Search results
1 – 10 of over 29000Majid Rahi, Ali Ebrahimnejad and Homayun Motameni
Taking into consideration the current human need for agricultural produce such as rice that requires water for growth, the optimal consumption of this valuable liquid is…
Abstract
Purpose
Taking into consideration the current human need for agricultural produce such as rice that requires water for growth, the optimal consumption of this valuable liquid is important. Unfortunately, the traditional use of water by humans for agricultural purposes contradicts the concept of optimal consumption. Therefore, designing and implementing a mechanized irrigation system is of the highest importance. This system includes hardware equipment such as liquid altimeter sensors, valves and pumps which have a failure phenomenon as an integral part, causing faults in the system. Naturally, these faults occur at probable time intervals, and the probability function with exponential distribution is used to simulate this interval. Thus, before the implementation of such high-cost systems, its evaluation is essential during the design phase.
Design/methodology/approach
The proposed approach included two main steps: offline and online. The offline phase included the simulation of the studied system (i.e. the irrigation system of paddy fields) and the acquisition of a data set for training machine learning algorithms such as decision trees to detect, locate (classification) and evaluate faults. In the online phase, C5.0 decision trees trained in the offline phase were used on a stream of data generated by the system.
Findings
The proposed approach is a comprehensive online component-oriented method, which is a combination of supervised machine learning methods to investigate system faults. Each of these methods is considered a component determined by the dimensions and complexity of the case study (to discover, classify and evaluate fault tolerance). These components are placed together in the form of a process framework so that the appropriate method for each component is obtained based on comparison with other machine learning methods. As a result, depending on the conditions under study, the most efficient method is selected in the components. Before the system implementation phase, its reliability is checked by evaluating the predicted faults (in the system design phase). Therefore, this approach avoids the construction of a high-risk system. Compared to existing methods, the proposed approach is more comprehensive and has greater flexibility.
Research limitations/implications
By expanding the dimensions of the problem, the model verification space grows exponentially using automata.
Originality/value
Unlike the existing methods that only examine one or two aspects of fault analysis such as fault detection, classification and fault-tolerance evaluation, this paper proposes a comprehensive process-oriented approach that investigates all three aspects of fault analysis concurrently.
Details
Keywords
Memoona Iqbal and Muhammad Rafiq
DeLone and McLean (D&M) has been amongst the most widely used models to assess the success elements of information systems (IS) since 1992. A decade later in 2003, D&M proposed a…
Abstract
Purpose
DeLone and McLean (D&M) has been amongst the most widely used models to assess the success elements of information systems (IS) since 1992. A decade later in 2003, D&M proposed a revised design that included several components which have been left out of original proposed model. This study aims to rely on the review of a number of papers casing the era 2011–2022 that satisfies a specific set of requirements to identify the research gaps in this area and to prepare a future research agenda.
Design/methodology/approach
This study is a systematic review: a technique that identifies and evaluates pertinent research. This gathers and analyses data from selected studies with objective to catalogue all empirical research studies, which responds to a certain study topic or hypothesis to meets predetermined inclusion criteria. Data collection method was divided into four stages, and selection details are determined through flow chart.
Findings
This research discovered D&M 2003 model use in many contexts, countries and cultures to better comprehend the topic and addresses its gaps, particularly with regard to public sector and its particularities. Publications have frequently emphasized the significance of this idea while studying public sector information systems by using associated variables-related items. Findings also include a summary of key components and dimensions used in reviewed studies in relation to each of the seven variables, and associated particularities in government sector over the world.
Originality/value
To the best of the authors’ knowledge, this is the first ever effort in this developing country in discipline of Information Management to execute such kind of study to review D&M ISS model in detail at this stage to evaluate nonacademic public sector information systems around the world.
Details
Keywords
Mpho Trinity Manenzhe, Arnesh Telukdarie and Megashnee Munsamy
The purpose of this paper is to propose a system dynamic simulated process model for maintenance work management incorporating the Fourth Industrial Revolution (4IR) technologies.
Abstract
Purpose
The purpose of this paper is to propose a system dynamic simulated process model for maintenance work management incorporating the Fourth Industrial Revolution (4IR) technologies.
Design/methodology/approach
The extant literature in physical assets maintenance depicts that poor maintenance management is predominantly because of a lack of a clearly defined maintenance work management process model, resulting in poor management of maintenance work. This paper solves this complex phenomenon using a combination of conceptual process modeling and system dynamics simulation incorporating 4IR technologies. A process for maintenance work management and its control actions on scheduled maintenance tasks versus unscheduled maintenance tasks is modeled, replicating real-world scenarios with a digital lens (4IR technologies) for predictive maintenance strategy.
Findings
A process for maintenance work management is thus modeled and simulated as a dynamic system. Post-model validation, this study reveals that the real-world maintenance work management process can be replicated using system dynamics modeling. The impact analysis of 4IR technologies on maintenance work management systems reveals that the implementation of 4IR technologies intensifies asset performance with an overall gain of 27.46%, yielding the best maintenance index. This study further reveals that the benefits of 4IR technologies positively impact equipment defect predictability before failure, thereby yielding a predictive maintenance strategy.
Research limitations/implications
The study focused on maintenance work management system without the consideration of other subsystems such as cost of maintenance, production dynamics, and supply chain management.
Practical implications
The maintenance real-world quantitative data is retrieved from two maintenance departments from company A, for a period of 24 months, representing years 2017 and 2018. The maintenance quantitative data retrieved represent six various types of equipment used at underground Mines. The maintenance management qualitative data (Organizational documents) in maintenance management are retrieved from company A and company B. Company A is a global mining industry, and company B is a global manufacturing industry. The reliability of the data used in the model validation have practical implications on how maintenance work management system behaves with the benefit of 4IR technologies' implementation.
Social implications
This research study yields an overall benefit in asset management, thereby intensifying asset performance. The expected learnings are intended to benefit future research in the physical asset management field of study and most important to the industry practitioners in physical asset management.
Originality/value
This paper provides for a model in which maintenance work and its dynamics is systematically managed. Uncontrollable corrective maintenance work increases the complexity of the overall maintenance work management. The use of a system dynamic model and simulation incorporating 4IR technologies adds value on the maintenance work management effectiveness.
Details
Keywords
Reihaneh Alsadat Tabaeeian, Behzad Hajrahimi and Atefeh Khoshfetrat
The purpose of this review paper was identifying barriers to the use of telemedicine systems in primary health-care individual level among professionals.
Abstract
Purpose
The purpose of this review paper was identifying barriers to the use of telemedicine systems in primary health-care individual level among professionals.
Design/methodology/approach
This study used Scopus and PubMed databases for scientific records identification. A systematic review of the literature structured by PRISMA guidelines was conducted on 37 included papers published between 2009 and 2019. A qualitative approach was used to synthesize insights into using telemedicine by primary care professionals.
Findings
Three barriers were identified and classified: system quality, data quality and service quality barriers. System complexity in terms of usability, system unreliability, security and privacy concerns, lack of integration and inflexibility of systems-in-use are related to system quality. Data quality barriers are data inaccuracy, data timeliness issues, data conciseness concerns and lack of data uniqueness. Finally, service reliability concerns, lack of technical support and lack of user training have been categorized as service quality barriers.
Originality/value
This review identified and mapped emerging themes of barriers to the use of telemedicine systems. This paper also through a new conceptualization of telemedicine use from perspectives of the primary care professionals contributes to informatics literature and system usage practices.
Details
Keywords
Swathi Pennapareddy, Ramprasad Srinivasan and Natarajan K.
Automatic dependent surveillance-broadcast (ADS-B) is the foundational technology of the next generation air transportation system defined by Federal Aviation Authority and is one…
Abstract
Purpose
Automatic dependent surveillance-broadcast (ADS-B) is the foundational technology of the next generation air transportation system defined by Federal Aviation Authority and is one of the most precise ways for tracking aircraft position. ADS-B is intended to provide greater situational awareness to the pilots by displaying the traffic information like aircraft ID, altitude, speed and other critical parameters on the Cockpit Display of Traffic Information displays in the cockpit. Unfortunately, due to the initial proposed nature of ADS-B protocol, it is neither encrypted nor has any other innate security mechanisms, which makes it an easy target for malicious attacks. The system is vulnerable to various active and passive attacks like message ingestion, message deletion, eavesdropping, jamming, etc., which has become an area of concern for the aviation industry. The purpose of this study is to propose a method based on modified advanced encryption standard (AES) algorithm to secure the ADS=B messages and increase the integrity of ADS-B data transmissions.
Design/methodology/approach
Though there are various cryptographic and non-cryptographic methods proposed to secure ADS-B data transmissions, it is evident that most of these systems have limitations in terms of cost, implementation or feasibility. The new proposed method implements AES encryption techniques on the ADS-B data on the sender side and correlated decryption mechanism at the receiver end. The system is designed based on the flight schedule data available from any flight planning systems and implementing the AES algorithm on the ADS-B data from each aircraft in the flight schedule.
Findings
The suitable hardware was developed using Raspberry pi, ESP32 and Ra-02. Several runs were done to verify the original message, transmitted data and received data. During transmission, encryption algorithm was being developed, which has got very high secured transmission, and during the reception, the data was secured. Field test was conducted to validate the transmission and quality. Several trials were done to validate the transmission process. The authors have successfully shown that the ADS-B data can be encrypted using AES algorithm. The authors are successful in transmitting and receiving the ADS-B data packet using the discussed hardware and software methodology. One major advantage of using the proposed solution is that the information received is encrypted, and the receiver ADS-B system can decrypt the messages on the receiving end. This clearly proves that when the data is received by an unknown receiver, the messages cannot be decrypted, as the receiver is not capable of decrypting the AES-authenticated messages transmitted by the authenticated source. Also, AES encryption is highly unlikely to be decrypted if the encryption key and the associated decryption key are not known.
Research limitations/implications
Implementation of the developed solution in actual onboard avionics systems is not within the scope of this research. Hence, assessing in the real-time distances is not covered.
Social implications
The authors propose to extend this as a software solution to the onboard avionics systems by considering the required architectural changes. This solution can also bring in positive results for unmanned air vehicles in addition to the commercial aircrafts. Enhancement of security to the key operational and navigation data elements is going to be invaluable for future air traffic management and saving lives of people.
Originality/value
The proposed solution has been practically implemented by developing the hardware and software as part of this research. This has been clearly brought out in the paper. The implementation has been tested using the actual ADS-B data/messages received from using the ADS-B receiver. The solution works perfectly, and this brings immense value to the aircraft-to-aircraft and aircraft-to-ground communications, specifically while using ADS-B data for communicating the position information. With the proposed architecture and minor software updates to the onboard avionics, this solution can enhance safety of flights.
Details
Keywords
Jacqueline Humphries, Pepijn Van de Ven, Nehal Amer, Nitin Nandeshwar and Alan Ryan
Maintaining the safety of the human is a major concern in factories where humans co-exist with robots and other physical tools. Typically, the area around the robots is monitored…
Abstract
Purpose
Maintaining the safety of the human is a major concern in factories where humans co-exist with robots and other physical tools. Typically, the area around the robots is monitored using lasers. However, lasers cannot distinguish between human and non-human objects in the robot’s path. Stopping or slowing down the robot when non-human objects approach is unproductive. This research contribution addresses that inefficiency by showing how computer-vision techniques can be used instead of lasers which improve up-time of the robot.
Design/methodology/approach
A computer-vision safety system is presented. Image segmentation, 3D point clouds, face recognition, hand gesture recognition, speed and trajectory tracking and a digital twin are used. Using speed and separation, the robot’s speed is controlled based on the nearest location of humans accurate to their body shape. The computer-vision safety system is compared to a traditional laser measure. The system is evaluated in a controlled test, and in the field.
Findings
Computer-vision and lasers are shown to be equivalent by a measure of relationship and measure of agreement. R2 is given as 0.999983. The two methods are systematically producing similar results, as the bias is close to zero, at 0.060 mm. Using Bland–Altman analysis, 95% of the differences lie within the limits of maximum acceptable differences.
Originality/value
In this paper an original model for future computer-vision safety systems is described which is equivalent to existing laser systems, identifies and adapts to particular humans and reduces the need to slow and stop systems thereby improving efficiency. The implication is that computer-vision can be used to substitute lasers and permit adaptive robotic control in human–robot collaboration systems.
Details
Keywords
Dilek Şahin, Mehmet Nurullah Kurutkan and Tuba Arslan
Today, e-government (electronic government) applications have extended to the frontiers of health-care delivery. E-Nabız contains personal health records of health services…
Abstract
Purpose
Today, e-government (electronic government) applications have extended to the frontiers of health-care delivery. E-Nabız contains personal health records of health services received, whether public or private. The use of the application by patients and physicians has provided efficiency and cost advantages. The success of e-Nabız depends on the level of technology acceptance of health-care service providers and recipients. While there is a large research literature on the technology acceptance of service recipients in health-care services, there is a limited number of studies on physicians providing services. This study aims to determine the level of influence of trust and privacy variables in addition to performance expectancy, effort expectancy, social influence and facilitating factors in the unified theory of acceptance and use of technology (UTAUT) model on the intention and behavior of using e-Nabız application.
Design/methodology/approach
The population of the study consisted of general practitioners and specialist physicians actively working in any health facility in Turkey. Data were collected cross-sectionally from 236 physicians on a voluntary basis through a questionnaire. The response rate of data collection was calculated as 47.20%. Data were collected cross-sectionally from 236 physicians through a questionnaire. Descriptive statistics, correlation analysis and structural equation modeling were used to analyze the data.
Findings
The study found that performance expectancy, effort expectancy, trust and perceived privacy had a significant effect on physicians’ behavioral intentions to adopt the e-Nabız system. In addition, facilitating conditions and behavioral intention were determinants of usage behavior (p < 0.05). However, no significant relationship was found between social influence and behavioral intention (p > 0.05).
Originality/value
This study confirms that the UTAUT model provides an appropriate framework for predicting factors influencing physicians’ behaviors and intention to use e-Nabız. In addition, the empirical findings show that trust and perceived privacy, which are additionally considered in the model, are also influential.
Details
Keywords
The lack of conceptual approaches for organizing and expressing capabilities, usage and impact of intelligent machines (IMs) in work settings is an obstacle to moving beyond…
Abstract
Purpose
The lack of conceptual approaches for organizing and expressing capabilities, usage and impact of intelligent machines (IMs) in work settings is an obstacle to moving beyond isolated case examples, domain-specific studies, 2 × 2 frameworks and expert opinion in discussions of IMs and work. This paper's purpose is to illuminate many issues that often are not addressed directly in research, practice or punditry related to IMs. It pursues that purpose by presenting an integrated approach for identifying and organizing important aspects of analysis and evaluation related to IMs in work settings.
Design/methodology/approach
This paper integrates previously published ideas related to work systems (WSs), smart devices and systems, facets of work, roles and responsibilities of information systems, interactions between people and machines and a range of criteria for evaluating system performance.
Findings
Eight principles outline a straightforward and flexible approach for analyzing and evaluating IMs and the WSs that use them. Those principles are based on the above ideas.
Originality/value
This paper provides a novel approach for identifying design choices for situated use of IMs. The breadth, depth and integration of this approach address a gap in existing literature, which rarely aspires to this paper’s thoroughness in combining ideas that support the description, analysis, design and evaluation of situated uses of IMs.
Details
Keywords
Alicia Martín-Navarro, María Paula Lechuga Sancho and Jose Aurelio Medina-Garrido
Companies are increasingly implementing business process management systems (BPMSs) to support their processes. However, there is a gap in the literature regarding whether users…
Abstract
Purpose
Companies are increasingly implementing business process management systems (BPMSs) to support their processes. However, there is a gap in the literature regarding whether users also use BPMSs to manage the knowledge needed for processes to be completed. This study aims to analyze the factors that cause users to use BPMSs to manage the knowledge required in business processes.
Design/methodology/approach
The paper proposes an original model that integrates two successful information system models applied to BPMSs and knowledge management systems. To test the hypotheses derived from this new model, data were collected from 242 mature BPMS users from 12 Spanish and Latin American companies. Structural equation modeling with AMOS was used to examine the model.
Findings
Users’ perceived usefulness of a BPMS when using it for knowledge management (KM) is the only factor influencing them to use it for KM.
Practical implications
This study has practical implications for managers wishing to successfully implement a BPMS to support processes and for employees to use the knowledge embedded in the tool. The latter will only happen if users perceive the tool’s usefulness for KM.
Originality/value
To the best of the authors’ knowledge, this model is the first empirically validated model to successfully analyze BPMS users’ tendency to use BPMSs as a tool to support necessary KM in processes.
Details
Keywords
Kristijan Mirkovski, Kamel Rouibah, Paul Lowry, Joanna Paliszkiewicz and Marzena Ganc
Despite the major information technology investments made by public institutions, the reuse of e-government services remains an issue as citizens hesitate to use e-government…
Abstract
Purpose
Despite the major information technology investments made by public institutions, the reuse of e-government services remains an issue as citizens hesitate to use e-government websites regularly. The purpose of this study is to investigate the cross-country determinants of e-government reuse intention by proposing a theoretical model that integrates constructs from (1) the Delone and McLean IS success model (i.e. system quality, service quality, information quality, perceived value and user satisfaction); (2) the trust and risk models (i.e. citizen trust, overall risk, time risk, privacy risk and psychological risks); and (3) Hofstede's cultural model (i.e. uncertainty avoidance, masculinity, individualism and cross-cultural trust and risk).
Design/methodology/approach
Based on data from interviews with 81 Kuwaiti citizens and surveys of 1,829 Kuwaiti and Polish citizens, this study conducted comprehensive, cross-cultural and comparative analyses of e-government reuse intention in a cross-country setting.
Findings
The results show that trust is positively associated with citizens' intention to reuse e-government services, whereas risk is negatively associated with citizens' perceived value. This study also found that masculinity–femininity and uncertainty avoidance are positively associated with the intention to reuse e-government services and that individualism–collectivism has no significant relationship with reuse intention. This study's findings have important implications for researchers and practitioners seeking to understand and improve e-government success in cross-country settings.
Originality/value
This study developed a parsimonious model of quality, trust, risk, culture and technology reuse that captures country-specific cultural contexts and enables us to conduct a comprehensive, cross-cultural and comparative analysis of e-government reuse intention in the cross-country setting of Kuwait and Poland.
Details