Search results

1 – 10 of over 22000
Article
Publication date: 26 January 2021

Charlie Silva Lopes, Denis Silva da Silveira and João Araujo

The primary concern of quality improvement in processes is not the input–output conversion but the information that enables and controls process. This paper presents process…

Abstract

Purpose

The primary concern of quality improvement in processes is not the input–output conversion but the information that enables and controls process. This paper presents process fragments for dimensions of information quality (IQ).

Design/methodology/approach

Research is based on the design science paradigm to create four fragments of reusable processes, that contemplate the following dimensions of IQ: accessibility, completeness, accuracy and consistency.

Findings

There is a theoretical discussion of the concept of IQ in process models, in which the fragments presented provide designers with a reduction in modeling time through reuse. Therefore, the designer has the flexibility to improve the IQ according to the context of each process.

Practical implications

The discussion is relevant for both researchers and business designers because it shows that IQ is essential to guarantee the efficient execution of processes.

Social implications

Processes modeling can be a challenge for inexperienced designers as they always try to solve a problem from the start, without worrying about the IQ dimensions in process models. Fragments here presented can be (re)used to guide these designers in processes modeling with more IQ.

Originality/value

Process modeling approaches provide expressive techniques but do not guarantee IQ in the models. However, these approaches present process fragments that can be easily used to contemplate IQ in process models. In this context, process fragments reuse stands out as an innovative solution to mitigate the shortcomings of process models related to IQ.

Details

International Journal of Quality & Reliability Management, vol. 38 no. 9
Type: Research Article
ISSN: 0265-671X

Keywords

Article
Publication date: 18 January 2013

Chen Guodong, Zeyang Xia, Rongchuan Sun, Zhenhua Wang and Lining Sun

Detecting objects in images and videos is a difficult task that has challenged the field of computer vision. Most of the algorithms for object detection are sensitive to…

Abstract

Purpose

Detecting objects in images and videos is a difficult task that has challenged the field of computer vision. Most of the algorithms for object detection are sensitive to background clutter and occlusion, and cannot localize the edge of the object. An object's shape is typically the most discriminative cue for its recognition by humans. The purpose of this paper is to introduce a model‐based object detection method which uses only shape‐fragment features.

Design/methodology/approach

The object shape model is learned from a small set of training images and all object models are composed of shape fragments. The model of the object is in multi‐scales.

Findings

The major contributions of this paper are the application of learned shape fragments‐based model for object detection in complex environment and a novel two‐stage object detection framework.

Originality/value

The results presented in this paper are competitive with other state‐of‐the‐art object detection methods.

Article
Publication date: 6 July 2015

Yanjun Zhang and Youchao Sun

This paper aims to propose a method of hazards identification of uncontained engine rotor failure (UERF) based on collision detection between geometric models. UERF is a typical…

Abstract

Purpose

This paper aims to propose a method of hazards identification of uncontained engine rotor failure (UERF) based on collision detection between geometric models. UERF is a typical particular risk that imposes threat on flight safety of an aircraft. Aircraft systems are made up of many parts and components; therefore, it is difficult to identify hazards caused by UERF early in the design cycle.

Design/methodology/approach

The methodology involves the following steps: the mapping relationship of input information is established; the parametric models are used to simulate the uncontained fragments of different categories; the parts and components that the uncontained fragment may collide with are determined by uniform space decomposition and precise collision detection; and the catastrophic hazards are identified with the comparison of the collision detection result sets and the minimum cut sets.

Findings

An application case, which takes the hydraulic system of a certain type of civil aircraft in design as a study object, shows that the method proposed in this paper is suitable and efficient for hazards identification of UERF.

Practical implications

The method proposed herein is useful for acquiring the minimum cut sets that will be triggered by the uncontained fragment in the design phase.

Originality/value

A novel and effective method of hazards identification of UERF for an aircraft with large and complex systems is presented, which is helpful to the optimization of the layout design of parts and components of the aircraft.

Details

Aircraft Engineering and Aerospace Technology: An International Journal, vol. 87 no. 4
Type: Research Article
ISSN: 0002-2667

Keywords

Article
Publication date: 29 March 2013

Aleksandar Hudic, Shareeful Islam, Peter Kieseberg, Sylvi Rennert and Edgar R. Weippl

The aim of this research is to secure the sensitive outsourced data with minimum encryption within the cloud provider. Unfaithful solutions for providing privacy and security…

2913

Abstract

Purpose

The aim of this research is to secure the sensitive outsourced data with minimum encryption within the cloud provider. Unfaithful solutions for providing privacy and security along with performance issues by encryption usage of outsourced data are the main motivation points of this research.

Design/methodology/approach

This paper presents a method for secure and confidential storage of data in the cloud environment based on fragmentation. The method supports minimal encryption to minimize the computations overhead due to encryption. The proposed method uses normalization of relational databases, tables are categorized based on user requirements relating to performance, availability and serviceability, and exported to XML as fragments. After defining the fragments and assigning the appropriate confidentiality levels, the lowest number of Cloud Service Providers (CSPs) is used required to store all fragments that must remain unlinkable in separate locations.

Findings

Particularly in the cloud databases are sometimes de‐normalised (their normal form is decreased to lower level) to increase the performance.

Originality/value

The paper proposes a methodology to minimize the need for encryption and instead focus on making data entities unlinkable so that even in the case of a security breach for one set of data, the privacy impact on the whole is limited. The paper would be relevant to those people whose main concern is to preserve data privacy in distributed systems.

Details

International Journal of Pervasive Computing and Communications, vol. 9 no. 1
Type: Research Article
ISSN: 1742-7371

Keywords

Article
Publication date: 1 July 2005

Markos Goulielmos

Proposes to analyze known case studies of information systems failure.

3386

Abstract

Purpose

Proposes to analyze known case studies of information systems failure.

Design/methodology/approach

Uses the organizational failure diagnosis model.

Findings

Finds that there is the need to assess the organization's “health” prior to information systems development and to raise the organization's actual capacity for systems development to the necessary levels for success.

Originality/value

Previous studying of these cases has underplayed the role of technical problems as the surface manifestations of deeper‐rooted organizational pathologies causing the failure. The usefulness of the organizational failure diagnosis model is shown in recognizing these deeper‐rooted issues and a number of suggestions are made for the prevention of failure.

Details

Disaster Prevention and Management: An International Journal, vol. 14 no. 3
Type: Research Article
ISSN: 0965-3562

Keywords

Article
Publication date: 1 December 1998

Terje Brasethvik

States that heterogeneous project groups today may be expected to use the mechanisms of the Web for sharing information. Metadata has been proposed as a mechanism for expressing…

Abstract

States that heterogeneous project groups today may be expected to use the mechanisms of the Web for sharing information. Metadata has been proposed as a mechanism for expressing semantics of information and, hence, facilitate information retrieval, understanding and use. Presents an approach to sharing of information which aims to use a semantic modeling language as the basis for expressing semantics of information and designing metadata schemes. Functioning in the borderlines between human and computer understandability, the modeling language could be able to express semantics of published Web documents. Reporting on work in progress, the paper presents the overall framework and ideas.

Details

Internet Research, vol. 8 no. 5
Type: Research Article
ISSN: 1066-2243

Keywords

Article
Publication date: 8 November 2011

Oluwole Alfred Olatunji

The popularity of Building Information Modelling (BIM) has improved tremendously in recent years. The business sense it makes to construction small to medium‐sized (SME…

3296

Abstract

Purpose

The popularity of Building Information Modelling (BIM) has improved tremendously in recent years. The business sense it makes to construction small to medium‐sized (SME) organizations has also become vitally important, especially when the deliverables of BIM potentials are becoming more explicit than they were several years ago. Moreover, there is adequate evidence to suggest that an early adoption of BIM by construction SME organizations could mean marked sustainable business advantage to them. The purpose of this paper is to initiate a long‐term study on how BIM triggers market improvements in the Australian construction industry, to establish the specific impact of these on construction industry's contribution to Australian economy, also to develop a simple model on the cost of implementing BIM in a typical construction SME.

Design/methodology/approach

This research relies on evidence from literature to identify different operational models of construction organizations, namely; matrix, divisional, functional and networked business models. A definite approach was taken to articulate some contributory concepts and rationales which drive organizational response to technological changes across the identified four categories of organization structure models. Focus group discussion was the primary research method for this study, while additional data were collected from public sources. Respondents and data were sourced from two firms selected from each type of organization model. In the end, 24 industry practitioners from a range of Australian construction SME businesses that provide software and technical support services, consultancy and contracting services took part in the study.

Findings

Analysis of 32 sample cases revealed that BIM implementation costs were mostly defined by a range of cost variables, including software acquisition and technical support, hardware, training, services and implementation contingencies. On the average, software costs accounted for about 55 percent of total implementation costs. This particular cost descriptor was about five to seven times more than the cost of hardware (depending on the level of sophistication of operations, expected implementation outcomes and whether new hardware were used or existing installation were upgraded with BIM compliant drivers). The study also found that training cost was a third of software costs, while the average total cost of services, recruitment and contingencies, all added together, was about 5 percent of total implementation costs. In the end, a linear model was developed to predict the cost of BIM implementation in construction SMEs.

Originality/value

A preliminary version of this study has been presented in the 2010 edition of the International Conference on Information Technology in Construction (CIB W078). As a study in a new direction, it focuses on specific organization models and their unique responses to drivers of change. While other studies have looked into macro implementation of BIM, mostly without considering the peculiarity and dynamics of organization structure, this study has focused on construction SME businesses offering a wide range of services.

Book part
Publication date: 31 January 2022

Monica E. Mincu and Sara Romiti

The Italian system of education is characterised by weak school autonomy, strong teacher autonomy, and lack of collegial cultures. From the point of the cohesion/regulation…

Abstract

The Italian system of education is characterised by weak school autonomy, strong teacher autonomy, and lack of collegial cultures. From the point of the cohesion/regulation matrix, the Italian case is rather of an individualist type with some fatalist notes, given a widespread culture of pedagogical egalitarianism and the existence of formal collegial bodies. There are many barriers to the introduction of evidence-based practice in Italian teaching. At the same time, some major enablers at the school level are as a self-evaluation school rapport and a school improvement plan. At the school system level, the Institute for school evaluation is as a key player contributing to the advancement of a culture of EIP. We argue that an enduring centralization model with weak coordination mechanisms at the school level is not suitable to mobilize academic research knowledge across the Italian system. A new governance mechanism based on widely disseminated policies would be of critical importance in the Italian case, in order to improve the use of EIP in schools and to enhance the skills of teachers and school leaders through professional development.

Details

The Emerald Handbook of Evidence-Informed Practice in Education
Type: Book
ISBN: 978-1-80043-141-6

Keywords

Case study
Publication date: 26 February 2024

Jinyun Sun and Feiting Wu

This case is mainly about the development journey of Tujia, a unicorn in China's accommodations-sharing sector, as well as the development status of the sector. On December 1…

Abstract

This case is mainly about the development journey of Tujia, a unicorn in China's accommodations-sharing sector, as well as the development status of the sector. On December 1, 2011, Tujia.com—China's first medium- and high-end vacation apartment booking platform—was formally launched, and it announced the first round of capital injection in less than half a year after its launch. It completed D and D+ round of financing on August 3, 2015, securing $300 million with an estimated value exceeding $1 billion. The completion of this financing round meant that Tujia formally entered the $1 billion club composed of “unicorn” Internet companies. In June 2016, it announced the strategic M&A of Mayi; in October 2016, it announced its strategic agreement with Ctrip.com and Qunar.com for the M&A of their apartment and homestay businesses. The completion of these transactions manifested the matrix with the four major platforms Tujia, Mayi, Ctrip, and Qunar. Since then, Tujia has become the absolute pacesetter in China's online accommodations-sharing sector.

Details

FUDAN, vol. no.
Type: Case Study
ISSN: 2632-7635

Article
Publication date: 7 November 2020

Diego Toralles Avila, Rubens Ideron dos Santos, Jan Mendling and Lucineia Heloisa Thom

Process modeling guidelines are a valuable instrument for increasing the quality of process models. Since finding and selecting suitable guidelines are challenging, this paper…

Abstract

Purpose

Process modeling guidelines are a valuable instrument for increasing the quality of process models. Since finding and selecting suitable guidelines are challenging, this paper aims to find and select suitable guidelines because they are scattered across the many studies of the literature. Also, not all of them are supported by empirical studies.

Design/methodology/approach

The authors conducted a systematic literature review to collect and analyze process modeling guidelines present in the literature and the empirical evidence that supports them.

Findings

The authors investigated a total of 793 articles and identified a total of 45 process modeling guidelines in five different categories. For each of these guidelines, the authors report empirical evidence together with corresponding measures, such as comprehension accuracy and error probability.

Originality/value

Compared to the prior literature reviews on process model quality and process modeling guidelines, this article extends current knowledge by analyzing the empirical evidence and variables associated with each guideline. This analysis provides guidance for practitioners and scholars on which guidelines to use while modeling a process and perform further research on.

Details

Business Process Management Journal, vol. 27 no. 1
Type: Research Article
ISSN: 1463-7154

Keywords

1 – 10 of over 22000