Search results

1 – 10 of 186
Article
Publication date: 12 April 2024

Jie Li, Zui Tao and Nadilai Aisihaer

This study investigates whether the visualization of agricultural products influences consumers’ purchase intentions in the context of farmer-assisted livestreaming in China…

Abstract

Purpose

This study investigates whether the visualization of agricultural products influences consumers’ purchase intentions in the context of farmer-assisted livestreaming in China. Moreover, it explores the moderating effect of packaging functionality and the mediating effect of consumer trust.

Design/methodology/approach

Consumers in China from multiple social media platforms participated in this survey, which yielded 333 valid responses for analysis.

Findings

The results revealed a positive relationship between the video presentation about the agricultural production process and consumers’ purchase intention, which is mediated by consumers’ trust. Meanwhile, packaging functionality moderates the relationship between agricultural product visualization and consumers’ purchase intentions as well as the indirect effect of consumers’ trust.

Originality/value

This study extends the application of the stimulus-organism-response (SOR) model to the field of farmer-assisted livestreaming. By building a more detailed model, this study adds to knowledge on the influencing mechanisms of consumers’ purchase intentions in farmer-assisted livestreaming.

Details

Asia Pacific Journal of Marketing and Logistics, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 1355-5855

Keywords

Article
Publication date: 30 October 2023

Hui Jie Li and Deqing Tan

The purpose of the study is to investigate strategies for enhancing pollution oversight by local governments while reducing government-enterprise collusion (GEC) levels…

Abstract

Purpose

The purpose of the study is to investigate strategies for enhancing pollution oversight by local governments while reducing government-enterprise collusion (GEC) levels. Additionally, the factors influencing pollution control efforts at incineration plants are explored. Potential approaches to improving them and for effectively reducing waste incineration pollution are suggested.

Design/methodology/approach

The authors examined the most effective methods for mitigating incineration-related pollution and preventing collusion and developed a differential game model involving interactions between local governments and incineration plants. The findings of this work have significant policy implications for central governments worldwide seeking to regulate waste incineration practices.

Findings

The results indicate that, first, elevating environmental assessment standards can incentivize local governments to improve their oversight efforts. Second, collusion between incineration plants and local governments can be deterred by transferring benefits from the plants to the local government, while increased supervision by the central government and the enforcement of penalties for collusion can also mitigate collusion. Third, both central and local governments can bolster their supervisory and penalty mechanisms for instances of excessive pollution, encouraging incineration plants to invest more in pollution control. Finally, when the central government finds it challenging to detect excessive incineration-related pollution, enhancing rewards and penalties at the local government level can be a viable alternative.

Originality/value

This study stands out by considering the dynamic nature of pollutants. A differential game model is constructed which captures the evolving dynamics between local governments and incineration plants, offering insights regarding the prevention of collusion from a dynamic perspective. The findings may provide a valuable reference for governments as they develop and enforce regulations while motivating incineration plants to actively engage in reducing waste-incineration pollution.

Details

Kybernetes, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 0368-492X

Keywords

Article
Publication date: 13 December 2023

Ying-Jie Guan and Yong-Ping Li

To solve the shortcomings of existed search and rescue drones, search and rescue the trapped people trapped in earthquake ruins, underwater and avalanches quickly and accurately…

Abstract

Purpose

To solve the shortcomings of existed search and rescue drones, search and rescue the trapped people trapped in earthquake ruins, underwater and avalanches quickly and accurately, this paper aims to propose a four-axis eight-rotor rescue unmanned aerial vehicle (UAV) which can carry a radar life detector. As the design of propeller is the key to the design of UAV, this paper mainly designs the propeller of the UAV at the present stage.

Design/methodology/approach

Based on the actual working conditions of UAVs, this paper preliminarily estimated the load of UAVs and the diameters of propellers and designed the main parameters of propellers according to the leaf element theory and momentum theory. Based on the low Reynolds number airfoil, this paper selected the airfoil with high lift drag ratio from the commonly used low Reynolds number airfoils. The chord length and twist angle of propeller blades were calculated according to the Wilson method and the maximum wind energy utilization coefficient and were optimized by the Asymptotic exponential function. The aerodynamic characteristics of the designed single propeller and coaxial propeller under different installation pitch angles and different installation distances were analyzed.

Findings

The results showed that the design of coaxial twin propellers can increase the load capacity by about 1.5 times without increasing the propeller diameter. When the installation distance between the two propellers was 8 cm and the tilt angle was 15° counterclockwise, the aerodynamic characteristics of the coaxial propeller were optimal.

Originality/value

The novelty of this work came from the conceptual design of the new rescue UAV and its numerical optimization using the Wilson method combined with the maximum wind energy utilization factor and the exponential function. The aerodynamic characteristics of the common shaft propeller were analyzed under different mounting angles and different mounting distances.

Details

Aircraft Engineering and Aerospace Technology, vol. 96 no. 1
Type: Research Article
ISSN: 1748-8842

Keywords

Article
Publication date: 16 January 2023

Faisal Lone, Harsh Kumar Verma and Krishna Pal Sharma

The purpose of this study is to extensively explore the vehicular network paradigm, challenges faced by them and provide a reasonable solution for securing these vulnerable…

Abstract

Purpose

The purpose of this study is to extensively explore the vehicular network paradigm, challenges faced by them and provide a reasonable solution for securing these vulnerable networks. Vehicle-to-everything (V2X) communication has brought the long-anticipated goal of safe, convenient and sustainable transportation closer to reality. The connected vehicle (CV) paradigm is critical to the intelligent transportation systems vision. It imagines a society free of a troublesome transportation system burdened by gridlock, fatal accidents and a polluted environment. The authors cannot overstate the importance of CVs in solving long-standing mobility issues and making travel safer and more convenient. It is high time to explore vehicular networks in detail to suggest solutions to the challenges encountered by these highly dynamic networks.

Design/methodology/approach

This paper compiles research on various V2X topics, from a comprehensive overview of V2X networks to their unique characteristics and challenges. In doing so, the authors identify multiple issues encountered by V2X communication networks due to their open communication nature and high mobility, especially from a security perspective. Thus, this paper proposes a trust-based model to secure vehicular networks. The proposed approach uses the communicating nodes’ behavior to establish trustworthy relationships. The proposed model only allows trusted nodes to communicate among themselves while isolating malicious nodes to achieve secure communication.

Findings

Despite the benefits offered by V2X networks, they have associated challenges. As the number of CVs on the roads increase, so does the attack surface. Connected cars provide numerous safety-critical applications that, if compromised, can result in fatal consequences. While cryptographic mechanisms effectively prevent external attacks, various studies propose trust-based models to complement cryptographic solutions for dealing with internal attacks. While numerous trust-based models have been proposed, there is room for improvement in malicious node detection and complexity. Optimizing the number of nodes considered in trust calculation can reduce the complexity of state-of-the-art solutions. The theoretical analysis of the proposed model exhibits an improvement in trust calculation, better malicious node detection and fewer computations.

Originality/value

The proposed model is the first to add another dimension to trust calculation by incorporating opinions about recommender nodes. The added dimension improves the trust calculation resulting in better performance in thwarting attacks and enhancing security while also reducing the trust calculation complexity.

Details

International Journal of Pervasive Computing and Communications, vol. 20 no. 1
Type: Research Article
ISSN: 1742-7371

Keywords

Article
Publication date: 17 March 2023

Tao Hu, Yihong Chen, Huimin Chen and Yangyan Zhang

This study aims to expand tourism knowledge by analysing literature review articles published in English Web of Science (WOS) and Chinese China National Knowledge Infrastructure…

Abstract

Purpose

This study aims to expand tourism knowledge by analysing literature review articles published in English Web of Science (WOS) and Chinese China National Knowledge Infrastructure (CNKI) language journals and reviewing their influence, interconnection and trends.

Design/methodology/approach

A three-stage method was designed to understand the tourism research progress. Performance analysis identified the publication timeline, high-yielding journals and authors that published tourism literature reviews and frequently cited papers. Science mapping visualisation examined the intrinsic connections between co-authorship and co-institution. Finally, emerging trend analysis explored the topic modelling and evolution through Latent Dirichlet allocation (LDA) and regression.

Findings

The key statistics and collaborations relationships of tourism literature reviews were traced. LDA identified 45 and 22 topics, which narrowed the barriers in tourism studies. The regression analysis divided these topics into “hot”, “fresh”, “bell-shaped” and “stable” patterns. These modes represent the progress of tourism studies. The topic “new emerging technologies and the internet” is the focus of tourism literature reviews published in both databases. Future research could pay more attention to the topics in the “hot” and “fresh” patterns. The results enrich the progress of tourism literature reviews and provide a direction for future research.

Originality/value

To the best of the authors’ knowledge, this study is the first literature analysis for tourism literature reviews published in WOS versus CNKI journals. The proposed three-stage systematic method is used for the first time for the literature review and can guide future research.

目的

本研究旨在通过分析英文WOS和中文CNKI语言期刊上发表的文献综述文章, 回顾其影响、相互联系和趋势, 来扩大旅游知识体系。

方法

本研究设计了一个三阶段方法来了解旅游研究进展。绩效分析确定了出版时间线、发表的旅游文献综述的高产期刊和作者以及经常被引用的文章。科学地图可视化审视了合作作者和合作机构之间的内在联系。最后, 新兴趋势分析通过潜在狄利克雷分配和回归探讨了主题建模和演变。

研究结果

本文追踪了旅游文献综述的关键统计数据和合作情况。潜在狄利克雷分配确定了45个和22个主题, 这缩小了旅游研究中的研究缺口。回归分析将这些主题分为“热门”、“新鲜”、“钟形”和“稳定”模式。这些模式代表了旅游研究的进展。主题“新兴技术和互联网”是不同数据库中发表的旅游文献综述的焦点。未来的研究可以更多地关注“热门”和“新鲜”模式中的主题。研究结果丰富了旅游文献综述的进展, 为今后的研究提供了方向。

原创性/价值

这项研究是首次对WOS与CNKI期刊上发表的旅游文献评论进行文献分析。所提出的三阶段系统方法首次用于文献综述, 可以指导未来的研究。

Propósito

El objetivo de este estudio es ampliar el conocimiento turístico analizando los artículos de revisión documental publicados en revistas, tanto en la versión WOS en inglés cómo en CNKI China, y revisando sus efectos, interconexiones y tendencias.

Metodología

Se ha diseñado el método de tres etapas para comprender el progreso de la investigación turística. El análisis del desempeño determinó la línea de tiempo de publicación, las revistas de alto rendimiento y los comentarios de la literatura turística publicados por los autores, así como los artículos citados con frecuencia. La visualización de los mapas científicos, examina los vínculos intrínsecos entre los autores colaboradores y las instituciones colaboradoras. Finalmente, el análisis de tendencias emergentes explora el modelado temático y la evolución a través de posibles asignaciones y regresiones de dilick-ray.

Hallazgos

Se han analizado las estadísticas clave y las relaciones de cooperación de la revisión de la literatura turística. La asignación potencial de dilich-ray identifica 45 y 22 temas, lo que reduce las barreras en la investigación turística. El análisis de regresión divide estos temas en patrones “populares”, “novedosos”, “en forma de campana” y “estables”. Estos modelos representan el avance de la investigación turística. El tema “tecnologías emergentes e internet” es el foco de la revisión de la literatura turística publicada en diferentes bases de datos. La investigación futura puede centrarse más en temas en modelos “populares” y “novedosos”. Los resultados de la investigación enriquecen el progreso de la revisión de la literatura turística y proporcionan una dirección para futuras investigaciones.

Originalidad/valor

El estudio es el primer análisis documental de los comentarios de la literatura turística publicados en las revistas WOS y CNKI. El método sistemático de tres etapas propuesto se utiliza por primera vez en la revisión documental y puede guiar futuras investigaciones.

Article
Publication date: 13 February 2024

Amer Jazairy, Emil Persson, Mazen Brho, Robin von Haartman and Per Hilletofth

This study presents a systematic literature review (SLR) of the interdisciplinary literature on drones in last-mile delivery (LMD) to extrapolate pertinent insights from and into…

Abstract

Purpose

This study presents a systematic literature review (SLR) of the interdisciplinary literature on drones in last-mile delivery (LMD) to extrapolate pertinent insights from and into the logistics management field.

Design/methodology/approach

Rooting their analytical categories in the LMD literature, the authors performed a deductive, theory refinement SLR on 307 interdisciplinary journal articles published during 2015–2022 to integrate this emergent phenomenon into the field.

Findings

The authors derived the potentials, challenges and solutions of drone deliveries in relation to 12 LMD criteria dispersed across four stakeholder groups: senders, receivers, regulators and societies. Relationships between these criteria were also identified.

Research limitations/implications

This review contributes to logistics management by offering a current, nuanced and multifaceted discussion of drones' potential to improve the LMD process together with the challenges and solutions involved.

Practical implications

The authors provide logistics managers with a holistic roadmap to help them make informed decisions about adopting drones in their delivery systems. Regulators and society members also gain insights into the prospects, requirements and repercussions of drone deliveries.

Originality/value

This is one of the first SLRs on drone applications in LMD from a logistics management perspective.

Details

The International Journal of Logistics Management, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 0957-4093

Keywords

Article
Publication date: 22 October 2021

Fredrick Ahenkora Boamah, Jianhua Zhang and Md. Helal Miah

The effective and efficient implementation of daily work activities necessitates tacit knowledge sharing, boosting firm productivity. However, the link between tacit knowledge…

Abstract

Purpose

The effective and efficient implementation of daily work activities necessitates tacit knowledge sharing, boosting firm productivity. However, the link between tacit knowledge sharing within a company and its effects on organizational performance is unclear, so the purpose of this study is to examine the impact of sharing tacit knowledge on the success of a company.

Design/methodology/approach

Construction managers and senior managers were the study’s target participants. The correlation matrix was used to assess the significant correlation between study frameworks and the statistical approach of multiple regression was also used to test the hypotheses using statistical package for social sciences (SPSS) v.26.

Findings

The findings suggest that companies will be more willing and capable of making decisions based on experience when knowledge systems are used successfully. Furthermore, new organizational knowledge and particular evaluation procedures, such as anxiety and conflict resolution preparation, personal relationship and training improvement, mediation and task clarity, are explained, which can aid in success.

Originality/value

The study contributes to construction companies’ perception of knowledge sharing and recommends organizations to build capacity to encourage, improve engagement and review to maintain the dissemination of knowledge.

Details

Journal of Engineering, Design and Technology , vol. 21 no. 6
Type: Research Article
ISSN: 1726-0531

Keywords

Article
Publication date: 17 June 2021

Ambica Ghai, Pradeep Kumar and Samrat Gupta

Web users rely heavily on online content make decisions without assessing the veracity of the content. The online content comprising text, image, video or audio may be tampered…

1161

Abstract

Purpose

Web users rely heavily on online content make decisions without assessing the veracity of the content. The online content comprising text, image, video or audio may be tampered with to influence public opinion. Since the consumers of online information (misinformation) tend to trust the content when the image(s) supplement the text, image manipulation software is increasingly being used to forge the images. To address the crucial problem of image manipulation, this study focusses on developing a deep-learning-based image forgery detection framework.

Design/methodology/approach

The proposed deep-learning-based framework aims to detect images forged using copy-move and splicing techniques. The image transformation technique aids the identification of relevant features for the network to train effectively. After that, the pre-trained customized convolutional neural network is used to train on the public benchmark datasets, and the performance is evaluated on the test dataset using various parameters.

Findings

The comparative analysis of image transformation techniques and experiments conducted on benchmark datasets from a variety of socio-cultural domains establishes the effectiveness and viability of the proposed framework. These findings affirm the potential applicability of proposed framework in real-time image forgery detection.

Research limitations/implications

This study bears implications for several important aspects of research on image forgery detection. First this research adds to recent discussion on feature extraction and learning for image forgery detection. While prior research on image forgery detection, hand-crafted the features, the proposed solution contributes to stream of literature that automatically learns the features and classify the images. Second, this research contributes to ongoing effort in curtailing the spread of misinformation using images. The extant literature on spread of misinformation has prominently focussed on textual data shared over social media platforms. The study addresses the call for greater emphasis on the development of robust image transformation techniques.

Practical implications

This study carries important practical implications for various domains such as forensic sciences, media and journalism where image data is increasingly being used to make inferences. The integration of image forgery detection tools can be helpful in determining the credibility of the article or post before it is shared over the Internet. The content shared over the Internet by the users has become an important component of news reporting. The framework proposed in this paper can be further extended and trained on more annotated real-world data so as to function as a tool for fact-checkers.

Social implications

In the current scenario wherein most of the image forgery detection studies attempt to assess whether the image is real or forged in an offline mode, it is crucial to identify any trending or potential forged image as early as possible. By learning from historical data, the proposed framework can aid in early prediction of forged images to detect the newly emerging forged images even before they occur. In summary, the proposed framework has a potential to mitigate physical spreading and psychological impact of forged images on social media.

Originality/value

This study focusses on copy-move and splicing techniques while integrating transfer learning concepts to classify forged images with high accuracy. The synergistic use of hitherto little explored image transformation techniques and customized convolutional neural network helps design a robust image forgery detection framework. Experiments and findings establish that the proposed framework accurately classifies forged images, thus mitigating the negative socio-cultural spread of misinformation.

Details

Information Technology & People, vol. 37 no. 2
Type: Research Article
ISSN: 0959-3845

Keywords

Content available
Article
Publication date: 2 November 2023

Qi Yao, Yuntong Liang, Mengying Feng and Hao Wang

Based on the chain liability and green halo effects, this study uses the perspective of multi-tier supply chain management to examine the impact mechanism and boundary conditions…

Abstract

Purpose

Based on the chain liability and green halo effects, this study uses the perspective of multi-tier supply chain management to examine the impact mechanism and boundary conditions of suppliers' green innovation types on consumers' willingness to participate in value co-creation with focal firms from the perspective of multi-tier supply chain management.

Design/methodology/approach

Using four situational experiments, 660 participants were recruited in Credamo, and SPSS 23.0 was used for data analysis. Experiments 1a and 1b verify the effect of suppliers' green innovation on consumers' willingness to participate in value co-creation with focal firms; experiment 2 examines the mediating effect of green sincerity perception; and experiment 3 explores the moderating effect of innovation proactiveness.

Findings

The results show that suppliers' green innovation efforts are more sincere when they are substantive (vs. symbolic), thereby generating higher value co-creation intentions. As a driving force, innovation proactiveness moderates the influence of suppliers' green innovation types on consumer's willingness to co-create value with focal firms.

Originality/value

This study enriches the literature on green supply chain management (GSCM) and consumers' willingness to co-create value. Furthermore, this study provides firms with practical guidance to improve marketing performance and green innovation practices through multilevel GSCM.

Details

International Journal of Physical Distribution & Logistics Management, vol. 53 no. 10
Type: Research Article
ISSN: 0960-0035

Keywords

Article
Publication date: 3 October 2023

Jie Chu, Junhong Li, Yizhe Jiang, Weicheng Song and Tiancheng Zong

The Wiener-Hammerstein nonlinear system is made up of two dynamic linear subsystems in series with a static nonlinear subsystem, and it is widely used in electrical, mechanical…

Abstract

Purpose

The Wiener-Hammerstein nonlinear system is made up of two dynamic linear subsystems in series with a static nonlinear subsystem, and it is widely used in electrical, mechanical, aerospace and other fields. This paper considers the parameter estimation of the Wiener-Hammerstein output error moving average (OEMA) system.

Design/methodology/approach

The idea of multi-population and parameter self-adaptive identification is introduced, and a multi-population self-adaptive differential evolution (MPSADE) algorithm is proposed. In order to confirm the feasibility of the above method, the differential evolution (DE), the self-adaptive differential evolution (SADE), the MPSADE and the gradient iterative (GI) algorithms are derived to identify the Wiener-Hammerstein OEMA system, respectively.

Findings

From the simulation results, the authors find that the estimation errors under the four algorithms stabilize after 120, 30, 20 and 300 iterations, respectively, and the estimation errors of the four algorithms converge to 5.0%, 3.6%, 2.7% and 7.3%, which show that all four algorithms can identify the Wiener-Hammerstein OEMA system.

Originality/value

Compared with DE, SADE and GI algorithm, the MPSADE algorithm not only has higher parameter estimation accuracy but also has a faster convergence speed. Finally, the input–output relationship of laser welding system is described and identified by the MPSADE algorithm. The simulation results show that the MPSADE algorithm can effectively identify parameters of the laser welding system.

Details

Engineering Computations, vol. 40 no. 9/10
Type: Research Article
ISSN: 0264-4401

Keywords

1 – 10 of 186