Search results
1 – 10 of 533Reinhard Müllner and Andreas Riener
Conventional street lighting systems in areas with a low frequency of passersby are online most of the night without purpose. The consequence is that a large amount of power is…
Abstract
Purpose
Conventional street lighting systems in areas with a low frequency of passersby are online most of the night without purpose. The consequence is that a large amount of power is wasted meaninglessly. With the broad availability of flexible‐lighting technology like light‐emitting diode lamps and everywhere available wireless internet connection, fast reacting, reliably operating, and power‐conserving street lighting systems become reality. The purpose of this work is to describe the Smart Street Lighting (SSL) system, a first approach to accomplish the demand for flexible public lighting systems.
Design/methodology/approach
This work presents the SSL system, a framework developed for a dynamic switching of street lamps based on pedestrians' locations and desired safety (or “fear”) zones. In the developed system prototype, each pedestrian is localized via his/her smartphone, periodically sending location and configuration information to the SSL server. For street lamp control, each and every lamppost is equipped with a ZigBee‐based radio device, receiving control information from the SSL server via multi‐hop routing.
Findings
This research paper confirms that the application of the proposed SSL system has great potential to revolutionize street lighting, particularly in suburban areas with low‐pedestrian frequency. More important, the broad utilization of SSL can easily help to overcome the regulatory requirement for CO2 emission reduction by switching off lampposts whenever they are not required.
Research limitations/implications
The paper discusses in detail the implementation of SSL, and presents results of its application on a small scale. Experiments have shown that objects like trees can interrupt wireless communication between lampposts and that inaccuracy of global positioning system position detection can lead to unexpected lighting effects.
Originality/value
This paper introduces the novel SSL framework, a system for fast, reliable, and energy efficient street lamp switching based on a pedestrian's location and personal desires of safety. Both safety zone definition and position estimation in this novel approach is accomplished using standard smartphone capabilities. Suggestions for overcoming these issues are discussed in the last part of the paper.
Details
Keywords
Haim Shaked and Chen Schechter
The purpose of this paper is to explore how effective school principals use systems thinking, aiming to present the systems school leadership (SSL) approach – an approach where…
Abstract
Purpose
The purpose of this paper is to explore how effective school principals use systems thinking, aiming to present the systems school leadership (SSL) approach – an approach where principals lead schools through the systems thinking concept and procedures.
Design/methodology/approach
Participants were 28 Israeli school principals, selected as outstanding leaders by recommendations from their superintendents and according to their schools’ achievements. The study employed semi-structured interviews as well as focus groups. Generating themes was an inductive process, grounded in the various perspectives articulated by participants.
Findings
Data analysis generated four main characteristics of SSL: leading wholes; adopting a multidimensional view; influencing indirectly; and evaluating significance.
Research limitations/implications
Further research that will explore to what extent and how often principals use systems thinking is required. In addition, replication in various educational contexts is important in order to substantiate the validity of the SSL's characteristics. Beyond principals’ perceptions, more objective measures like direct observations are needed to evaluate actual implementation of SSL in diverse school settings.
Practical implications
Identifying the SSL characteristics facilitates the development of practical processes for nurturing SSL in various stages of school leaders’ educational career.
Originality/value
This paper provides a useful conceptual and empirical framework to evaluate SSL as a managerial approach.
Details
Keywords
Susannah Diamond and Brian Irwin
The paper aims to explore staff practices in using e‐learning to embed sustainability literacy, highlight best practice and determine areas for improvement.
Abstract
Purpose
The paper aims to explore staff practices in using e‐learning to embed sustainability literacy, highlight best practice and determine areas for improvement.
Design/methodology/approach
A framework of four areas for developing student sustainability literacy (SSL) was proposed as a basis for analysing practice. A literature review then explored the extent to which e‐learning is used to support embedding SSL in the curriculum, and the types of e‐learning currently in use for this.
Findings
E‐learning tools were most frequently used to provide flexible access to information, followed by support for communication and collaboration, and were less frequently used for the development of specific skills, personal identity and confidence.
Research limitations/implications
The sample of case studies provided only limited evidence. A survey of practitioners could be undertaken to explore and validate the issues raised by the literature review.
Practical implications
The review highlighted scope for a pedagogical shift away from using e‐learning for information delivery and practical communication, and towards supporting rich, student‐centred forms of learning in both blended and distance learning modes.
Social implications
This shift would create more powerful learning experiences for students, more effectively develop students' personal identities and skills, and yield graduates who are more confident in their ability to create more sustainable futures.
Originality/value
This paper will be of value to academic staff and educational developers looking to develop practice in embedding SSL in teaching and learning, and to harness the potential of e‐learning.
Details
Keywords
Peipei Bai, Hossein Heidarian Ghaleh, Huikun Chang, Longzhen Li and Jongwook Pak
The study aims to offer a nuanced, fine-grained understanding of how the relationship between high-performance work systems (HPWSs) and negative employee outcomes can be…
Abstract
Purpose
The study aims to offer a nuanced, fine-grained understanding of how the relationship between high-performance work systems (HPWSs) and negative employee outcomes can be attenuated under self-sacrificial leadership (SSL).
Design/methodology/approach
Hierarchical linear modeling (HLM) was used to test the proposed multilevel model on a sample of 37 first-line managers (FLMs) and 209 employees working in a large Chinese company.
Findings
The results showed that HPWS is positively related to emotional exhaustion and turnover intention. Most conspicuously, the authors found that such adverse effects of HPWS are mitigated with a high level of SSL.
Practical implications
The dark side of HPWS can be alleviated if practitioners complement their practices with sufficient support for employees. Particularly, FLMs who exhibit subordinate-serving attitudes consider followers' well-being and provide them with resources can lessen the high pressure of HPWS in pursuit of performance enhancement.
Originality/value
Prior studies on the relationships between HPWS and employee outcomes have produced somewhat mixed results. This study extended the current discourse by explicating instead why HPWS could potentially impair employee outcomes and how the negative effects of HPWS can be mitigated under positive leader behaviors.
Details
Keywords
Kun Tong, Sanjay Joshi and E. Amine Lehtihet
The purpose of this research is to extend the previous approach to software error compensation to fused deposition modeling (FDM) machines and explores the approach to apply…
Abstract
Purpose
The purpose of this research is to extend the previous approach to software error compensation to fused deposition modeling (FDM) machines and explores the approach to apply compensation by correcting slice files.
Design/methodology/approach
In addition to applying the stereolithography (STL) file‐based compensation method from earlier research; a new approach using the slice file format to apply compensation is presented. Under this approach, the confounded effects of all errors in a FDM machine are mapped into a “virtual” parametric machine error model. A 3D artifact is built on the FDM machine and differences between its actual and nominal dimensions are used to estimate the coefficients of the error functions. A slice file compensation method is developed and tested on two types of parts as a means for further improving the error compensation for feature form error improvement. STL file compensation is also applied to a specific FDM 3000 machine and the results are compared with those of a specific SLA 250 machine.
Findings
The two compensation methods are compared. Although, the slice file compensation method theoretically allows higher compensation resolution, the actual machine control resolution of the FDM machine can be a limitation which makes the difference between STL compensation and slice file compensation indistinguishable. However, as the control resolution is increased, this method will make it possible to provide a higher degree of compensation.
Originality/value
Compensation method applied to slice file format is developed for FDM machines and its limitations are explored. Based on the experimental study, dimensional accuracy of parts is considerably improved by the software error compensation approach.
Details
Keywords
Examines the general requirement for security technologies in order to provide a basis for trust in the e‐commerce environment. The discussion is supported by the findings from…
Abstract
Examines the general requirement for security technologies in order to provide a basis for trust in the e‐commerce environment. The discussion is supported by the findings from two surveys, conducted by the authors, among general Internet users (i.e. potential target consumers) and commercial businesses. These surveys considered both the attitudes to e‐commerce in general and opinions relating to the associated security requirements. Attempts were also made to assess the respondent’s knowledge of the existing security safeguards that may be applied. The survey results suggest that, while there is significant concern among Internet‐based consumers regarding the security of their purchasing activities, these are outweighed by the merits offered by the medium. The results also suggested a lack of awareness or understanding of the security technologies that are available and it is concluded that overcoming this problem would help to establish a wider foundation of trust in the new technology.
Details
Keywords
Lihong Zhou, Yaqian Song and Tong Zhou
Self-service libraries (SSLs) have been regarded as an effective approach to provide convenient book services to the enormously large populations of China’s cities. These SSLs are…
Abstract
Purpose
Self-service libraries (SSLs) have been regarded as an effective approach to provide convenient book services to the enormously large populations of China’s cities. These SSLs are in fact automatic book service machines, which provide a combination of services, including reading card issuing, book lending and returning, and book reservations and collection. However, despite acclaimed success, SSL services are not well received by patrons and are underutilised. The purpose of this paper is to identify and understand the causes of the underutilisation of SSL services in Chinese cities.
Design/methodology/approach
This study adopted an inductive approach and a case study research design. The SSL services in Wuhan, the capital city of Hubei Province, were adopted as the case study, in which 20 public librarians, SSL workers and managers, and library patrons were approached and interviewed using semi-structured question scripts. The interview data were analysed using a thematic analysis approach.
Findings
The analysis pointed to 13 causes in three main themes: management problems, service limitations, and the implicit role of government. Further conceptualisation of the findings revealed that the underutilisation of SSL services has resulted from the absence of a patron-centric perspective and the negligence of patrons’ needs and requirements. Therefore, to increase the popularity and usage of SSLs, it is necessary to develop patron-centric management mechanisms through which patrons’ needs and requirements can be effectively understood and responded to.
Originality/value
This study aims to develop specific suggestions to improve the usage of SSLs. Furthermore, although this study focuses on SSL development in China, this research can provide useful suggestions and implications that can be shared across international borders.
Details
Keywords
Sandip C. Patel and Pritimoy Sanyal
Supervisory control and data acquisition (SCADA) systems are widely used by utility companies during the production and distribution of oil, gas, chemicals, electric power, and…
Abstract
Purpose
Supervisory control and data acquisition (SCADA) systems are widely used by utility companies during the production and distribution of oil, gas, chemicals, electric power, and water to control and monitor these operations. A cyber attack on a SCADA system cannot only result in a major financial disaster but also in devastating damage to public safety and health. The purpose of this paper is to survey the literature on the cyber security of SCADA systems and then suggest two categories of security solutions.
Design/methodology/approach
The paper proposes the use of secure socket layer/transport layer security (SSL/TLS) and IP security (IPsec) solutions, implemented on the test‐bed at the University of Louisville, as the optimal choices when considering the level of security a solution can provide and the difficulty of implementing such a security measure. The paper analyzes these two solution choices, discuss their advantages and disadvantages, and present details on efficient ways of implementing these solutions.
Findings
The SSL/TLS solution to the protocol security using public domain toolkits such as OpenSSL may provide a fast, effective, and economical solution. However, the SSL/TLS protocol and its implementation toolkits have their limitations so this approach may need another enhancement.
Practical implications
IPsec can be used to provide IP‐level security in addition to SSL/TLS.
Originality/value
The use of these enhanced security approaches in SCADA systems should effectively reduce the vulnerability of these critical systems to malicious cyber attacks, and thereby potentially avoiding the serious consequences of such attacks.
Details
Keywords
To investigate the role of spent sulphite liquor (SSL) retained on neutral sulphite bagasse pulp in the binding action of phenolic resin, for the purpose of enhancing its…
Abstract
Purpose
To investigate the role of spent sulphite liquor (SSL) retained on neutral sulphite bagasse pulp in the binding action of phenolic resin, for the purpose of enhancing its performance to produce high quality agro‐based composite.
Design/methodology/approach
Pulps used in this work as agro‐based fibres were prepared from Asplund defibrator and neutral sulphite pulping processes. The performance of the resol resin in presence of SSL, were evaluated in terms of the effects of SSL constituents and using novolac as phenolic resin, in comparison with that prepared from pulps in absence of SSL and conventionally prepared resol – Asplund bagasse composites. Preparation of pulp free from sulphonyl groups and pre‐out‐precipitating the resol or lignosulphonic acid (LSA) on the strength and water resistance properties of the composite produced was also examined. The degraded hemicellulose and LSA in SSL were polynomial correlated with the changes in composites properties.
Findings
All neutral sulphite pulps investigated, in presence of SSL, were found to enhance the strength quality of agro‐based composite compared to commercially available resol‐agro‐based composite. The retained SSL on NS‐raw bagasse pulp could replace the Asplund bagasse pulp together with resol resin in production of agro‐composite. As well as, using neutral sulphite – Asplund bagasse pulp reduced the percent of added resol to half, to produce commercial resol agro‐based composite. The performance of the composite produced from novolac resin‐SSL‐neutral sulphite pulp and resol‐LSA‐neutral sulphite pulp exceeded 1.5 to 1.9 times the strength of commercially available composite.
Research limitations/implications
Despite the SSL retained on pulp success in improving the strength property of the resol resin‐agro‐composites, but it has an undesirable effect on water resistance of the product. This problem was resolved by avoiding the undesirable effect of sulphonyl groups on pulp fibres as well as the degraded hemicellulose in SSL.
Practical implications
The approach developed provided a simple and practical solution to enhancing the performance of phenolic resin as well as agro‐fibres and SSL wastes in the production of high performance lignocellulosic composite.
Originality/value
The resol, together with SSL constituents retained on neutral sulphite pulp, are economic bonding agents for agro‐fibres and could be used in wood mills for production of medium density fibre‐board.
Details
Keywords
Vasileios Stamatis, Michail Salampasis and Konstantinos Diamantaras
In federated search, a query is sent simultaneously to multiple resources and each one of them returns a list of results. These lists are merged into a single list using the…
Abstract
Purpose
In federated search, a query is sent simultaneously to multiple resources and each one of them returns a list of results. These lists are merged into a single list using the results merging process. In this work, the authors apply machine learning methods for results merging in federated patent search. Even though several methods for results merging have been developed, none of them were tested on patent data nor considered several machine learning models. Thus, the authors experiment with state-of-the-art methods using patent data and they propose two new methods for results merging that use machine learning models.
Design/methodology/approach
The methods are based on a centralized index containing samples of documents from all the remote resources, and they implement machine learning models to estimate comparable scores for the documents retrieved by different resources. The authors examine the new methods in cooperative and uncooperative settings where document scores from the remote search engines are available and not, respectively. In uncooperative environments, they propose two methods for assigning document scores.
Findings
The effectiveness of the new results merging methods was measured against state-of-the-art models and found to be superior to them in many cases with significant improvements. The random forest model achieves the best results in comparison to all other models and presents new insights for the results merging problem.
Originality/value
In this article the authors prove that machine learning models can substitute other standard methods and models that used for results merging for many years. Our methods outperformed state-of-the-art estimation methods for results merging, and they proved that they are more effective for federated patent search.
Details