Search results

1 – 10 of over 1000
Article
Publication date: 14 December 2023

Ali Al Owad, Neeraj Yadav, Vimal Kumar, Vikas Swarnakar, K. Jayakrishna, Salah Haridy and Vishwas Yadav

Lean Six Sigma (LSS) implementation follows a structured approach called define-measure-analyze-improve-control (DMAIC). Earlier research about its application in emergency…

Abstract

Purpose

Lean Six Sigma (LSS) implementation follows a structured approach called define-measure-analyze-improve-control (DMAIC). Earlier research about its application in emergency healthcare services shows that it requires organizational transformation, which many healthcare setups find difficult. The Kotter change management model facilitates organizational transformation but has not been attempted in LSS settings till now. This study aims to integrate the LSS framework with the Kotter change management model to come up with an integrated framework that will facilitate LSS deployment in emergency health services.

Design/methodology/approach

Two-stage Delphi method was conducted by using a literature review. First, the success factors and barriers of LSS are investigated, especially from an emergency healthcare point of view. The features and benefits of Kotter's change management models are then reviewed. Subsequently, they are integrated to form a framework specific to LSS deployment in an emergency healthcare set-up. The elements of this framework are analyzed using expert opinion ratings. A new framework for LSS deployment in emergency healthcare has been developed, which can prevent failures due to challenges faced by organizations in overcoming resistance to changes.

Findings

The eight steps of the Kotter model such as establishing a sense of urgency, forming a powerful guiding coalition, creating a vision, communicating the vision, empowering others to act on the vision, planning for and creating short-term wins, consolidating improvements and producing still more change, institutionalizing new approaches are derived from the eight common errors that managers make while implementing change in the institution. The study integrated LSS principles and Kotter’s change management model to apply in emergency care units in order to reduce waste and raise the level of service quality provided by healthcare companies.

Research limitations/implications

The present study could contribute knowledge to the literature by providing a framework to integrate lean management and Kotter's change management model for the emergency care unit of the healthcare organization. This framework guides decision-makers and organizations as proper strategies are required for applying lean management practices in any system.

Originality/value

The proposed framework is unique and no other study has prescribed any integrated framework for LSS implementation in emergency healthcare that overcomes resistance to change.

Details

Benchmarking: An International Journal, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 1463-5771

Keywords

Article
Publication date: 15 June 2023

Amna Salman and Wasiq Ahmad

The Operations and Maintenance (O&M) cost of a facility is typically 60–85% of the total life cycle cost of a building whereas its design and construction cost accounts for only…

Abstract

Purpose

The Operations and Maintenance (O&M) cost of a facility is typically 60–85% of the total life cycle cost of a building whereas its design and construction cost accounts for only 5–10%. Therefore, enhancing and optimizing the O&M of a facility is a crucial issue. In addition, with the increasing complexities in a building's operating systems, more technologically advanced solutions are required for proactively maintaining a facility. Thereby, a tool is needed which can optimize and reduce the cost of facility maintenance. One of the solutions is Augmented or Mixed Reality (AR/MR) technologies which can reduce repair time, training time and streamline inspections. Therefore, the purpose of this study is to establish contextual knowledge of AR/MR application in facilities operation and maintenance and present an implementation framework through the analysis and classification of articles published between 2015 and 2022.

Design/methodology/approach

To effectively understand all AR/MR applications in facilities management (FM), a systematic literature review is performed. The Preferred Reporting Items for Systematic Reviews and Meta-Analysis (PRISMA) protocol was followed for searching and describing the search strategies. Keywords were identified through the concept mapping technique. The Scopus database and Google Scholar were employed to find relevant articles, books and conference papers. A thorough bibliometric analysis was conducted using VOS Viewer and subsequently, a thematic analysis was performed for the selected publications.

Findings

The use of AR/MR within facilities O&M could be categorized into five different application areas: (1) visualization; (2) maintenance; (3) indoor localization and positioning; (4) information management and (5) indoor environment. After a thematic analysis of the literature, it was found that maintenance and indoor localization were the most frequently used research application domains. The chronological evolution of AR/MR in FM is also presented along with the origin of publications, which showed that the technology is out of its infancy stage and is ready for implementation. However, literature showed many challenges hindering this goal, that is (1) reluctance of the organizational leadership to bear the cost of hardware and trainings for the employees, (2) Lack of BIM use in FM and (3) system lagging, crashing and unable to register the real environment. A preliminary framework is presented to overcome these challenges.

Originality/value

This study accommodates a variety of application domains within facilities O&M. The publications were systematically selected from the existing literature and then reviewed to exhibit various AR/MR applications to support FM. There have been no literature reviews that focus on AR and/or MR in the FM and this paper fills the gap by not only presenting its applications but also developing an implementation framework.

Details

Smart and Sustainable Built Environment, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 2046-6099

Keywords

Article
Publication date: 16 April 2024

Sha Zhou, Yaqin Su, Muhammad Aamir Shahzad and Zhengchi Liu

The integration of social media and e-commerce has resulted in a rising phenomenon among individual content providers (ICPs), who used to offer free content, to provide consumers…

Abstract

Purpose

The integration of social media and e-commerce has resulted in a rising phenomenon among individual content providers (ICPs), who used to offer free content, to provide consumers with paid content, such as online courses, Q&As or consultations. Despite the prevalence of ICPs’ content monetization, empirical research has rarely studied its underlying mechanism. This paper examines how the characteristics of free content contributed by ICPs on social media platforms influence their paid content sales, focusing on the perspective of human brand.

Design/methodology/approach

The empirical setting is an online knowledge exchange platform, where users are allowed to provide free content (e.g. answers) on the social media platform and launch paid content (e.g. lectures) on the e-commerce platform. A machine learning technique is employed to construct measures for the characteristics of free content, and fixed-effects estimation is presented to confirm which factors have a significant influence on the sales of paid content.

Findings

The empirical results show that the quality, diversity and expertness of free content have a significant positive impact on the sales of the ICP-paid content, with the brand popularity of ICP playing a mediating role.

Originality/value

This study is the first attempt to demystify the relationship between content contribution and ICPs’ content monetization from the perspective of human brand. The findings validate the effectiveness of the “Selling by Contribution” strategy and provide valuable insights for ICPs and social media platforms.

Details

Internet Research, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 1066-2243

Keywords

Article
Publication date: 4 April 2024

Dong Li, Yu Zhou, Zhan-Wei Cao, Xin Chen and Jia-Peng Dai

This paper aims to establish a lattice Boltzmann (LB) method for solid-liquid phase transition (SLPT) from the pore scale to the representative elementary volume (REV) scale. By…

Abstract

Purpose

This paper aims to establish a lattice Boltzmann (LB) method for solid-liquid phase transition (SLPT) from the pore scale to the representative elementary volume (REV) scale. By applying this method, detailed information about heat transfer and phase change processes within the pores can be obtained, while also enabling the calculation of larger-scale SLPT problems, such as shell-and-tube phase change heat storage systems.

Design/methodology/approach

Three-dimensional (3D) pore-scale enthalpy-based LB model is developed. The computational input parameters at the REV scale are derived from calculations at the pore scale, ensuring consistency between the two scales. The approaches to reconstruct the 3D porous structure and determine the REV of metal foam were discussed. The implementation of conjugate heat transfer between the solid matrix and the solid−liquid phase change material (SLPCM) for the proposed model is developed. A simple REV-scale LB model under the local thermal nonequilibrium condition is presented. The method of bridging the gap between the pore-scale and REV-scale enthalpy-based LB models by the REV is given.

Findings

This coupled method facilitates detailed simulations of flow, heat transfer and phase change within pores. The approach holds promise for multiscale calculations in latent heat storage devices with porous structures. The SLPT of the heat sinks for electronic device thermal control was simulated as a case, demonstrating the efficiency of the present models in designing and optimizing SLPT devices.

Originality/value

A coupled pore-scale and REV-scale LB method as a numerical tool for investigating phase change in porous materials was developed. This innovative approach allows for the capture of details within pores while addressing computations over a large domain. The LB method for simulating SLPT from the pore scale to the REV scale was given. The proposed method addresses the conjugate heat transfer between the SLPCM and the solid matrix in the enthalpy-based LB model.

Details

International Journal of Numerical Methods for Heat & Fluid Flow, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 0961-5539

Keywords

Article
Publication date: 19 September 2023

Amin Jan, Mehmood Khan, Mian M. Ajmal and Ataul Karim Patwary

Considering the transition of communicational channels from physical to digital spaces, this study aims to provide a theoretical foundation for understanding engagement in…

Abstract

Purpose

Considering the transition of communicational channels from physical to digital spaces, this study aims to provide a theoretical foundation for understanding engagement in electronic word of mouth (eWoM) among managers and customers in the hospitality and tourism industry.

Design/methodology/approach

This study uses the four aggregate dimensions, namely, performance expectancy, efforts expectancy, social influence and facilitations condition. Further, this paper uses the 14 second-order themes of the Unified Theory of Acceptance and Use of Technology with a data set that represents elements that can trigger eWoM, both from managers’ and customers’ perspectives. The process of data structuration follows thematic analysis and axial coding techniques.

Findings

The results of this study show that performance expectancy, facilitation conditions, social influence and effort expectancy all trigger positive eWoM generation in the hospitality and tourism industry indicating customers’ and managers’ perspectives.

Originality/value

This novel study provides a theoretical foundation and novel propositions for future research work on the role of novel antecedents that can trigger eWoM in the hospitality and tourism industry. This paper also provides a benchmark for practitioners and policymakers in their strategic decisions-making towards improving business performance through positive eWoM.

Details

Global Knowledge, Memory and Communication, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 2514-9342

Keywords

Article
Publication date: 17 April 2023

Qingyu Li, Jenny Wong and Dickson K.W. Chiu

This paper investigates school library services in the digital age for students with dyslexia and explores the impact of current library services on students’ learning.

Abstract

Purpose

This paper investigates school library services in the digital age for students with dyslexia and explores the impact of current library services on students’ learning.

Design/methodology/approach

A qualitative study with semi-structured interviews was designed according to the LAFE (Look and listen, Assistance and accessibility, Format and fit, and Environment) framework for learners with dyslexia and the 5E instructional model and conducted with 11 school librarians.

Findings

Results indicated that participants lacked knowledge of dyslexia for appropriate library services. Awareness, IT skills, school administration, funding and parental attitudes would influence the library’s tailored services to dyslexic children, despite the rich resources in these participants’ libraries, including paperbacks, digital resources and electronic devices. Adaptations are necessary to provide accessible services, especially by applying digital technologies, and school libraries can positively impact students’ reading interests, promote knowledge inquiry and strengthen information literacy skills.

Originality/value

While students with dyslexia spend significant time in schools, limited studies focus on school library services in the digital age, especially in Asia. This study fills the gap by systematically exploring the issue with the 5E instructional model.

Details

Library Hi Tech, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 0737-8831

Keywords

Article
Publication date: 15 February 2024

Kai Deng, Liang Zhang, Chen Chen, Xiao Lu, Lei Sun and Xing-Yu Guo

This study aims to explore the feasibility of adding Si3N4 nanoparticles to Sn58Bi and provides a theoretical basis for designing and applying new lead-free solder materials for…

Abstract

Purpose

This study aims to explore the feasibility of adding Si3N4 nanoparticles to Sn58Bi and provides a theoretical basis for designing and applying new lead-free solder materials for the electronic packaging industry.

Design/methodology/approach

In this paper, Sn58Bi-xSi3N4 (x = 0, 0.2, 0.4, 0.6, 0.8, 1.0 Wt.%) was prepared for bonding Cu substrate, and the changes in thermal properties, wettability, microstructure, interfacial intermetallic compound and mechanical properties of the composite solder were systematically studied.

Findings

The experiment results demonstrate that including Si3N4 nanoparticles does not significantly impact the melting point of Sn58Bi solder, and the undercooling degree of solder only fluctuates slightly. The molten solder spreading area reached a maximum of 96.17 mm2, raised by 19.41% relative to those without Si3N4, and the wetting angle was the smallest at 0.6 Wt.% of Si3N4, with a minimum value of 8.35°. When the Si3N4 nanoparticles reach 0.6 Wt.%, the solder joint microstructure is significantly refined. Appropriately adding Si3N4 nanoparticles will slightly increase the solder alloy hardness. When the concentration of Si3N4 reaches 0.6 Wt.%, the joints shear strength reached 45.30 MPa, representing a 49.85% increase compared to those without additives. A thorough examination indicates that legitimately incorporating Si3N4 nanoparticles into Sn58Bi solder can enhance its synthetical performance, and 0.6 Wt.% is the best addition amount in our test setting.

Originality/value

In this paper, Si3N4 nanoparticles were incorporated into Sn58Bi solder, and the effects of different contents of Si3N4 nanoparticles on Sn58Bi solder were investigated from various aspects.

Details

Soldering & Surface Mount Technology, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 0954-0911

Keywords

Article
Publication date: 9 November 2023

Jenny Sarah Wesche and Lisa Handke

To remain competitive, efficient and productive, organisations need to ensure that their employees continuously learn and develop. This is even more challenging and critical in…

Abstract

Purpose

To remain competitive, efficient and productive, organisations need to ensure that their employees continuously learn and develop. This is even more challenging and critical in times characterised by volatility, uncertainty, complexity and ambiguity (VUCA). Hence, several technological applications have been introduced with the promise to make organisational training and development (T&D) more efficient and targeted through digitisation and automation. However, digitising and automating processes in the sensitive field of T&D also poses challenges and perils for employees and organisations as a whole.

Design/methodology/approach

Structured by the T&D process of (1) assessment/planning, (2) design/implementation and (3) evaluation, the authors present different digitisation and automation possibilities and discuss the specific opportunities and challenges they pose. Subsequently, the authors identify and discuss overarching themes of opportunities and challenges of technology use in T&D via a meta-review.

Findings

This synthesis revealed three central topics that decision-makers in T&D should carefully consider when it comes to the implementation of technological applications: opportunities and challenges of (1) data collection, (2) decision-making and (3) the value of human contact.

Originality/value

This review integrates previously fragmented research on specific technologies applied to specific T&D functions and provides researchers and practitioners with a fuller picture of the opportunities and challenges of technology applied in T&D.

Details

Personnel Review, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 0048-3486

Keywords

Article
Publication date: 22 June 2022

Shubangini Patil and Rekha Patil

Until now, a lot of research has been done and applied to provide security and original data from one user to another, such as third-party auditing and several schemes for…

Abstract

Purpose

Until now, a lot of research has been done and applied to provide security and original data from one user to another, such as third-party auditing and several schemes for securing the data, such as the generation of the key with the help of encryption algorithms like Rivest–Shamir–Adleman and others. Here are some of the related works that have been done previously. Remote damage control resuscitation (RDCR) scheme by Yan et al. (2017) is proposed based on the minimum bandwidth. By enabling the third party to perform the verification of public integrity. Although it supports the repair management for the corrupt data and tries to recover the original data, in practicality it fails to do so, and thus it takes more computation and communication cost than our proposed system. In a paper by Chen et al. (2015), using broadcast encryption, an idea for cloud storage data sharing has been developed. This technique aims to accomplish both broadcast data and dynamic sharing, allowing users to join and leave a group without affecting the electronic press kit (EPK). In this case, the theoretical notion was true and new, but the system’s practicality and efficiency were not acceptable, and the system’s security was also jeopardised because it proposed adding a member without altering any keys. In this research, an identity-based encryption strategy for data sharing was investigated, as well as key management and metadata techniques to improve model security (Jiang and Guo, 2017). The forward and reverse ciphertext security is supplied here. However, it is more difficult to put into practice, and one of its limitations is that it can only be used for very large amounts of cloud storage. Here, it extends support for dynamic data modification by batch auditing. The important feature of the secure and efficient privacy preserving provable data possession in cloud storage scheme was to support every important feature which includes data dynamics, privacy preservation, batch auditing and blockers verification for an untrusted and an outsourced storage model (Pathare and Chouragadec, 2017). A homomorphic signature mechanism was devised to prevent the usage of the public key certificate, which was based on the new id. This signature system was shown to be resistant to the id attack on the random oracle model and the assault of forged message (Nayak and Tripathy, 2018; Lin et al., 2017). When storing data in a public cloud, one issue is that the data owner must give an enormous number of keys to the users in order for them to access the files. At this place, the knowledge assisted software engineering (KASE) plan was publicly unveiled for the first time. While sharing a huge number of documents, the data owner simply has to supply the specific key to the user, and the user only needs to provide the single trapdoor. Although the concept is innovative, the KASE technique does not apply to the increasingly common manufactured cloud. Cui et al. (2016) claim that as the amount of data grows, distribution management system (DMS) will be unable to handle it. As a result, various proven data possession (PDP) schemes have been developed, and practically all data lacks security. So, here in these certificates, PDP was introduced, which was based on bilinear pairing. Because of its feature of being robust as well as efficient, this is mostly applicable in DMS. The main purpose of this research is to design and implement a secure cloud infrastructure for sharing group data. This research provides an efficient and secure protocol for multiple user data in the cloud, allowing many users to easily share data.

Design/methodology/approach

The methodology and contribution of this paper is given as follows. The major goal of this study is to design and implement a secure cloud infrastructure for sharing group data. This study provides an efficient and secure protocol for multiple user data in cloud, allowing several users to share data without difficulty. The primary purpose of this research is to design and implement a secure cloud infrastructure for sharing group data. This research develops an efficient and secure protocol for multiple user data in the cloud, allowing numerous users to exchange data without difficulty. Selection scheme design (SSD) comprises two algorithms; first algorithm is designed for limited users and algorithm 2 is redesigned for the multiple users. Further, the authors design SSD-security protocol which comprises a three-phase model, namely, Phase 1, Phase 2 and Phase 3. Phase 1 generates the parameters and distributes the private key, the second phase generates the general key for all the users that are available and third phase is designed to prevent the dishonest user to entertain in data sharing.

Findings

Data sharing in cloud computing provides unlimited computational resources and storage to enterprise and individuals; moreover, cloud computing leads to several privacy and security concerns such as fault tolerance, reliability, confidentiality and data integrity. Furthermore, the key consensus mechanism is fundamental cryptographic primitive for secure communication; moreover, motivated by this phenomenon, the authors developed SSDmechanismwhich embraces the multiple users in the data-sharing model.

Originality/value

Files shared in the cloud should be encrypted for security purpose; later these files are decrypted for the users to access the file. Furthermore, the key consensus process is a crucial cryptographic primitive for secure communication; additionally, the authors devised the SSD mechanism, which incorporates numerous users in the data-sharing model, as a result of this phenomena. For evaluation of the SSD method, the authors have considered the ideal environment of the system, that is, the authors have used java as a programming language and eclipse as the integrated drive electronics tool for the proposed model evaluation. Hardware configuration of the model is such that it is packed with 4 GB RAM and i7 processor, the authors have used the PBC library for the pairing operations (PBC Library, 2022). Furthermore, in the following section of this paper, the number of users is varied to compare with the existing methodology RDIC (Li et al., 2020). For the purposes of the SSD-security protocol, a prime number is chosen as the number of users in this work.

Details

International Journal of Pervasive Computing and Communications, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 1742-7371

Keywords

Article
Publication date: 10 February 2023

Kanungo Barada Mohanty and Pavankumar Daramukkala

The purpose of this study is to provide the enhancement of power quality of a high power-rated voltage source inverter driven induction motor with a three-phase, three-level…

Abstract

Purpose

The purpose of this study is to provide the enhancement of power quality of a high power-rated voltage source inverter driven induction motor with a three-phase, three-level neutral point clamped converter placed at the front end, while a passive power filter is connected in shunt with it. The improvement in power quality can be achieved by reducing the total harmonic distortion in source current. The controllers were designed for the linearization of the high-power induction motor drive. A control method is presented for the regulation of the common DC-link voltage.

Design/methodology/approach

The induction motor is modeled using its dynamic equations, and a decoupling controller is designed to linearize the nonlinear dynamics of the drive through feedback. The common DC-link voltage of the proposed front-end connected converter is monitored and controlled through a control method which feeds the pulse width modulated inverter that drives the induction motor. A passive power filter is designed to meet the reactive power requirement of the system in addition to improve the power quality.

Findings

Simulations were carried out for the proposed topology of the drive mechanism, and the outcomes were analyzed by a comparative analysis of the drive system both in the presence of the passive filter as well as in the absence of the filter. The total harmonic distortion is found to be reduced enough to meet the standards with the designed filter, and the reactive power is also compensated considerably. The input power factor at the supply side is maintained almost to unity, and the DC-link voltage of the proposed circuit topology is maintained at the desired level. The overall performance of the drive system was found to be useful and economical.

Originality/value

A new topology of a front-end connected three-level neutral point clamped converter to a high power-rated induction motor drive is proposed. The drive is fed by a pulse width modulated inverter with a common DC-link with the front end connected converter. A passive filter is designed with respect to the reactive power requirement of the system and connected in shunt to the converter at the supply side. Control schemes are designed and used for the drive system and also for the regulation of the common DC-link voltage of the proposed front end connected converter.

Details

World Journal of Engineering, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 1708-5284

Keywords

1 – 10 of over 1000