Search results

1 – 4 of 4
Article
Publication date: 27 September 2021

Alex Bradley, Haijiang Li, Honglei Qin, Wen Xi, Daniel Peel and Nicholas Nisbet

Defining building information modelling (BIM) standards for the infrastructure domain is a central issue to the successful implementation of BIM in civil engineering domains. To…

Abstract

Purpose

Defining building information modelling (BIM) standards for the infrastructure domain is a central issue to the successful implementation of BIM in civil engineering domains. To this end, this paper aims to present a requirements and process analysis for the ports and waterways domain to address the lack of BIM standards development, using the information delivery manual (IDM) approach and the ethos of openBIM standards.

Design/methodology/approach

This research uses the IDM approach. This involves the definition of use cases, process maps, exchange scenarios and subsequent exchange requirements. All these developments were sourced and validated by a series of international industry consultations.

Findings

The paper identifies 30 domain relevant use cases collated from existing sources and new cases. An overview and detailed ports and waterways process map (defining actors, activities and data exchanges). The process maps highlighted 38 exchange scenarios between various activities. Various exchange requirements were defined and are discussed in the context of the required information exchange model and the extensions required to fulfil the needs of the domain. The analysis provides the core information for the next steps of development for a substantial extension to the Industry Foundation Classes and the supporting data dictionary standards.

Research limitations/implications

Because of the international scope of the research, the outcomes can be applied by any stakeholders in the domain of ports and waterways. Therefore, some variation is expected at a national and organizational level. This research has the potential to accelerate the adoption of openBIM standards within the ports and waterways domain leading to increases in efficiency, collaborative working.

Originality/value

This paper reviews the requirements of an identified gap in the provision of openBIM standards relevant and applicable to the domain of ports and waterways.

Details

Construction Innovation , vol. 22 no. 4
Type: Research Article
ISSN: 1471-4175

Keywords

Article
Publication date: 28 June 2021

Xianke Sun, Gaoliang Wang, Liuyang Xu and Honglei Yuan

In data grids, replication has been regarded as a crucial optimization strategy. Computing tasks are performed on IoT gateways at the cloud edges to obtain a prompt response. So…

Abstract

Purpose

In data grids, replication has been regarded as a crucial optimization strategy. Computing tasks are performed on IoT gateways at the cloud edges to obtain a prompt response. So, investigating the data replication mechanisms in the IoT is necessary. Henceforth, a systematic survey of data replication strategies in IoT techniques is presented in this paper, and some suggestions are offered for the upcoming works. In two key classifications, various parameters dependent on the analysis of the prevalent approaches are considered. The pros and cons associated with chosen strategies have been explored, and the essential problems of them have been presented to boost the future of more effective data replication strategies. We have also discovered gaps in papers and provided solutions for them.

Design/methodology/approach

Progress in Information Technology (IT) growth has brought the Internet of Things (IoT) into life to take a vital role in our everyday lifestyles. Big IoT-generated data brings tremendous data processing challenges. One of the most challenging problems is data replication to improve fault-tolerance, reliability, and accessibility. In this way, if the primary data source fails, a replica can be swapped in immediately. There is a significant influence on the IoT created by data replication techniques, but no extensive and systematic research exists in this area. There is still no systematic and full way to address the relevant methods and evaluate them. Hence, in the present investigation, a literature review is indicated on the IoT-based data replication from papers published until 2021. Based on the given guidelines, chosen papers are reviewed. After establishing exclusion and inclusion criteria, an independent systematic search in Google Scholar, ACM, Scopus, Eric, Science Direct, Springer link, Emerald, Global ProQuest, and IEEE for relevant studies has been performed, and 21(6 paper analyzed in section 1 and 15 paper analyzed in section 3) papers have been analyzed.

Findings

The results showed that data replication mechanisms in the IoT algorithms outperform other algorithms regarding impressive network utilization, job implementation time, hit ratio, total replication number, and the portion of utilized storage in percentage. Although a few ideas have been suggested that fix different facets of IoT data management, we predict that there is still space for development and more study. Thus, in order to design innovative and more effective methods for future IoT-based structures, we explored open research directions in the domain of efficient data processing.

Research limitations/implications

The present investigation encountered some drawbacks. First of all, only certain papers published in English were included. It is evident that some papers exist on data replication processes in the IoT written in other languages, but they were not included in our research. Next, the current report has only analyzed the mined based on data replication processes and IoT keyword discovery. The methods for data replication in the IoT would not be printed with keywords specified. In this review, the papers presented in national conferences and journals are neglected. In order to achieve the highest ability, this analysis contains papers from major global academic journals.

Practical implications

To appreciate the significance and accuracy of the data often produced by different entities, the article illustrates that data provenance is essential. The results contribute to providing strong suggestions for future IoT studies. To be able to view the data, administrators have to modify novel abilities. The current analysis will deal with the speed of publications and suggest the findings of research and experience as a future path for IoT data replication decision-makers.

Social implications

In general, the rise in the knowledge degree of scientists, academics, and managers will enhance administrators' positive and consciously behavioral actions in handling IoT environments. We anticipate that the consequences of the present report could lead investigators to produce more efficient data replication methods in IoT regarding the data type and data volume.

Originality/value

This report provides a detailed literature review on data replication strategies relying on IoT. The lack of such papers increases the importance of this paper. Utilizing the responses to the study queries, data replication's primary purpose, current problems, study concepts, and processes in IoT are summarized exclusively. This approach will allow investigators to establish a more reliable IoT technique for data replication in the future. To the best of our understanding, our research is the first to provide a thorough overview and evaluation of the current solutions by categorizing them into static/dynamic replication and distributed replication subcategories. By outlining possible future study paths, we conclude the article.

Details

Library Hi Tech, vol. 39 no. 4
Type: Research Article
ISSN: 0737-8831

Keywords

Article
Publication date: 20 August 2021

Yuhang Gao, Xiaohong Chen, Ping Liu, Honglei Zhou, Shaoli Fu, Wei Li, Xinkuan Liu, Fengcang Ma, Yanbo Zhu and Jiayan Wu

This study aims to investigate the effect of coatings prepared by the addition of copper-aluminum alloy powder on the corrosion behavior of 90/10 copper-nickel alloy.

Abstract

Purpose

This study aims to investigate the effect of coatings prepared by the addition of copper-aluminum alloy powder on the corrosion behavior of 90/10 copper-nickel alloy.

Design/methodology/approach

Coatings of copper-aluminum alloy powder at different contents (Wt.% = 50%, 60%, 70% and 80%) were prepared by the high-temperature heat treatment process. The microstructure and component of the coatings were characterized by scanning electron microscope, X-ray diffraction, energy dispersive spectrometer and X-ray photoelectron spectroscopy. The electrochemical properties of the coating were explored by electrochemical impedance spectroscopy.

Findings

The results show that the aluminized layer was successfully constructed on the surface of 90/10 copper-nickel alloy, the composition of the coating was composed of copper-aluminum phase and aluminum-nickel phase, the existence of the aluminum-nickel phase was formed by the diffusion of Ni elements within the substrate and because of the diffusion, the Al-Ni phase was distributed in the middle and bottom of the coating more. The Al-Ni phase is considered to be the enhanced phase for corrosion resistance. When the copper-aluminum alloy powder content is 70 Wt.%, the corrosion resistance is the best.

Originality/value

The enhancement of corrosion resistance of 90/10 copper-nickel alloy by the copper-aluminum alloy powder was revealed, the composition of the aluminized layer and the mechanism of corrosion resistance were discussed.

Details

Anti-Corrosion Methods and Materials, vol. 68 no. 5
Type: Research Article
ISSN: 0003-5599

Keywords

Article
Publication date: 4 April 2016

Shancang Li, Theo Tryfonas and Honglei Li

The purpose of this paper is to provide an in-depth overview of the security requirements and challenges for Internet of Things (IoT) and discuss security solutions for various…

9954

Abstract

Purpose

The purpose of this paper is to provide an in-depth overview of the security requirements and challenges for Internet of Things (IoT) and discuss security solutions for various enabling technologies and implications to various applications.

Design/methodology/approach

Security requirements and solutions are analysed based on a four-layer framework of IoT on sensing layer, network layer, service layer, and application layer. The cross-layer threats are analysed followed by the security discussion for the enabling technologies including identification and tracking technologies, WSN and RFID, communication, networks, and service management.

Findings

IoT calls for new security infrastructure based on the new technical standards. As a consequence, new security design for IoT shall pay attention to these new standards. Security at both the physical devices and service-applications is critical to the operation of IoT, which is indispensable for the success of IoT. Open problems remain in a number of areas, such as security and privacy protection, network protocols, standardization, identity management, trusted architecture, etc.

Practical implications

The implications to various applications including supervisory control and data acquisition, enterprise systems, social IoT are discussed. The paper will serve as a starting point for future IoT security design and management. The security strategies for IoT should be carefully designed by managing the tradeoffs among security, privacy, and utility to provide security in multi-layer architecture of IoT.

Originality/value

The paper synthesizes the current security requirements for IoT and provides a clear framework of security infrastructure based on four layers. Accordingly, the security requirements and potential threats in the four-layer architecture are provided in terms of general devices security, communication security, network security, and application security.

Details

Internet Research, vol. 26 no. 2
Type: Research Article
ISSN: 1066-2243

Keywords

1 – 4 of 4