Search results
1 – 10 of 37Fatimah De’nan, Chong Shek Wai and Nor Salwani Hashim
Various designs of corrugated webs include trapezoidal, sinusoidal, triangular and rectangular profiles. The increasing use of curved plates has prompted the creation of…
Abstract
Purpose
Various designs of corrugated webs include trapezoidal, sinusoidal, triangular and rectangular profiles. The increasing use of curved plates has prompted the creation of I-sections made of steel with a corrugated web design. This study aims to examine the effectiveness of an I-beam steel section that features a perforated-triangular web profile.
Design/methodology/approach
In the current study, finite element analysis was conducted on corrugated-perforated steel I-sections using ANSYS software. The study focused on inspecting the design of the perforations, including their shape (circle, square, hexagon, diamond and octagon), size of perforations (80 mm, 100 mm and 120 mm) and layout (the position of web perforation), as well as examining the geometric properties of the section in term of bending, lateral torsional buckling, torsion and shear behavior.
Findings
The study revealed that perforations with diamond, circle and hexagon shapes exhibit good performance, whereas the square shape performs poorly. Moreover, the steel section’s performance decreases with an increase in perforation size, regardless of loading conditions. In addition, the shape of the web perforations can also influence its stress distribution. For example, diamond-shaped perforations have been found to perform better than square-shaped perforations in terms of stress distribution and overall performance. This was because of their ability to distribute stress more evenly and provide greater support to the surrounding material. The diagonal alignment of the diamond shape aligns with principal stress directions, allowing for efficient load transfer and reduced stress concentrations. Additionally, diamond-shaped perforations offer a larger effective area, better shear transfer and improved strain redistribution, resulting in enhanced structural integrity and increased load-carrying capacity.
Originality/value
Hence, the presence of lateral-torsional buckling and torsional loading conditions significantly impacts the performance of corrugated-perforated steel I-sections.
Details
Keywords
A. El-Hadidy, A. Fadel and H. Fadel
Multilayer technical fabrics are an important part of fibrous filters used in raw water filtration systems. The implementation of the filtration process depends on the structure…
Abstract
Multilayer technical fabrics are an important part of fibrous filters used in raw water filtration systems. The implementation of the filtration process depends on the structure of the fabric system, water particle deposition mechanisms and water flow conditions. This paper discusses, in terms of theoretical models, the results of an investigation on the flow resistance and efficiency of raw water filtration at the initial stage, in which the dispersed phase consists of liquid particles, through a multilayer technical fabric system with different structural parameters.
The research results indicate the functional dependence of filtering properties on thestructural parameters of the fibres studied (primarily, fabric packing density coefficient,fabric tightness, and raw water flow parameters, such as the water flow rate (time)). The results of the research on multilayer technical fabrics with particular focus on the analysis of pore fraction distribution may be of crucial importance in forecasting the use of multilayer technical fabrics as filtering media for raw water filtration processing, considering that the conditions are sufficient
Details
Keywords
Selin Hanife Eryuruk and Fatma Kalaoglu
Knitted fabrics containing elastane provide high level of comfort and ease of usage because of the elastic and drape properties over the body. Knitted fabrics respond to every…
Abstract
Purpose
Knitted fabrics containing elastane provide high level of comfort and ease of usage because of the elastic and drape properties over the body. Knitted fabrics respond to every movement of the body and return back to its original shape easily so they are used widely for apparel production. The most important properties required from the elastic knitted garments are wear comfort, fit, breathability and durability. The purpose of this paper is to analyse the effect of elastane yarn count and ground yarn count on the performance properties of 12 single jersey knitted fabrics were analysed after dying.
Design/methodology/approach
The research design for this study consists an experimental study. In all, 12 fabrics containing half plating and full plating elastane were produced using 30/1-40/1 Ne yarn counts. Bursting strength, stretch recovery, residual extension, air permeability, spirality and drape properties of fabrics were evaluated.
Findings
As a result of study it was found a certain effect as the elastane amount and count changed. For all types of knitted fabrics, bursting strength values increased and fabric spirality values decreased as the elastane amount and elastane yarn count increased. Also it was found a significant relationship between elastane amount and count with air permeability, spirality, bursting strength and drape.
Originality/value
As a result of the literature review, it was seen that the effects of elastane amount, elastane yarn count and fabric yarn count on the performance properties of knitted fabrics has not been studied broadly.
Details
Keywords
Sandeep W. Dahake, Abhaykumar M. Kuthe, Jitendra Chawla and Mahesh B. Mawale
The purpose of this paper is to develop a workflow for design and fabrication of customized surgical guides (CSGs) for placement of the bidirectional extraoral distraction…
Abstract
Purpose
The purpose of this paper is to develop a workflow for design and fabrication of customized surgical guides (CSGs) for placement of the bidirectional extraoral distraction instruments (EDIs) in bilateral mandibular distraction osteogenesis (MDO) surgery to treat the bilateral temporomandibular joint ankylosis with zero mouth opening.
Design/methodology/approach
The comprehensive workflow consists of six steps: medical imaging; virtual surgical planning (VSP); computer aided design; rapid prototyping (RP); functional testing of CSGs and mock surgery; and clinical application. Fused deposition modeling, an RP process was used to fabricate CSGs in acrylonitrile butadiene styrene material. Finally, mandibular reconstruction with MDO was performed successfully using RP-assisted CSGs.
Findings
Design and development of CSGs prior to the actual MDO surgery improves accuracy, reduces operation time and decreases patient morbidity, hence improving the quality of surgery. Manufacturing of CSG is easy using RP to transfer VSP into the actual surgery.
Originality/value
This study describes an RP-assisted CSGs fabrication for exact finding of both; osteotomy site and drilling location to fix EDI’s pins accurately in the mandible; for accurate osteotomy and placement of the bidirectional EDIs in MDO surgery to achieve accurate distraction.
Details
Keywords
Beata Jałocha, Ewa Bogacz-Wojtanowska, Anna Góral, Grażyna Prawelska-Skrzypek and Piotr Jedynak
In this chapter we discuss how, as a tool for organizational change, action research can affect the development of cooperation between a traditional university and the external…
Abstract
In this chapter we discuss how, as a tool for organizational change, action research can affect the development of cooperation between a traditional university and the external environment. The case analyzed was a two-year action research project carried out in cooperation with over 20 employers. This project was carried out at multiple levels and had several essential goals. Apart from its emancipatory role in the shift in the way students carry out their master's theses (toward application, implementation, where organizations become the research subject instead of the research object), the project's aim was to open up the university to cooperation with its environment and conduct useful research. The results indicate that action research through the democratization of the process of introducing changes and its bottom-up nature influences the development of real cooperation between the university and external organizations. Additionally, they contribute to the emancipation of university knowledge, its democratization, dehierarchization, as well as cocreation and sharing with cooperating organizations.
Details
Keywords
Dawa Dolma Bhutia, Yeka Zhimo, Ramen Kole and Jayanta Saha
The purpose of this paper was to determine the antifungal activities of different solvent extracts of common plants in vitro and in vivo against banana anthracnose fungus…
Abstract
Purpose
The purpose of this paper was to determine the antifungal activities of different solvent extracts of common plants in vitro and in vivo against banana anthracnose fungus Colletotrichum musae (Berk & M.A. Curtis) Arx, and to investigate its effects on the pathogen and identify the bio active component(s).
Design/methodology/approach
Extracts were obtained from leaves, tender shoots, rhizomes, bulbs, seeds and fruits of 42 naturally growing plant species following hot sequential extraction. Preliminary screening of the solvent extracts was done based on the inhibition of radial mycelial growth of C. musae following poison food technique and conidial germination inhibition by cavity slide technique. The selected extracts were assessed for their effect on harvested banana in reducing anthracnose during storage. The active components in the bio-active fractions of plant extract were identified by gas chromatography-mass spectroscopy.
Findings
Methanol extracted a larger quantity of material (between 6.9 and 12.5 per cent) than hexane or chloroform, and all its extracts were active against the test pathogen with mycelial growth inhibition ranging from 13.70 to 88.89 per cent. Zingiber officinale rhizome extract as well as Polyalthia longifolia and Clerodendrum inerme leaf extracts exhibited more than 80 per cent inhibition of mycelial growth. Total inhibition of spore germination of C. musae was recorded in Z. officinale and P. longifolia extracts at 0.3 per cent w/v and 0.5 per cent w/v concentration, respectively, while only 68 per cent spore inhibition was recorded in C. inerme at 0.5 per cent w/v concentration. Of the three plant species, Z. officinale had the best antifungal activity (18.0 per cent disease incidence; 2.2 disease severity scale) when banana fruits were dipped in the extract at a concentration of 0.5 per cent w/v at 5 days of storage in ambient condition (80-82 per cent R.H., 27 ± 1°C). The bio-active compounds in the extract of Z. officinale were identified as alpha-curcumene and zingerone.
Originality/value
Based on the antifungal activity, plant extract of Z. officinale can be used as an effective alternative to chemicals in controlling anthracnose pathogen in harvested banana.
Details
Keywords
Manuel Burghardt, Markus Heckner and Christian Wolff
Purpose — This chapter illustrates and explains the ambiguity and vagueness of the term social search and aims at describing and classifying the heterogeneous landscape of social…
Abstract
Purpose — This chapter illustrates and explains the ambiguity and vagueness of the term social search and aims at describing and classifying the heterogeneous landscape of social search implementations on the WWW.
Methodology/approach — We have looked at different definitions as well as the context of social search by carrying out an extensive literature review, and tried to unify and enhance existing ideas and concepts. Our definition of social search is illustrated by a general review of existing social search engines, which are analyzed and described by their specific features and social aspects.
Findings — The chapter presents a discussion of social search as well as a comparison of existing social search engines.
Social implications — The definition of social search and the comparison of social search engines summarize the many ways people can search the web together and allow for an assessment of future developments in this area.
Originality/value of paper — Although different attempts to define social search have been made in the past, we present an argumentation that unifies some existing definitions and which is different from other interpretations of the social search concept. We present an overview and a comparison of the different genres of social search engines.
Details
Keywords
Martina Neri, Federico Niccolini and Luigi Martino
Cyberattacks are becoming increasingly widespread, and cybersecurity is therefore increasingly important. Although the technological aspects of cybersecurity are its best-known…
Abstract
Purpose
Cyberattacks are becoming increasingly widespread, and cybersecurity is therefore increasingly important. Although the technological aspects of cybersecurity are its best-known characteristics, the cybersecurity phenomenon goes beyond the detection of technological impacts, and encompasses all the dimensions of an organization. This study thus focusses on an additional set of organizational elements. The key elements of cybersecurity organizational readiness depicted here are cybersecurity awareness, cybersecurity culture and cybersecurity organizational resilience (OR). This study aims to qualitatively assess small and medium enterprises’ (SMEs) overall level of organizational cybersecurity readiness.
Design/methodology/approach
This study focused on conducting a cybersecurity organizational readiness assessment using a sample of 53 Italian SMEs from the information and communication technology sector. Informed mixed method research, this study was conducted consistent with the principles of the explanatory sequential mixed method design, and adopting a quanti-qualitative methodology. The quantitative data were collected through a questionnaire. Qualitative data were subsequently collected through semi-structured interviews.
Findings
Although many elements of the technical aspects of cybersecurity OR have yielded very encouraging results, there are still some areas that require improvement. These include those facets that constitute the foundation of cybersecurity awareness, and, thus, a cybersecurity culture. This result highlights that the areas in need of improvement are exactly those that are most important in fighting against cyber threats via organizational cybersecurity readiness.
Originality/value
Although the importance of SMEs is obvious, evidence of such organizations’ attitudes to cybersecurity are still limited. This research is an attempt to depict the organizational issue related to cybersecurity, i.e. overall cybersecurity organizational readiness.
Details
Keywords
Martin Karlsson, Fredrik Karlsson, Joachim Åström and Thomas Denk
This paper aims to investigate the connection between different perceived organizational cultures and information security policy compliance among white-collar workers.
Abstract
Purpose
This paper aims to investigate the connection between different perceived organizational cultures and information security policy compliance among white-collar workers.
Design/methodology/approach
The survey using the Organizational Culture Assessment Instrument was sent to white-collar workers in Sweden (n = 674), asking about compliance with information security policies. The survey instrument is an operationalization of the Competing Values Framework that distinguishes between four different types of organizational culture: clan, adhocracy, market and bureaucracy.
Findings
The results indicate that organizational cultures with an internal focus are positively related to employees’ information security policy compliance. Differences in organizational culture with regards to control and flexibility seem to have less effect. The analysis shows that a bureaucratic form of organizational culture is most fruitful for fostering employees’ information security policy compliance.
Research limitations/implications
The results suggest that differences in organizational culture are important for employees’ information security policy compliance. This justifies further investigating the mechanisms linking organizational culture to information security compliance.
Practical implications
Practitioners should be aware that the different organizational cultures do matter for employees’ information security compliance. In businesses and the public sector, the authors see a development toward customer orientation and marketization, i.e. the opposite an internal focus, that may have negative ramifications for the information security of organizations.
Originality/value
Few information security policy compliance studies exist on the consequences of different organizational/information cultures.
Details
Keywords
A. Al‐Ayed, S.M. Furnell, D. Zhao and P.S. Dowland
This paper aims to look at unpatched software which represents a significant problem for internet‐based systems, with a myriad malware incidents and hacker exploits taking…
Abstract
Purpose
This paper aims to look at unpatched software which represents a significant problem for internet‐based systems, with a myriad malware incidents and hacker exploits taking advantage of vulnerable targets. Unfortunately, vulnerability management is a non‐trivial task, and is complicated by an increasing number of vulnerabilities and the workload implications associated with handling the associated security advisories and updates.
Design/methodology/approach
As a step towards addressing the problem, this paper presents an automated framework that is designed to provide a vendor‐independent means of vulnerability notification and rectification for system administrators.
Findings
In the proposed framework, incoming vulnerability advisory messages may be obtained from multiple sources, and then filtered and prioritised according to the specific requirements of the target environment (as determined by the security administrator). In addition to notification management, the framework provides an automated facility for the download and deployment of any associated patches. The framework has been implemented in prototype form, with particular focus on the notification manager.
Originality/value
This paper presents an automated framework, providing a valuable and comprehensive solution for managing vulnerabilities in terms of notification and rectification systems.
Details