Search results

1 – 10 of over 2000
Article
Publication date: 13 March 2024

Ziyuan Ma, Huajun Gong and Xinhua Wang

The purpose of this paper is to construct an event-triggered finite-time fault-tolerant formation tracking controller, which can achieve a time-varying formation control for…

Abstract

Purpose

The purpose of this paper is to construct an event-triggered finite-time fault-tolerant formation tracking controller, which can achieve a time-varying formation control for multiple unmanned aerial vehicles (UAVs) during actuator failures and external perturbations.

Design/methodology/approach

First, this study developed the formation tracking protocol for each follower using UAV formation members, defining the tracking inaccuracy of the UAV followers’ location. Subsequently, this study designed the multilayer event-triggered controller based on the backstepping method framework within finite time. Then, considering the actuator failures, and added self-adaptive thought for fault-tolerant control within finite time, the event-triggered closed-loop system is subsequently shown to be a finite-time stable system. Furthermore, the Zeno behavior is analyzed to prevent infinite triggering instances within a finite time. Finally, simulations are conducted with external disturbances and actuator failure conditions to demonstrate formation tracking controller performance.

Findings

It achieves improved performance in the presence of external disturbances and system failures. Combining limited-time adaptive control and event triggering improves system stability, increase robustness to disturbances and calculation efficiency. In addition, the designed formation tracking controller can effectively control the time-varying formation of the leader and followers to complete the task, and by adding a fixed-time observer, it can effectively compensate for external disturbances and improve formation control accuracy.

Originality/value

A formation-following controller is designed, which can handle both external disturbances and internal actuator failures during formation flight, and the proposed method can be applied to a variety of formation control scenarios and does not rely on a specific type of UAV or communication network.

Details

Aircraft Engineering and Aerospace Technology, vol. 96 no. 3
Type: Research Article
ISSN: 1748-8842

Keywords

Open Access
Article
Publication date: 7 September 2023

Sten Torpan, Sten Hansson, Kati Orru, Mark Rhinard, Lucia Savadori, Pirjo Jukarainen, Tor-Olav Nævestad, Sunniva Frislid Meyer, Abriel Schieffelers and Gabriella Lovasz

This paper offers an empirical overview of European emergency managers' institutional arrangements and guidelines for using social media in risk and crisis communication.

Abstract

Purpose

This paper offers an empirical overview of European emergency managers' institutional arrangements and guidelines for using social media in risk and crisis communication.

Design/methodology/approach

The authors collected and analysed material including publicly accessible relevant legal acts, policy documents, official guidelines, and press reports in eight European countries – Germany, Italy, Belgium, Sweden, Hungary, Finland, Norway, and Estonia. Additionally, the authors carried out 95 interviews with emergency managers in the eight countries between September 2019 and February 2020.

Findings

The authors found that emergency management institutions' social media usage is rarely centrally controlled and social media crisis communication was regulated with the same guidelines as crisis communication on traditional media. Considering this study's findings against the backdrop of existing research and practice, the authors find support for a “mixed arrangement” model by which centralised policies work in tandem with decentralised practices on an ad hoc basis.

Practical implications

Comparative insights about institutional arrangements and procedural guidelines on social media crisis communication in the studied countries could inform the future policies concerning social media use in other emergency management systems.

Originality/value

This study includes novel, cross-national comparative data on the institutional arrangements and guidelines for using social media in emergency management in the context of Europe.

Details

International Journal of Emergency Services, vol. 13 no. 1
Type: Research Article
ISSN: 2047-0894

Keywords

Open Access
Article
Publication date: 22 March 2024

Geming Zhang, Lin Yang and Wenxiang Jiang

The purpose of this study is to introduce the top-level design ideas and the overall architecture of earthquake early-warning system for high speed railways in China, which is…

Abstract

Purpose

The purpose of this study is to introduce the top-level design ideas and the overall architecture of earthquake early-warning system for high speed railways in China, which is based on P-wave earthquake early-warning and multiple ways of rapid treatment.

Design/methodology/approach

The paper describes the key technologies that are involved in the development of the system, such as P-wave identification and earthquake early-warning, multi-source seismic information fusion and earthquake emergency treatment technologies. The paper also presents the test results of the system, which show that it has complete functions and its major performance indicators meet the design requirements.

Findings

The study demonstrates that the high speed railways earthquake early-warning system serves as an important technical tool for high speed railways to cope with the threat of earthquake to the operation safety. The key technical indicators of the system have excellent performance: The first report time of the P-wave is less than three seconds. From the first arrival of P-wave to the beginning of train braking, the total delay of onboard emergency treatment is 3.63 seconds under 95% probability. The average total delay for power failures triggered by substations is 3.3 seconds.

Originality/value

The paper provides a valuable reference for the research and development of earthquake early-warning system for high speed railways in other countries and regions. It also contributes to the earthquake prevention and disaster reduction efforts.

Article
Publication date: 7 February 2023

Yalan Yan, Siyu Xin and Xianjin Zha

Knowledge transfer which refers to the communication of knowledge from a source so that it is learned and applied by a recipient has long been a challenge for knowledge…

Abstract

Purpose

Knowledge transfer which refers to the communication of knowledge from a source so that it is learned and applied by a recipient has long been a challenge for knowledge management. The purpose of this study is to understand influencing factors of transactive memory system (TMS) and knowledge transfer.

Design/methodology/approach

Drawing on the theories of communication visibility, social distance and flow, this study develops a research model. Then, data are collected from users of the social media mobile App. Partial least squares-structural equation modeling (PLS-SEM) is employed to analyze data.

Findings

TMS is a valid second-order construct in the social media mobile app context, which is more reflected by credibility. Meanwhile, communication visibility and social distance each have positive effects on TMS which further has a positive effect on knowledge transfer. Flow has a positive effect on knowledge transfer.

Practical implications

Developers of the mobile App should carefully consider the role of information and communication technology (ICT) in supporting TMS and knowledge transfer. They should consider recommendation algorithm so that the benefit of communication visibility can be retained. They should design the feature to classify users based on similarity so as to stimulate users' feeling of close social distance. They should keep on improving features based on users' holistic experience.

Originality/value

This study incorporates the perspectives of communication visibility, social distance and flow to understand TMS and knowledge transfer, presenting a new lens for research.

Details

Aslib Journal of Information Management, vol. 76 no. 3
Type: Research Article
ISSN: 2050-3806

Keywords

Article
Publication date: 29 February 2024

Atefeh Hemmati, Mani Zarei and Amir Masoud Rahmani

Big data challenges and opportunities on the Internet of Vehicles (IoV) have emerged as a transformative paradigm to change intelligent transportation systems. With the growth of…

Abstract

Purpose

Big data challenges and opportunities on the Internet of Vehicles (IoV) have emerged as a transformative paradigm to change intelligent transportation systems. With the growth of data-driven applications and the advances in data analysis techniques, the potential for data-adaptive innovation in IoV applications becomes an outstanding development in future IoV. Therefore, this paper aims to focus on big data in IoV and to provide an analysis of the current state of research.

Design/methodology/approach

This review paper uses a systematic literature review methodology. It conducts a thorough search of academic databases to identify relevant scientific articles. By reviewing and analyzing the primary articles found in the big data in the IoV domain, 45 research articles from 2019 to 2023 were selected for detailed analysis.

Findings

This paper discovers the main applications, use cases and primary contexts considered for big data in IoV. Next, it documents challenges, opportunities, future research directions and open issues.

Research limitations/implications

This paper is based on academic articles published from 2019 to 2023. Therefore, scientific outputs published before 2019 are omitted.

Originality/value

This paper provides a thorough analysis of big data in IoV and considers distinct research questions corresponding to big data challenges and opportunities in IoV. It also provides valuable insights for researchers and practitioners in evolving this field by examining the existing fields and future directions for big data in the IoV ecosystem.

Details

International Journal of Pervasive Computing and Communications, vol. 20 no. 2
Type: Research Article
ISSN: 1742-7371

Keywords

Article
Publication date: 11 April 2023

Shekhar Rathor, Weidong Xia and Dinesh Batra

Agile principles have been widely used in software development team practice since the creation of the Agile Manifesto. Studies have examined variables related to agile principles…

Abstract

Purpose

Agile principles have been widely used in software development team practice since the creation of the Agile Manifesto. Studies have examined variables related to agile principles without systematically considering the relationships among key team, agile methodology, and process variables underlying the agile principles and how these variables jointly influence the achievement of software development agility. In this study, the authors tested a team/methodology–process–agility model that links team variables (team autonomy and team competence) and methodological variable (iterative development) to process variables (communication and collaborative decision-making), which are in turn linked to software development agility (ability to sense, respond and learn).

Design/methodology/approach

Survey data from one hundred and sixty software development professionals were analyzed using structural equation modeling methods.

Findings

The results support the team/methodology–process–agility model. Process variables (communication and collaborative decision-making) mediated the effects of team (autonomy and competence) and methodological (iterative development) variables on software development agility. In addition, team, methodology and process variables had different effects on the three dimensions of software development agility.

Originality/value

The results contribute to the literature on organizational IT management by establishing a team/methodology–process–agility model that can serve as a basis for developing a core theoretical foundation underlying agile principles and practices. The results also have practical implications for organizations in understanding and managing holistically the different roles that agile methodological, team and process factors play in achieving software development agility.

Details

Information Technology & People, vol. 37 no. 2
Type: Research Article
ISSN: 0959-3845

Keywords

Open Access
Article
Publication date: 2 January 2024

Eylem Thron, Shamal Faily, Huseyin Dogan and Martin Freer

Railways are a well-known example of complex critical infrastructure, incorporating socio-technical systems with humans such as drivers, signallers, maintainers and passengers at…

Abstract

Purpose

Railways are a well-known example of complex critical infrastructure, incorporating socio-technical systems with humans such as drivers, signallers, maintainers and passengers at the core. The technological evolution including interconnectedness and new ways of interaction lead to new security and safety risks that can be realised, both in terms of human error, and malicious and non-malicious behaviour. This study aims to identify the human factors (HF) and cyber-security risks relating to the role of signallers on the railways and explores strategies for the improvement of “Digital Resilience” – for the concept of a resilient railway.

Design/methodology/approach

Overall, 26 interviews were conducted with 21 participants from industry and academia.

Findings

The results showed that due to increased automation, both cyber-related threats and human error can impact signallers’ day-to-day operations – directly or indirectly (e.g. workload and safety-critical communications) – which could disrupt the railway services and potentially lead to safety-related catastrophic consequences. This study identifies cyber-related problems, including external threats; engineers not considering the human element in designs when specifying security controls; lack of security awareness among the rail industry; training gaps; organisational issues; and many unknown “unknowns”.

Originality/value

The authors discuss socio-technical principles through a hexagonal socio-technical framework and training needs analysis to mitigate against cyber-security issues and identify the predictive training needs of the signallers. This is supported by a systematic approach which considers both, safety and security factors, rather than waiting to learn from a cyber-attack retrospectively.

Details

Information & Computer Security, vol. 32 no. 2
Type: Research Article
ISSN: 2056-4961

Keywords

Article
Publication date: 11 October 2023

Radha Subramanyam, Y. Adline Jancy and P. Nagabushanam

Cross-layer approach in media access control (MAC) layer will address interference and jamming problems. Hybrid distributed MAC can be used for simultaneous voice, data…

Abstract

Purpose

Cross-layer approach in media access control (MAC) layer will address interference and jamming problems. Hybrid distributed MAC can be used for simultaneous voice, data transmissions in wireless sensor network (WSN) and Internet of Things (IoT) applications. Choosing the correct objective function in Nash equilibrium for game theory will address fairness index and resource allocation to the nodes. Game theory optimization for distributed may increase the network performance. The purpose of this study is to survey the various operations that can be carried out using distributive and adaptive MAC protocol. Hill climbing distributed MAC does not need a central coordination system and location-based transmission with neighbor awareness reduces transmission power.

Design/methodology/approach

Distributed MAC in wireless networks is used to address the challenges like network lifetime, reduced energy consumption and for improving delay performance. In this paper, a survey is made on various cooperative communications in MAC protocols, optimization techniques used to improve MAC performance in various applications and mathematical approaches involved in game theory optimization for MAC protocol.

Findings

Spatial reuse of channel improved by 3%–29%, and multichannel improves throughput by 8% using distributed MAC protocol. Nash equilibrium is found to perform well, which focuses on energy utility in the network by individual players. Fuzzy logic improves channel selection by 17% and secondary users’ involvement by 8%. Cross-layer approach in MAC layer will address interference and jamming problems. Hybrid distributed MAC can be used for simultaneous voice, data transmissions in WSN and IoT applications. Cross-layer and cooperative communication give energy savings of 27% and reduces hop distance by 4.7%. Choosing the correct objective function in Nash equilibrium for game theory will address fairness index and resource allocation to the nodes.

Research limitations/implications

Other optimization techniques can be applied for WSN to analyze the performance.

Practical implications

Game theory optimization for distributed may increase the network performance. Optimal cuckoo search improves throughput by 90% and reduces delay by 91%. Stochastic approaches detect 80% attacks even in 90% malicious nodes.

Social implications

Channel allocations in centralized or static manner must be based on traffic demands whether dynamic traffic or fluctuated traffic. Usage of multimedia devices also increased which in turn increased the demand for high throughput. Cochannel interference keep on changing or mitigations occur which can be handled by proper resource allocations. Network survival is by efficient usage of valid patis in the network by avoiding transmission failures and time slots’ effective usage.

Originality/value

Literature survey is carried out to find the methods which give better performance.

Details

International Journal of Pervasive Computing and Communications, vol. 20 no. 2
Type: Research Article
ISSN: 1742-7371

Keywords

Article
Publication date: 27 March 2024

Michael Boadi Nyamekye, Edward Markwei Martey, George Cudjoe Agbemabiese, Alexander Kofi Preko, Theophilus Gyepi-Garbrah and Emmanuel Appah

This paper aimed to test a proposed framework highlighting strategic green marketing initiatives and how they drive new technology implementation towards green corporate…

Abstract

Purpose

This paper aimed to test a proposed framework highlighting strategic green marketing initiatives and how they drive new technology implementation towards green corporate performance, underpinned by institutional isomorphism.

Design/methodology/approach

The study used a quantitative method and convenience sampling approach in gathering data using adapted questionnaires to solicit first-hand information from 225 employees of small and medium-sized enterprises (SMEs) in the tourism and hospitality sector underpinned by the theory of institutional isomorphism.

Findings

The study shows that green communication and green strategy alignment have significant predictive effects on new technology implementation. Cultural isomorphism significantly moderated the effects of implementing new technology (i.e. green communication and strategy alignment). In addition, “new technology implementation had a significant predictive effect on green corporate performance”. Meanwhile, the moderation effect of “green creative behaviour on the new technology-green corporate performance dyad was positive but insignificant.”

Originality/value

The study’s novel framework confirms how green communication strategy and green strategy alignment complement cultural isomorphism to explain the impact of new technology implementation on green corporate performance, underpinned by institutional isomorphism.

Details

Journal of Contemporary Marketing Science, vol. 7 no. 1
Type: Research Article
ISSN: 2516-7480

Keywords

Article
Publication date: 15 September 2023

Debadutta Kumar Panda

Microfinance programs across the countries are designed on the self-help and peer pressure model, aim at microentrepreneurship development. Despite of significant studies on…

Abstract

Purpose

Microfinance programs across the countries are designed on the self-help and peer pressure model, aim at microentrepreneurship development. Despite of significant studies on microfinance-supported microentrepreneurship (MSM), not a single literature examines it from the systems thinking. In addition to that, the extant literature did not look MSM from the behavioral perspectives. To address the above gaps, the present study aims to examine self-help group (SHG)-based microfinance programs from the systems approach using the Stimulus-Organism-Behavior-Consequence (SOBC) model.

Design/methodology/approach

Information gathered from 786 women SHG members from four states of India through a structured interview schedule. Confirmatory Factor Analysis (CFA) and Structural Equation Modeling (SEM) were conducted to process data. Additional statistical tests were performed to test the reliability and validity.

Findings

It was found that the “positive stimulus” (social intermediation, financial intermediation and business development services) positively impacted; and “negative stimulus” (intermediation accountability, and intermediation assumption) negatively impact, to “motive” (attitude, subjective norms, and perceived control) for micro-entrepreneurship in the SHG-based microfinance. Further, “motive” positively predicted “behavioral intention”; the “behavioral intention” positively determined “consequences” of micro-entrepreneurship. Intermediation as stimuli acted as “input”; the motive and behavioral intention acted as the “process”, and the consequence acted as the “output” in the SHG-based microentrepreneurship system.

Originality/value

To the best of the author's knowledge, this paper is the first one to examine the behavioral systems of microentrepreneurship programs through the Stimulus-Organism-Behavior-Consequence (SOBC) model.

Peer review

The peer review history for this article is available at: https://publons.com/publon/10.1108/IJSE-12-2022-0801

Details

International Journal of Social Economics, vol. 51 no. 5
Type: Research Article
ISSN: 0306-8293

Keywords

1 – 10 of over 2000