Search results

1 – 10 of 164
Article
Publication date: 30 May 2023

Richard Kwasi Bannor, Helena Oppong-Kyeremeh, Abigail Oparebea Boateng, Ebenezer Bold and Barikisu Gruzah

This paper examined the factors influencing the participation of rice processors in short supply chains and the participation impact on the amount of rice processed, per capita…

Abstract

Purpose

This paper examined the factors influencing the participation of rice processors in short supply chains and the participation impact on the amount of rice processed, per capita expenditure of household and value of sales.

Design/methodology/approach

The Seemingly Unrelated Regression and Doubly Robust Augmented Inverse Probability Weighting Model (AIPW) were used to analyse the determinants of short supply chain participation and the impact of short supply.

Findings

From the results, the mean value of rice processed was GH₵18385 (US$ 3,069.28), with the minimum value being GH₵ 25 (US$ 4.17) and the maximum GH₵ 67200 (US$ 1,1218.70) per annum. Processed rice aroma and grade characteristics positively influence the value of processed rice sold via short supply chains as well as the expertise rate of the processor, Farmer-Based Organisation membership, and marketing information availability. Women rice processors' per capita expenditure, total sales value and the value of processed rice was positively influenced by the short supply chain participation.

Research limitations/implications

Even though the sample size was appropriate, a larger sample size could further support the study's finding since a limited geographical area with predominant domestic rice processors was studied. Again, future studies should consider behavioural theories, such as the Theory of Planned Behaviour, amongst others, in understanding the reasons for the choices of short supply chains compared to other sales outlets.

Originality/value

Although there is a growing body of literature on rice, most of the studies focussed on the marketing outlet of rice producers, rice processing, constraints and opportunities faced by rice farmers and processors and an out-grower scheme involving rice processors amongst rice producers with none of these on the choice of short supply chains amongst women processors. Also, amongst all the studies on rice producers, none applied a theory; however, the Women in Development (WID) Theory was used to analyse the impact of the short supply chain on the impact on household per capita expenditure (poverty), the value of sales and amount of rice processed, a modest theoretical contribution of the paper to literature.

Details

Journal of Agribusiness in Developing and Emerging Economies, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 2044-0839

Keywords

Article
Publication date: 7 April 2023

Mohit Ray, Avinash Kumar and Samir K. Srivastava

Despite various consequences for different stakeholders in the mustard ecosystem, India prohibited blending in mustard oil to achieve self-reliance in edible oils and promote…

206

Abstract

Purpose

Despite various consequences for different stakeholders in the mustard ecosystem, India prohibited blending in mustard oil to achieve self-reliance in edible oils and promote consumer health. This paper uncovers the implications of this policy on mustard production, consumption and prices.

Design/methodology/approach

This paper deploys system dynamics (SD) to model the mustard ecosystem. SD uses simulation modeling to comprehend the nonlinear behavior of complex systems over time utilizing causal-loop and stock-flow diagrams.

Findings

While the mustard price does not vary in the short run, it diverges toward a higher side in the long run due to the changed policy mandate. Surprisingly, due to the predominance of market prices, the policy administered minimum support price (MSP) was found to have a limited influence on mustard prices. Hence, the focus should be on supply augmentation through non-price-based measures like disseminating information to enhance the yield rate of seed production and promoting the adoption of efficient technologies with higher oil conversion efficiency.

Research limitations/implications

The paper allows policymakers to quantitatively evaluate the effectiveness of policy interventions to mitigate the adverse impacts of policy mandate. It presents a reliable roadmap for policymakers to roll out effective policies.

Originality/value

The paper uncovers the system-level impact of policy on stakeholders and examines the effectiveness of MSP.

Details

Journal of Agribusiness in Developing and Emerging Economies, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 2044-0839

Keywords

Article
Publication date: 7 August 2023

Serafina Stone, Zannie Langford, Risya Arsyi, Imran Lapong, Zulung Zach, Radhiyah Ruhon, Boedi Julianto, Irsyadi Siradjuddin, Annie Wong and Scott Waldron

Poor post-harvest handling practices by seaweed farmers are a key issue in seaweed value chains, contributing to low-quality seaweed being supplied to processors. To address this…

Abstract

Purpose

Poor post-harvest handling practices by seaweed farmers are a key issue in seaweed value chains, contributing to low-quality seaweed being supplied to processors. To address this, a range of advanced drying technologies and methods have been developed, yet uptake by farmers remains low. This study examines factors affecting drying technology uptake by seaweed farmers to identify opportunities to incentivise improved drying practices.

Design/methodology/approach

This study draws on a quantitative survey of 273 seaweed farmers in two villages in South Sulawesi, 16 months of ethnographic fieldwork and 166 semi-structured interviews.

Findings

Farmers engage in limited adoption of improved drying technologies and practices as they don't receive higher prices for higher quality products, instead aiming to meet only the minimum acceptable standards to avoid a price discount or rejection of their product. Technologies and techniques that have been adopted are often used in ways that differ from their original purpose, such as to reduce drying times and labour input, rather than to produce products of low moisture and dirt contents. Similarly, local traders mix high- and low-quality seaweed in order to supply warehouses with seaweed which on average meets minimum quality standards.

Originality/value

This study reveals that improved drying practices are unlikely to be adopted unless incentivised by more targeted price-grade differentials.

Details

Journal of Agribusiness in Developing and Emerging Economies, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 2044-0839

Keywords

Article
Publication date: 11 April 2023

Mario Iván Tarride

The paper aims to contribute conceptually to the conversation about organizational models and to the future development of an organizational diagnostic method, based on the human…

Abstract

Purpose

The paper aims to contribute conceptually to the conversation about organizational models and to the future development of an organizational diagnostic method, based on the human being seen as an allopoietic information processing gray box.

Design/methodology/approach

Methodologically, the approach is qualitative and interpretative, using the concepts of autopoiesis and allopoiesis of H. Maturana and F. Varela, the ideas of cybernetic machine, black box and functional homomorphism of W.R. Ashby, moving from the human being to the organizations producing goods and/or services.

Findings

Observing the human being as an allopoietic gray box allowed us to confirm the human being as an information-producing entity and the nervous system as its productive component. The functions distinguished were to emote, feel, perceive, think, memorize, decide, communicate, regulate, control, coordinate and move. Similarly, the proposed organizational model is composed of the same functions in which emoting is homologated with distributed leadership for the achievement of the organizational climate and to move with production. Notwithstanding the circularity of affectation between the functional components, the climate is the basis of organizational operation and consequently, the decisional closure distributed between owners and employees.

Research limitations/implications

This is a theoretical proposal that needs to be discussed, and although there are precedents that could help in this regard, it is essential to enrich the model and derive thereof specific tools that can be applied.

Practical implications

A general model is provided from which methods of organizational design, diagnosis and treatment could be derived.

Social implications

The proposed model is expected to be a contribution to organizational research discussion.

Originality/value

It is considered that the work has a certain degree of originality when proposing a functional organizational model of a general nature, based on the emotionality of the people that constitute it.

Details

Kybernetes, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 0368-492X

Keywords

Article
Publication date: 26 June 2023

Tita Flores, Verónica Greis Andía Flores, Efrain Chura Zea and Javier Mamani Paredes

This article examines the dairy value chain in Southern Peru and identifies four critical success factors that can enhance the local situation.

Abstract

Purpose

This article examines the dairy value chain in Southern Peru and identifies four critical success factors that can enhance the local situation.

Design/methodology/approach

The study employed descriptive research using semi-structured interviews with entrepreneurs from 17 cheese factories across eight districts, namely Azángaro, Ayaviri, Pucara, Lampa, Cabana, Acora, Pomata and Puno. Quantitative market data were also gathered and analyzed alongside qualitative views.

Findings

The study identified four critical issues: quality concerns in milk production, suboptimal managerial practices of cheese-processing plants, lack of compliance to regulations, particularly hygiene and environmental ones, and inadequate access to finance. The findings reveal a gap between the practices of the Puno region's dairy industry and world-class standards for cheese production. Urgent actions are required to improve product quality, increase access to finance, enhance managerial education and ensure compliance with regulations.

Research limitations/implications

Results suggest critical issues to be prioritized, but the article does not propose how to solve the problems identified. External factors, such as economic changes, were also not considered. Interviews were conducted exclusively with cheese processing entrepreneurs, not milk producers.

Originality/value

This case study provides an insight into the interior of Peru, an under-researched region facing several development challenges. The findings have significant implications for dairy value chain stakeholders in Peru and other similar contexts.

Details

Journal of Agribusiness in Developing and Emerging Economies, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 2044-0839

Keywords

Article
Publication date: 17 October 2022

Santosh Kumar B. and Krishna Kumar E.

Deep learning techniques are unavoidable in a variety of domains such as health care, computer vision, cyber-security and so on. These algorithms demand high data transfers but…

50

Abstract

Purpose

Deep learning techniques are unavoidable in a variety of domains such as health care, computer vision, cyber-security and so on. These algorithms demand high data transfers but require bottlenecks in achieving the high speed and low latency synchronization while being implemented in the real hardware architectures. Though direct memory access controller (DMAC) has gained a brighter light of research for achieving bulk data transfers, existing direct memory access (DMA) systems continue to face the challenges of achieving high-speed communication. The purpose of this study is to develop an adaptive-configured DMA architecture for bulk data transfer with high throughput and less time-delayed computation.

Design/methodology/approach

The proposed methodology consists of a heterogeneous computing system integrated with specialized hardware and software. For the hardware, the authors propose an field programmable gate array (FPGA)-based DMAC, which transfers the data to the graphics processing unit (GPU) using PCI-Express. The workload characterization technique is designed using Python software and is implementable for the advanced risk machine Cortex architecture with a suitable communication interface. This module offloads the input streams of data to the FPGA and initiates the FPGA for the control flow of data to the GPU that can achieve efficient processing.

Findings

This paper presents an evaluation of a configurable workload-based DMA controller for collecting the data from the input devices and concurrently applying it to the GPU architecture, bypassing the hardware and software extraneous copies and bottlenecks via PCI Express. It also investigates the usage of adaptive DMA memory buffer allocation and workload characterization techniques. The proposed DMA architecture is compared with the other existing DMA architectures in which the performance of the proposed DMAC outperforms traditional DMA by achieving 96% throughput and 50% less latency synchronization.

Originality/value

The proposed gated recurrent unit has produced 95.6% accuracy in characterization of the workloads into heavy, medium and normal. The proposed model has outperformed the other algorithms and proves its strength for workload characterization.

Details

International Journal of Pervasive Computing and Communications, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 1742-7371

Keywords

Article
Publication date: 19 December 2023

N'Banan Ouattara, Xueping Xiong, Abdelrahman Ali, Dessalegn Anshiso Sedebo, Trazié Bertrand Athanase Youan Bi and Zié Ballo

This study examines the impact of agricultural credit on rice farmers' technical efficiency (TE) in Côte d'Ivoire by considering the heterogeneity among credit sources.

Abstract

Purpose

This study examines the impact of agricultural credit on rice farmers' technical efficiency (TE) in Côte d'Ivoire by considering the heterogeneity among credit sources.

Design/methodology/approach

A multistage sampling technique was used to collect data from 588 randomly sampled rice farmers in seven rice areas of the country. The authors use the endogenous stochastic frontier production (ESFP) model to account for the endogeneity of access to agricultural credit.

Findings

On the one hand, agricultural credit has a significant and positive impact on rice farmers' TE. Rice farmers receiving agricultural credit have an average of 5% increase in their TE, confirming the positive impact of agricultural credit on TE. On the other hand, the study provides evidence that the impact of credit on rice production efficiency differs depending on the source of credit. Borrowing from agricultural cooperatives and paddy rice buyers/processors positively and significantly influences the TE, while borrowing from microfinance institutions (MFIs) negatively and significantly influences the TE. Moreover, borrowing from relatives/friends does not significantly influence TE.

Research limitations/implications

Future research can further explore the contribution of agricultural credit by including several agricultural productions and using panel data.

Originality/value

The study provides evidence that the impact of agricultural credit on agricultural production efficiency depends on the source of credit. This study contributes to the literature on the impact of agricultural credit and enlightens policymakers in the design of agricultural credit models in developing countries, particularly Côte d'Ivoire.

Details

Journal of Agribusiness in Developing and Emerging Economies, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 2044-0839

Keywords

Article
Publication date: 22 June 2022

Shubangini Patil and Rekha Patil

Until now, a lot of research has been done and applied to provide security and original data from one user to another, such as third-party auditing and several schemes for…

Abstract

Purpose

Until now, a lot of research has been done and applied to provide security and original data from one user to another, such as third-party auditing and several schemes for securing the data, such as the generation of the key with the help of encryption algorithms like Rivest–Shamir–Adleman and others. Here are some of the related works that have been done previously. Remote damage control resuscitation (RDCR) scheme by Yan et al. (2017) is proposed based on the minimum bandwidth. By enabling the third party to perform the verification of public integrity. Although it supports the repair management for the corrupt data and tries to recover the original data, in practicality it fails to do so, and thus it takes more computation and communication cost than our proposed system. In a paper by Chen et al. (2015), using broadcast encryption, an idea for cloud storage data sharing has been developed. This technique aims to accomplish both broadcast data and dynamic sharing, allowing users to join and leave a group without affecting the electronic press kit (EPK). In this case, the theoretical notion was true and new, but the system’s practicality and efficiency were not acceptable, and the system’s security was also jeopardised because it proposed adding a member without altering any keys. In this research, an identity-based encryption strategy for data sharing was investigated, as well as key management and metadata techniques to improve model security (Jiang and Guo, 2017). The forward and reverse ciphertext security is supplied here. However, it is more difficult to put into practice, and one of its limitations is that it can only be used for very large amounts of cloud storage. Here, it extends support for dynamic data modification by batch auditing. The important feature of the secure and efficient privacy preserving provable data possession in cloud storage scheme was to support every important feature which includes data dynamics, privacy preservation, batch auditing and blockers verification for an untrusted and an outsourced storage model (Pathare and Chouragadec, 2017). A homomorphic signature mechanism was devised to prevent the usage of the public key certificate, which was based on the new id. This signature system was shown to be resistant to the id attack on the random oracle model and the assault of forged message (Nayak and Tripathy, 2018; Lin et al., 2017). When storing data in a public cloud, one issue is that the data owner must give an enormous number of keys to the users in order for them to access the files. At this place, the knowledge assisted software engineering (KASE) plan was publicly unveiled for the first time. While sharing a huge number of documents, the data owner simply has to supply the specific key to the user, and the user only needs to provide the single trapdoor. Although the concept is innovative, the KASE technique does not apply to the increasingly common manufactured cloud. Cui et al. (2016) claim that as the amount of data grows, distribution management system (DMS) will be unable to handle it. As a result, various proven data possession (PDP) schemes have been developed, and practically all data lacks security. So, here in these certificates, PDP was introduced, which was based on bilinear pairing. Because of its feature of being robust as well as efficient, this is mostly applicable in DMS. The main purpose of this research is to design and implement a secure cloud infrastructure for sharing group data. This research provides an efficient and secure protocol for multiple user data in the cloud, allowing many users to easily share data.

Design/methodology/approach

The methodology and contribution of this paper is given as follows. The major goal of this study is to design and implement a secure cloud infrastructure for sharing group data. This study provides an efficient and secure protocol for multiple user data in cloud, allowing several users to share data without difficulty. The primary purpose of this research is to design and implement a secure cloud infrastructure for sharing group data. This research develops an efficient and secure protocol for multiple user data in the cloud, allowing numerous users to exchange data without difficulty. Selection scheme design (SSD) comprises two algorithms; first algorithm is designed for limited users and algorithm 2 is redesigned for the multiple users. Further, the authors design SSD-security protocol which comprises a three-phase model, namely, Phase 1, Phase 2 and Phase 3. Phase 1 generates the parameters and distributes the private key, the second phase generates the general key for all the users that are available and third phase is designed to prevent the dishonest user to entertain in data sharing.

Findings

Data sharing in cloud computing provides unlimited computational resources and storage to enterprise and individuals; moreover, cloud computing leads to several privacy and security concerns such as fault tolerance, reliability, confidentiality and data integrity. Furthermore, the key consensus mechanism is fundamental cryptographic primitive for secure communication; moreover, motivated by this phenomenon, the authors developed SSDmechanismwhich embraces the multiple users in the data-sharing model.

Originality/value

Files shared in the cloud should be encrypted for security purpose; later these files are decrypted for the users to access the file. Furthermore, the key consensus process is a crucial cryptographic primitive for secure communication; additionally, the authors devised the SSD mechanism, which incorporates numerous users in the data-sharing model, as a result of this phenomena. For evaluation of the SSD method, the authors have considered the ideal environment of the system, that is, the authors have used java as a programming language and eclipse as the integrated drive electronics tool for the proposed model evaluation. Hardware configuration of the model is such that it is packed with 4 GB RAM and i7 processor, the authors have used the PBC library for the pairing operations (PBC Library, 2022). Furthermore, in the following section of this paper, the number of users is varied to compare with the existing methodology RDIC (Li et al., 2020). For the purposes of the SSD-security protocol, a prime number is chosen as the number of users in this work.

Details

International Journal of Pervasive Computing and Communications, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 1742-7371

Keywords

Open Access
Article
Publication date: 7 July 2022

Sirilak Ketchaya and Apisit Rattanatranurak

Sorting is a very important algorithm to solve problems in computer science. The most well-known divide and conquer sorting algorithm is quicksort. It starts with dividing the…

1267

Abstract

Purpose

Sorting is a very important algorithm to solve problems in computer science. The most well-known divide and conquer sorting algorithm is quicksort. It starts with dividing the data into subarrays and finally sorting them.

Design/methodology/approach

In this paper, the algorithm named Dual Parallel Partition Sorting (DPPSort) is analyzed and optimized. It consists of a partitioning algorithm named Dual Parallel Partition (DPPartition). The DPPartition is analyzed and optimized in this paper and sorted with standard sorting functions named qsort and STLSort which are quicksort, and introsort algorithms, respectively. This algorithm is run on any shared memory/multicore systems. OpenMP library which supports multiprocessing programming is developed to be compatible with C/C++ standard library function. The authors’ algorithm recursively divides an unsorted array into two halves equally in parallel with Lomuto's partitioning and merge without compare-and-swap instructions. Then, qsort/STLSort is executed in parallel while the subarray is smaller than the sorting cutoff.

Findings

In the authors’ experiments, the 4-core Intel i7-6770 with Ubuntu Linux system is implemented. DPPSort is faster than qsort and STLSort up to 6.82× and 5.88× on Uint64 random distributions, respectively.

Originality/value

The authors can improve the performance of the parallel sorting algorithm by reducing the compare-and-swap instructions in the algorithm. This concept can be used to develop related problems to increase speedup of algorithms.

Details

Applied Computing and Informatics, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 2634-1964

Keywords

Article
Publication date: 12 January 2024

Ali Rashidi, George Lukic Woon, Miyami Dasandara, Mohsen Bazghaleh and Pooria Pasbakhsh

The construction industry remains one of the most hazardous industries worldwide, with a higher number of fatalities and injuries each year. The safety and well-being of workers…

Abstract

Purpose

The construction industry remains one of the most hazardous industries worldwide, with a higher number of fatalities and injuries each year. The safety and well-being of workers at a job site are paramount as they face both immediate and long-term risks such as falls and musculoskeletal disorders. To mitigate these dangers, sensor-based technologies have emerged as a crucial tool to promote the safety and well-being of workers on site. The implementation of real-time sensor data-driven monitoring tools can greatly benefit the construction industry by enabling the early identification and prevention of potential construction accidents. This study aims to explore the innovative method of prototype development regarding a safety monitoring system in the form of smart personal protective equipment (PPE) by taking advantage of the recent advances in wearable technology and cloud computing.

Design/methodology/approach

The proposed smart construction safety system has been meticulously crafted to seamlessly integrate with conventional safety gear, such as gloves and vests, to continuously monitor construction sites for potential hazards. This state-of-the-art system is primarily geared towards mitigating musculoskeletal disorders and preventing workers from inadvertently entering high-risk zones where falls or exposure to extreme temperatures could occur. The wearables were introduced through the proposed system in a non-intrusive manner where the safety vest and gloves were chosen as the base for the PPE as almost every construction worker would be required to wear them on site. Sensors were integrated into the PPE, and a smartphone application which is called SOTER was developed to view and interact with collected data. This study discusses the method and process of smart PPE system design and development process in software and hardware aspects.

Findings

This research study posits a smart system for PPE that utilises real-time sensor data collection to improve worksite safety and promote worker well-being. The study outlines the development process of a prototype that records crucial real-time data such as worker location, altitude, temperature and hand pressure while handling various construction objects. The collected data are automatically uploaded to a cloud service, allowing supervisors to monitor it through a user-friendly smartphone application. The worker tracking ability with the smart PPE can help to alleviate the identified issues by functioning as an active warning system to the construction safety management team. It is steadily evident that the proposed smart PPE system can be utilised by the respective industry practitioners to ensure the workers' safety and well-being at construction sites through monitoring of the workers with real-time sensor data.

Originality/value

The proposed smart PPE system assists in reducing the safety risks posed by hazardous environments as well as preventing a certain degree of musculoskeletal problems for workers. Ultimately, the current study unveils that the construction industry can utilise cloud computing services in conjunction with smart PPE to take advantage of the recent advances in novel technological avenues and bring construction safety management to a new level. The study significantly contributes to the prevailing knowledge of construction safety management in terms of applying sensor-based technologies in upskilling construction workers' safety in terms of real-time safety monitoring and safety knowledge sharing.

Details

Smart and Sustainable Built Environment, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 2046-6099

Keywords

1 – 10 of 164