Search results

1 – 10 of over 3000
Article
Publication date: 19 December 2022

Amir Yaqoubi, Fatemeh Sabouhi, Ali Bozorgi-Amiri and Mohsen Sadegh Amalnick

A growing body of evidence points to the influence of location and allocation decisions on the structure of healthcare networks. The authors introduced a three-level hierarchical…

Abstract

Purpose

A growing body of evidence points to the influence of location and allocation decisions on the structure of healthcare networks. The authors introduced a three-level hierarchical facility location model to minimize travel time in the healthcare system under uncertainty.

Design/methodology/approach

Most healthcare networks are hierarchical and, as a result, the linkage between their levels makes it difficult to specify the location of the facilities. In this article, the authors present a hybrid approach according to data envelopment analysis and robust programming to design a healthcare network. In the first phase, the efficiency of each potential location is calculated based on the non-radial range-adjusted measure considering desirable and undesirable outputs based on a number of criteria such as the target area's population, proximity to earthquake faults, quality of urban life, urban decrepitude, etc. The locations deemed suitable are then used as candidate locations in the mathematical model. In the second phase, based on the proposed robust optimization model, called light robustness, the location and allocation decisions are adopted.

Findings

The developed model is evaluated using an actual-world case study in District 1 of Tehran, Iran and relevant results and different sensitivity analyses were presented as well. When the percentage of referral parameters changes, the value of the robust model's objective function increases.

Originality/value

The contributions of this article are listed as follows: Considering desirable and undesirable criteria to selecting candidate locations, providing a robust programming model for building a service network and applying the developed model to an actual-world case study.

Article
Publication date: 6 March 2024

Mouna Zerzeri, Intissar Moussa and Adel Khedher

The purpose of this paper aims to design a robust wind turbine emulator (WTE) based on a three-phase induction motor (3PIM).

Abstract

Purpose

The purpose of this paper aims to design a robust wind turbine emulator (WTE) based on a three-phase induction motor (3PIM).

Design/methodology/approach

The 3PIM is driven by a soft voltage source inverter (VSI) controlled by a specific space vector modulation. By adjusting the appropriate vector sequence selection, the desired VSI output voltage allows a real wind turbine speed emulation in the laboratory, taking into account the wind profile, static and dynamic behaviors and parametric variations for theoretical and then experimental analysis. A Mexican hat profile and a sinusoidal profile are therefore used as the wind speed system input to highlight the electrical, mechanical and electromagnetic system response.

Findings

The simulation results, based on relative error data, show that the proposed reactive power control method effectively estimates the flux and the rotor time constant, thus ensuring an accurate trajectory tracking of the wind speed for the wind emulation application.

Originality/value

The proposed architecture achieves its results through the use of mathematical theory and WTE topology combine with an online adaptive estimator and Lyapunov stability adaptation control methods. These approaches are particularly relevant for low-cost or low-power alternative current (AC) motor drives in the field of renewable energy emulation. It has the advantage of eliminating the need for expensive and unreliable position transducers, thereby increasing the emulator drive life. A comparative analysis was also carried out to highlight the online adaptive estimator fast response time and accuracy.

Details

COMPEL - The international journal for computation and mathematics in electrical and electronic engineering , vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 0332-1649

Keywords

Article
Publication date: 30 November 2023

Anas Iftikhar, Imran Ali and Mark Stevenson

This study aims to analyse whether the presence of supply chain complexity (SCC) influences firms to improve their supply chain (SC) resilience and SC robustness capability. This…

Abstract

Purpose

This study aims to analyse whether the presence of supply chain complexity (SCC) influences firms to improve their supply chain (SC) resilience and SC robustness capability. This study also examines an important paradox: whether investing in both exploitation and exploration practices is conflicting or complementary to enabling SC resilience and robustness in the presence of SCC.

Design/methodology/approach

The authors used a survey-based approach to collect 242 useful responses from SC professionals of Pakistani firms, an important emerging economy context. The data were analysed with covariance-based structural equation modelling to statistically validate the model.

Findings

The analysis reveals several key findings: the presence of SCC has a direct, positive influence on SC resilience and SC robustness; while exploitation practices only partially mediate the nexus between SCC and SC resilience, they fully mediate the relationship between SCC and SC robustness; while exploration practices partially mediate the nexus between SCC and SC resilience, they do not mediate the relationship between SCC and SC robustness and SCC has a significant influence on SC resilience and SC robustness sequentially through exploitation and exploration (i.e. one after the other).

Practical implications

These findings help to reconcile the exploitation versus exploration paradox in cultivating SC resilience and SC robustness in the presence of SCC. The findings assist SC managers in determining how to deploy their limited resources most effectively to enhance SC resilience and SC robustness while facing SCC.

Originality/value

The authors devise and empirically validate a unique framework that demonstrates how the presence of SCC works as a stimulus to build SC resilience and SC robustness.

Details

Supply Chain Management: An International Journal, vol. 29 no. 2
Type: Research Article
ISSN: 1359-8546

Keywords

Article
Publication date: 23 January 2024

Li Li, Hui Ye and Xiaohua Meng

Considering the unmeasurable states of the systems and the previewed reference signal, a novel fuzzy observer-based preview controller, which is a mixed controller of the fuzzy…

Abstract

Purpose

Considering the unmeasurable states of the systems and the previewed reference signal, a novel fuzzy observer-based preview controller, which is a mixed controller of the fuzzy observer-based controller, fuzzy integrator and preview controller, is considered to address the tracking control problem.

Design/methodology/approach

The authors employ an augmentation technique to construct an augmented error system for uncertain T-S fuzzy discrete-time systems with time-varying uncertainties. Additionally, the authors obtain the corresponding linear matrix inequality (LMI) conditions for designing the preview controller.

Findings

This paper discusses the preview tracking problem for nonlinear systems. First, considering the unmeasurable states of the systems and the previewed reference signal, a novel fuzzy observer-based preview controller, which is a mixed controller of the fuzzy observer-based controller, fuzzy integrator, and preview controller, is considered to address the tracking control problem. Then, using the fuzzy Lyapunov functional with the linear matrix inequality (LMI) technique, new sufficient conditions for the asymptotic stability of the augmented system are derived by applying the LMI technique. The preview controller and fuzzy observer can be designed in one step. Finally, a numerical example is used to illustrate the effectiveness of the results.

Originality/value

An augmented error system is successfully constructed by the state augmentation approach. A novel preview controller is designed to address the tracking control problem. The preview controller and fuzzy observer can be designed in one step.

Details

Engineering Computations, vol. 41 no. 1
Type: Research Article
ISSN: 0264-4401

Keywords

Article
Publication date: 4 July 2023

Kevin John Burnard

Case study research has been applied across numerous fields and provides an established methodology for exploring and understanding various research contexts. This paper aims to…

Abstract

Purpose

Case study research has been applied across numerous fields and provides an established methodology for exploring and understanding various research contexts. This paper aims to aid in developing methodological rigor by investigating the approaches of establishing validity and reliability.

Design/methodology/approach

Based on a systematic review of relevant literature, this paper catalogs the use of validity and reliability measures within academic publications between 2008 and 2018. The review analyzes case study research across 15 peer-reviewed journals (total of 1,372 articles) and highlights the application of validity and reliability measures.

Findings

The evidence of the systematic literature review suggests that validity measures appear well established and widely reported within case study–based research articles. However, measures and test procedures related to research reliability appear underrepresented within analyzed articles.

Originality/value

As shown by the presented results, there is a need for more significant reporting of the procedures used related to research reliability. Toward this, the features of a robust case study protocol are defined and discussed.

Details

Management Research Review, vol. 47 no. 2
Type: Research Article
ISSN: 2040-8269

Keywords

Article
Publication date: 31 October 2023

Eziaku Onyeizu Rasheed, Maryam Khoshbakht and George Baird

This paper aims to illustrate the extensive benefits of qualitative data analysis as a rarely undertaken process in post-occupancy evaluation surveys. As a result, there is…

Abstract

Purpose

This paper aims to illustrate the extensive benefits of qualitative data analysis as a rarely undertaken process in post-occupancy evaluation surveys. As a result, there is limited evidence of what occupants say about their buildings, especially for operational parameters, as opposed to how they rate them. While quantitative analyses provide useful information on how workers feel about workplace operational factors, qualitative analyses provide richer information on what aspects of the workplace workers identify as influential to their comfort, well-being and productivity.

Design/methodology/approach

The authors analysed 6,938 comments from office buildings worldwide on workers’ perception of workplace operational factors: design, storage, needs, space at desks and storage in their work environments. These factors were analysed based on the buildings’ design intent and use, and the associated comments were coded into positive, negative and balanced comments. The authors used a combination of coding, descriptive analysis, content analysis and word cloud to dissect the comments.

Findings

The findings showed that whereas workers rated these operational factors favourably, there were significantly more negative comments about each factor. Also, the Chi-square test showed a significant association (p < 0.01) between the satisfaction scale and the type of comments received for all the operational factors. This means that when a factor is rated high in the satisfaction score (5–7), there were fewer negative and more positive comments and vice versa. The word cloud analysis highlighted vital aspects of the office environment the workers mostly commented on, such as open plan design, natural lighting, space and windows, toilets, facilities, kitchens, meeting room booking systems, storage and furniture.

Research limitations/implications

This study highlights the importance of dissecting building occupants’ comments as integral to building performance monitoring and measurement. These emphasise the richness and value of respondents’ comments and the importance of critically analysing them. A limitation is that only 6,938 comments were viable for analysis because most comments were either incomplete with no meaning or were not provided. This underlines the importance of encouraging respondents to comment and express their feelings in questionnaire surveys. Also, the building use studies questionnaire data set presents extensive opportunities for further analyses of interrelationships between demographics, building characteristics and environmental and operational factors.

Practical implications

The findings from this study can be applied to future projects and facility management to maintain and improve office buildings throughout their life cycle. Also, these findings are essential in predicting the requirements of future workplaces for robust workplace designs and management.

Originality/value

The authors identified specific comments on the performance of workplaces across the globe, showing similarities and differences between sustainable, conventional, commercial and institutional buildings. Specifically, the analysis showed that office workers’ comments do not always corroborate the ratings they give their buildings. There was a significantly higher percentage of negative comments than positive comments despite the high satisfaction scores of the operational factors.

Details

Facilities , vol. 42 no. 3/4
Type: Research Article
ISSN: 0263-2772

Keywords

Article
Publication date: 27 March 2024

Yan Zhou and Chuanxu Wang

Disruptions at ports may destroy the planned ship schedules profoundly, which is an imperative operation problem that shipping companies need to overcome. This paper attempts to…

Abstract

Purpose

Disruptions at ports may destroy the planned ship schedules profoundly, which is an imperative operation problem that shipping companies need to overcome. This paper attempts to help shipping companies cope with port disruptions through recovery scheduling.

Design/methodology/approach

This paper studies the ship coping strategies for the port disruptions caused by severe weather. A novel mixed-integer nonlinear programming model is proposed to solve the ship schedule recovery problem (SSRP). A distributionally robust mean conditional value-at-risk (CVaR) optimization model was constructed to handle the SSRP with port disruption uncertainties, for which we derive tractable counterparts under the polyhedral ambiguity sets.

Findings

The results show that the size of ambiguity set, confidence level and risk-aversion parameter can significantly affect the optimal values, decision-makers should choose a reasonable parameter combination. Besides, sailing speed adjustment and handling rate adjustment are effective strategies in SSRP but may not be sufficient to recover the schedule; therefore, port skipping and swapping are necessary when multiple or longer disruptions occur at ports.

Originality/value

Since the port disruption is difficult to forecast, we attempt to take the uncertainties into account to achieve more meaningful results. To the best of our knowledge, there is barely a research study focusing on the uncertain port disruptions in the SSRP. Moreover, this is the first paper that applies distributionally robust optimization (DRO) to deal with uncertain port disruptions through the equivalent counterpart of DRO with polyhedral ambiguity set, in which a robust mean-CVaR optimization formulation is adopted as the objective function for a trade-off between the expected total costs and the risk.

Details

Kybernetes, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 0368-492X

Keywords

Article
Publication date: 5 April 2024

Lida Haghnegahdar, Sameehan S. Joshi, Rohith Yanambaka Venkata, Daniel A. Riley and Narendra B. Dahotre

Additive manufacturing also known as 3D printing is an evolving advanced manufacturing technology critical for the new era of complex machinery and operating systems…

19

Abstract

Purpose

Additive manufacturing also known as 3D printing is an evolving advanced manufacturing technology critical for the new era of complex machinery and operating systems. Manufacturing systems are increasingly faced with risk of attacks not only by traditional malicious actors such as hackers and cyber-criminals but also by some competitors and organizations engaged in corporate espionage. This paper aims to elaborate a plausible risk practice of designing and demonstrate a case study for the compromised-based malicious for polymer 3D printing system.

Design/methodology/approach

This study assumes conditions when a machine was compromised and evaluates the effect of post compromised attack by studying its effects on tensile dog bone specimens as the printed object. The designed algorithm removed predetermined specific number of layers from the tensile samples. The samples were visually identical in terms of external physical dimensions even after removal of the layers. Samples were examined nondestructively for density. Additionally, destructive uniaxial tensile tests were carried out on the modified samples and compared to the unmodified sample as a control for various mechanical properties. It is worth noting that the current approach was adapted for illustrating the impact of cyber altercations on properties of additively produced parts in a quantitative manner. It concurrently pointed towards the vulnerabilities of advanced manufacturing systems and a need for designing robust mitigation/defense mechanism against the cyber altercations.

Findings

Density, Young’s modulus and maximum strength steadily decreased with an increase in the number of missing layers, whereas a no clear trend was observed in the case of % elongation. Post tensile test observations of the sample cross-sections confirmed the successful removal of the layers from the samples by the designed method. As a result, the current work presented a cyber-attack model and its quantitative implications on the mechanical properties of 3D printed objects.

Originality/value

To the best of the authors’ knowledge, this is the original work from the team. It is currently not under consideration for publication in any other avenue. The paper provides quantitative approach of realizing impact of cyber intrusions on deteriorated performance of additively manufactured products. It also enlists important intrusion mechanisms relevant to additive manufacturing.

Details

Rapid Prototyping Journal, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 1355-2546

Keywords

Article
Publication date: 8 April 2024

Caitlin Brandenburg, Paulina Stehlik, Christy Noble, Rachel Wenke, Kristen Jones, Laetitia Hattingh, Kelly Dungey, Grace Branjerdporn, Ciara Spillane, Sharmin Kalantari, Shane George, Gerben Keijzers and Sharon Mickan

Clinician engagement in research has positive impacts for healthcare, but is often difficult for healthcare organisations to support in light of limited resources. This scoping…

Abstract

Purpose

Clinician engagement in research has positive impacts for healthcare, but is often difficult for healthcare organisations to support in light of limited resources. This scoping review aimed to describe the literature on health service-administered strategies for increasing research engagement by medical practitioners.

Design/methodology/approach

Medline, EMBASE and Web of Science databases were searched from 2000 to 2021 and two independent reviewers screened each record for inclusion. Inclusion criteria were that studies sampled medically qualified clinicians; reported empirical data; investigated effectiveness of an intervention in improving research engagement and addressed interventions implemented by an individual health service/hospital.

Findings

Of the 11,084 unique records, 257 studies were included. Most (78.2%) studies were conducted in the USA, and were targeted at residents (63.0%). Outcomes were measured in a variety of ways, most commonly publication-related outcomes (77.4%), though many studies used more than one outcome measure (70.4%). Pre-post (38.8%) and post-only (28.7%) study designs were the most common, while those using a contemporaneous control group were uncommon (11.5%). The most commonly reported interventions included Resident Research Programs (RRPs), protected time, mentorship and education programs. Many articles did not report key information needed for data extraction (e.g. sample size).

Originality/value

This scoping review demonstrated that, despite a large volume of research, issues like poor reporting, infrequent use of robust study designs and heterogeneous outcome measures limited application. The most compelling available evidence pointed to RRPs, protected time and mentorship as effective interventions. Further high-quality evidence is needed to guide healthcare organisations on increasing medical research engagement.

Details

Journal of Health Organization and Management, vol. 38 no. 2
Type: Research Article
ISSN: 1477-7266

Keywords

Article
Publication date: 17 June 2021

Ambica Ghai, Pradeep Kumar and Samrat Gupta

Web users rely heavily on online content make decisions without assessing the veracity of the content. The online content comprising text, image, video or audio may be tampered…

1161

Abstract

Purpose

Web users rely heavily on online content make decisions without assessing the veracity of the content. The online content comprising text, image, video or audio may be tampered with to influence public opinion. Since the consumers of online information (misinformation) tend to trust the content when the image(s) supplement the text, image manipulation software is increasingly being used to forge the images. To address the crucial problem of image manipulation, this study focusses on developing a deep-learning-based image forgery detection framework.

Design/methodology/approach

The proposed deep-learning-based framework aims to detect images forged using copy-move and splicing techniques. The image transformation technique aids the identification of relevant features for the network to train effectively. After that, the pre-trained customized convolutional neural network is used to train on the public benchmark datasets, and the performance is evaluated on the test dataset using various parameters.

Findings

The comparative analysis of image transformation techniques and experiments conducted on benchmark datasets from a variety of socio-cultural domains establishes the effectiveness and viability of the proposed framework. These findings affirm the potential applicability of proposed framework in real-time image forgery detection.

Research limitations/implications

This study bears implications for several important aspects of research on image forgery detection. First this research adds to recent discussion on feature extraction and learning for image forgery detection. While prior research on image forgery detection, hand-crafted the features, the proposed solution contributes to stream of literature that automatically learns the features and classify the images. Second, this research contributes to ongoing effort in curtailing the spread of misinformation using images. The extant literature on spread of misinformation has prominently focussed on textual data shared over social media platforms. The study addresses the call for greater emphasis on the development of robust image transformation techniques.

Practical implications

This study carries important practical implications for various domains such as forensic sciences, media and journalism where image data is increasingly being used to make inferences. The integration of image forgery detection tools can be helpful in determining the credibility of the article or post before it is shared over the Internet. The content shared over the Internet by the users has become an important component of news reporting. The framework proposed in this paper can be further extended and trained on more annotated real-world data so as to function as a tool for fact-checkers.

Social implications

In the current scenario wherein most of the image forgery detection studies attempt to assess whether the image is real or forged in an offline mode, it is crucial to identify any trending or potential forged image as early as possible. By learning from historical data, the proposed framework can aid in early prediction of forged images to detect the newly emerging forged images even before they occur. In summary, the proposed framework has a potential to mitigate physical spreading and psychological impact of forged images on social media.

Originality/value

This study focusses on copy-move and splicing techniques while integrating transfer learning concepts to classify forged images with high accuracy. The synergistic use of hitherto little explored image transformation techniques and customized convolutional neural network helps design a robust image forgery detection framework. Experiments and findings establish that the proposed framework accurately classifies forged images, thus mitigating the negative socio-cultural spread of misinformation.

Details

Information Technology & People, vol. 37 no. 2
Type: Research Article
ISSN: 0959-3845

Keywords

1 – 10 of over 3000