Search results
1 – 10 of 56Atefeh Hemmati, Mani Zarei and Amir Masoud Rahmani
Big data challenges and opportunities on the Internet of Vehicles (IoV) have emerged as a transformative paradigm to change intelligent transportation systems. With the growth of…
Abstract
Purpose
Big data challenges and opportunities on the Internet of Vehicles (IoV) have emerged as a transformative paradigm to change intelligent transportation systems. With the growth of data-driven applications and the advances in data analysis techniques, the potential for data-adaptive innovation in IoV applications becomes an outstanding development in future IoV. Therefore, this paper aims to focus on big data in IoV and to provide an analysis of the current state of research.
Design/methodology/approach
This review paper uses a systematic literature review methodology. It conducts a thorough search of academic databases to identify relevant scientific articles. By reviewing and analyzing the primary articles found in the big data in the IoV domain, 45 research articles from 2019 to 2023 were selected for detailed analysis.
Findings
This paper discovers the main applications, use cases and primary contexts considered for big data in IoV. Next, it documents challenges, opportunities, future research directions and open issues.
Research limitations/implications
This paper is based on academic articles published from 2019 to 2023. Therefore, scientific outputs published before 2019 are omitted.
Originality/value
This paper provides a thorough analysis of big data in IoV and considers distinct research questions corresponding to big data challenges and opportunities in IoV. It also provides valuable insights for researchers and practitioners in evolving this field by examining the existing fields and future directions for big data in the IoV ecosystem.
Details
Keywords
Subhi Jleilaty, Anas Ammounah, Ghiath Abdulmalek, Lydie Nouveliere, Hang Su and Samer Alfayad
This paper aims to develop an adaptable control architecture for electrohydraulic humanoid robots (HYDROïD) that emulate the functionality of the human nervous system. The…
Abstract
Purpose
This paper aims to develop an adaptable control architecture for electrohydraulic humanoid robots (HYDROïD) that emulate the functionality of the human nervous system. The developed control architecture overcomes the limitations of classical centralized and decentralized systems by distributing intelligence across controllers.
Design/methodology/approach
The proposed solution is a distributed real-time control architecture with robot operating system (ROS). The joint controllers have the intelligence to make decisions, dominate their actuators and publish their state. The real-time capabilities are ensured in the master controller by using a Preempt-RT kernel beside open robot control software middleware to operate the real-time tasks and in the customized joint controllers by free real-time operating systems firmware. Systems can be either centralized, where all components are connected to a central unit or decentralized, where distributed units act as interfaces between the I/Os and the master controller when the master controller is without the ability to make decisions.
Findings
The proposed architecture establishes a versatile and adaptive control framework. It features a centralized hardware topology with a master PC and distributed joint controllers, while the software architecture adapts based on the task. It operates in a distributed manner for precise, force-independent motions and in a decentralized manner for tasks requiring compliance and force control. This design enables the examination of the sensorimotor loop at both low-level joint controllers and the high-level master controller.
Originality/value
It developed a control architecture emulating the functionality of the human nervous system. The experimental validations were performed on the HYDROïD. The results demonstrated 50% advancements in the update rate compared to other humanoids and 30% in the latency of the master processor and the control tasks.
Details
Keywords
Anandika Sharma, Tarunpreet Bhatia, Rohit Kumar Singh and Anupam Sharma
The food supply chain has faced many challenges due to its complex and complicated nature. Blockchain technology is one of the mechanisms used to improve agri-food supply chain…
Abstract
Purpose
The food supply chain has faced many challenges due to its complex and complicated nature. Blockchain technology is one of the mechanisms used to improve agri-food supply chain processes by evolving organization capabilities. A study is being conducted to scrutinize the adoption of blockchain technology in the agri-food supply chain through the lens of the operational capability approach. It further makes an attempt to identify the capabilities of blockchain to improve supply chain processes.
Design/methodology/approach
The qualitative research method with semi-structured interviews was used to gather information from experts and professionals in the food supply chain and blockchain technology. The authors have adopted a systematic approach of coding using open, axial and selective methods to depict and identify the themes that represent the blockchain-enabled agri-food supply chain. The data were collected from 32 interviews of selected participants.
Findings
The result shows five critical areas where blockchain can come up to enhance the agri-food supply chain performance by providing traceability, transparency, information security, transactions, and trust and quality. Further, the study reveals that blockchain will provide safety, lower the cost of transactions and can create trust among users to communicate within the whole supply chain without the intervention of a third party. This study demonstrated that the capabilities need to be considered when introducing technology into the practice.
Research limitations/implications
The study implies thought-provoking implications for bridging the theory-practice gap by examining the empirical data to demonstrate how the operational capabilities of blockchain technology further strengthen the agri-food supply chain. Additionally, this study provides some suggestions for utilizing the results and proposes a framework to understand more about blockchain use cases in the agri-food supply chain as well as extend the application of blockchain using an operational capability approach for future academic researchers in this area.
Practical implications
This study presented some more important managerial implications which reveal that the majority of organisations were in the initial stages of adoption process of blockchain technology. Further, the positive influence of managers and IT experts can help the information technology companies (IT) and stakeholders for developing and promoting blockchain solutions in the agri-food supply chain. The important implication of blockchain enabled agri-food supply chain is to maintain information security and incresae supply chain performance.
Originality/value
The study shows the operational capabilities of agri-food supply chain using blockchain technology. Blockchain can contribute in enhancing the agri-food supply chain to increase traceability and transparency and helps to reduce the risk of disruptions.
Details
Keywords
Yansen Wu, Dongsheng Wen, Anmin Zhao, Haobo Liu and Ke Li
This study aims to study the thermal identification issue by harvesting both solar energy and atmospheric thermal updraft for a solar-powered unmanned aerial vehicle (SUAV) and…
Abstract
Purpose
This study aims to study the thermal identification issue by harvesting both solar energy and atmospheric thermal updraft for a solar-powered unmanned aerial vehicle (SUAV) and its electric energy performance under continuous soaring conditions.
Design/methodology/approach
The authors develop a specific dynamic model for SUAVs in both soaring and cruise modes. The support vector machine regression (SVMR) is adopted to estimate the thermal position, and it is combined with feedback control to implement the SUAV soaring in the updraft. Then, the optimal path model is built based on the graph theory considering the existence of several thermals distributed in the environment. The procedure is proposed to estimate the electricity cost of SUAV during flight as well as soaring, and making use of dynamic programming to maximize electric energy.
Findings
The simulation results present the integrated control method could allow SUAV to soar with the updraft. In addition, the proposed approach allows the SUAV to fly to the destination using distributed thermals while reducing the electric energy use.
Originality/value
Two simplified dynamic models are constructed for simulation considering there are different flight mode. Besides, the data-driven-based SVMR method is proposed to support SUAV soaring. Furthermore, instead of using length, the energy cost coefficient in optimization problem is set as electric power, which is more suitable for SUAV because its advantage is to transfer the three-dimensional path planning problem into the two-dimensional.
Details
Keywords
Vaclav Snasel, Tran Khanh Dang, Josef Kueng and Lingping Kong
This paper aims to review in-memory computing (IMC) for machine learning (ML) applications from history, architectures and options aspects. In this review, the authors investigate…
Abstract
Purpose
This paper aims to review in-memory computing (IMC) for machine learning (ML) applications from history, architectures and options aspects. In this review, the authors investigate different architectural aspects and collect and provide our comparative evaluations.
Design/methodology/approach
Collecting over 40 IMC papers related to hardware design and optimization techniques of recent years, then classify them into three optimization option categories: optimization through graphic processing unit (GPU), optimization through reduced precision and optimization through hardware accelerator. Then, the authors brief those techniques in aspects such as what kind of data set it applied, how it is designed and what is the contribution of this design.
Findings
ML algorithms are potent tools accommodated on IMC architecture. Although general-purpose hardware (central processing units and GPUs) can supply explicit solutions, their energy efficiencies have limitations because of their excessive flexibility support. On the other hand, hardware accelerators (field programmable gate arrays and application-specific integrated circuits) win on the energy efficiency aspect, but individual accelerator often adapts exclusively to ax single ML approach (family). From a long hardware evolution perspective, hardware/software collaboration heterogeneity design from hybrid platforms is an option for the researcher.
Originality/value
IMC’s optimization enables high-speed processing, increases performance and analyzes massive volumes of data in real-time. This work reviews IMC and its evolution. Then, the authors categorize three optimization paths for the IMC architecture to improve performance metrics.
Details
Keywords
Ali Katouzian Bolourforoush and Hamid Jahankhani
Banking traces back to 2000 BC in Assyria, India and Sumeria. Merchants used to give grain loans to farmers and traders to carry goods between cities. In ancient Greece and Roman…
Abstract
Banking traces back to 2000 BC in Assyria, India and Sumeria. Merchants used to give grain loans to farmers and traders to carry goods between cities. In ancient Greece and Roman Empire, lenders in temples, provided loans, and accepted deposits while performed change of money. The archaeological evidence uncovered in India and China corroborates this. The major development in banking came predominantly in the mediaeval, Renaissance Italy, with the major cities Florence, Venice and Genoa being the financial centres. Technology has become an inherent and integral part of our lives. We are generating a huge amount of data in transfer, storage and usage, with greater demands of ubiquitous accessibility, inducing an enormous impact on industry and society. With the emergence of smarter cities and societies, the security challenges pertinent to data become greater, impending impact on the consumer protection and security. The aim of this chapter is to highlight if SSI and passwordless authentication using FIDO-2 protocol assuage security concerns such as authentication and authorisation while preserving the individual's privacy.
Details
Keywords
Betul Gokkaya, Erisa Karafili, Leonardo Aniello and Basel Halak
The purpose of this study is to increase awareness of current supply chain (SC) security-related issues by providing an extensive analysis of existing SC security solutions and…
Abstract
Purpose
The purpose of this study is to increase awareness of current supply chain (SC) security-related issues by providing an extensive analysis of existing SC security solutions and their limitations. The security of SCs has received increasing attention from researchers, due to the emerging risks associated with their distributed nature. The increase in risk in SCs comes from threats that are inherently similar regardless of the type of SC, thus, requiring similar defence mechanisms. Being able to identify the types of threats will help developers to build effective defences.
Design/methodology/approach
In this work, we provide an analysis of the threats, possible attacks and traceability solutions for SCs, and highlight outstanding problems. Through a comprehensive literature review (2015–2021), we analysed various SC security solutions, focussing on tracking solutions. In particular, we focus on three types of SCs: digital, food and pharmaceutical that are considered prime targets for cyberattacks. We introduce a systematic categorization of threats and discuss emerging solutions for prevention and mitigation.
Findings
Our study shows that the current traceability solutions for SC systems do not offer a broadened security analysis and fail to provide extensive protection against cyberattacks. Furthermore, global SCs face common challenges, as there are still unresolved issues, especially those related to the increasing SC complexity and interconnectivity, where cyberattacks are spread across suppliers.
Originality/value
This is the first time that a systematic categorization of general threats for SC is made based on an existing threat model for hardware SC.
Details
Keywords
Christopher S. Dutt and Chris Ryan
This paper examines why individuals start their hospitality careers by becoming temporary lifeguards while aspiring to later promotion. It reports data from young people working…
Abstract
Purpose
This paper examines why individuals start their hospitality careers by becoming temporary lifeguards while aspiring to later promotion. It reports data from young people working in one major upmarket hotel chain that operates in the Gulf but has a global reach. This study aims to address issues regarding this often-overlooked career path for young staff.
Design/methodology/approach
A qualitative questionnaire was distributed to lifeguards working in a luxury hotel chain in a Gulf country to explore their reasons for working as a lifeguard and their experiences in this role. Data were analysed using QDA Miner and WordStat to generate coherence and similarity indices.
Findings
It is found that the attractions include good training with a well-established company operating in an upmarket location, but other important factors include career prospects, skill enhancement, self-development, monetary savings and experience working in one of the world’s most exciting tourist locations.
Practical implications
The results offer implications for management looking to recruit expatriate labour without considering long-term employment or residence. Nonetheless, while this offers opportunities to assess many potential long-term employees, there are costs to the practice.
Originality/value
Little research has been conducted on lifeguards and how employment in such roles can develop careers in hospitality. The study contributes to understanding motives and career development and conceptually suggests that liminal status complements those drawn to protean career development. The results shed light on how new employees, including management trainees, undertake liminal, protean careers, to care for family, develop their careers and enter markets that may otherwise be difficult to enter.
Details
Keywords
The years following the 9/11/2001 terrorists attacks saw a marked increase in community and hospital emergency preparedness, from communications across community networks…
Abstract
Purpose
The years following the 9/11/2001 terrorists attacks saw a marked increase in community and hospital emergency preparedness, from communications across community networks, development of policies and procedures, to attainment and training in the use of biological warfare resources. Regular drills ensured emergency and health care personnel were trained and prepared to address the next large-scale crisis, especially from terrorist and bioterrorist attacks. This chapter looks at some of the more familiar global health issues over the past two decades and the lessons learned from hospital responses to inform hospital management in preparation for future incidents.
Search Methods
This study is a narrative review of the literature related to lessons learned from four major events in the time period from 2002 to 2023 – SARS, MERS, Ebola, and COVID-19.
Search Results
The initial search yielded 25,913 articles; 57 articles were selected for inclusion in the study.
Discussion and Conclusions
Comparison of key issues and lessons learned among the four major events described in this article – SARS, MERS, Ebola, and COVID-19 – highlight that several lessons are “relearned” with each event. Other key issues, such as supply shortages, staffing availability, and hospital capacity to simultaneously provide care to noninfectious patients came to the forefront during the COVID-19 pandemic. A primary, ongoing concern for hospitals is how to maintain their preparedness given competing priorities, resources, and staff time. This concern remains post-COVID-19.
Details