Search results

1 – 10 of 80
Open Access
Article
Publication date: 24 January 2020

Mingyu Zhang, Jing Wang, Peiran Yang, Zhaohua Shang, Yi Liu and Longjie Dai

This paper aims to study the influence of the dimension change of bush-pin on the pressure, oil film thickness, temperature rise and traction coefficient in contact zone by using…

Abstract

Purpose

This paper aims to study the influence of the dimension change of bush-pin on the pressure, oil film thickness, temperature rise and traction coefficient in contact zone by using a thermal elastohydrodynamic lubrication (EHL) model for finite line contact. Concretely, the effects of the equivalent curvature radius of the bush and the pin, and the length of the bush are investigated.

Design/methodology/approach

In this paper, the contact between the bush and pin is simplified as finite line contact. The lubrication state is studied by numerical simulation using steady-state line contact thermal EHL. A constitutive equation Ree–Eyring fluid is used in the calculations.

Findings

It is found that by selecting an optimal equivalent radius of curvature and prolonging the bush length can improve the lubrication state effectively.

Originality/value

Under specific working conditions, there exists an optimal equivalent radius to maximize the minimum oil film thickness in the contact zone. The increase of generatrix length will weaken the stress concentration effect in the rounded corner area at both ends of the bush, which can improve the wear resistance of chain.

Peer review

The peer review history for this article is available at: https://publons.com/publon/10.1108/ILT-10-2019-0448.

Details

Industrial Lubrication and Tribology, vol. 72 no. 5
Type: Research Article
ISSN: 0036-8792

Keywords

Open Access
Article
Publication date: 21 March 2024

Mohammad Yasser Arafat and Sonal Atreya

The study investigates the relationship between hospital environmental factors and the well-being of geriatric in-patients. It aims to identify the impact of architectural design…

Abstract

Purpose

The study investigates the relationship between hospital environmental factors and the well-being of geriatric in-patients. It aims to identify the impact of architectural design on comfort, safety, privacy and stress levels experienced by elderly patients during their hospital stays.

Design/methodology/approach

Employing a mixed-methods approach, the research assesses the experiences of 100 geriatric in-patients across various hospital types through surveys, observational checklists and state anxiety measurements. The methodology involves examining architectural features, patient perceptions and correlations among environmental variables and patient experiences. Statistical analyses, including correlations and chi-square tests, were employed to discern associations between environmental variables and patient experiences.

Findings

The research identified key architectural features significantly impacting geriatric patients' experiences. Factors such as sturdy beds, furniture quantity, lighting conditions, proximity to facilities and ward occupancy levels were found to influence spatial, sensory and social comfort. Notably, proximity to facilities and control over the immediate environment were crucial for self-control and safety perceptions. Privacy, highly valued by patients, correlated with the presence of curtains and ward occupancy. Moreover, patient stress levels exhibited correlations with autonomy, privacy and ward occupancy.

Originality/value

This research offers significant insights into the criticality of specific architectural elements in enhancing comfort and reducing stress for geriatric in-patients. These findings hold substantial value for healthcare facility design, emphasizing the need to prioritize certain design aspects to promote the well-being of elderly patients during hospitalization.

Details

Frontiers in Engineering and Built Environment, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 2634-2499

Keywords

Open Access
Article
Publication date: 15 February 2022

Martin Nečaský, Petr Škoda, David Bernhauer, Jakub Klímek and Tomáš Skopal

Semantic retrieval and discovery of datasets published as open data remains a challenging task. The datasets inherently originate in the globally distributed web jungle, lacking…

1213

Abstract

Purpose

Semantic retrieval and discovery of datasets published as open data remains a challenging task. The datasets inherently originate in the globally distributed web jungle, lacking the luxury of centralized database administration, database schemes, shared attributes, vocabulary, structure and semantics. The existing dataset catalogs provide basic search functionality relying on keyword search in brief, incomplete or misleading textual metadata attached to the datasets. The search results are thus often insufficient. However, there exist many ways of improving the dataset discovery by employing content-based retrieval, machine learning tools, third-party (external) knowledge bases, countless feature extraction methods and description models and so forth.

Design/methodology/approach

In this paper, the authors propose a modular framework for rapid experimentation with methods for similarity-based dataset discovery. The framework consists of an extensible catalog of components prepared to form custom pipelines for dataset representation and discovery.

Findings

The study proposes several proof-of-concept pipelines including experimental evaluation, which showcase the usage of the framework.

Originality/value

To the best of authors’ knowledge, there is no similar formal framework for experimentation with various similarity methods in the context of dataset discovery. The framework has the ambition to establish a platform for reproducible and comparable research in the area of dataset discovery. The prototype implementation of the framework is available on GitHub.

Details

Data Technologies and Applications, vol. 56 no. 4
Type: Research Article
ISSN: 2514-9288

Keywords

Open Access
Article
Publication date: 16 August 2021

Shamal Faily, Claudia Iacob, Raian Ali and Duncan Ki-Aries

This paper aims to present a tool-supported approach for visualising personas as social goal models, which can subsequently be used to identify security tensions.

Abstract

Purpose

This paper aims to present a tool-supported approach for visualising personas as social goal models, which can subsequently be used to identify security tensions.

Design/methodology/approach

The authors devised an approach to partially automate the construction of social goal models from personas. The authors provide two examples of how this approach can identify previously hidden implicit vulnerabilities and validate ethical hazards faced by penetration testers and their safeguards.

Findings

Visualising personas as goal models makes it easier for stakeholders to see implications of their goals being satisfied or denied and designers to incorporate the creation and analysis of such models into the broader requirements engineering (RE) tool-chain.

Originality/value

The approach can be used with minimal changes to existing user experience and goal modelling approaches and security RE tools.

Details

Information & Computer Security, vol. 29 no. 5
Type: Research Article
ISSN: 2056-4961

Keywords

Open Access
Article
Publication date: 27 June 2019

Younss Ait Mou and Muammer Koc

This paper aims to report on the findings of an investigation to compare three different three-dimensional printing (3DP) or additive manufacturing technologies [i.e. fused…

1464

Abstract

Purpose

This paper aims to report on the findings of an investigation to compare three different three-dimensional printing (3DP) or additive manufacturing technologies [i.e. fused deposition modeling (FDM), stereolithography (SLA) and material jetting (MJ)] and four different equipment (FDM, SLA, MJP 2600 and Object 260) in terms of their dimensional process capability (dimensional accuracy and surface roughness). It provides a comprehensive and comparative understanding about the level of attainable dimensional accuracy, repeatability and surface roughness of commonly used 3DP technologies. It is expected that these findings will help other researchers and industrialists in choosing the right technology and equipment for a given 3DP application.

Design/methodology/approach

A benchmark model of 5 × 5 cm with several common and challenging features, such as around protrusion and hole, flat surface, micro-scale ribs and micro-scale long channels was designed and printed repeatedly using four different equipment of three different 3DP technologies. The dimensional accuracy of the printed models was measured using non-contact digital measurement methods. The surface roughness was evaluated using a digital profilometer. Finally, the surface quality and edge sharpness were evaluated under a reflected light ZEISS microscope with a 50× magnification objective.

Findings

The results show that FDM technology with the used equipment results in a rough surface and loose dimensional accuracy. The SLA printer produced a smoother surface, but resulted in the distortion of thin features (<1 mm). MJ printers, on the other hand, produced comparable surface roughness and dimensional accuracy. However, ProJet MJP 3600 produced sharper edges when compared to the Objet 260 that produced round edges.

Originality/value

This paper, for the first time, provides a comprehensive comparison of three different commonly used 3DP technologies in terms of their dimensional capability and surface roughness without farther post-processing. Thus, it offers a reliable guideline for design consideration and printer selection based on the target application.

Details

Rapid Prototyping Journal, vol. 25 no. 5
Type: Research Article
ISSN: 1355-2546

Keywords

Open Access
Article
Publication date: 20 June 2022

Kimberly Gleason, Yezen H. Kannan and Christian Rauch

This paper aims to explain the fundraising and valuation processes of startups and discuss the conflicts of interest between entrepreneurs, venture capital (VC) firms and…

7299

Abstract

Purpose

This paper aims to explain the fundraising and valuation processes of startups and discuss the conflicts of interest between entrepreneurs, venture capital (VC) firms and stakeholders in the context of startup corporate governance. Further, this paper uses the examples of WeWork and Zenefits to explain how a failure of stakeholders to demand an external audit from an independent accounting firm in early stages of funding led to an opportunity for fraud.

Design/methodology/approach

The methodology used is a literature review and analysis of startup valuation combined with the Fraud Triangle Theory. This paper also provides a discussion of WeWork and Zenefits, both highly visible examples of startup fraud, and explores an increased role for independent external auditors in fraud risk mitigation on behalf of stakeholders prior to an initial public offering (IPO).

Findings

This paper documents a number of fraud risks posed by the “fake it till you make it” ethos and investor behavior and pricing in the world of entrepreneurial finance and VC, which could be mitigated by a greater awareness of startup stakeholders of the value of an external audit performed by an independent accounting firm prior to an IPO.

Research limitations/implications

An implication of this paper is that regulators should consider greater oversight of the startup financing process and potentially take steps to facilitate greater independence of participants in the IPO process.

Practical implications

Given the potential conflicts of interest between VC firms, investment banks and startup founders, the investors at the time of an IPO may be exposed to the risk that the shares of the IPO firms are overvalued at offering.

Social implications

This study demonstrates how startup practices can be extended to the Fraud Triangle and issue a call to action for the accounting profession to take a greater role in protecting the public from startup fraud. This study then offers recommendations for regulators and standards entities.

Originality/value

There are few academic papers in the financial crime literature that link the valuation and culture of startup firms with fraud risk. This study provides a concise explanation of the process of valuation for startups and highlights the considerations for stakeholders in assessing fraud risk. In addition, this study documents an emerging role for auditors as stewards of proper valuation for pre-IPO firms.

Details

Journal of Financial Crime, vol. 29 no. 4
Type: Research Article
ISSN: 1359-0790

Keywords

Open Access
Article
Publication date: 28 February 2024

Luke Mizzi, Arrigo Simonetti and Andrea Spaggiari

The “chiralisation” of Euclidean polygonal tessellations is a novel, recent method which has been used to design new auxetic metamaterials with complex topologies and improved…

Abstract

Purpose

The “chiralisation” of Euclidean polygonal tessellations is a novel, recent method which has been used to design new auxetic metamaterials with complex topologies and improved geometric versatility over traditional chiral honeycombs. This paper aims to design and manufacture chiral honeycombs representative of four distinct classes of 2D Euclidean tessellations with hexagonal rotational symmetry using fused-deposition additive manufacturing and experimentally analysed the mechanical properties and failure modes of these metamaterials.

Design/methodology/approach

Finite Element simulations were also used to study the high-strain compressive performance of these systems under both periodic boundary conditions and realistic, finite conditions. Experimental uniaxial compressive loading tests were applied to additively manufactured prototypes and digital image correlation was used to measure the Poisson’s ratio and analyse the deformation behaviour of these systems.

Findings

The results obtained demonstrate that these systems have the ability to exhibit a wide range of Poisson’s ratios (positive, quasi-zero and negative values) and stiffnesses as well as unusual failure modes characterised by a sequential layer-by-layer collapse of specific, non-adjacent ligaments. These findings provide useful insights on the mechanical properties and deformation behaviours of this new class of metamaterials and indicate that these chiral honeycombs could potentially possess anomalous characteristics which are not commonly found in traditional chiral metamaterials based on regular monohedral tilings.

Originality/value

To the best of the authors’ knowledge, the authors have analysed for the first time the high strain behaviour and failure modes of chiral metamaterials based on Euclidean multi-polygonal tessellations.

Details

Rapid Prototyping Journal, vol. 30 no. 11
Type: Research Article
ISSN: 1355-2546

Keywords

Abstract

Details

Sameness and Repetition in Contemporary Media Culture
Type: Book
ISBN: 978-1-80455-955-0

Open Access
Article
Publication date: 26 April 2024

Adela Sobotkova, Ross Deans Kristensen-McLachlan, Orla Mallon and Shawn Adrian Ross

This paper provides practical advice for archaeologists and heritage specialists wishing to use ML approaches to identify archaeological features in high-resolution satellite…

Abstract

Purpose

This paper provides practical advice for archaeologists and heritage specialists wishing to use ML approaches to identify archaeological features in high-resolution satellite imagery (or other remotely sensed data sources). We seek to balance the disproportionately optimistic literature related to the application of ML to archaeological prospection through a discussion of limitations, challenges and other difficulties. We further seek to raise awareness among researchers of the time, effort, expertise and resources necessary to implement ML successfully, so that they can make an informed choice between ML and manual inspection approaches.

Design/methodology/approach

Automated object detection has been the holy grail of archaeological remote sensing for the last two decades. Machine learning (ML) models have proven able to detect uniform features across a consistent background, but more variegated imagery remains a challenge. We set out to detect burial mounds in satellite imagery from a diverse landscape in Central Bulgaria using a pre-trained Convolutional Neural Network (CNN) plus additional but low-touch training to improve performance. Training was accomplished using MOUND/NOT MOUND cutouts, and the model assessed arbitrary tiles of the same size from the image. Results were assessed using field data.

Findings

Validation of results against field data showed that self-reported success rates were misleadingly high, and that the model was misidentifying most features. Setting an identification threshold at 60% probability, and noting that we used an approach where the CNN assessed tiles of a fixed size, tile-based false negative rates were 95–96%, false positive rates were 87–95% of tagged tiles, while true positives were only 5–13%. Counterintuitively, the model provided with training data selected for highly visible mounds (rather than all mounds) performed worse. Development of the model, meanwhile, required approximately 135 person-hours of work.

Research limitations/implications

Our attempt to deploy a pre-trained CNN demonstrates the limitations of this approach when it is used to detect varied features of different sizes within a heterogeneous landscape that contains confounding natural and modern features, such as roads, forests and field boundaries. The model has detected incidental features rather than the mounds themselves, making external validation with field data an essential part of CNN workflows. Correcting the model would require refining the training data as well as adopting different approaches to model choice and execution, raising the computational requirements beyond the level of most cultural heritage practitioners.

Practical implications

Improving the pre-trained model’s performance would require considerable time and resources, on top of the time already invested. The degree of manual intervention required – particularly around the subsetting and annotation of training data – is so significant that it raises the question of whether it would be more efficient to identify all of the mounds manually, either through brute-force inspection by experts or by crowdsourcing the analysis to trained – or even untrained – volunteers. Researchers and heritage specialists seeking efficient methods for extracting features from remotely sensed data should weigh the costs and benefits of ML versus manual approaches carefully.

Social implications

Our literature review indicates that use of artificial intelligence (AI) and ML approaches to archaeological prospection have grown exponentially in the past decade, approaching adoption levels associated with “crossing the chasm” from innovators and early adopters to the majority of researchers. The literature itself, however, is overwhelmingly positive, reflecting some combination of publication bias and a rhetoric of unconditional success. This paper presents the failure of a good-faith attempt to utilise these approaches as a counterbalance and cautionary tale to potential adopters of the technology. Early-majority adopters may find ML difficult to implement effectively in real-life scenarios.

Originality/value

Unlike many high-profile reports from well-funded projects, our paper represents a serious but modestly resourced attempt to apply an ML approach to archaeological remote sensing, using techniques like transfer learning that are promoted as solutions to time and cost problems associated with, e.g. annotating and manipulating training data. While the majority of articles uncritically promote ML, or only discuss how challenges were overcome, our paper investigates how – despite reasonable self-reported scores – the model failed to locate the target features when compared to field data. We also present time, expertise and resourcing requirements, a rarity in ML-for-archaeology publications.

Details

Journal of Documentation, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 0022-0418

Keywords

Open Access
Article
Publication date: 11 May 2021

Ambra Galeazzo, Andrea Furlan and Andrea Vinelli

Drawing on the theoretical concept of organisational fit, this paper questions the relevance of employees' participation in the link between continuous improvement (CI) and…

6365

Abstract

Purpose

Drawing on the theoretical concept of organisational fit, this paper questions the relevance of employees' participation in the link between continuous improvement (CI) and operational performance. The literature has long emphasised that to be successful, CI implementation needs to rely on employees' involvement as soon as its inception. This paper argues that this approach is not generalisable.

Design/methodology/approach

Based on a database of 330 firms across 15 countries, regression analyses were used to hypothesise that the fit between CI and employee participation is positively associated with operational performance, and that the fit between CI and centralisation of authority is negatively associated with operational performance. The authors also ran a robustness check with polynomial regression analyses and the response surface methodology.

Findings

CI–employee participation fit is positively associated with operational performance, suggesting that there is less need for employees to be involved when a firm has scarcely developed CI. Employee participation becomes gradually more relevant as CI progresses. Moreover, the results demonstrate that the CI–centralisation of authority fit is negatively associated with operational performance, suggesting that a top-down management approach with centralised authority is preferable when CI is low, whereas a bottom-up management approach is helpful when a firm has extensively developed CI.

Originality/value

This research draws on the concept of organisational fit to explore the relationships between internal practices in the operations management literature. The authors suggest that managers should dynamically balance the practices of employee participation and centralisation of authority as CI improves. This study highlights that CI has different evolutionary levels that require different managerial approaches and practices.

Details

International Journal of Operations & Production Management, vol. 41 no. 13
Type: Research Article
ISSN: 0144-3577

Keywords

1 – 10 of 80