Search results

1 – 10 of over 2000
Article
Publication date: 6 February 2024

Junyi Chen, Buqing Cao, Zhenlian Peng, Ziming Xie, Shanpeng Liu and Qian Peng

With the increasing number of mobile applications, efficiently recommending mobile applications to users has become a challenging problem. Although existing mobile application…

Abstract

Purpose

With the increasing number of mobile applications, efficiently recommending mobile applications to users has become a challenging problem. Although existing mobile application recommendation approaches based on user attributes and behaviors have achieved notable effectiveness, they overlook the diffusion patterns and interdependencies of topic-specific mobile applications among user groups. mobile applications among user groups. This paper aims to capture the diffusion patterns and interdependencies of mobile applications among user groups. To achieve this, a topic-aware neural network-based mobile application recommendation method, referred to as TN-MR, is proposed.

Design/methodology/approach

In this method, first, the user representations are enhanced by introducing a topic-aware attention layer, which captures both the topic context and the diffusion history context. Second, it exploits a time-decay mechanism to simulate changes in user interest. Multitopic user representations are aggregated by the time decay module to output the user representations of cascading representations under multiple topics. Finally, user scores that are likely to download the mobile application are predicted and ranked.

Findings

Experimental comparisons and analyses were conducted on the actual 360App data set, and the results demonstrate that the effectiveness of mobile application recommendations can be significantly improved by using TN-MR.

Originality/value

In this paper, the authors propose a mobile application recommendation method based on topic-aware attention networks. By capturing the diffusion patterns and dependencies of mobile applications, it effectively assists users in selecting their applications of interest from thousands of options, significantly improving the accuracy of mobile application recommendations.

Details

International Journal of Web Information Systems, vol. 20 no. 2
Type: Research Article
ISSN: 1744-0084

Keywords

Article
Publication date: 22 March 2024

Qianmai Luo, Chengshuang Sun, Ying Li, Zhenqiang Qi and Guozong Zhang

With increasing complexity of construction projects and new construction processes and methods are adopted, more safety hazards are emerging at construction sites, requiring the…

Abstract

Purpose

With increasing complexity of construction projects and new construction processes and methods are adopted, more safety hazards are emerging at construction sites, requiring the application of the modern risk management methods. As an emerging technology, digital twin has already made valuable contributions to safety risk management in many fields. Therefore, exploring the application of digital twin technology in construction safety risk management is of great significance. The purpose of this study is to explore the current research status and application potential of digital twin technology in construction safety risk management.

Design/methodology/approach

This study followed a four-stage literature processing approach as outlined in the systematic literature review procedure guidelines. It then combined the quantitative analysis tools and qualitative analysis methods to organize and summarize the current research status of digital twin technology in the field of construction safety risk management, analyze the application of digital twin technology in construction safety risk management and identify future research trends.

Findings

The research findings indicate that the application of digital twin technology in the field of construction safety risk management is still in its early stages. Based on the results of the literature analysis, this paper summarizes five aspects of digital twin technology's application in construction safety risk management: real-time monitoring and early warning, safety risk prediction and assessment, accident simulation and emergency response, safety risk management decision support and safety training and education. It also proposes future research trends based on the current research challenges.

Originality/value

This study provides valuable references for the extended application of digital twin technology and offers a new perspective and approach for modern construction safety risk management. It contributes to the enhancement of the theoretical framework for construction safety risk management and the improvement of on-site construction safety.

Details

Engineering, Construction and Architectural Management, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 0969-9988

Keywords

Article
Publication date: 17 April 2023

Harry Kogetsidis

The purpose of this paper is to examine the contribution that problem structuring methods – a branch of the decision support discipline of operational research – have made in…

Abstract

Purpose

The purpose of this paper is to examine the contribution that problem structuring methods – a branch of the decision support discipline of operational research – have made in helping managers deal with situations of high complexity. The paper reviews the limitations of traditional operational research and argues that problem structuring methods have expanded the entire discipline and significantly contributed to its holistic nature and problem-solving orientation.

Design/methodology/approach

The paper provides a critical discussion of the limitations of the traditional operational research approach and examines how the development and successful application of problem structuring methods have opened up a new paradigm of analysis in management science.

Findings

In theoretical terms, problem structuring methods have moved the discipline of operational research away from its positivistic epistemology and towards interpretivism and the acceptance of a subjective social reality. In practical terms, they offer managers a broad range of appropriate analytical tools which provide transparency and offer the opportunity to those affected by the problem situation to be actively involved in the entire modelling process within a facilitated environment.

Originality/value

The paper offers a critical discussion of the contribution that problem structuring methods have made while also identifying the challenges they face as they try to achieve higher levels of recognition and acceptance in management science.

Details

International Journal of Organizational Analysis, vol. 32 no. 2
Type: Research Article
ISSN: 1934-8835

Keywords

Article
Publication date: 26 March 2024

Çağla Cergibozan and İlker Gölcük

The study aims to propose a decision-support system to determine the location of a regional disaster logistics warehouse. Emphasizing the importance of disaster logistics, it…

Abstract

Purpose

The study aims to propose a decision-support system to determine the location of a regional disaster logistics warehouse. Emphasizing the importance of disaster logistics, it considers the criteria to be evaluated for warehouse location selection. It is aimed to determine a warehouse location that will serve the disaster victims most efficiently in case of a disaster by making an application for the province of Izmir, where a massive earthquake hit in 2020.

Design/methodology/approach

The paper proposes a fuzzy best–worst method to evaluate the alternative locations for the warehouse. The method considers the linguistic evaluations of the decision-makers and provides an advantage in terms of comparison consistency. The alternatives were identified through interviews and discussions with a group of experts in the fields of humanitarian aid and disaster relief operations. The group consists of academics and a vice-governor, who had worked in Izmir. The results of a previously conducted questionnaire were also used in determining these locations.

Findings

It is shown how the method will be applied to this problem, and the most effective location for the disaster logistics warehouse in Izmir has been determined.

Originality/value

This study contributes to disaster preparedness and brings a solution to the organization of the logistics services in Izmir.

Details

Kybernetes, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 0368-492X

Keywords

Article
Publication date: 14 December 2023

Marjan Sharifi, Majid Siavashi and Milad Hosseini

Present study aims to extend the lattice Boltzmann method (LBM) to simulate radiation in geometries with curved boundaries, as the first step to simulate radiation in complex…

Abstract

Purpose

Present study aims to extend the lattice Boltzmann method (LBM) to simulate radiation in geometries with curved boundaries, as the first step to simulate radiation in complex porous media. In recent years, researchers have increasingly explored the use of porous media to improve the heat transfer processes. The lattice Boltzmann method (LBM) is one of the most effective techniques for simulating heat transfer in such media. However, the application of the LBM to study radiation in complex geometries that contain curved boundaries, as found in many porous media, has been limited.

Design/methodology/approach

The numerical evaluation of the effect of the radiation-conduction parameter and extinction coefficient on temperature and incident radiation distributions demonstrates that the proposed LBM algorithm provides highly accurate results across all cases, compared to those found in the literature or those obtained using the finite volume method (FVM) with the discrete ordinates method (DOM) for radiative information.

Findings

For the case with a conduction-radiation parameter equal to 0.01, the maximum relative error is 1.9% in predicting temperature along vertical central line. The accuracy improves with an increase in the conduction-radiation parameter. Furthermore, the comparison between computational performances of two approaches reveals that the LBM-LBM approach performs significantly faster than the FVM-DOM solver.

Originality/value

The difficulty of radiative modeling in combined problems involving irregular boundaries has led to alternative approaches that generally increase the computational expense to obtain necessary radiative details. To address the limitations of existing methods, this study presents a new approach involving a coupled lattice Boltzmann and first-order blocked-off technique to efficiently model conductive-radiative heat transfer in complex geometries with participating media. This algorithm has been developed using the parallel lattice Boltzmann solver.

Details

International Journal of Numerical Methods for Heat & Fluid Flow, vol. 34 no. 3
Type: Research Article
ISSN: 0961-5539

Keywords

Article
Publication date: 22 March 2024

Douglas Ramalho Queiroz Pacheco

This study aims to propose and numerically assess different ways of discretising a very weak formulation of the Poisson problem.

Abstract

Purpose

This study aims to propose and numerically assess different ways of discretising a very weak formulation of the Poisson problem.

Design/methodology/approach

We use integration by parts twice to shift smoothness requirements to the test functions, thereby allowing low-regularity data and solutions.

Findings

Various conforming discretisations are presented and tested, with numerical results indicating good accuracy and stability in different types of problems.

Originality/value

This is one of the first articles to propose and test concrete discretisations for very weak variational formulations in primal form. The numerical results, which include a problem based on real MRI data, indicate the potential of very weak finite element methods for tackling problems with low regularity.

Details

Engineering Computations, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 0264-4401

Keywords

Article
Publication date: 18 January 2024

Yahan Xiong and Xiaodong Fu

Users often struggle to select choosing among similar online services. To help them make informed decisions, it is important to establish a service reputation measurement…

Abstract

Purpose

Users often struggle to select choosing among similar online services. To help them make informed decisions, it is important to establish a service reputation measurement mechanism. User-provided feedback ratings serve as a primary source of information for this mechanism, and ensuring the credibility of user feedback is crucial for a reliable reputation measurement. Most of the previous studies use passive detection to identify false feedback without creating incentives for honest reporting. Therefore, this study aims to develop a reputation measure for online services that can provide incentives for users to report honestly.

Design/methodology/approach

In this paper, the authors present a method that uses a peer prediction mechanism to evaluate user credibility, which evaluates users’ credibility with their reports by applying the strictly proper scoring rule. Considering the heterogeneity among users, the authors measure user similarity, identify similar users as peers to assess credibility and calculate service reputation using an improved expectation-maximization algorithm based on user credibility.

Findings

Theoretical analysis and experimental results verify that the proposed method motivates truthful reporting, effectively identifies malicious users and achieves high service rating accuracy.

Originality/value

The proposed method has significant practical value in evaluating the authenticity of user feedback and promoting honest reporting.

Details

International Journal of Web Information Systems, vol. 20 no. 2
Type: Research Article
ISSN: 1744-0084

Keywords

Article
Publication date: 21 June 2023

Mehmet Kirmizi and Batuhan Kocaoglu

This study aims to analyze and synthesize the design features of existing digital transformation maturity models with a developed classification scheme and propose a generic…

Abstract

Purpose

This study aims to analyze and synthesize the design features of existing digital transformation maturity models with a developed classification scheme and propose a generic maturity model development wireframe based on design science research.

Design/methodology/approach

A systematic literature review is conducted on digital transformation maturity models in peer-reviewed journals, including the Emerald Insight, Science Direct, Scopus, Taylor & Francis and Web of Science databases, which resulted in 21 studies. A concept-centric tabular approach is used to analyze the studies, and intersectional demonstrations are used to synthesize the findings regarding the design features.

Findings

The classification scheme derived from the tabular concept-centric approach and iteratively evolved results in three main and 25 subcategories related to the design features. Analysis and synthesis of the studies reveal the granularity of the existing digital transformation maturity models concerning the design features. Furthermore, considering the design features in the classification scheme, a generic maturity model development wireframe is proposed to guide the researchers.

Research limitations/implications

The generic maturity model development wireframe and the classification scheme that represents the design features of existing maturity models guide the researchers for the maturity model development roadmap.

Originality/value

The existing literature review studies do not focus on the design feature of digital transformation maturity models within a systematic literature review perspective. A unique classification scheme derived from the tabular concept-centric approach aims to analyze the granularity level of the existing models. Furthermore, the generic maturity model development wireframe includes the guidelines and recommendations of design science studies and presents a roadmap for maturity model researchers.

Details

Journal of Modelling in Management, vol. 19 no. 2
Type: Research Article
ISSN: 1746-5664

Keywords

Article
Publication date: 4 December 2023

Ved Prabha Toshniwal, Rakesh Jain, Gunjan Soni, Sachin Kumar Mangla and Sandeep Narula

This study is centered on the identification of the most appropriate Technology Adoption (TA) model for investigating the adoption of Industry 4.0 technologies within…

Abstract

Purpose

This study is centered on the identification of the most appropriate Technology Adoption (TA) model for investigating the adoption of Industry 4.0 technologies within pharmaceutical and related enterprises. The aim is to facilitate a smooth transition to advanced technologies while concurrently achieving environmental sustainability.

Design/methodology/approach

Selection of a suitable TA theory is carried out using a hybrid multi-criteria decision-making (MCDM) approach incorporating PIvot Pairwise RElative Criteria Importance Assessment (PIPRECIA) and Fuzzy Measurement of alternatives and ranking according to Compromise solution (F-MARCOS) methods. A group of three experts is formulated for the ranking of criteria and alternatives based on those criteria.

Findings

The results indicate that out of all six TA models considered unified theory of acceptance and use of technology (UTAUT) model gets the highest utility function value, followed by the technical adoption model (TAM). Further, sensitivity analysis is conducted to confirm the validity of the MCDM model employed.

Research limitations/implications

Challenging times like COVID-19 pointed out the importance of technology in the pharmaceutical and healthcare sectors. TA studies in this area can help in the identification of critical factors that can assist pharmaceutical firms in their efforts to embrace emerging technologies, enhance their outputs and increase their efficiency.

Originality/value

The novelty of this research lies in the fact that the utilization of a TA theory prior to its implementation has not been witnessed in existing scholarly literature. The utilization of a TA theory, specifically within the pharmaceutical industry, can assist enterprises in directing their attention toward pertinent factors when contemplating the implementation of emerging technologies and achieving sustainable development.

Details

Management of Environmental Quality: An International Journal, vol. 35 no. 3
Type: Research Article
ISSN: 1477-7835

Keywords

Article
Publication date: 13 September 2023

Prasetyo Adi Wibowo Putro, Dana Indra Sensuse and Wahyu Setiawan Setiawan Wibowo

This paper aims to develop a framework for critical information infrastructure (CII) protection in smart government, an alternative measure for common cybersecurity frameworks…

Abstract

Purpose

This paper aims to develop a framework for critical information infrastructure (CII) protection in smart government, an alternative measure for common cybersecurity frameworks such as NIST Cybersecurity Framework and ISO 27001. Smart government is defined as the government administration sector of CII due to its similarity as a core of smart technology.

Design/methodology/approach

To ensure the validity of the data, the research methodology used in this paper follows the predicting malfunctions in socio-technical systems (PreMiSTS) approach, a variation of the socio-technical system (STS) approach specifically designed to predict potential issues in the STS. In this study, PreMiSTS was enriched with observation and systematic literature review as its main data collection method, thematic analysis and validation by experts using fuzzy Delphi method (FDM).

Findings

The proposed CII protection framework comprises several dimensions: objectives, interdependency, functions, risk management, resources and governance. For all those dimensions, there are 20 elements and 41 variables.

Practical implications

This framework can be an alternative guideline for CII protection in smart government, particularly in government administration services.

Originality/value

The author uses PreMiSTS, a socio-technical approach combined with thematic analysis and FDM, to design a security framework for CII protection. This combination was designed as a mixed-method approach to improve the likelihood of success in an IT project.

Details

Information & Computer Security, vol. 32 no. 1
Type: Research Article
ISSN: 2056-4961

Keywords

1 – 10 of over 2000