Search results

1 – 10 of 15
Article
Publication date: 1 August 2022

Di Wang, Xiongmian Wei, Jian Liu, Yunmian Xiao, Yongqiang Yang, Linqing Liu, Chaolin Tan, Xusheng Yang and Changjun Han

This paper aims to explore a structural optimization method to achieve the lightweight design of an aviation control stick part manufactured by laser powder bed fusion (LPBF…

Abstract

Purpose

This paper aims to explore a structural optimization method to achieve the lightweight design of an aviation control stick part manufactured by laser powder bed fusion (LPBF) additive manufacturing (AM). The utilization of LPBF for the fabrication of the part provides great freedom to its structure optimization, further reduces its weight and improves its portability.

Design/methodology/approach

The stress distribution of the model was analyzed by finite element analysis. The material distribution path of the model was optimized through topology optimization. The structure and size of the parts were designed by applying honeycomb structures for weight reduction. The lightweight designed control stick part model was printed by LPBF using AlSi10Mg.

Findings

The weight of the control stick model was reduced by 32.64% through the optimization method using honeycomb structures with various geometries. The similar stress concentrations of the control stick model indicate that weight reduction has negligible effect on its mechanical strength. The maximum stress of the lightweight designed model under loading is 230.85 MPa, which is 61.81% larger than that of the original model. The lightweight control stick part manufactured by LPBF has good printability and service performance.

Originality/value

A structural optimization method integrating topology, shape and size optimization was proposed for a lightweight AlSi10Mg control stick printed by LPBF. The effectiveness of the optimization method, the printability of the lightweight model and the service performance of LPBF-printed AlSi10Mg control stick was verified, which provided practical references for the lightweight design of AM.

Details

Rapid Prototyping Journal, vol. 28 no. 10
Type: Research Article
ISSN: 1355-2546

Keywords

Article
Publication date: 29 December 2022

Changhui Song, Junfei Huang, Linqing Liu, Zehua Hu, Yongqiang Yang, Di Wang and Chao Yang

This paper aims to better control the mechanical properties and functional properties of NiTi alloy.

Abstract

Purpose

This paper aims to better control the mechanical properties and functional properties of NiTi alloy.

Design/methodology/approach

NiTi alloy samples with equal atomic ratio were formed by selective laser melting (SLM). X-ray diffraction (XRD), differential scanning calorimetry (DSC), scanning electron microscopy and tensile testing methods were used to study the effects of different laser power and scanning speed on the densification behavior, phase transformation characteristics and mechanical properties of NiTi alloy.

Findings

Compared with the laser power, the variation of the keyhole effect caused by the change of scanning speed is more intense, which has a greater effect on the densification behavior of SLM NiTi alloy. The effect of the laser power on the phase transition temperature is small. The increase of scanning speed weakens the burning degree of Ni element, so phase transition temperature decreases. The results of DSC test and tensile test show that the scanning velocity can significantly change the phase transition temperature, martensite twins reorientation and stress–strain behavior of SLM NiTi alloy.

Originality/value

This study provides a potential method to regulate the mechanical properties and functional properties of NiTi shape memory alloy in the future and NiTi alloys formed by SLM with good elongation were obtained because the Supercellular crystal structure formed during the nonequilibrium solidification of SLM and the superfine precipitates dispersed in the alloy prevented the dislocation formation.

Details

Rapid Prototyping Journal, vol. 29 no. 4
Type: Research Article
ISSN: 1355-2546

Keywords

Article
Publication date: 2 August 2011

Liu Linqing, Tan Liwen and Ma Haiyan

Massive increases in international trade and investment extend industries beyond national borders, so states and enterprises have become the two critical players in the boundary…

Abstract

Purpose

Massive increases in international trade and investment extend industries beyond national borders, so states and enterprises have become the two critical players in the boundary of industries. The purpose of this paper is to provide a new conceptual framework to analyze the role of states and enterprises in enhancing the industrial international competitiveness (IIC).

Design/methodology/approach

Being a research‐based paper, the topic is approached by theoretical analysis and conceptual development. The paper reviews IIC literature and argues for a rational study ICC in the context of global value chain. Next, the paper puts forward a two‐dimensional governance model and five typical governance systems of the industries of developing countries. Examples of typical governance system are given based the practice of Chinese industries, such as appeal, rare earths, automotive, etc.

Findings

This paper constructs an industrial two‐dimensional governance model of the developing countries in the context of global value chain based on the interaction between industry governance and market governance, and also presents five typical governance systems – free to market, public governance, industrial governance, joint governance and network governance. Different governance system reflects different roles of states and enterprises played in the global value chains and result in different IIC in the end.

Research limitations/implications

The limitation is based primarily on methodology. The two‐dimensional governance model provides target‐oriented guidance for foresting international competitiveness of different types of industries. Future studies should include more in‐depth case studies on different governance system.

Originality/value

The paper presents a framework of the industrial two‐dimensional governance model, which emphasizes the important role of both states and enterprise in the IIC in the context of global value chain.

Details

Nankai Business Review International, vol. 2 no. 3
Type: Research Article
ISSN: 2040-8749

Keywords

Article
Publication date: 6 November 2017

Shi Min

The purpose of this paper is to explore the potential causes of the reduction of cotton cultivation in Shandong Province of China from the perspective of smallholders and notably…

Abstract

Purpose

The purpose of this paper is to explore the potential causes of the reduction of cotton cultivation in Shandong Province of China from the perspective of smallholders and notably examine the role of off-farm employment.

Design/methodology/approach

This paper extends an integrated behavioral model to analyze the relationship between off-farm employment and cotton cultivation by taking into account farmers’ risk attitudes. A household survey data of 144 Bt cotton farmers in six villages in Linqing County, Shandong Province conducted in 2012 and 2013 is used. A simultaneous equations model is established and further estimated by using three-stage least squares method.

Findings

Although the introduction of Bt cotton has promoted the increase in cotton acreage in China from 1999 to 2007, the planting area of cotton has been decreasing since 2007. The results show the significant correlations among risk attitude, off-farm employment, and cotton cultivation. The planting area of cotton is positively correlated with farmers’ willingness to take risk but negatively associated with off-farm employment of family members. The findings imply that the rapid emergence of off-farm labor markets is a major reason for the reduction of cotton acreage in Shandong Province. In the context of the more opportunities of off-farm employment in China, cotton acreage is expected to decrease further.

Originality/value

The findings provide a reasonable explanation for the reduction of cotton cultivation in Shandong. This analysis contributes to a better understanding of the relationships among individual risk attitude, off-farm employment, and agricultural behavior, thereby adding to the literature about the application of the integrated behavioral model.

Details

China Agricultural Economic Review, vol. 9 no. 4
Type: Research Article
ISSN: 1756-137X

Keywords

Book part
Publication date: 17 January 2023

Sylvia Gottschalk

Cryptoassets have recently attracted the attention of national and international financial regulators. Since the mid-2010s blockchains have increasingly been adapted to automate…

Abstract

Cryptoassets have recently attracted the attention of national and international financial regulators. Since the mid-2010s blockchains have increasingly been adapted to automate and replace many aspects of financial intermediation, and by 2015 Ethereum had created the smart contract language that underpins the digitization of real assets as asset-backed tokens (ABTs). Those were initially issued by FinTech companies, but more recently banks active on international capital and financial markets, and even central banks, for example, the Bank of Thailand, have developed their own digital platforms and blockchains. A wide variety of real and financial assets underpins ABTs, viz., real-estate, art, corporate and sovereign bonds, and equity. Consequently, owing to the significant market capitalization of cryptocurrencies, the Basel Committee on Banking Supervision (BCBS) published two consultative papers delineating its approach on cryptoasset regulation. In this study, the authors analyze the mechanics of ABTs and their potential risks, relying on case studies of recent issuance of tokens in equity, real-estate, and debt markets, to highlight their main characteristics. The authors also investigate the consequences of the increasingly oligopolistic structure of blockchain mining pools and Bitcoin exchanges for the integrity and security of unregulated distributed ledgers. Finally, the authors analyze the BCBS’ regulatory proposals, and discuss the reaction of international financial institutions and cryptocurrency interest groups. The main findings are, firstly, that most ABTs are akin to asset-backed securities. Secondly, nearly all ABTs are “off-chain/on-chain,” that is, the underlying is a traditional asset that exists off-chain and is subsequently digitized. The main exception is the World Bank’s bond-i that is genuinely native to the blockchain created by the Commonwealth Bank of Australia, and has no existence outside it. Thirdly, all ABTs are issued on permissioned blockchains, where anti-money laundering/anti-terrorist funding and know-your-customer regulations are enforced. From a prudential regulatory perspective, ABTs do not appear to pose serious systemic risks to international financial markets. This may account for the often negative reactions of banks, banking associations, and cryptocurrency interest groups to the BCBS’ 2021 proposals for risk-weighted capital provisions for cryptoassets, which are viewed as excessive. Finally, we found that issuance of ABTS and other smart contracts on permissionless blockchains such as Bitcoin and Ethereum could potentially generate financial instability. A precedent involving Ethereum and The DAO in 2016 shows that (i) there is a significant accountability gap in permissionless blockchains, and (ii) the core developers of blockchains and smart contract technology, and Bitcoin mining pools, exercise an unexpectedly high- and completely unregulated-amount of power in what is supposedly a decentralized network.

Open Access
Article
Publication date: 30 January 2004

Jess Browning and Seung-Hee Lee

The Incheon Region has numerous assets that fall within a Pentaport model.' These include the Incheon International Airport, the Port of Incheon, a coastal industrial park, free…

Abstract

The Incheon Region has numerous assets that fall within a Pentaport model.' These include the Incheon International Airport, the Port of Incheon, a coastal industrial park, free economic zones, a leisure port, and Songdo new town designed to be the future Silicon Valley of Korea. This paper looks at how Northeast Asia trade flows between China and Korea might be enhanced by application of the Pentaport model in making the Incheon region a North East Asian Hub. It looks also at their trade and logistics systems as well as their water borne commerce. It proposes an integrated transportation system for the Yellow Sea Region being beneficial to the economies of the Northeast Asia. It also stresses that innovative technologies for ships, terminals and cargo handling systems should be introduced to develop a competitive short sea shipping system in the region and cooperation among the regional countries will be essential to achieve the final goal. The potential of methods of container shipping is discussed as it might apply to short sea shipping in the Yellow Sea Region that could greatly facilitate Incheon's situation with respect to the broader region in application of the Pentaport model.

Details

Journal of International Logistics and Trade, vol. 1 no. 2
Type: Research Article
ISSN: 1738-2122

Keywords

Article
Publication date: 9 March 2015

Eugene Ferry, John O Raw and Kevin Curran

The interoperability of cloud data between web applications and mobile devices has vastly improved over recent years. The popularity of social media, smartphones and cloud-based…

2110

Abstract

Purpose

The interoperability of cloud data between web applications and mobile devices has vastly improved over recent years. The popularity of social media, smartphones and cloud-based web services have contributed to the level of integration that can be achieved between applications. This paper investigates the potential security issues of OAuth, an authorisation framework for granting third-party applications revocable access to user data. OAuth has rapidly become an interim de facto standard for protecting access to web API data. Vendors have implemented OAuth before the open standard was officially published. To evaluate whether the OAuth 2.0 specification is truly ready for industry application, an entire OAuth client server environment was developed and validated against the speciation threat model. The research also included the analysis of the security features of several popular OAuth integrated websites and comparing those to the threat model. High-impacting exploits leading to account hijacking were identified with a number of major online publications. It is hypothesised that the OAuth 2.0 specification can be a secure authorisation mechanism when implemented correctly.

Design/methodology/approach

To analyse the security of OAuth implementations in industry a list of the 50 most popular websites in Ireland was retrieved from the statistical website Alexa (Noureddine and Bashroush, 2011). Each site was analysed to identify if it utilised OAuth. Out of the 50 sites, 21 were identified with OAuth support. Each vulnerability in the threat model was then tested against each OAuth-enabled site. To test the robustness of the OAuth framework, an entire OAuth environment was required. The proposed solution would compose of three parts: a client application, an authorisation server and a resource server. The client application needed to consume OAuth-enabled services. The authorisation server had to manage access to the resource server. The resource server had to expose data from the database based on the authorisation the user would be given from the authorisation server. It was decided that the client application would consume emails from Google’s Gmail API. The authorisation and resource server were modelled around a basic task-tracking web application. The client application would also consume task data from the developed resource server. The client application would also support Single Sign On for Google and Facebook, as well as a developed identity provider “MyTasks”. The authorisation server delegated authorisation to the client application and stored cryptography information for each access grant. The resource server validated the supplied access token via public cryptography and returned the requested data.

Findings

Two sites out of the 21 were found to be susceptible to some form of attack, meaning that 10.5 per cent were vulnerable. In total, 18 per cent of the world’s 50 most popular sites were in the list of 21 OAuth-enabled sites. The OAuth 2.0 specification is still very much in its infancy, but when implemented correctly, it can provide a relatively secure and interoperable authentication delegation mechanism. The IETF are currently addressing issues and expansions in their working drafts. Once a strict level of conformity is achieved between vendors and vulnerabilities are mitigated, it is likely that the framework will change the way we access data on the web and other devices.

Originality/value

OAuth is flexible, in that it offers extensions to support varying situations and existing technologies. A disadvantage of this flexibility is that new extensions typically bring new security exploits. Members of the IETF OAuth Working Group are constantly refining the draft specifications and are identifying new threats to the expanding functionality. OAuth provides a flexible authentication mechanism to protect and delegate access to APIs. It solves the password re-use across multiple accounts problem and stops the user from having to disclose their credentials to third parties. Filtering access to information by scope and giving the user the option to revoke access at any point gives the user control of their data. OAuth does raise security concerns, such as defying phishing education, but there are always going to be security issues with any authentication technology. Although several high impacting vulnerabilities were identified in industry, the developed solution proves the predicted hypothesis that a secure OAuth environment can be built when implemented correctly. Developers must conform to the defined specification and are responsible for validating their implementation against the given threat model. OAuth is an evolving authorisation framework. It is still in its infancy, and much work needs to be done in the specification to achieve stricter validation and vendor conformity. Vendor implementations need to become better aligned in order to provider a rich and truly interoperable authorisation mechanism. Once these issues are resolved, OAuth will be on track for becoming the definitive authentication standard on the web.

Details

Information & Computer Security, vol. 23 no. 1
Type: Research Article
ISSN: 2056-4961

Keywords

Open Access
Article
Publication date: 31 December 2003

Jess Browning

In the 21st Century, a region 's growth and prosperity will depend upon its intermodal transportation infrastructure and its ability to efficiently move goods, materials, and…

Abstract

In the 21st Century, a region 's growth and prosperity will depend upon its intermodal transportation infrastructure and its ability to efficiently move goods, materials, and people within the system whether it be from origin to destination; from supplier to customer through the various levels of the supply-chain; or from point to point within the system. Planning for the future focuses on improving a region 's intermodal transportation system efficiencies and infrastructure, its connection to other economies, and on the development of logistics institutions and facilities.

With China 's rapidly developing economy and society, record numbers of new modern facilities such as airports, ports, highways, logistics parks and warehouses are being built. Along with this, companies have made extensive investments in information technologies and software to support the tremendous growth that has taken place in the logistics industry. The development and improvement of China's historic inland water transport system is essential to their continued future growth and prosperity. In Korea, past and present National Governments have emphasized the importance of developing a North East Asian Logistics and Business Hub in their region and have worked on strategies, which include water transport, as part of an important national agenda to that end.

This article looks at how trade flows in the Yangtze and Yellow Sea Regions and between China and South Korea might be enhanced by application of improved shipping methods in marine commerce that will promote economic growth in the region. The application of logistics practices and use of barges is explored for the movement of containers on inland and coastal waterways as well as in short sea shipping which could greatly facilitate the region 's situation with respect to future economic growth.

Details

Journal of International Logistics and Trade, vol. 1 no. 1
Type: Research Article
ISSN: 1738-2122

Article
Publication date: 16 August 2011

Sudipto Ray and S.K. Roy Chowdhury

The paper's aim is to predict numerically the contact temperatures between two rough sliding bodies and to compare with the experimental results.

Abstract

Purpose

The paper's aim is to predict numerically the contact temperatures between two rough sliding bodies and to compare with the experimental results.

Design/methodology/approach

An elastic contact algorithm is used to analyze the normal contact between two nominally smooth surfaces. The algorithm evaluates real contact area using digitized roughness data and the corresponding contact pressure distribution. Using finite element method a steady state 3D temperature distribution at the interface between the sliding bodies is obtained. Using infrared (IR) imaging technique, experiments were carried out to measure the contact temperature distribution between rough rubbing bodies with a systematic variation of surface roughness and operating variables.

Findings

Contact temperature distributions over a wide range of normal load, sliding velocity and surface roughness have been obtained. It was seen that the maximum contact temperature expectedly increases with surface roughness (Sa values), normal load and sliding velocity. The results also indicate that the “hot spots” are located exactly at the positions where the contact pressures are extremely high. Temperatures can be seen to fall drastically at areas where no asperity contacts were established. The temperature contours at different depths were also plotted and it was observed that the temperatures fall away from the actual contact zone and relatively high temperatures persist at the “hot spot” zones much below the contact surface. Finally it is encouraging to find a good correlation between the numerical and experimental results and this indicates the strength of the present analysis.

Research limitations/implications

Experimental accuracy can be improved by using a thermal imaging camera that measures emissivity in situ and uses it to find the contact temperature. The spatial resolution and the response time of the camera also need to be improved. This can improve the correlation between numerical and experimental results.

Practical implications

One of the major factors attributed to the failure of sliding components is the frictional heating and the resulting flash temperatures at the sliding interface. However, it is not easy to measure such temperatures owing to the inherent difficulties in accessing the contact zone. Besides, thermal imaging techniques can be applied only with such tribo‐pairs where at least one of the contacting materials is transparent to IR radiation. In practice, such cases are a rarity. However, the good correlation observed between the numerical and experimental results in this work would give the practicing engineer a confidence to apply the numerical model directly and calculate contact temperatures for any tribo‐material pairs that are generally seen around.

Originality/value

A good correlation between the numerical and experimental results gives credence to the fact that the numerical model can be used to predict contact temperatures between any sliding tribo‐pairs.

Details

Industrial Lubrication and Tribology, vol. 63 no. 5
Type: Research Article
ISSN: 0036-8792

Keywords

Article
Publication date: 18 August 2023

Filipe Ferreira, Pedro Briga, Sérgio Ramos Teixeira and Fernando Almeida

This study aims to present an innovative sandbox platform that implements a decision support system (DSS) to assess the sustainable development goals (SDGs) addressed at the…

Abstract

Purpose

This study aims to present an innovative sandbox platform that implements a decision support system (DSS) to assess the sustainable development goals (SDGs) addressed at the municipal level. It intends to determine the relative importance of each SDG in municipalities and explore the synergies that can be discovered among them.

Design/methodology/approach

Participatory action research is used to develop a DSS and an algorithm designated as discrete heavy fuzzy was also developed, which extends the Apriori algorithm to include discrete quantitative assessments of the level of SDG compliance by each project. A scenario consisting of three municipalities in Portugal (i.e. Porto, Loulé and Castelo de Vide) was chosen to demonstrate the implementation of the sandbox platform and to interpret the observed results.

Findings

The results reveal significant differences in the typology of SDGs addressed by each municipality. It was found that municipal sustainable projects are strongly influenced by the contextual factors of each municipality. Porto has projects that address the first five SDGs. Loulé appears projects that promote innovation, the fight against climate change and the development of sustainable cities. Castelo de Vida has initiatives related to innovation and infrastructure and decent work and economic growth.

Research limitations/implications

This study provides knowledge about the relative importance of the SDGs in Portuguese municipalities and explores the synergies among them. The proposed sandbox platform fills the gaps of the ODSlocal Webtool by proposing a dynamic and interactive approach for the exploration of quantitative indicators regarding the implementation status of the SDGs established in the 2030 Agenda.

Originality/value

This study provides knowledge about the relative importance of the SDGs and the various synergies that exist between them considering the Portuguese municipalities. The sandbox platform presented and developed within this study allows filling the gaps of the ODSlocal Webtool that gathers essentially qualitative information about each project and offers a dynamic and interactive exploration with quantitative indicators of the implementation status of the SDGs established in the 2030 Agenda.

Details

Journal of Engineering, Design and Technology , vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 1726-0531

Keywords

1 – 10 of 15