Search results

1 – 10 of 15
Article
Publication date: 6 March 2024

Mouna Zerzeri, Intissar Moussa and Adel Khedher

The purpose of this paper aims to design a robust wind turbine emulator (WTE) based on a three-phase induction motor (3PIM).

Abstract

Purpose

The purpose of this paper aims to design a robust wind turbine emulator (WTE) based on a three-phase induction motor (3PIM).

Design/methodology/approach

The 3PIM is driven by a soft voltage source inverter (VSI) controlled by a specific space vector modulation. By adjusting the appropriate vector sequence selection, the desired VSI output voltage allows a real wind turbine speed emulation in the laboratory, taking into account the wind profile, static and dynamic behaviors and parametric variations for theoretical and then experimental analysis. A Mexican hat profile and a sinusoidal profile are therefore used as the wind speed system input to highlight the electrical, mechanical and electromagnetic system response.

Findings

The simulation results, based on relative error data, show that the proposed reactive power control method effectively estimates the flux and the rotor time constant, thus ensuring an accurate trajectory tracking of the wind speed for the wind emulation application.

Originality/value

The proposed architecture achieves its results through the use of mathematical theory and WTE topology combine with an online adaptive estimator and Lyapunov stability adaptation control methods. These approaches are particularly relevant for low-cost or low-power alternative current (AC) motor drives in the field of renewable energy emulation. It has the advantage of eliminating the need for expensive and unreliable position transducers, thereby increasing the emulator drive life. A comparative analysis was also carried out to highlight the online adaptive estimator fast response time and accuracy.

Details

COMPEL - The international journal for computation and mathematics in electrical and electronic engineering , vol. 43 no. 2
Type: Research Article
ISSN: 0332-1649

Keywords

Article
Publication date: 5 March 2021

Chiemeka Loveth Maxwell, Dongsheng Yu and Yang Leng

The purpose of this paper is to design and construct an amplitude shift keying (ASK) modulator, which, using the digital binary modulating signal, controls a floating memristor…

Abstract

Purpose

The purpose of this paper is to design and construct an amplitude shift keying (ASK) modulator, which, using the digital binary modulating signal, controls a floating memristor emulator (MR) internally without the need for additional control circuits to achieve the ASK modulated wave.

Design/methodology/approach

A binary digital unipolar signal to be modulated is converted by a pre-processor circuit into a suitable bipolar modulating direct current (DC) signal for the control of the MR state, using current conveyors the carrier signal’s amplitude is varied with the change in the memristance of the floating MR. A high pass filter is then used to remove the DC control signal (modulating signal) leaving only the modulated carrier signal.

Findings

The results from the experiment and simulation are in agreement showed that the MR can be switched between two states and that a change in the carrier signals amplitude can be achieved by using an MR. Thus, showing that the circuit behavior is in line with the proposed theory and validating the said theory.

Originality/value

In this paper, the binary signal to be modulated is modified into a suitable control signal for the MR, thus the MR relies on the internal operation of the modulator circuit for the control of its memristance. An ASK modulation can then be achieved using a floating memristor without the need for additional circuits or signals to control its memristance.

Article
Publication date: 21 March 2023

Manikandan R. and Raja Singh R.

The purpose of this paper is to prevent the destruction of other parts of a wind energy conversion system because of faults, the diagnosis of insulated-gate bipolar transistor…

Abstract

Purpose

The purpose of this paper is to prevent the destruction of other parts of a wind energy conversion system because of faults, the diagnosis of insulated-gate bipolar transistor (IGBT) faults has become an essential topic of study. Demand for sustainable energy sources has been prompted by rising environmental pollution and energy requirements. Renewable energy has been identified as a viable substitute for conventional fossil fuel energy generation. Because of its rapid installation time and adaptable expenditure for construction scale, wind energy has emerged as a great energy resource. Power converter failure is particularly significant for the reliable operation of wind power conversion systems because it not only has a high yearly fault rate but also a prolonged downtime. The power converters will continue to operate even after the failure, especially the open-circuit fault, endangering their other parts and impairing their functionality.

Design/methodology/approach

The most widely used signal processing methods for locating open-switch faults in power devices are the short-time Fourier transform and wavelet transform (WT) – based on time–frequency analysis. To increase their effectiveness, these methods necessitate the intensive use of computational resources. This study suggests a fault detection technique using empirical mode decomposition (EMD) that examines the phase currents from a power inverter. Furthermore, the intrinsic mode function’s relative energy entropy (REE) and simple logical operations are used to locate IGBT open switch failures.

Findings

The presented scheme successfully locates and detects 21 various classes of IGBT faults that could arise in a two-level three-phase voltage source inverter (VSI). To verify the efficacy of the proposed fault diagnosis (FD) scheme, the test is performed under various operating conditions of the power converter and induction motor load. The proposed method outperforms existing FD schemes in the literature in terms of fault coverage and robustness.

Originality/value

This study introduces an EMD–IMF–REE-based FD method for VSIs in wind turbine systems, which enhances the effectiveness and robustness of the FD method.

Article
Publication date: 16 January 2024

Ji Fang, Vincent C.S. Lee and Haiyan Wang

This paper explores optimal service resource management strategy, a continuous challenge for health information service to enhance service performance, optimise service resource…

Abstract

Purpose

This paper explores optimal service resource management strategy, a continuous challenge for health information service to enhance service performance, optimise service resource utilisation and deliver interactive health information service.

Design/methodology/approach

An adaptive optimal service resource management strategy was developed considering a value co-creation model in health information service with a focus on collaborative and interactive with users. The deep reinforcement learning algorithm was embedded in the Internet of Things (IoT)-based health information service system (I-HISS) to allocate service resources by controlling service provision and service adaptation based on user engagement behaviour. The simulation experiments were conducted to evaluate the significance of the proposed algorithm under different user reactions to the health information service.

Findings

The results indicate that the proposed service resource management strategy, considering user co-creation in the service delivery, process improved both the service provider’s business revenue and users' individual benefits.

Practical implications

The findings may facilitate the design and implementation of health information services that can achieve a high user service experience with low service operation costs.

Originality/value

This study is amongst the first to propose a service resource management model in I-HISS, considering the value co-creation of the user in the service-dominant logic. The novel artificial intelligence algorithm is developed using the deep reinforcement learning method to learn the adaptive service resource management strategy. The results emphasise user engagement in the health information service process.

Details

Industrial Management & Data Systems, vol. 124 no. 3
Type: Research Article
ISSN: 0263-5577

Keywords

Article
Publication date: 17 August 2023

P.S. JosephNg

This study aims to highlight that security and flexibilities remain the main points of contention in the cordiality business. This research points to planning a framework that…

92

Abstract

Purpose

This study aims to highlight that security and flexibilities remain the main points of contention in the cordiality business. This research points to planning a framework that empowers hotel users to get to the room using a mobile access key. Advancing secured facilities, mobile phone “Near Field Communication” (NFC) innovation as the entrance device by carrying out an application containing an imitated mobile key for explicit verification access is used.

Design/methodology/approach

The proposed system is evaluated by triangulation of experimental, numerical and rational evaluation using partial least square structural equation modeling (PLS-SEM) with Malaysian hotel guests and employees.

Findings

The discoveries with the hypothesis supported validated that the suggested solution can eliminate physical cards, boost protection and encourage a contactless ecosystem. Theoretical, management and societal contributions are discussed here.

Research limitations/implications

This experiment comes with the constraints that it was conducted in only two hotels and does not fully reflect the choices of a wider range of travellers. Secondly, the cost of existing NFC smart locks is still relatively high, and along with the development of technology, the price will decrease when supply exceeds demand.

Practical implications

To promote high-security attributes, NFC technology as the access system by implementing an application containing an emulated smart key for specific authentication access is used. The host-card emulation enables cost-effectiveness profit and initiating a defence system in the pandemic era.

Social implications

To promote high-security attributes, NFC technology is used as the access system by implementing an application containing an emulated smart key for specific authentication access. The host-card emulation enables cost-effectiveness profit and initiating a defence system in the pandemic era.

Originality/value

The novelty of this study comes from the use of commonly available smartphone NFC features that are yet to be applied in the tourism ecosystem. The research provokes the applied concept of mobile smartkeys.

Details

Journal of Science and Technology Policy Management, vol. 15 no. 3
Type: Research Article
ISSN: 2053-4620

Keywords

Article
Publication date: 10 September 2024

Busra Ozdenizci Kose

The purpose of this study is to investigate the factors facilitating and influencing the adoption of DevOps practices specifically tailored to mobile software development, with a…

Abstract

Purpose

The purpose of this study is to investigate the factors facilitating and influencing the adoption of DevOps practices specifically tailored to mobile software development, with a focus on understanding the influence of mobile-specific requirements on DevOps integration.

Design/methodology/approach

The study employs a qualitative methodology, including a literature review, exploratory case research and partial quantitative assessments through DORA metrics and survey applications. This approach, guided by the Technology-Organization-Environment (TOE) framework, prioritizes in-depth insights into the adoption of DevOps practices and explores strategies for integrating DevOps in mobile software development.

Findings

The research identifies several key themes specific to Mobile DevOps adoption, including tool integration issues, testing complexities, deployment challenges and security concerns. These findings underscore the necessity for tailored DevOps solutions that can effectively address the unique demands of mobile software development. The study also proposes actionable strategies to overcome these challenges, thereby enhancing the efficiency, quality and security of mobile applications.

Practical implications

The insights gained from this study provide valuable guidance for practitioners in the mobile software development sector. By understanding and addressing the specific challenges of Mobile DevOps, organizations can improve their DevOps practices and achieve better outcomes in terms of project delivery speed, quality and security. For example, implementing robust testing strategies, investing in compatible tools and developing well-defined rollback procedures can significantly enhance Mobile DevOps effectiveness. Furthermore, incorporating continuous security measures and improving cross-functional collaboration can lead to more secure and efficient mobile application deployments.

Social implications

This study offers valuable starting points for researching Mobile DevOps in real-world settings, based on insights from practical DevOps implementations in a single-case organization. Organizations can use this information to compare their own DevOps approaches with those of the studied organization, and can facilitate self-assessment and improvement.

Originality/value

This study contributes to the limited literature on Mobile DevOps adoption and proposing actionable strategies. By incorporating the TOE framework, it provides a comprehensive guide that enhances understanding and management of DevOps practices throughout the mobile application development lifecycle and offers significant value to practitioners and researchers alike.

Details

Kybernetes, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 0368-492X

Keywords

Book part
Publication date: 1 December 2023

Margie Foster, Hossein Arvand, Hugh T. Graham and Denise Bedford

This chapter explores the traditional and evolving practice of preservation. Traditional preservation practices are traced throughout history. Current practice is described as a…

Abstract

Chapter Summary

This chapter explores the traditional and evolving practice of preservation. Traditional preservation practices are traced throughout history. Current practice is described as a foundation from which to understand evolving practices. Traditional preservation has historically focused on tangible assets that take a tangible form we can all see and touch. The traditional practices are compared to the evolving practices of knowledge and intangible resources. The chapter examines why, what, how, when, where we preserve, and who preserves to understand the transition in progress today. The authors make the case that shifting the traditional focus from preserving for the past and evidentiary reasons to preserving for the future to support business challenges is crucial. The authors also tie the need to refocus on historical impediments and challenges to knowledge use and reuse in practical business environments.

Details

Knowledge Preservation and Curation
Type: Book
ISBN: 978-1-83982-930-7

Book part
Publication date: 5 April 2024

Christine Amsler, Robert James, Artem Prokhorov and Peter Schmidt

The traditional predictor of technical inefficiency proposed by Jondrow, Lovell, Materov, and Schmidt (1982) is a conditional expectation. This chapter explores whether, and by…

Abstract

The traditional predictor of technical inefficiency proposed by Jondrow, Lovell, Materov, and Schmidt (1982) is a conditional expectation. This chapter explores whether, and by how much, the predictor can be improved by using auxiliary information in the conditioning set. It considers two types of stochastic frontier models. The first type is a panel data model where composed errors from past and future time periods contain information about contemporaneous technical inefficiency. The second type is when the stochastic frontier model is augmented by input ratio equations in which allocative inefficiency is correlated with technical inefficiency. Compared to the standard kernel-smoothing estimator, a newer estimator based on a local linear random forest helps mitigate the curse of dimensionality when the conditioning set is large. Besides numerous simulations, there is an illustrative empirical example.

Article
Publication date: 8 December 2023

Deryck J. Van Rensburg, Pete Naudé and Izak Fayena

Consumer product firms renowned for marketing appear to be complementing brand creation, extension and acquisition with minority equity investments in entrepreneurial brand…

Abstract

Purpose

Consumer product firms renowned for marketing appear to be complementing brand creation, extension and acquisition with minority equity investments in entrepreneurial brand ventures (EBVs) for strategic purposes. Similarly, EBVs are looking for growth and resources that can be accessed via inter-organizational partnerships. This flourishing industry practice and the paucity of empirical research indicates the potential for new studies. The research objective was to examine why and how large incumbents were implementing strategic brand venturing (SBV), and with this understanding to develop a framework useful for descriptive and normative purposes.

Design/methodology/approach

This qualitative research study comprised in-depth interviews and multiple data sources across seven case studies drawn from US subsidiaries of global firms within the consumer products industry. Grounded in resource theory, the dimensions of strategic brand equity investments are abductively derived.

Findings

The findings delineate 16 process capabilities within four aggregate clusters entailing, the designing of the SBV program, opportunity identification, brand entrepreneur partnerships and venture portfolio management. Prefaced by endogenous and exogenous antecedents, these process capabilities help to contribute strategic and financial value when implemented.

Research limitations/implications

This qualitative research study yielded analytical rather than statistical generalizations. A range of market and economic factors exist in the United States contributing towards a favorable entrepreneurial and brand incubation climate. This may render the SBV concept as contingent and contextual. Furthermore, the view of brand entrepreneurs' regarding the design of the process model were not explicitly sought but inferred from the discourses of the venturing units interviewed.

Practical implications

The article outlines several important implementation imperatives for corporations endeavoring to competitively advantage their brand portfolios via adoption of a minority equity investing strategy in EBVs. Practitioners are cautioned against myopically adopting this process alone as a success heuristic given other factors may impact success such as changes in corporate strategy or upper echelon sponsorship.

Social implications

Mission preservation for social brand ventures being tethered to a large incumbent may need to be taken into account prior to and during SBV relationships.

Originality/value

The research contributes to the call for greater insights into the investment processes used in venturing relationships as well as coverage of new industry sectors beyond technology industries that often characterize corporate venture capital studies. Several novel findings emerged related to the importance of—the industry ecosystem; symbiosis between the founding brand entrepreneur and brand culture; synchronization of investment strategies with an emerging brand life-cycle model and serendipitous corporate entrepreneurial opportunities.

Details

Journal of Strategy and Management, vol. 17 no. 1
Type: Research Article
ISSN: 1755-425X

Keywords

Article
Publication date: 3 November 2023

Bhanu Prakash Saripalli, Gagan Singh and Sonika Singh

Estimation of solar cell parameters, mathematical modeling and the actual performance analysis of photovoltaic (PV) cells at various ecological conditions are very important in…

Abstract

Purpose

Estimation of solar cell parameters, mathematical modeling and the actual performance analysis of photovoltaic (PV) cells at various ecological conditions are very important in the design and analysis of maximum power point trackers and power converters. This study aims to propose the analysis and modeling of a simplified three-diode model based on the manufacturer’s performance data.

Design/methodology/approach

A novel technique is presented to evaluate the PV cell constraints and simplify the existing equation using analytical and iterative methods. To examine the current equation, this study focuses on three crucial operational points: open circuit, short circuit and maximum operating points. The number of parameters needed to estimate these built-in models is decreased from nine to five by an effective iteration method, considerably reducing computational requirements.

Findings

The proposed model, in contrast to the previous complex nine-parameter three-diode model, simplifies the modeling and analysis process by requiring only five parameters. To ensure the reliability and accuracy of this proposed model, its results were carefully compared with datasheet values under standard test conditions (STC). This model was implemented using MATLAB/Simulink and validated using a polycrystalline solar cell under STC conditions.

Originality/value

The proposed three-diode model clearly outperforms the earlier existing two-diode model in terms of accuracy and performance, especially in lower irradiance settings, according to the results and comparison analysis.

Details

World Journal of Engineering, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 1708-5284

Keywords

1 – 10 of 15