Search results

1 – 10 of over 29000
Article
Publication date: 21 December 2023

Majid Rahi, Ali Ebrahimnejad and Homayun Motameni

Taking into consideration the current human need for agricultural produce such as rice that requires water for growth, the optimal consumption of this valuable liquid is…

Abstract

Purpose

Taking into consideration the current human need for agricultural produce such as rice that requires water for growth, the optimal consumption of this valuable liquid is important. Unfortunately, the traditional use of water by humans for agricultural purposes contradicts the concept of optimal consumption. Therefore, designing and implementing a mechanized irrigation system is of the highest importance. This system includes hardware equipment such as liquid altimeter sensors, valves and pumps which have a failure phenomenon as an integral part, causing faults in the system. Naturally, these faults occur at probable time intervals, and the probability function with exponential distribution is used to simulate this interval. Thus, before the implementation of such high-cost systems, its evaluation is essential during the design phase.

Design/methodology/approach

The proposed approach included two main steps: offline and online. The offline phase included the simulation of the studied system (i.e. the irrigation system of paddy fields) and the acquisition of a data set for training machine learning algorithms such as decision trees to detect, locate (classification) and evaluate faults. In the online phase, C5.0 decision trees trained in the offline phase were used on a stream of data generated by the system.

Findings

The proposed approach is a comprehensive online component-oriented method, which is a combination of supervised machine learning methods to investigate system faults. Each of these methods is considered a component determined by the dimensions and complexity of the case study (to discover, classify and evaluate fault tolerance). These components are placed together in the form of a process framework so that the appropriate method for each component is obtained based on comparison with other machine learning methods. As a result, depending on the conditions under study, the most efficient method is selected in the components. Before the system implementation phase, its reliability is checked by evaluating the predicted faults (in the system design phase). Therefore, this approach avoids the construction of a high-risk system. Compared to existing methods, the proposed approach is more comprehensive and has greater flexibility.

Research limitations/implications

By expanding the dimensions of the problem, the model verification space grows exponentially using automata.

Originality/value

Unlike the existing methods that only examine one or two aspects of fault analysis such as fault detection, classification and fault-tolerance evaluation, this paper proposes a comprehensive process-oriented approach that investigates all three aspects of fault analysis concurrently.

Details

International Journal of Intelligent Computing and Cybernetics, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 1756-378X

Keywords

Article
Publication date: 8 June 2023

Memoona Iqbal and Muhammad Rafiq

DeLone and McLean (D&M) has been amongst the most widely used models to assess the success elements of information systems (IS) since 1992. A decade later in 2003, D&M proposed a…

1471

Abstract

Purpose

DeLone and McLean (D&M) has been amongst the most widely used models to assess the success elements of information systems (IS) since 1992. A decade later in 2003, D&M proposed a revised design that included several components which have been left out of original proposed model. This study aims to rely on the review of a number of papers casing the era 2011–2022 that satisfies a specific set of requirements to identify the research gaps in this area and to prepare a future research agenda.

Design/methodology/approach

This study is a systematic review: a technique that identifies and evaluates pertinent research. This gathers and analyses data from selected studies with objective to catalogue all empirical research studies, which responds to a certain study topic or hypothesis to meets predetermined inclusion criteria. Data collection method was divided into four stages, and selection details are determined through flow chart.

Findings

This research discovered D&M 2003 model use in many contexts, countries and cultures to better comprehend the topic and addresses its gaps, particularly with regard to public sector and its particularities. Publications have frequently emphasized the significance of this idea while studying public sector information systems by using associated variables-related items. Findings also include a summary of key components and dimensions used in reviewed studies in relation to each of the seven variables, and associated particularities in government sector over the world.

Originality/value

To the best of the authors’ knowledge, this is the first ever effort in this developing country in discipline of Information Management to execute such kind of study to review D&M ISS model in detail at this stage to evaluate nonacademic public sector information systems around the world.

Details

Global Knowledge, Memory and Communication, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 2514-9342

Keywords

Open Access
Article
Publication date: 26 May 2023

Mpho Trinity Manenzhe, Arnesh Telukdarie and Megashnee Munsamy

The purpose of this paper is to propose a system dynamic simulated process model for maintenance work management incorporating the Fourth Industrial Revolution (4IR) technologies.

2017

Abstract

Purpose

The purpose of this paper is to propose a system dynamic simulated process model for maintenance work management incorporating the Fourth Industrial Revolution (4IR) technologies.

Design/methodology/approach

The extant literature in physical assets maintenance depicts that poor maintenance management is predominantly because of a lack of a clearly defined maintenance work management process model, resulting in poor management of maintenance work. This paper solves this complex phenomenon using a combination of conceptual process modeling and system dynamics simulation incorporating 4IR technologies. A process for maintenance work management and its control actions on scheduled maintenance tasks versus unscheduled maintenance tasks is modeled, replicating real-world scenarios with a digital lens (4IR technologies) for predictive maintenance strategy.

Findings

A process for maintenance work management is thus modeled and simulated as a dynamic system. Post-model validation, this study reveals that the real-world maintenance work management process can be replicated using system dynamics modeling. The impact analysis of 4IR technologies on maintenance work management systems reveals that the implementation of 4IR technologies intensifies asset performance with an overall gain of 27.46%, yielding the best maintenance index. This study further reveals that the benefits of 4IR technologies positively impact equipment defect predictability before failure, thereby yielding a predictive maintenance strategy.

Research limitations/implications

The study focused on maintenance work management system without the consideration of other subsystems such as cost of maintenance, production dynamics, and supply chain management.

Practical implications

The maintenance real-world quantitative data is retrieved from two maintenance departments from company A, for a period of 24 months, representing years 2017 and 2018. The maintenance quantitative data retrieved represent six various types of equipment used at underground Mines. The maintenance management qualitative data (Organizational documents) in maintenance management are retrieved from company A and company B. Company A is a global mining industry, and company B is a global manufacturing industry. The reliability of the data used in the model validation have practical implications on how maintenance work management system behaves with the benefit of 4IR technologies' implementation.

Social implications

This research study yields an overall benefit in asset management, thereby intensifying asset performance. The expected learnings are intended to benefit future research in the physical asset management field of study and most important to the industry practitioners in physical asset management.

Originality/value

This paper provides for a model in which maintenance work and its dynamics is systematically managed. Uncontrollable corrective maintenance work increases the complexity of the overall maintenance work management. The use of a system dynamic model and simulation incorporating 4IR technologies adds value on the maintenance work management effectiveness.

Details

Journal of Quality in Maintenance Engineering, vol. 29 no. 5
Type: Research Article
ISSN: 1355-2511

Keywords

Article
Publication date: 22 December 2022

Reihaneh Alsadat Tabaeeian, Behzad Hajrahimi and Atefeh Khoshfetrat

The purpose of this review paper was identifying barriers to the use of telemedicine systems in primary health-care individual level among professionals.

Abstract

Purpose

The purpose of this review paper was identifying barriers to the use of telemedicine systems in primary health-care individual level among professionals.

Design/methodology/approach

This study used Scopus and PubMed databases for scientific records identification. A systematic review of the literature structured by PRISMA guidelines was conducted on 37 included papers published between 2009 and 2019. A qualitative approach was used to synthesize insights into using telemedicine by primary care professionals.

Findings

Three barriers were identified and classified: system quality, data quality and service quality barriers. System complexity in terms of usability, system unreliability, security and privacy concerns, lack of integration and inflexibility of systems-in-use are related to system quality. Data quality barriers are data inaccuracy, data timeliness issues, data conciseness concerns and lack of data uniqueness. Finally, service reliability concerns, lack of technical support and lack of user training have been categorized as service quality barriers.

Originality/value

This review identified and mapped emerging themes of barriers to the use of telemedicine systems. This paper also through a new conceptualization of telemedicine use from perspectives of the primary care professionals contributes to informatics literature and system usage practices.

Details

Journal of Science and Technology Policy Management, vol. 15 no. 3
Type: Research Article
ISSN: 2053-4620

Keywords

Article
Publication date: 7 May 2024

Swathi Pennapareddy, Ramprasad Srinivasan and Natarajan K.

Automatic dependent surveillance-broadcast (ADS-B) is the foundational technology of the next generation air transportation system defined by Federal Aviation Authority and is one…

Abstract

Purpose

Automatic dependent surveillance-broadcast (ADS-B) is the foundational technology of the next generation air transportation system defined by Federal Aviation Authority and is one of the most precise ways for tracking aircraft position. ADS-B is intended to provide greater situational awareness to the pilots by displaying the traffic information like aircraft ID, altitude, speed and other critical parameters on the Cockpit Display of Traffic Information displays in the cockpit. Unfortunately, due to the initial proposed nature of ADS-B protocol, it is neither encrypted nor has any other innate security mechanisms, which makes it an easy target for malicious attacks. The system is vulnerable to various active and passive attacks like message ingestion, message deletion, eavesdropping, jamming, etc., which has become an area of concern for the aviation industry. The purpose of this study is to propose a method based on modified advanced encryption standard (AES) algorithm to secure the ADS=B messages and increase the integrity of ADS-B data transmissions.

Design/methodology/approach

Though there are various cryptographic and non-cryptographic methods proposed to secure ADS-B data transmissions, it is evident that most of these systems have limitations in terms of cost, implementation or feasibility. The new proposed method implements AES encryption techniques on the ADS-B data on the sender side and correlated decryption mechanism at the receiver end. The system is designed based on the flight schedule data available from any flight planning systems and implementing the AES algorithm on the ADS-B data from each aircraft in the flight schedule.

Findings

The suitable hardware was developed using Raspberry pi, ESP32 and Ra-02. Several runs were done to verify the original message, transmitted data and received data. During transmission, encryption algorithm was being developed, which has got very high secured transmission, and during the reception, the data was secured. Field test was conducted to validate the transmission and quality. Several trials were done to validate the transmission process. The authors have successfully shown that the ADS-B data can be encrypted using AES algorithm. The authors are successful in transmitting and receiving the ADS-B data packet using the discussed hardware and software methodology. One major advantage of using the proposed solution is that the information received is encrypted, and the receiver ADS-B system can decrypt the messages on the receiving end. This clearly proves that when the data is received by an unknown receiver, the messages cannot be decrypted, as the receiver is not capable of decrypting the AES-authenticated messages transmitted by the authenticated source. Also, AES encryption is highly unlikely to be decrypted if the encryption key and the associated decryption key are not known.

Research limitations/implications

Implementation of the developed solution in actual onboard avionics systems is not within the scope of this research. Hence, assessing in the real-time distances is not covered.

Social implications

The authors propose to extend this as a software solution to the onboard avionics systems by considering the required architectural changes. This solution can also bring in positive results for unmanned air vehicles in addition to the commercial aircrafts. Enhancement of security to the key operational and navigation data elements is going to be invaluable for future air traffic management and saving lives of people.

Originality/value

The proposed solution has been practically implemented by developing the hardware and software as part of this research. This has been clearly brought out in the paper. The implementation has been tested using the actual ADS-B data/messages received from using the ADS-B receiver. The solution works perfectly, and this brings immense value to the aircraft-to-aircraft and aircraft-to-ground communications, specifically while using ADS-B data for communicating the position information. With the proposed architecture and minor software updates to the onboard avionics, this solution can enhance safety of flights.

Details

Aircraft Engineering and Aerospace Technology, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 1748-8842

Keywords

Article
Publication date: 30 April 2024

Jacqueline Humphries, Pepijn Van de Ven, Nehal Amer, Nitin Nandeshwar and Alan Ryan

Maintaining the safety of the human is a major concern in factories where humans co-exist with robots and other physical tools. Typically, the area around the robots is monitored…

Abstract

Purpose

Maintaining the safety of the human is a major concern in factories where humans co-exist with robots and other physical tools. Typically, the area around the robots is monitored using lasers. However, lasers cannot distinguish between human and non-human objects in the robot’s path. Stopping or slowing down the robot when non-human objects approach is unproductive. This research contribution addresses that inefficiency by showing how computer-vision techniques can be used instead of lasers which improve up-time of the robot.

Design/methodology/approach

A computer-vision safety system is presented. Image segmentation, 3D point clouds, face recognition, hand gesture recognition, speed and trajectory tracking and a digital twin are used. Using speed and separation, the robot’s speed is controlled based on the nearest location of humans accurate to their body shape. The computer-vision safety system is compared to a traditional laser measure. The system is evaluated in a controlled test, and in the field.

Findings

Computer-vision and lasers are shown to be equivalent by a measure of relationship and measure of agreement. R2 is given as 0.999983. The two methods are systematically producing similar results, as the bias is close to zero, at 0.060 mm. Using Bland–Altman analysis, 95% of the differences lie within the limits of maximum acceptable differences.

Originality/value

In this paper an original model for future computer-vision safety systems is described which is equivalent to existing laser systems, identifies and adapts to particular humans and reduces the need to slow and stop systems thereby improving efficiency. The implication is that computer-vision can be used to substitute lasers and permit adaptive robotic control in human–robot collaboration systems.

Details

Technological Sustainability, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 2754-1312

Keywords

Article
Publication date: 26 March 2024

Dilek Şahin, Mehmet Nurullah Kurutkan and Tuba Arslan

Today, e-government (electronic government) applications have extended to the frontiers of health-care delivery. E-Nabız contains personal health records of health services…

Abstract

Purpose

Today, e-government (electronic government) applications have extended to the frontiers of health-care delivery. E-Nabız contains personal health records of health services received, whether public or private. The use of the application by patients and physicians has provided efficiency and cost advantages. The success of e-Nabız depends on the level of technology acceptance of health-care service providers and recipients. While there is a large research literature on the technology acceptance of service recipients in health-care services, there is a limited number of studies on physicians providing services. This study aims to determine the level of influence of trust and privacy variables in addition to performance expectancy, effort expectancy, social influence and facilitating factors in the unified theory of acceptance and use of technology (UTAUT) model on the intention and behavior of using e-Nabız application.

Design/methodology/approach

The population of the study consisted of general practitioners and specialist physicians actively working in any health facility in Turkey. Data were collected cross-sectionally from 236 physicians on a voluntary basis through a questionnaire. The response rate of data collection was calculated as 47.20%. Data were collected cross-sectionally from 236 physicians through a questionnaire. Descriptive statistics, correlation analysis and structural equation modeling were used to analyze the data.

Findings

The study found that performance expectancy, effort expectancy, trust and perceived privacy had a significant effect on physicians’ behavioral intentions to adopt the e-Nabız system. In addition, facilitating conditions and behavioral intention were determinants of usage behavior (p < 0.05). However, no significant relationship was found between social influence and behavioral intention (p > 0.05).

Originality/value

This study confirms that the UTAUT model provides an appropriate framework for predicting factors influencing physicians’ behaviors and intention to use e-Nabız. In addition, the empirical findings show that trust and perceived privacy, which are additionally considered in the model, are also influential.

Details

Journal of Science and Technology Policy Management, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 2053-4620

Keywords

Article
Publication date: 19 February 2024

Steven Alter

The lack of conceptual approaches for organizing and expressing capabilities, usage and impact of intelligent machines (IMs) in work settings is an obstacle to moving beyond…

Abstract

Purpose

The lack of conceptual approaches for organizing and expressing capabilities, usage and impact of intelligent machines (IMs) in work settings is an obstacle to moving beyond isolated case examples, domain-specific studies, 2 × 2 frameworks and expert opinion in discussions of IMs and work. This paper's purpose is to illuminate many issues that often are not addressed directly in research, practice or punditry related to IMs. It pursues that purpose by presenting an integrated approach for identifying and organizing important aspects of analysis and evaluation related to IMs in work settings. 

Design/methodology/approach

This paper integrates previously published ideas related to work systems (WSs), smart devices and systems, facets of work, roles and responsibilities of information systems, interactions between people and machines and a range of criteria for evaluating system performance.

Findings

Eight principles outline a straightforward and flexible approach for analyzing and evaluating IMs and the WSs that use them. Those principles are based on the above ideas.

Originality/value

This paper provides a novel approach for identifying design choices for situated use of IMs. The breadth, depth and integration of this approach address a gap in existing literature, which rarely aspires to this paper’s thoroughness in combining ideas that support the description, analysis, design and evaluation of situated uses of IMs.

Details

Information Technology & People, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 0959-3845

Keywords

Open Access
Article
Publication date: 7 June 2023

Alicia Martín-Navarro, María Paula Lechuga Sancho and Jose Aurelio Medina-Garrido

Companies are increasingly implementing business process management systems (BPMSs) to support their processes. However, there is a gap in the literature regarding whether users…

1328

Abstract

Purpose

Companies are increasingly implementing business process management systems (BPMSs) to support their processes. However, there is a gap in the literature regarding whether users also use BPMSs to manage the knowledge needed for processes to be completed. This study aims to analyze the factors that cause users to use BPMSs to manage the knowledge required in business processes.

Design/methodology/approach

The paper proposes an original model that integrates two successful information system models applied to BPMSs and knowledge management systems. To test the hypotheses derived from this new model, data were collected from 242 mature BPMS users from 12 Spanish and Latin American companies. Structural equation modeling with AMOS was used to examine the model.

Findings

Users’ perceived usefulness of a BPMS when using it for knowledge management (KM) is the only factor influencing them to use it for KM.

Practical implications

This study has practical implications for managers wishing to successfully implement a BPMS to support processes and for employees to use the knowledge embedded in the tool. The latter will only happen if users perceive the tool’s usefulness for KM.

Originality/value

To the best of the authors’ knowledge, this model is the first empirically validated model to successfully analyze BPMS users’ tendency to use BPMSs as a tool to support necessary KM in processes.

Details

Journal of Knowledge Management, vol. 27 no. 11
Type: Research Article
ISSN: 1367-3270

Keywords

Article
Publication date: 27 June 2023

Kristijan Mirkovski, Kamel Rouibah, Paul Lowry, Joanna Paliszkiewicz and Marzena Ganc

Despite the major information technology investments made by public institutions, the reuse of e-government services remains an issue as citizens hesitate to use e-government…

Abstract

Purpose

Despite the major information technology investments made by public institutions, the reuse of e-government services remains an issue as citizens hesitate to use e-government websites regularly. The purpose of this study is to investigate the cross-country determinants of e-government reuse intention by proposing a theoretical model that integrates constructs from (1) the Delone and McLean IS success model (i.e. system quality, service quality, information quality, perceived value and user satisfaction); (2) the trust and risk models (i.e. citizen trust, overall risk, time risk, privacy risk and psychological risks); and (3) Hofstede's cultural model (i.e. uncertainty avoidance, masculinity, individualism and cross-cultural trust and risk).

Design/methodology/approach

Based on data from interviews with 81 Kuwaiti citizens and surveys of 1,829 Kuwaiti and Polish citizens, this study conducted comprehensive, cross-cultural and comparative analyses of e-government reuse intention in a cross-country setting.

Findings

The results show that trust is positively associated with citizens' intention to reuse e-government services, whereas risk is negatively associated with citizens' perceived value. This study also found that masculinity–femininity and uncertainty avoidance are positively associated with the intention to reuse e-government services and that individualism–collectivism has no significant relationship with reuse intention. This study's findings have important implications for researchers and practitioners seeking to understand and improve e-government success in cross-country settings.

Originality/value

This study developed a parsimonious model of quality, trust, risk, culture and technology reuse that captures country-specific cultural contexts and enables us to conduct a comprehensive, cross-cultural and comparative analysis of e-government reuse intention in the cross-country setting of Kuwait and Poland.

Details

Information Technology & People, vol. 37 no. 4
Type: Research Article
ISSN: 0959-3845

Keywords

1 – 10 of over 29000