Search results
1 – 10 of over 3000Fengyuan Liu, Srichand Hinduja and Paulo Bártolo
This paper aims to describe the control software of a novel manufacturing system called plasma-assisted bio-extrusion system (PABS), designed to produce complex multi-material and…
Abstract
Purpose
This paper aims to describe the control software of a novel manufacturing system called plasma-assisted bio-extrusion system (PABS), designed to produce complex multi-material and functionally graded scaffolds for tissue engineering applications. This fabrication system combines multiple pressure-assisted and screw-assisted printing heads and plasma jets. Control software allows the users to create single or multi-material constructs with uniform pore size or pore size gradients by changing the operation parameters, such as geometric parameters, lay-down pattern, filament distance, feed rate and layer thickness, and to produce functional graded scaffolds with different layer-by-layer coating/surface modification strategies by using the plasma modification system.
Design/methodology/approach
MATLAB GUI is used to develop the software, including the design of the user interface and the implementation of all mathematical programing for both multi-extrusion and plasma modification systems.
Findings
Based on the user definition, G programing codes are generated, enabling full integration and synchronization with the hardware of PABS. Single, multi-material and functionally graded scaffolds can be obtained by manipulating different materials, scaffold designs and processing parameters. The software is easy to use, allowing the efficient control of the PABS even for the fabrication of complex scaffolds.
Originality/value
This paper introduces a novel additive manufacturing system for tissue engineering applications describing in detail the software developed to control the system. This new fabrication system represents a step forward regarding the current state-of-the-art technology in the field of biomanufacturing, enabling the design and fabrication of more effective scaffolds matching the mechanical and surface characteristics of the surrounding tissue and enabling the incorporation of high number of cells uniformly distributed and the introduction of multiple cell types with positional specificity.
Details
Keywords
Vennan Sibanda, Khumbulani Mpofu and John Trimble
In manufacturing, dedicated machine tools and flexible machine tools are failing to satisfy the ever-changing manufacturing demands of short life cycles and dynamic nature of…
Abstract
Purpose
In manufacturing, dedicated machine tools and flexible machine tools are failing to satisfy the ever-changing manufacturing demands of short life cycles and dynamic nature of products. These machines are limited when new product designs are introduced. The solution lies in developing responsive machines that can be adjusted or be changed functionally when these change requirements arise. These machines are reconfigurable machines which are becoming the new focus, as they rapidly respond to product variety and volume changes. A sheet metal working machine known as a reconfigurable guillotine shear and bending press machine (RGS&BPM) has been developed. The purpose of this paper is to present a methodology, function-oriented design approach (FODA), which was developed for the design of the RGS&BPM.
Design/methodology/approach
The design of the machine is based on the six principles of reconfigurable manufacturing systems (RMSs), namely, modularity, scalability integrability, convertibility, diagnosability and customisability. The methodology seeks to optimise the design process of the RGS&BPM through a design of modules that make up the machine, enable its conversion and reconfiguration. The FODA is focussed on function identification to select the operational function required. Two main functions are recognised for the machine, these being cutting and bending; hence, the design revolves around these two and reconfigurability.
Findings
The developed design methodology was tested in the design of a prototype for the reconfigurable guillotine shear and bending press machine. The prototype is currently being manufactured and will be subjected to functional tests once completed. This paper is being presented not only to present the methodology by to show and highlight its practical applicability, as the prototype manufacturers have been enthusiastic about this new approach.
Research limitations/implications
The research was limited to the design methodology for the RGS&BPM, the machine which has been designed to completion using this methodology, with prototype being manufactured.
Practical implications
This study presents critical steps and considerations in the development of reconfigurable machines. The main thrust being to explore the best possibility of developing the machines with dual functionality that will assist in availing the technology to manufacturer. As the machine has been development, the success of the design can be directly attributed to the FODA methodology, among other contributing factors. It also highlights the significance of the principles of RMS in reconfigurable machine design.
Social implications
The RGS&BM machine is an answer for the small-to-medium enterprises (SMEs), as the machine replaces two machines with one, and the methodology ensures its affordable design. It contributes immensely to the machine availability by eliminating trial and error approaches.
Originality/value
This study presents a new approach to the design of reconfigurable dual machines using principles of RMS. As the targeted market is the SME, it is not limited to that as any entrepreneur may use the machine to their advantage. The design methodology presented contributes to the body of knowledge in dual reconfigurable machine tool design.
Details
Keywords
Guanchen Liu, Dongdong Xu, Zifu Shen, Hongjie Xu and Liang Ding
As an advanced manufacturing method, additive manufacturing (AM) technology provides new possibilities for efficient production and design of parts. However, with the continuous…
Abstract
Purpose
As an advanced manufacturing method, additive manufacturing (AM) technology provides new possibilities for efficient production and design of parts. However, with the continuous expansion of the application of AM materials, subtractive processing has become one of the necessary steps to improve the accuracy and performance of parts. In this paper, the processing process of AM materials is discussed in depth, and the surface integrity problem caused by it is discussed.
Design/methodology/approach
Firstly, we listed and analyzed the characterization parameters of metal surface integrity and its influence on the performance of parts and then introduced the application of integrated processing of metal adding and subtracting materials and the influence of different processing forms on the surface integrity of parts. The surface of the trial-cut material is detected and analyzed, and the surface of the integrated processing of adding and subtracting materials is compared with that of the pure processing of reducing materials, so that the corresponding conclusions are obtained.
Findings
In this process, we also found some surface integrity problems, such as knife marks, residual stress and thermal effects. These problems may have a potential negative impact on the performance of the final parts. In processing, we can try to use other integrated processing technologies of adding and subtracting materials, try to combine various integrated processing technologies of adding and subtracting materials, or consider exploring more efficient AM technology to improve processing efficiency. We can also consider adopting production process optimization measures to reduce the processing cost of adding and subtracting materials.
Originality/value
With the gradual improvement of the requirements for the surface quality of parts in the production process and the in-depth implementation of sustainable manufacturing, the demand for integrated processing of metal addition and subtraction materials is likely to continue to grow in the future. By deeply understanding and studying the problems of material reduction and surface integrity of AM materials, we can better meet the challenges in the manufacturing process and improve the quality and performance of parts. This research is very important for promoting the development of manufacturing technology and achieving success in practical application.
Details
Keywords
Chang Liu, Shiwu Yang, Yixuan Yang, Hefei Cao and Shanghe Liu
In the continuous development of high-speed railways, ensuring the safety of the operation control system is crucial. Electromagnetic interference (EMI) faults in signaling…
Abstract
Purpose
In the continuous development of high-speed railways, ensuring the safety of the operation control system is crucial. Electromagnetic interference (EMI) faults in signaling equipment may cause transportation interruptions, delays and even threaten the safety of train operations. Exploring the impact of disturbances on signaling equipment and establishing evaluation methods for the correlation between EMI and safety is urgently needed.
Design/methodology/approach
This paper elaborates on the necessity and significance of studying the impact of EMI as an unavoidable and widespread risk factor in the external environment of high-speed railway operations and continuous development. The current status of research methods and achievements from the perspectives of standard systems, reliability analysis and safety assessment are examined layer by layer. Additionally, it provides prospects for innovative ideas for exploring the quantitative correlation between EMI and signaling safety.
Findings
Despite certain innovative achievements in both domestic and international standard systems and related research for ensuring and evaluating railway signaling safety, there’s a lack of quantitative and strategic research on the degradation of safety performance in signaling equipment due to EMI. A quantitative correlation between EMI and safety has yet to be established. On this basis, this paper proposes considerations for research methods pertaining to the correlation between EMI and safety.
Originality/value
This paper overviews a series of methods and outcomes derived from domestic and international studies regarding railway signaling safety, encompassing standard systems, reliability analysis and safety assessment. Recognizing the necessity for quantitatively describing and predicting the impact of EMI on high-speed railway signaling safety, an innovative approach using risk assessment techniques as a bridge to establish the correlation between EMI and signaling safety is proposed.
Details
Keywords
Sung Min Kim, Gopesh Anand, Eric C. Larson and Joseph Mahoney
Enterprise systems are commonly implemented by firms through outsourcing arrangements with software vendors. However, deriving benefits from these implementations has proved to be…
Abstract
Purpose
Enterprise systems are commonly implemented by firms through outsourcing arrangements with software vendors. However, deriving benefits from these implementations has proved to be a challenge, and a great deal of variation has been observed in the extent of value generated for client and vendor firms. This research examines the role of co-specialization as a strategy to make the most out of outsourced enterprise systems. The authors develop hypotheses relating resource co-specialization with two indicators of success for implementation of enterprise software: (1) exchange success and (2) firm growth.
Design/methodology/approach
The hypotheses are tested using a unique panel data set of 175 firms adopting Advanced Planning and Scheduling (APS) software, a type of enterprise system used for managing manufacturing and logistics. The authors identify organizational factors that support co-specialization and then examine how co-specialization is associated with enterprise software implementation success, controlling for the endogenous choice to co-specialize.
Findings
The empirical results suggest that resource co-specialization is positively associated with implementation success and that the two resource co-specialization pathways that are examined complement each other in providing performance benefits.
Originality/value
This paper contributes to the research literature on outsourcing. The study also provides a new empirical test using a unique data set of 175 firms adopting APS Software.
Details
Keywords
Xiaochun Guan, Sheng Lou, Han Li and Tinglong Tang
Deployment of deep neural networks on embedded devices is becoming increasingly popular because it can reduce latency and energy consumption for data communication. This paper…
Abstract
Purpose
Deployment of deep neural networks on embedded devices is becoming increasingly popular because it can reduce latency and energy consumption for data communication. This paper aims to give out a method for deployment the deep neural networks on a quad-rotor aircraft for further expanding its application scope.
Design/methodology/approach
In this paper, a design scheme is proposed to implement the flight mission of the quad-rotor aircraft based on multi-sensor fusion. It integrates attitude acquisition module, global positioning system position acquisition module, optical flow sensor, ultrasonic sensor and Bluetooth communication module, etc. A 32-bit microcontroller is adopted as the main controller for the quad-rotor aircraft. To make the quad-rotor aircraft be more intelligent, the study also proposes a method to deploy the pre-trained deep neural networks model on the microcontroller based on the software packages of the RT-Thread internet of things operating system.
Findings
This design provides a simple and efficient design scheme to further integrate artificial intelligence (AI) algorithm for the control system design of quad-rotor aircraft.
Originality/value
This method provides an application example and a design reference for the implementation of AI algorithms on unmanned aerial vehicle or terminal robots.
Details
Keywords
This paper analyzes how information systems (IS) can serve as tools of neo-colonial control in offshore outsourcing of research and development work. It draws on critical work…
Abstract
Purpose
This paper analyzes how information systems (IS) can serve as tools of neo-colonial control in offshore outsourcing of research and development work. It draws on critical work examining business and knowledge process outsourcing.
Design/methodology/approach
The paper reports an empirical study of how laboratory information management systems (LIMS) shape offshore outsourcing practices involving Western client firms and Indian contract research organizations (CROs) in the pharmaceutical industry. The study adopted a multi-actor perspective, involving interviews with representatives of Western clients, Indian CROs, system validation auditors, and software vendors. The analysis was iterative and interpretative, guided by postcolonial sensitivity to themes of power and control.
Findings
The study found that LIMS act as tools of neo-colonial control at three levels. As Western clients specify particular brands of LIMS, they create a hierarchy among local CROs and impact the development of the local LIMS industry. At inter-organizational level, LIMS shape relationships by allowing remote, real-time and retrospective surveillance of CROs’ work. At individual level, the ability of LIMS to support micro-modularizing of research leads to routinization of scientific discovery, negatively impacting scientists’ work satisfaction.
Originality/value
By examining multiple actors’ perceptions of IS, this paper looks beyond the rhetoric of system efficiency characteristic of most international business research. As it explores dynamics of power and control surrounding IS, it also questions the proposition that outsourcing of high-end work will move emerging economies upstream in the value chain.
Details
Keywords
Ahmed H. Al-Dmour, Masam Abood and Hani H. Al-Dmour
This study aims at investigating the extent of SysTrust’s framework (principles and criteria) as an internal control approach for assuring the reliability of accounting…
Abstract
Purpose
This study aims at investigating the extent of SysTrust’s framework (principles and criteria) as an internal control approach for assuring the reliability of accounting information system (AIS) were being implemented in Jordanian business organizations.
Design/methodology/approach
The study is based on primary data collected through a structured questionnaire from 239 out of 328 shareholdings companies. The survey units were the shareholding companies in Jordan, and the single key respondents approach was adopted. The extents of SysTrust principles were also measured. Previously validated instruments were used where required. The data were analysed using t-test and ANOVA.
Findings
The results indicated that the extent of SysTrust being implemented could be considered to be moderate at this stage. This implies that there are some variations among business organizations in terms of their level of implementing of SysTrust principles and criteria. The results also showed that the extent of SysTrust principles being implemented was varied among business organizations based on their business sector. However, there were not found varied due to their size of business and a length of time in business (experience).
Research limitations/implications
This study is only conducted in Jordan as a developing country. Although Jordan is a valid indicator of prevalent factors in the wider MENA region and developing countries, the lack of external validity of this research means that any generalization of the research findings should be made with caution. Future research can be orientated to other national and cultural settings and compared with the results of this study.
Practical implications
The study provides evidence of the need for management to recognize the importance of the implementation of SysTrust principles and criteria as an internal control for assuring the reliability of AIS within their organizations and be aware which of these principles are appropriate to their size and industry sector.
Originality/value
The findings would be valuable for academic researchers, managers and professional accounting to acquire a better undemanding of the current status of the implementation of the SysTrust principles (i.e., availability, security, integrity processing, confidentiality, and privacy) as an internal control method for assuring the reliability of AIS by testing the phenomenon in Jordan as a developing country.
Details
Keywords
Edward Ayebeng Botchway, Kofi Agyekum, Hayford Pittri and Anthony Lamina
This study explores the importance of and vulnerabilities in deploying physical access control (PAC) devices in a typical university setting.
Abstract
Purpose
This study explores the importance of and vulnerabilities in deploying physical access control (PAC) devices in a typical university setting.
Design/methodology/approach
The study adopts face-to-face and telephone interviews. This study uses a semi-structured interview guide to solicit the views of 25 interviewees on the subject under consideration. Qualitative responses to the interview are thematically analyzed using NVivo 11 Pro analysis application software.
Findings
The findings reveal five importance and seven vulnerabilities in the deployment of PAC devices in the institution. Key among the importance of deploying the devices are “prevent unwanted premise access or intrusions,” “prevent disruptions to university/staff operations on campus” and “protect students and staff from outside intruders.” Key among the identified vulnerabilities are “tailgating”, “delay in emergent cases” and “power outage may affect its usage.”
Originality/value
This study offers insight into a rare area of study, especially in the Sub-Saharan Africa region. Furthermore, the study contributes to the state-of-the-art importance and vulnerabilities in deploying PAC devices in daily human activities. The study is valuable in that it has the potential to establish a foundation for future studies that may delve into investigating issues associated with the deployment of PAC devices.
Details
Keywords
The issue of cybersecurity has been cast as the focal point of a fight between two conflicting governance models: the nation-state model of national security and the global…
Abstract
Purpose
The issue of cybersecurity has been cast as the focal point of a fight between two conflicting governance models: the nation-state model of national security and the global governance model of multi-stakeholder collaboration, as seen in forums like IGF, IETF, ICANN, etc. There is a strange disconnect, however, between this supposed fight and the actual control over cybersecurity “on the ground”. This paper aims to reconnect discourse and control via a property rights approach, where control is located first and foremost in ownership.
Design/methodology/approach
This paper first conceptualizes current governance mechanisms through ownership and property rights. These concepts locate control over internet resources. They also help us understand ongoing shifts in control. Such shifts in governance are actually happening, security governance is being patched left and right, but these arrangements bear little resemblance to either the national security model of states or the global model of multi-stakeholder collaboration. With the conceptualization in hand, the paper then presents case studies of governance that have emerged around specific security externalities.
Findings
While not all mechanisms are equally effective, in each of the studied areas, the author found evidence of private actors partially internalizing the externalities, mostly on a voluntary basis and through network governance mechanisms. No one thinks that this is enough, but it is a starting point. Future research is needed to identify how these mechanisms can be extended or supplemented to further improve the governance of cybersecurity.
Originality/value
This paper bridges together the disconnected research communities on governance and (technical) cybersecurity.
Details