the emancipation of university knowledge, its democratization, dehierarchization, as well as cocreation and sharing with cooperating organizations.

Details

Research in Organizational Change and Development
Type: Book
ISBN: 978-1-80262-173-0

Keywords

Article
Publication date: 8 February 2016

Dawa Dolma Bhutia, Yeka Zhimo, Ramen Kole and Jayanta Saha

The purpose of this paper was to determine the antifungal activities of different solvent extracts of common plants in vitro and in vivo against banana anthracnose fungus…

Abstract

Purpose

The purpose of this paper was to determine the antifungal activities of different solvent extracts of common plants in vitro and in vivo against banana anthracnose fungus Colletotrichum musae (Berk & M.A. Curtis) Arx, and to investigate its effects on the pathogen and identify the bio active component(s).

Design/methodology/approach

Extracts were obtained from leaves, tender shoots, rhizomes, bulbs, seeds and fruits of 42 naturally growing plant species following hot sequential extraction. Preliminary screening of the solvent extracts was done based on the inhibition of radial mycelial growth of C. musae following poison food technique and conidial germination inhibition by cavity slide technique. The selected extracts were assessed for their effect on harvested banana in reducing anthracnose during storage. The active components in the bio-active fractions of plant extract were identified by gas chromatography-mass spectroscopy.

Findings

Methanol extracted a larger quantity of material (between 6.9 and 12.5 per cent) than hexane or chloroform, and all its extracts were active against the test pathogen with mycelial growth inhibition ranging from 13.70 to 88.89 per cent. Zingiber officinale rhizome extract as well as Polyalthia longifolia and Clerodendrum inerme leaf extracts exhibited more than 80 per cent inhibition of mycelial growth. Total inhibition of spore germination of C. musae was recorded in Z. officinale and P. longifolia extracts at 0.3 per cent w/v and 0.5 per cent w/v concentration, respectively, while only 68 per cent spore inhibition was recorded in C. inerme at 0.5 per cent w/v concentration. Of the three plant species, Z. officinale had the best antifungal activity (18.0 per cent disease incidence; 2.2 disease severity scale) when banana fruits were dipped in the extract at a concentration of 0.5 per cent w/v at 5 days of storage in ambient condition (80-82 per cent R.H., 27 ± 1°C). The bio-active compounds in the extract of Z. officinale were identified as alpha-curcumene and zingerone.

Originality/value

Based on the antifungal activity, plant extract of Z. officinale can be used as an effective alternative to chemicals in controlling anthracnose pathogen in harvested banana.

Details

Nutrition & Food Science, vol. 46 no. 1
Type: Research Article
ISSN: 0034-6659

Keywords

Book part
Publication date: 10 February 2012

Manuel Burghardt, Markus Heckner and Christian Wolff

Purpose — This chapter illustrates and explains the ambiguity and vagueness of the term social search and aims at describing and classifying the heterogeneous landscape of social…

Abstract

Purpose — This chapter illustrates and explains the ambiguity and vagueness of the term social search and aims at describing and classifying the heterogeneous landscape of social search implementations on the WWW.

Methodology/approach — We have looked at different definitions as well as the context of social search by carrying out an extensive literature review, and tried to unify and enhance existing ideas and concepts. Our definition of social search is illustrated by a general review of existing social search engines, which are analyzed and described by their specific features and social aspects.

Findings — The chapter presents a discussion of social search as well as a comparison of existing social search engines.

Social implications — The definition of social search and the comparison of social search engines summarize the many ways people can search the web together and allow for an assessment of future developments in this area.

Originality/value of paper — Although different attempts to define social search have been made in the past, we present an argumentation that unifies some existing definitions and which is different from other interpretations of the social search concept. We present an overview and a comparison of the different genres of social search engines.

Open Access
Article
Publication date: 20 July 2023

Martina Neri, Federico Niccolini and Luigi Martino

Cyberattacks are becoming increasingly widespread, and cybersecurity is therefore increasingly important. Although the technological aspects of cybersecurity are its best-known…

3221

Abstract

Purpose

Cyberattacks are becoming increasingly widespread, and cybersecurity is therefore increasingly important. Although the technological aspects of cybersecurity are its best-known characteristics, the cybersecurity phenomenon goes beyond the detection of technological impacts, and encompasses all the dimensions of an organization. This study thus focusses on an additional set of organizational elements. The key elements of cybersecurity organizational readiness depicted here are cybersecurity awareness, cybersecurity culture and cybersecurity organizational resilience (OR). This study aims to qualitatively assess small and medium enterprises’ (SMEs) overall level of organizational cybersecurity readiness.

Design/methodology/approach

This study focused on conducting a cybersecurity organizational readiness assessment using a sample of 53 Italian SMEs from the information and communication technology sector. Informed mixed method research, this study was conducted consistent with the principles of the explanatory sequential mixed method design, and adopting a quanti-qualitative methodology. The quantitative data were collected through a questionnaire. Qualitative data were subsequently collected through semi-structured interviews.

Findings

Although many elements of the technical aspects of cybersecurity OR have yielded very encouraging results, there are still some areas that require improvement. These include those facets that constitute the foundation of cybersecurity awareness, and, thus, a cybersecurity culture. This result highlights that the areas in need of improvement are exactly those that are most important in fighting against cyber threats via organizational cybersecurity readiness.

Originality/value

Although the importance of SMEs is obvious, evidence of such organizations’ attitudes to cybersecurity are still limited. This research is an attempt to depict the organizational issue related to cybersecurity, i.e. overall cybersecurity organizational readiness.

Open Access
Article
Publication date: 21 December 2021

Martin Karlsson, Fredrik Karlsson, Joachim Åström and Thomas Denk

This paper aims to investigate the connection between different perceived organizational cultures and information security policy compliance among white-collar workers.

4873

Abstract

Purpose

This paper aims to investigate the connection between different perceived organizational cultures and information security policy compliance among white-collar workers.

Design/methodology/approach

The survey using the Organizational Culture Assessment Instrument was sent to white-collar workers in Sweden (n = 674), asking about compliance with information security policies. The survey instrument is an operationalization of the Competing Values Framework that distinguishes between four different types of organizational culture: clan, adhocracy, market and bureaucracy.

Findings

The results indicate that organizational cultures with an internal focus are positively related to employees’ information security policy compliance. Differences in organizational culture with regards to control and flexibility seem to have less effect. The analysis shows that a bureaucratic form of organizational culture is most fruitful for fostering employees’ information security policy compliance.

Research limitations/implications

The results suggest that differences in organizational culture are important for employees’ information security policy compliance. This justifies further investigating the mechanisms linking organizational culture to information security compliance.

Practical implications

Practitioners should be aware that the different organizational cultures do matter for employees’ information security compliance. In businesses and the public sector, the authors see a development toward customer orientation and marketization, i.e. the opposite an internal focus, that may have negative ramifications for the information security of organizations.

Originality/value

Few information security policy compliance studies exist on the consequences of different organizational/information cultures.

Article
Publication date: 1 April 2005

A. Al‐Ayed, S.M. Furnell, D. Zhao and P.S. Dowland

This paper aims to look at unpatched software which represents a significant problem for internet‐based systems, with a myriad malware incidents and hacker exploits taking…

1550

Abstract

Purpose

This paper aims to look at unpatched software which represents a significant problem for internet‐based systems, with a myriad malware incidents and hacker exploits taking advantage of vulnerable targets. Unfortunately, vulnerability management is a non‐trivial task, and is complicated by an increasing number of vulnerabilities and the workload implications associated with handling the associated security advisories and updates.

Design/methodology/approach

As a step towards addressing the problem, this paper presents an automated framework that is designed to provide a vendor‐independent means of vulnerability notification and rectification for system administrators.

Findings

In the proposed framework, incoming vulnerability advisory messages may be obtained from multiple sources, and then filtered and prioritised according to the specific requirements of the target environment (as determined by the security administrator). In addition to notification management, the framework provides an automated facility for the download and deployment of any associated patches. The framework has been implemented in prototype form, with particular focus on the notification manager.

Originality/value

This paper presents an automated framework, providing a valuable and comprehensive solution for managing vulnerabilities in terms of notification and rectification systems.

Details

Information Management & Computer Security, vol. 13 no. 2
Type: Research Article
ISSN: 0968-5227

Keywords

1 – 10 of 37