Search results

1 – 10 of 120
Article
Publication date: 17 April 2024

Rafiu King Raji, Jian Lin Han, Zixing Li and Lihua Gong

At the moment, in terms of both research and commercial products, smart shoe technology and applications seem not to attract the same magnitude of attention compared to smart…

Abstract

Purpose

At the moment, in terms of both research and commercial products, smart shoe technology and applications seem not to attract the same magnitude of attention compared to smart garments and other smart wearables such as wrist watches and wrist bands. The purpose of this study is to fill this knowledge gap by discussing issues regarding smart shoe sensing technologies, smart shoe sensor placements, factors that affect sensor placements and finally the areas of smart shoe applications.

Design/methodology/approach

Through a review of relevant literature, this study first and foremost attempts to explain what constitutes a smart shoe and subsequently discusses the current trends in smart shoe applications. Discussed in this study are relevant sensing technologies, sensor placement and areas of smart shoe applications.

Findings

This study outlined 13 important areas of smart shoe applications. It also uncovered that majority of smart shoe functionality are physical activity tracking, health rehabilitation and ambulation assistance for the blind. Also highlighted in this review are some of the bottlenecks of smart shoe development.

Originality/value

To the best of the authors’ knowledge, this is the first comprehensive review paper focused on smart shoe applications, and therefore serves as an apt reference for researchers within the field of smart footwear.

Details

Sensor Review, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 0260-2288

Keywords

Article
Publication date: 14 December 2023

Huaxiang Song, Chai Wei and Zhou Yong

The paper aims to tackle the classification of Remote Sensing Images (RSIs), which presents a significant challenge for computer algorithms due to the inherent characteristics of…

Abstract

Purpose

The paper aims to tackle the classification of Remote Sensing Images (RSIs), which presents a significant challenge for computer algorithms due to the inherent characteristics of clustered ground objects and noisy backgrounds. Recent research typically leverages larger volume models to achieve advanced performance. However, the operating environments of remote sensing commonly cannot provide unconstrained computational and storage resources. It requires lightweight algorithms with exceptional generalization capabilities.

Design/methodology/approach

This study introduces an efficient knowledge distillation (KD) method to build a lightweight yet precise convolutional neural network (CNN) classifier. This method also aims to substantially decrease the training time expenses commonly linked with traditional KD techniques. This approach entails extensive alterations to both the model training framework and the distillation process, each tailored to the unique characteristics of RSIs. In particular, this study establishes a robust ensemble teacher by independently training two CNN models using a customized, efficient training algorithm. Following this, this study modifies a KD loss function to mitigate the suppression of non-target category predictions, which are essential for capturing the inter- and intra-similarity of RSIs.

Findings

This study validated the student model, termed KD-enhanced network (KDE-Net), obtained through the KD process on three benchmark RSI data sets. The KDE-Net surpasses 42 other state-of-the-art methods in the literature published from 2020 to 2023. Compared to the top-ranked method’s performance on the challenging NWPU45 data set, KDE-Net demonstrated a noticeable 0.4% increase in overall accuracy with a significant 88% reduction in parameters. Meanwhile, this study’s reformed KD framework significantly enhances the knowledge transfer speed by at least three times.

Originality/value

This study illustrates that the logit-based KD technique can effectively develop lightweight CNN classifiers for RSI classification without substantial sacrifices in computation and storage costs. Compared to neural architecture search or other methods aiming to provide lightweight solutions, this study’s KDE-Net, based on the inherent characteristics of RSIs, is currently more efficient in constructing accurate yet lightweight classifiers for RSI classification.

Details

International Journal of Web Information Systems, vol. 20 no. 2
Type: Research Article
ISSN: 1744-0084

Keywords

Book part
Publication date: 19 April 2024

Knut S. Vikør

While most West European nations were formed around pre-existing entities that could be called “countries” before the modern age, this was not the case in the Middle East. Some…

Abstract

While most West European nations were formed around pre-existing entities that could be called “countries” before the modern age, this was not the case in the Middle East. Some entities, like Egypt, did have a clear political and cultural identity before colonialism, others, like Algeria, did not. This chapter discusses the four states of the Maghreb: Morocco, Algeria, Tunisia and Libya, through the perspective of “country creation” going into and coming out of colonial rule. We can see here two “models” of fairly similar types of historical development, one showing a gradual process through a protectorate period to relatively stable modern nations, another through violent conquest and direct colonization ending in violent liberation and military and wealthy but fragile states. The article asks whether these models for the history of country creation and the presence or absence of pre-colonial identities can help explain the modern history and nature of these states in the Arab Spring and the years thereafter. Then, a more tentative attempt is made to apply these models to two countries of the Arab east, Syria and Iraq. While local variations ensure that no model can be transferred directly, it can show the importance of studying the historical factors that go into the transition from geographical region to a country with people that can form the basis of a nation.

Details

A Comparative Historical and Typological Approach to the Middle Eastern State System
Type: Book
ISBN: 978-1-83753-122-6

Keywords

Article
Publication date: 14 November 2022

Abdul Hannan Qureshi, Wesam Salah Alaloul, Wong Kai Wing, Syed Saad, Khalid Mhmoud Alzubi and Muhammad Ali Musarat

Rebar is the prime component of reinforced concrete structures, and rebar monitoring is a time-consuming and technical job. With the emergence of the fourth industrial revolution…

Abstract

Purpose

Rebar is the prime component of reinforced concrete structures, and rebar monitoring is a time-consuming and technical job. With the emergence of the fourth industrial revolution, the construction industry practices have evolved toward digitalization. Still, hesitation remains among stakeholders toward the adoption of advanced technologies and one of the significant reasons is the unavailability of knowledge frameworks and implementation guidelines. This study aims to investigate technical factors impacting automated monitoring of rebar for the understanding, confidence gain and effective implementation by construction industry stakeholders.

Design/methodology/approach

A structured study pipeline has been adopted, which includes a systematic literature collection, semistructured interviews, pilot survey, questionnaire survey and statistical analyses via merging two techniques, i.e. structural equation modeling and relative importance index.

Findings

The achieved model highlights “digital images” and “scanning” as two main categories being adopted for automated rebar monitoring. Moreover, “external influence”, “data-capturing”, “image quality”, and “environment” have been identified as the main factors under “digital images”. On the other hand, “object distance”, “rebar shape”, “occlusion” and “rebar spacing” have been highlighted as the main contributing factors under “scanning”.

Originality/value

The study provides a base guideline for the construction industry stakeholders to gain confidence in automated monitoring of rebar via vision-based technologies and effective implementation of the progress-monitoring processes. This study, via structured data collection, performed qualitative and quantitative analyses to investigate technical factors for effective rebar monitoring via vision-based technologies in the form of a mathematical model.

Details

Construction Innovation , vol. 24 no. 3
Type: Research Article
ISSN: 1471-4175

Keywords

Article
Publication date: 18 April 2024

Jibran Abbas and Ashish Khare

According to regulations, aircraft must be in an airworthy condition before they can be operated. To ensure airworthiness, they must be maintained by an approved component…

Abstract

Purpose

According to regulations, aircraft must be in an airworthy condition before they can be operated. To ensure airworthiness, they must be maintained by an approved component maintenance organisation. This study is aimed to identify potential errors that may arise during the final inspection and certification process of aircraft components, categorise them, determine their consequences and quantify the associated risks. Any removed aircraft components must be sent to an approved aircraft component maintenance organisation for further maintenance and issuance of European Union Aviation Safety Agency (EASA) Form 1. Thereafter, a final inspection and certification process must be conducted by certifying staff to receive an EASA Form 1. This process is crucial because any errors during this stage can result in the installation of unsafe components in an aircraft.

Design/methodology/approach

The Systematic Human Error Reduction and Prediction Approach (SHERPA) method was used to identify potential errors. This method involved a review of the procedures of three maintenance organisations, individual interviews with ten subject matter experts and a consensus group of 14 certifying staff from different maintenance organisations to achieve the desired results.

Findings

In this study, 39 potential errors were identified during the final inspection and certification process. Furthermore, analysis revealed that 48.7% of these issues were attributed to checking errors, making it the most common type of error observed.

Originality/value

This study pinpoints the potential errors in the final inspection and certification of aircraft components. It offers maintenance organisations a roadmap to assess procedures, implement preventive measures and reduce the likelihood of these errors.

Details

Aircraft Engineering and Aerospace Technology, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 1748-8842

Keywords

Book part
Publication date: 30 April 2024

Julien Grayer

Racial stigma and racial criminalization have been centralizing pillars of the construction of Blackness in the United States. Taking such systemic injustice and racism as a…

Abstract

Racial stigma and racial criminalization have been centralizing pillars of the construction of Blackness in the United States. Taking such systemic injustice and racism as a given, then question then becomes how these macro-level arrangements are reflected in micro-level processes. This work uses radical interactionism and stigma theory to explore the potential implications for racialized identity construction and the development of “criminalized subjectivity” among Black undergraduate students at a predominately white university in the Midwest. I use semistructured interviews to explore the implications of racial stigma and criminalization on micro-level identity construction and how understandings of these issues can change across space and over the course of one's life. Findings demonstrate that Black university students are keenly aware of this particular stigma and its consequences in increasingly complex ways from the time they are school-aged children. They were aware of this stigma as a social fact but did not internalize it as a true reflection of themselves; said internalization was thwarted through strong self-concept and racial socialization. This increasingly complex awareness is also informed by an intersectional lens for some interviewees. I argue not only that the concept of stigma must be explicitly placed within these larger systems but also that understanding and identity-building are both rooted in ever-evolving processes of interaction and meaning-making. This research contributes to scholarship that applies a critical lens to Goffmanian stigma rooted in Black sociology and criminology and from the perspectives of the stigmatized themselves.

Details

Symbolic Interaction and Inequality
Type: Book
ISBN: 978-1-83797-689-8

Keywords

Article
Publication date: 12 April 2024

Zhen Li, Jianqing Han, Mingrui Zhao, Yongbo Zhang, Yanzhe Wang, Cong Zhang and Lin Chang

This study aims to design and validate a theoretical model for capacitive imaging (CI) sensors that incorporates the interelectrode shielding and surrounding shielding electrodes…

Abstract

Purpose

This study aims to design and validate a theoretical model for capacitive imaging (CI) sensors that incorporates the interelectrode shielding and surrounding shielding electrodes. Through experimental verification, the effectiveness of the theoretical model in evaluating CI sensors equipped with shielding electrodes has been demonstrated.

Design/methodology/approach

The study begins by incorporating the interelectrode shielding and surrounding shielding electrodes of CI sensors into the theoretical model. A method for deriving the semianalytical model is proposed, using the renormalization group method and physical model. Based on random geometric parameters of CI sensors, capacitance values are calculated using both simulation models and theoretical models. Three different types of CI sensors with varying geometric parameters are designed and manufactured for experimental testing.

Findings

The study’s results indicate that the errors of the semianalytical model for the CI sensor are predominantly below 5%, with all errors falling below 10%. This suggests that the semianalytical model, derived using the renormalization group method, effectively evaluates CI sensors equipped with shielding electrodes. The experimental results demonstrate the efficacy of the theoretical model in accurately predicting the capacitance values of the CI sensors.

Originality/value

The theoretical model of CI sensors is described by incorporating the interelectrode shielding and surrounding shielding electrodes into the model. This comprehensive approach allows for a more accurate evaluation of the detecting capability of CI sensors, as well as optimization of their performance.

Details

Sensor Review, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 0260-2288

Keywords

Open Access
Article
Publication date: 16 January 2024

Jani Koskinen, Kai Kristian Kimppa, Janne Lahtiranta and Sami Hyrynsalmi

The competition in the academe has always been tough, but today, the academe seems to be more like an industry than an academic community as academics are evaluated through…

Abstract

Purpose

The competition in the academe has always been tough, but today, the academe seems to be more like an industry than an academic community as academics are evaluated through quantified and economic means.

Design/methodology/approach

This article leans on Heidegger’s thoughts on the essence of technology and his ontological view on being to show the dangers that lie in this quantification of researchers and research.

Findings

Despite the benefits that information systems (ISs) offer to people and research, it seems that technology has made it possible to objectify researchers and research. This has a negative impact on the academe and should thus be looked into especially by the IS field, which should note the problems that exist in its core. This phenomenon of quantified academics is clearly visible at academic quantification sites, where academics are evaluated using metrics that count their output. It seems that the essence of technology has disturbed the way research is valued by emphasising its quantifiable aspects. The study claims that it is important to look for other ways to evaluate researchers rather than trying to maximise research production, which has led to the flooding of articles that few have the time or interest to read.

Originality/value

This paper offers new insights into the current phenomenon of quantification of academics and underlines the need for critical changes if in order to achieve the academic culture that is desirable for future academics.

Details

Information Technology & People, vol. 37 no. 8
Type: Research Article
ISSN: 0959-3845

Keywords

Open Access
Article
Publication date: 15 January 2024

Christine Prince, Nessrine Omrani and Francesco Schiavone

Research on online user privacy shows that empirical evidence on how privacy literacy relates to users' information privacy empowerment is missing. To fill this gap, this paper…

1048

Abstract

Purpose

Research on online user privacy shows that empirical evidence on how privacy literacy relates to users' information privacy empowerment is missing. To fill this gap, this paper investigated the respective influence of two primary dimensions of online privacy literacy – namely declarative and procedural knowledge – on online users' information privacy empowerment.

Design/methodology/approach

An empirical analysis is conducted using a dataset collected in Europe. This survey was conducted in 2019 among 27,524 representative respondents of the European population.

Findings

The main results show that users' procedural knowledge is positively linked to users' privacy empowerment. The relationship between users' declarative knowledge and users' privacy empowerment is partially supported. While greater awareness about firms and organizations practices in terms of data collections and further uses conditions was found to be significantly associated with increased users' privacy empowerment, unpredictably, results revealed that the awareness about the GDPR and user’s privacy empowerment are negatively associated. The empirical findings reveal also that greater online privacy literacy is associated with heightened users' information privacy empowerment.

Originality/value

While few advanced studies made systematic efforts to measure changes occurred on websites since the GDPR enforcement, it remains unclear, however, how individuals perceive, understand and apply the GDPR rights/guarantees and their likelihood to strengthen users' information privacy control. Therefore, this paper contributes empirically to understanding how online users' privacy literacy shaped by both users' declarative and procedural knowledge is likely to affect users' information privacy empowerment. The study empirically investigates the effectiveness of the GDPR in raising users' information privacy empowerment from user-based perspective. Results stress the importance of greater transparency of data tracking and processing decisions made by online businesses and services to strengthen users' control over information privacy. Study findings also put emphasis on the crucial need for more educational efforts to raise users' awareness about the GDPR rights/guarantees related to data protection. Empirical findings also show that users who are more likely to adopt self-protective approaches to reinforce personal data privacy are more likely to perceive greater control over personal data. A broad implication of this finding for practitioners and E-businesses stresses the need for empowering users with adequate privacy protection tools to ensure more confidential transactions.

Details

Information Technology & People, vol. 37 no. 8
Type: Research Article
ISSN: 0959-3845

Keywords

Open Access
Article
Publication date: 19 December 2023

Nadia Arshad, Rotem Shneor and Adele Berndt

Crowdfunding is an increasingly popular channel for project fundraising for entrepreneurial ventures. Such efforts require fundraisers to develop and manage a crowdfunding…

Abstract

Purpose

Crowdfunding is an increasingly popular channel for project fundraising for entrepreneurial ventures. Such efforts require fundraisers to develop and manage a crowdfunding campaign over a period of time and several stages. Thus, the authors aim to identify the stages fundraisers go through in their crowdfunding campaign process and how their engagement evolves throughout this process.

Design/methodology/approach

Following a multiple case study research design analysing six successful campaigns, the current study suggests a taxonomy of stages the fundraisers go through in their crowdfunding campaign management process while identifying the types of engagement displayed and their relative intensity at each of these stages.

Findings

The study proposes a five-stage process framework (pre-launch, launch, mid-campaign, conclusion and post-campaign), accompanied by a series of propositions outlining the relative intensity of different types of engagement throughout this process. The authors show that engagement levels appear with high intensity at pre-launch, and to a lesser degree also at the post-launch stage while showing low intensity at the stages in between them. More specifically, cognitive and behavioural engagement are most prominent at the pre- and post-launch stages. Emotional engagement is highest during the launch, mid-launch and conclusion stages. And social engagement maintains moderate levels of intensity throughout the process.

Originality/value

This study focuses on the campaign process using engagement theory, thus identifying the differing engagement patterns throughout the dynamic crowdfunding campaign management process, not just in one part.

Details

International Journal of Entrepreneurial Behavior & Research, vol. 30 no. 11
Type: Research Article
ISSN: 1355-2554

Keywords

1 – 10 of 120