Search results

1 – 10 of over 2000
Article
Publication date: 11 January 2024

Marco Fabio Benaglia, Mei-Hui Chen, Shih-Hao Lu, Kune-Muh Tsai and Shih-Han Hung

This research investigates how to optimize storage location assignment to decrease the order picking time and the waiting time of orders in the staging area of low-temperature…

182

Abstract

Purpose

This research investigates how to optimize storage location assignment to decrease the order picking time and the waiting time of orders in the staging area of low-temperature logistics centers, with the goal of reducing food loss caused by temperature abuse.

Design/methodology/approach

The authors applied ABC clustering to the products in a simulated database of historical orders modeled after the actual order pattern of a large cold logistics company; then, the authors mined the association rules and calculated the sales volume correlation indices of the ordered products. Finally, the authors generated three different simulated order databases to compare order picking time and waiting time of orders in the staging area under eight different storage location assignment strategies.

Findings

All the eight proposed storage location assignment strategies significantly improve the order picking time (by up to 8%) and the waiting time of orders in the staging area (by up to 22%) compared with random placement.

Research limitations/implications

The results of this research are based on a case study and simulated data, which implies that, if the best performing strategies are applied to different environments, the extent of the improvements may vary. Additionally, the authors only considered specific settings in terms of order picker routing, zoning and batching: other settings may lead to different results.

Practical implications

A storage location assignment strategy that adopts dispersion and takes into consideration ABC clustering and shipping frequency provides the best performance in minimizing order picker's travel distance, order picking time, and waiting time of orders in the staging area. Other strategies may be a better fit if the company's objectives differ.

Originality/value

Previous research on optimal storage location assignment rarely considered item association rules based on sales volume correlation. This study combines such rules with several storage planning strategies, ABC clustering, and two warehouse layouts; then, it evaluates their performance compared to the random placement, to find which one minimizes the order picking time and the order waiting time in the staging area, with a 30-min time limit to preserve the integrity of the cold chain. Order picking under these conditions was rarely studied before, because they may be irrelevant when dealing with temperature-insensitive items but become critical in cold warehouses to prevent temperature abuse.

Details

The International Journal of Logistics Management, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 0957-4093

Keywords

Article
Publication date: 28 October 2022

Shu-hsien Liao, Retno Widowati and Ching-Yu Lee

TikTok, a social media application (app), was originally positioned as a short music video community suitable for young users, and the app is user-generated content (UGC) short…

1639

Abstract

Purpose

TikTok, a social media application (app), was originally positioned as a short music video community suitable for young users, and the app is user-generated content (UGC) short video of vertical music. Users can make their own creative videos. Following the rhythm of the music, users can shoot various video content, personal talents, life records, performances, dances, plot interpretations, etc. However, what are the profiles and preferences of TikTok users, whereby the social media app is mainly developed by UGC? What is the impact of TikTok on the development of social media? In addition, what is UGC's social media model for user interactions in social networks? The purpose of this paper is to address and study these proposed issues.

Design/methodology/approach

All questionnaire items are designed as nominal and ordinal scales (not Likert scale). The obtained data from questionnaires are put into the relational database (N = 2,011). This empirical study takes Taiwan TikTok users as the research object, implements data mining analytics to generate user profiles through clustering analysis and further uses association rules’ analysis to analyze social media apps in social network interaction and social apps’ development by proposing two patterns and several meaningful rules.

Findings

This study finds that social media apps is a valuable practical research topic on online social media development. In addition, besides the TikTok, the authors eagerly await subsequent research to provide more valuable findings of social media apps in both theory and practice.

Originality/value

This study presents the research evidences that social media apps such as TikTok will be able to transcend the current development pattern of social media and make good use of the media and technology innovation of apps in social development and social informatics.

Details

Library Hi Tech, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 0737-8831

Keywords

Article
Publication date: 13 January 2023

Yongliang Deng, Zedong Liu, Liangliang Song, Guodong Ni and Na Xu

The purpose of this study is to identify the causative factors of metro construction safety accidents, analyze the correlation between accidents and causative factors and assist…

Abstract

Purpose

The purpose of this study is to identify the causative factors of metro construction safety accidents, analyze the correlation between accidents and causative factors and assist in developing safety management strategies for improving safety performance in the context of the Chinese construction industry.

Design/methodology/approach

To achieve these objectives, 13 types and 48 causations were determined based on 274 construction safety accidents in China. Then, 204 cause-and-effect relationships among accidents and causations were identified based on data mining. Next, network theory was employed to develop and analyze the metro construction accident causation network (MCACN).

Findings

The topological characteristics of MCACN were obtained, it is both a small-world network and a scale-free network. Controlling critical causative factors can effectively control the occurrence of metro construction accidents. Degree centrality strategy is better than closeness centrality strategy and betweenness centrality strategy.

Research limitations/implications

In practice, it is very difficult to quantitatively identify and determine the importance of different accidents and causative factors. The weights of nodes and edges are failed to be assigned when constructing MCACN.

Practical implications

This study provides a theoretical basis and feasible management reference for construction enterprises in China to control construction risks and reduce safety accidents. More safety resources should be allocated to control critical risks. It is recommended that safety managers implement degree centrality strategy when making safety-related decisions.

Originality/value

This paper establishes the MCACN model based on data mining and network theory, identifies the properties and clarifies the mechanism of metro construction accidents and causations.

Details

Engineering, Construction and Architectural Management, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 0969-9988

Keywords

Article
Publication date: 26 June 2023

Argaw Gurmu, M. Reza Hosseini, Mehrdad Arashpour and Wellia Lioeng

Building defects are becoming recurrent phenomena in most high-rise buildings. However, little research exists on the analysis of defects in high-rise buildings based on data from…

Abstract

Purpose

Building defects are becoming recurrent phenomena in most high-rise buildings. However, little research exists on the analysis of defects in high-rise buildings based on data from real-life projects. This study aims to develop dashboards and models for revealing the most common locations of defects, understanding associations among defects and predicting the rectification periods.

Design/methodology/approach

In total, 15,484 defect reports comprising qualitative and quantitative data were obtained from a company that provides consulting services for the construction industry in Victoria, Australia. Data mining methods were applied using a wide range of Python libraries including NumPy, Pandas, Natural Language Toolkit, SpaCy and Regular Expression, alongside association rule mining (ARM) and simulations.

Findings

Findings reveal that defects in multi-storey buildings often occur on lower levels, rather than on higher levels. Joinery defects were found to be the most recurrent problem on ground floors. The ARM outcomes show that the occurrence of one type of defect can be taken as an indication for the existence of other types of defects. For instance, in laundry, the chance of occurrence of plumbing and joinery defects, where paint defects are observed, is 88%. The stochastic model built for door defects showed that there is a 60% chance that defects on doors can be rectified within 60 days.

Originality/value

The dashboards provide original insight and novel ideas regarding the frequency of defects in various positions in multi-storey buildings. The stochastic models can provide a reliable point of reference for property managers, occupants and sub-contractors for taking measures to avoid reoccurring defects; so too, findings provide estimations of possible rectification periods for various types of defects.

Details

Construction Innovation , vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 1471-4175

Keywords

Article
Publication date: 16 April 2024

Liezl Smith and Christiaan Lamprecht

In a virtual interconnected digital space, the metaverse encompasses various virtual environments where people can interact, including engaging in business activities. Machine…

Abstract

Purpose

In a virtual interconnected digital space, the metaverse encompasses various virtual environments where people can interact, including engaging in business activities. Machine learning (ML) is a strategic technology that enables digital transformation to the metaverse, and it is becoming a more prevalent driver of business performance and reporting on performance. However, ML has limitations, and using the technology in business processes, such as accounting, poses a technology governance failure risk. To address this risk, decision makers and those tasked to govern these technologies must understand where the technology fits into the business process and consider its limitations to enable a governed transition to the metaverse. Using selected accounting processes, this study aims to describe the limitations that ML techniques pose to ensure the quality of financial information.

Design/methodology/approach

A grounded theory literature review method, consisting of five iterative stages, was used to identify the accounting tasks that ML could perform in the respective accounting processes, describe the ML techniques that could be applied to each accounting task and identify the limitations associated with the individual techniques.

Findings

This study finds that limitations such as data availability and training time may impact the quality of the financial information and that ML techniques and their limitations must be clearly understood when developing and implementing technology governance measures.

Originality/value

The study contributes to the growing literature on enterprise information and technology management and governance. In this study, the authors integrated current ML knowledge into an accounting context. As accounting is a pervasive aspect of business, the insights from this study will benefit decision makers and those tasked to govern these technologies to understand how some processes are more likely to be affected by certain limitations and how this may impact the accounting objectives. It will also benefit those users hoping to exploit the advantages of ML in their accounting processes while understanding the specific technology limitations on an accounting task level.

Details

Journal of Financial Reporting and Accounting, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 1985-2517

Keywords

Article
Publication date: 29 January 2024

Kai Wang

The identification of network user relationship in Fancircle contributes to quantifying the violence index of user text, mining the internal correlation of network behaviors among…

Abstract

Purpose

The identification of network user relationship in Fancircle contributes to quantifying the violence index of user text, mining the internal correlation of network behaviors among users, which provides necessary data support for the construction of knowledge graph.

Design/methodology/approach

A correlation identification method based on sentiment analysis (CRDM-SA) is put forward by extracting user semantic information, as well as introducing violent sentiment membership. To be specific, the topic of the implementation of topology mapping in the community can be obtained based on self-built field of violent sentiment dictionary (VSD) by extracting user text information. Afterward, the violence index of the user text is calculated to quantify the fuzzy sentiment representation between the user and the topic. Finally, the multi-granularity violence association rules mining of user text is realized by constructing violence fuzzy concept lattice.

Findings

It is helpful to reveal the internal relationship of online violence under complex network environment. In that case, the sentiment dependence of users can be characterized from a granular perspective.

Originality/value

The membership degree of violent sentiment into user relationship recognition in Fancircle community is introduced, and a text sentiment association recognition method based on VSD is proposed. By calculating the value of violent sentiment in the user text, the annotation of violent sentiment in the topic dimension of the text is achieved, and the partial order relation between fuzzy concepts of violence under the effective confidence threshold is utilized to obtain the association relation.

Details

Data Technologies and Applications, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 2514-9288

Keywords

Article
Publication date: 26 March 2024

Yuanwen Han, Jiang Shen, Xuwei Zhu, Bang An and Xueying Bao

This study aims to develop an interface management risk interaction modeling and analysis methodology applicable to complex systems in high-speed rail construction projects…

Abstract

Purpose

This study aims to develop an interface management risk interaction modeling and analysis methodology applicable to complex systems in high-speed rail construction projects, reveal the interaction mechanism of interface management risk and provide theoretical support for project managers to develop appropriate interface management risk response strategies.

Design/methodology/approach

This paper introduces the association rule mining technique to improve the complex network modeling method. Taking China as an example, based on the stakeholder perspective, the risk factors and significant accident types of interface management of high-speed rail construction projects are systematically identified, and a database is established. Then, the Apriori algorithm is used to mine and analyze the strong association rules among the factors in the database, construct the complex network, and analyze its topological characteristics to reveal the interaction mechanism of the interface management risk of high-speed rail construction projects.

Findings

The results show that the network is both scale-free and small-world, implying that construction accidents are not random events but rather the result of strong interactions between numerous interface management risks. Contractors, technical interfaces, mechanical equipment, and environmental factors are the primary direct causal factors of accidents, while owners and designers are essential indirect causal factors. The global importance of stakeholders such as owners, designers, and supervisors rises significantly after considering the indirect correlations between factors. This theoretically explains the need to consider the interactions between interface management risks.

Originality/value

The interaction mechanism between interface management risks is unclear, which is an essential factor influencing the decision of risk response measures. This study proposes a new methodology for analyzing interface management risk response strategies that incorporate quantitative analysis methods and considers the interaction of interface management risks.

Details

Engineering, Construction and Architectural Management, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 0969-9988

Keywords

Article
Publication date: 19 June 2023

Fatma Altuntas

The textile sector is one of the sectors where competition is intense and requires the production of high-value-added products. This study aims to conduct patent analysis to find…

Abstract

Purpose

The textile sector is one of the sectors where competition is intense and requires the production of high-value-added products. This study aims to conduct patent analysis to find the technology status, recent trends, applications and technological evaluations of protective textile technologies in practice.

Design/methodology/approach

More than 36,840 patent documents related to protective textile technologies are available for researchers, patent examiners and patent researchers. Patent analysis is conducted to report the technology status, recent trends and applications of protective textile technologies. This analysis provides insights into the possible future directions of protective textile technologies in practice. Additionally, association rule mining (ARM) is performed to find the hidden patterns among protective textile technologies.

Findings

The development of protective textile technologies is revealed by the technology evaluation in this study. In addition, the sub-technology classes affecting protective textile technologies are examined using the cooperative patent classification (CPC) codes of the patent documents. Technology status and recent trends of protective textile technologies are provided in detail. The results of this study show that (1) protective textile technologies are constantly being developed, (2) the working areas of medical protective textiles are increasing, (3) there are frequent studies on fabric structures for saving lives within the framework of human needs and (4) there are four technology classes, namely A41D, Y10T, B32B and A62B impacting the other technology classes related to textile technologies such as D10B, Y10T, F41H, A62D, D04H, Y10S and D10B.

Originality/value

To have a competitive advantage in the marketplace, evaluation of textile technologies is critical in developing “functionalized” and “technologized” textile products. In particular, evaluating technologies in developing protective textile products is extremely important to meet customer demands and present competitive products in the market. Examining these patents for technology developers, decision-makers and policymakers is an urgent and necessary job. However, studies examining the development of protective textile technologies with patent analysis are very limited in the literature. To fill this gap, technology status, recent trends and applications of protective textile technologies are reported based on patent analysis and ARM in this study.

Details

Kybernetes, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 0368-492X

Keywords

Article
Publication date: 20 February 2024

Xiaobo Shi, Yan Liu, Kunkun Ma, Zixin Gu, Yaning Qiao, Guodong Ni, Chibuzor Ojum, Alex Opoku and Yong Liu

The purpose is to identify and evaluate the safety risk factors in the coal mine construction process.

Abstract

Purpose

The purpose is to identify and evaluate the safety risk factors in the coal mine construction process.

Design/methodology/approach

The text mining technique was applied in the stage of safety risk factor identification. The association rules method was used to obtain associations with safety risk factors. Decision-Making Trial and Evaluation Laboratory (DEMATEL) and Interpretative Structural Modeling (ISM) were utilized to evaluate safety risk factors.

Findings

The results show that 18 safety risk factors are divided into 6 levels. There are 12 risk transmission paths in total. Meanwhile, unsafe behavior and equipment malfunction failure are the direct causes of accidents, and inadequate management system is the basic factor that determines the safety risk status.

Research limitations/implications

Due to the limitation of the computational matrix workload, this article only categorizes numerous lexical items into 18 factors. Then, the workshop relied on a limited number of experts; thus, the findings may be potentially biased. Next, the accident report lacks a universal standard for compilation, and the use of text mining technique may be further optimized. Finally, since the data are all from China, subsequent cross-country studies should be considered.

Social implications

The results can help China coal mine project managers to have a clear understanding of safety risks, efficiently carry out risk hazard identification work and take timely measures to cut off the path of transmission with risks identified in this study. This helps reduce the economic losses of coal mining enterprises, thus improving the safety standards of the entire coal mining industry and the national standards for coal mine safety policy formulation.

Originality/value

Coal mine construction projects are characterized by complexity and difficulties in construction. Current research on the identification and assessment of safety risk factors in coal mine construction is insufficient. This study combines objective and systematic research approaches. The findings contribute to the safety risk management of China coal mine construction projects by providing a basis for the development of safety measures.

Details

Engineering, Construction and Architectural Management, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 0969-9988

Keywords

Article
Publication date: 1 April 2024

Mahmud Akhter Shareef, Yogesh K. Dwivedi, Md. Shazzad Hosain, Mihalis Giannakis and Jashim Uddin Ahmed

This study has conducted exploratory research to understand who should comprise the members of a resilient supply chain for promoting an entrepreneurial ecosystem of a startup…

Abstract

Purpose

This study has conducted exploratory research to understand who should comprise the members of a resilient supply chain for promoting an entrepreneurial ecosystem of a startup project and to determine the mechanisms for the balanced coexistence of all stakeholders. This is necessary to ensure mutual benefits for all stakeholders, each of whom has multidimensional interests. Additionally, this supply chain must be able to withstand any potential disruption risks.

Design/methodology/approach

This research has employed a mixed-design approach. In this context, the study conducted an extensive qualitative and quantitative investigation, including 30 interviews and a survey involving 180 potential stakeholders in this supply network, respectively in the capital city of Bangladesh, Dhaka. The analysis of the interviews utilized principles of matrix thinking, while structural equation modeling (SEM) through LISREL was employed to understand cause-and-effect relationships.

Findings

Network, platform and governance—these three independent constructs have the potential to contribute to the dependent construct, a resilient supply chain, aimed at promoting an entrepreneurial ecosystem for startup projects. It has been revealed that the management of such projects depends on the rules and regulations within the ecosystem. An excellent governance mechanism is essential for this purpose. To facilitate coexistence, the establishment of a platform is crucial, where cooperation among all members is mandatory.

Practical implications

For practitioners, three distinctive but closely interdependent issues are explored and resolved in this philanthropic study. It has unfolded the elements of any startup project with essential settings.

Originality/value

The identification of the structural dynamics of potential stakeholders within the entrepreneurial ecosystem of startups is largely absent in existing literature. Therefore, there is a need to comprehensively investigate the entire network, including their roles, responsibilities and associations. This study makes a significant and novel contribution to the existing literature. Academics and practitioners alike have ample opportunities to learn from this new aspect of relationships across three distinct areas: the entrepreneurial ecosystem, startup projects and the development of a resilient supply chain.

Details

International Journal of Entrepreneurial Behavior & Research, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 1355-2554

Keywords

1 – 10 of over 2000