Search results

1 – 10 of 56
Article
Publication date: 29 February 2024

Atefeh Hemmati, Mani Zarei and Amir Masoud Rahmani

Big data challenges and opportunities on the Internet of Vehicles (IoV) have emerged as a transformative paradigm to change intelligent transportation systems. With the growth of…

Abstract

Purpose

Big data challenges and opportunities on the Internet of Vehicles (IoV) have emerged as a transformative paradigm to change intelligent transportation systems. With the growth of data-driven applications and the advances in data analysis techniques, the potential for data-adaptive innovation in IoV applications becomes an outstanding development in future IoV. Therefore, this paper aims to focus on big data in IoV and to provide an analysis of the current state of research.

Design/methodology/approach

This review paper uses a systematic literature review methodology. It conducts a thorough search of academic databases to identify relevant scientific articles. By reviewing and analyzing the primary articles found in the big data in the IoV domain, 45 research articles from 2019 to 2023 were selected for detailed analysis.

Findings

This paper discovers the main applications, use cases and primary contexts considered for big data in IoV. Next, it documents challenges, opportunities, future research directions and open issues.

Research limitations/implications

This paper is based on academic articles published from 2019 to 2023. Therefore, scientific outputs published before 2019 are omitted.

Originality/value

This paper provides a thorough analysis of big data in IoV and considers distinct research questions corresponding to big data challenges and opportunities in IoV. It also provides valuable insights for researchers and practitioners in evolving this field by examining the existing fields and future directions for big data in the IoV ecosystem.

Details

International Journal of Pervasive Computing and Communications, vol. 20 no. 2
Type: Research Article
ISSN: 1742-7371

Keywords

Abstract

Details

Organization and Governance Using Algorithms
Type: Book
ISBN: 978-1-83797-060-5

Article
Publication date: 4 June 2024

Subhi Jleilaty, Anas Ammounah, Ghiath Abdulmalek, Lydie Nouveliere, Hang Su and Samer Alfayad

This paper aims to develop an adaptable control architecture for electrohydraulic humanoid robots (HYDROïD) that emulate the functionality of the human nervous system. The…

Abstract

Purpose

This paper aims to develop an adaptable control architecture for electrohydraulic humanoid robots (HYDROïD) that emulate the functionality of the human nervous system. The developed control architecture overcomes the limitations of classical centralized and decentralized systems by distributing intelligence across controllers.

Design/methodology/approach

The proposed solution is a distributed real-time control architecture with robot operating system (ROS). The joint controllers have the intelligence to make decisions, dominate their actuators and publish their state. The real-time capabilities are ensured in the master controller by using a Preempt-RT kernel beside open robot control software middleware to operate the real-time tasks and in the customized joint controllers by free real-time operating systems firmware. Systems can be either centralized, where all components are connected to a central unit or decentralized, where distributed units act as interfaces between the I/Os and the master controller when the master controller is without the ability to make decisions.

Findings

The proposed architecture establishes a versatile and adaptive control framework. It features a centralized hardware topology with a master PC and distributed joint controllers, while the software architecture adapts based on the task. It operates in a distributed manner for precise, force-independent motions and in a decentralized manner for tasks requiring compliance and force control. This design enables the examination of the sensorimotor loop at both low-level joint controllers and the high-level master controller.

Originality/value

It developed a control architecture emulating the functionality of the human nervous system. The experimental validations were performed on the HYDROïD. The results demonstrated 50% advancements in the update rate compared to other humanoids and 30% in the latency of the master processor and the control tasks.

Details

Robotic Intelligence and Automation, vol. 44 no. 4
Type: Research Article
ISSN: 2754-6969

Keywords

Article
Publication date: 21 November 2023

Anandika Sharma, Tarunpreet Bhatia, Rohit Kumar Singh and Anupam Sharma

The food supply chain has faced many challenges due to its complex and complicated nature. Blockchain technology is one of the mechanisms used to improve agri-food supply chain…

Abstract

Purpose

The food supply chain has faced many challenges due to its complex and complicated nature. Blockchain technology is one of the mechanisms used to improve agri-food supply chain processes by evolving organization capabilities. A study is being conducted to scrutinize the adoption of blockchain technology in the agri-food supply chain through the lens of the operational capability approach. It further makes an attempt to identify the capabilities of blockchain to improve supply chain processes.

Design/methodology/approach

The qualitative research method with semi-structured interviews was used to gather information from experts and professionals in the food supply chain and blockchain technology. The authors have adopted a systematic approach of coding using open, axial and selective methods to depict and identify the themes that represent the blockchain-enabled agri-food supply chain. The data were collected from 32 interviews of selected participants.

Findings

The result shows five critical areas where blockchain can come up to enhance the agri-food supply chain performance by providing traceability, transparency, information security, transactions, and trust and quality. Further, the study reveals that blockchain will provide safety, lower the cost of transactions and can create trust among users to communicate within the whole supply chain without the intervention of a third party. This study demonstrated that the capabilities need to be considered when introducing technology into the practice.

Research limitations/implications

The study implies thought-provoking implications for bridging the theory-practice gap by examining the empirical data to demonstrate how the operational capabilities of blockchain technology further strengthen the agri-food supply chain. Additionally, this study provides some suggestions for utilizing the results and proposes a framework to understand more about blockchain use cases in the agri-food supply chain as well as extend the application of blockchain using an operational capability approach for future academic researchers in this area.

Practical implications

This study presented some more important managerial implications which reveal that the majority of organisations were in the initial stages of adoption process of blockchain technology. Further, the positive influence of managers and IT experts can help the information technology companies (IT) and stakeholders for developing and promoting blockchain solutions in the agri-food supply chain. The important implication of blockchain enabled agri-food supply chain is to maintain information security and incresae supply chain performance.

Originality/value

The study shows the operational capabilities of agri-food supply chain using blockchain technology. Blockchain can contribute in enhancing the agri-food supply chain to increase traceability and transparency and helps to reduce the risk of disruptions.

Details

Business Process Management Journal, vol. 30 no. 1
Type: Research Article
ISSN: 1463-7154

Keywords

Article
Publication date: 26 April 2024

Yansen Wu, Dongsheng Wen, Anmin Zhao, Haobo Liu and Ke Li

This study aims to study the thermal identification issue by harvesting both solar energy and atmospheric thermal updraft for a solar-powered unmanned aerial vehicle (SUAV) and…

Abstract

Purpose

This study aims to study the thermal identification issue by harvesting both solar energy and atmospheric thermal updraft for a solar-powered unmanned aerial vehicle (SUAV) and its electric energy performance under continuous soaring conditions.

Design/methodology/approach

The authors develop a specific dynamic model for SUAVs in both soaring and cruise modes. The support vector machine regression (SVMR) is adopted to estimate the thermal position, and it is combined with feedback control to implement the SUAV soaring in the updraft. Then, the optimal path model is built based on the graph theory considering the existence of several thermals distributed in the environment. The procedure is proposed to estimate the electricity cost of SUAV during flight as well as soaring, and making use of dynamic programming to maximize electric energy.

Findings

The simulation results present the integrated control method could allow SUAV to soar with the updraft. In addition, the proposed approach allows the SUAV to fly to the destination using distributed thermals while reducing the electric energy use.

Originality/value

Two simplified dynamic models are constructed for simulation considering there are different flight mode. Besides, the data-driven-based SVMR method is proposed to support SUAV soaring. Furthermore, instead of using length, the energy cost coefficient in optimization problem is set as electric power, which is more suitable for SUAV because its advantage is to transfer the three-dimensional path planning problem into the two-dimensional.

Details

Aircraft Engineering and Aerospace Technology, vol. 96 no. 4
Type: Research Article
ISSN: 1748-8842

Keywords

Article
Publication date: 22 December 2023

Vaclav Snasel, Tran Khanh Dang, Josef Kueng and Lingping Kong

This paper aims to review in-memory computing (IMC) for machine learning (ML) applications from history, architectures and options aspects. In this review, the authors investigate…

130

Abstract

Purpose

This paper aims to review in-memory computing (IMC) for machine learning (ML) applications from history, architectures and options aspects. In this review, the authors investigate different architectural aspects and collect and provide our comparative evaluations.

Design/methodology/approach

Collecting over 40 IMC papers related to hardware design and optimization techniques of recent years, then classify them into three optimization option categories: optimization through graphic processing unit (GPU), optimization through reduced precision and optimization through hardware accelerator. Then, the authors brief those techniques in aspects such as what kind of data set it applied, how it is designed and what is the contribution of this design.

Findings

ML algorithms are potent tools accommodated on IMC architecture. Although general-purpose hardware (central processing units and GPUs) can supply explicit solutions, their energy efficiencies have limitations because of their excessive flexibility support. On the other hand, hardware accelerators (field programmable gate arrays and application-specific integrated circuits) win on the energy efficiency aspect, but individual accelerator often adapts exclusively to ax single ML approach (family). From a long hardware evolution perspective, hardware/software collaboration heterogeneity design from hybrid platforms is an option for the researcher.

Originality/value

IMC’s optimization enables high-speed processing, increases performance and analyzes massive volumes of data in real-time. This work reviews IMC and its evolution. Then, the authors categorize three optimization paths for the IMC architecture to improve performance metrics.

Details

International Journal of Web Information Systems, vol. 20 no. 1
Type: Research Article
ISSN: 1744-0084

Keywords

Book part
Publication date: 25 October 2023

Ali Katouzian Bolourforoush and Hamid Jahankhani

Banking traces back to 2000 BC in Assyria, India and Sumeria. Merchants used to give grain loans to farmers and traders to carry goods between cities. In ancient Greece and Roman…

Abstract

Banking traces back to 2000 BC in Assyria, India and Sumeria. Merchants used to give grain loans to farmers and traders to carry goods between cities. In ancient Greece and Roman Empire, lenders in temples, provided loans, and accepted deposits while performed change of money. The archaeological evidence uncovered in India and China corroborates this. The major development in banking came predominantly in the mediaeval, Renaissance Italy, with the major cities Florence, Venice and Genoa being the financial centres. Technology has become an inherent and integral part of our lives. We are generating a huge amount of data in transfer, storage and usage, with greater demands of ubiquitous accessibility, inducing an enormous impact on industry and society. With the emergence of smarter cities and societies, the security challenges pertinent to data become greater, impending impact on the consumer protection and security. The aim of this chapter is to highlight if SSI and passwordless authentication using FIDO-2 protocol assuage security concerns such as authentication and authorisation while preserving the individual's privacy.

Details

Technology and Talent Strategies for Sustainable Smart Cities
Type: Book
ISBN: 978-1-83753-023-6

Keywords

Article
Publication date: 4 March 2024

Betul Gokkaya, Erisa Karafili, Leonardo Aniello and Basel Halak

The purpose of this study is to increase awareness of current supply chain (SC) security-related issues by providing an extensive analysis of existing SC security solutions and…

Abstract

Purpose

The purpose of this study is to increase awareness of current supply chain (SC) security-related issues by providing an extensive analysis of existing SC security solutions and their limitations. The security of SCs has received increasing attention from researchers, due to the emerging risks associated with their distributed nature. The increase in risk in SCs comes from threats that are inherently similar regardless of the type of SC, thus, requiring similar defence mechanisms. Being able to identify the types of threats will help developers to build effective defences.

Design/methodology/approach

In this work, we provide an analysis of the threats, possible attacks and traceability solutions for SCs, and highlight outstanding problems. Through a comprehensive literature review (2015–2021), we analysed various SC security solutions, focussing on tracking solutions. In particular, we focus on three types of SCs: digital, food and pharmaceutical that are considered prime targets for cyberattacks. We introduce a systematic categorization of threats and discuss emerging solutions for prevention and mitigation.

Findings

Our study shows that the current traceability solutions for SC systems do not offer a broadened security analysis and fail to provide extensive protection against cyberattacks. Furthermore, global SCs face common challenges, as there are still unresolved issues, especially those related to the increasing SC complexity and interconnectivity, where cyberattacks are spread across suppliers.

Originality/value

This is the first time that a systematic categorization of general threats for SC is made based on an existing threat model for hardware SC.

Details

Benchmarking: An International Journal, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 1463-5771

Keywords

Article
Publication date: 29 May 2023

Christopher S. Dutt and Chris Ryan

This paper examines why individuals start their hospitality careers by becoming temporary lifeguards while aspiring to later promotion. It reports data from young people working…

Abstract

Purpose

This paper examines why individuals start their hospitality careers by becoming temporary lifeguards while aspiring to later promotion. It reports data from young people working in one major upmarket hotel chain that operates in the Gulf but has a global reach. This study aims to address issues regarding this often-overlooked career path for young staff.

Design/methodology/approach

A qualitative questionnaire was distributed to lifeguards working in a luxury hotel chain in a Gulf country to explore their reasons for working as a lifeguard and their experiences in this role. Data were analysed using QDA Miner and WordStat to generate coherence and similarity indices.

Findings

It is found that the attractions include good training with a well-established company operating in an upmarket location, but other important factors include career prospects, skill enhancement, self-development, monetary savings and experience working in one of the world’s most exciting tourist locations.

Practical implications

The results offer implications for management looking to recruit expatriate labour without considering long-term employment or residence. Nonetheless, while this offers opportunities to assess many potential long-term employees, there are costs to the practice.

Originality/value

Little research has been conducted on lifeguards and how employment in such roles can develop careers in hospitality. The study contributes to understanding motives and career development and conceptually suggests that liminal status complements those drawn to protean career development. The results shed light on how new employees, including management trainees, undertake liminal, protean careers, to care for family, develop their careers and enter markets that may otherwise be difficult to enter.

Details

International Journal of Contemporary Hospitality Management, vol. 36 no. 3
Type: Research Article
ISSN: 0959-6119

Keywords

Book part
Publication date: 7 February 2024

Elveta D. Smith

The years following the 9/11/2001 terrorists attacks saw a marked increase in community and hospital emergency preparedness, from communications across community networks…

Abstract

Purpose

The years following the 9/11/2001 terrorists attacks saw a marked increase in community and hospital emergency preparedness, from communications across community networks, development of policies and procedures, to attainment and training in the use of biological warfare resources. Regular drills ensured emergency and health care personnel were trained and prepared to address the next large-scale crisis, especially from terrorist and bioterrorist attacks. This chapter looks at some of the more familiar global health issues over the past two decades and the lessons learned from hospital responses to inform hospital management in preparation for future incidents.

Search Methods

This study is a narrative review of the literature related to lessons learned from four major events in the time period from 2002 to 2023 – SARS, MERS, Ebola, and COVID-19.

Search Results

The initial search yielded 25,913 articles; 57 articles were selected for inclusion in the study.

Discussion and Conclusions

Comparison of key issues and lessons learned among the four major events described in this article – SARS, MERS, Ebola, and COVID-19 – highlight that several lessons are “relearned” with each event. Other key issues, such as supply shortages, staffing availability, and hospital capacity to simultaneously provide care to noninfectious patients came to the forefront during the COVID-19 pandemic. A primary, ongoing concern for hospitals is how to maintain their preparedness given competing priorities, resources, and staff time. This concern remains post-COVID-19.

Details

Research and Theory to Foster Change in the Face of Grand Health Care Challenges
Type: Book
ISBN: 978-1-83797-655-3

Keywords

1 – 10 of 56