Search results

1 – 10 of 346
Article
Publication date: 2 May 2023

Hang Guo, Xin Chen, Min Yu, Marcin Uradziński and Liang Cheng

In this study, an indoor sensor information fusion positioning system of the quadrotor unmanned aerial vehicle (UAV) was investigated to solve the problem of unstable indoor…

Abstract

Purpose

In this study, an indoor sensor information fusion positioning system of the quadrotor unmanned aerial vehicle (UAV) was investigated to solve the problem of unstable indoor flight positioning.

Design/methodology/approach

The presented system was built on Light Detection and Ranging (LiDAR), Inertial Measurement Unit (IMU) and LiDAR-Lite devices. Based on this, one can obtain the aircraft's current attitude and the position vector relative to the target and control the attitudes and positions of the UAV to reach the specified target positions. While building a UAV positioning model relative to the target for indoor positioning scenarios under limited Global Navigation Satellite Systems (GNSS), the system detects the environment through the NVIDIA Jetson TX2 (Transmit Data) peripheral sensor, obtains the current attitude and the position vector of the UAV, packs the data in the format and delivers it to the flight controller. Then the flight controller controls the UAV by calculating the posture to reach the specified target position.

Findings

The authors used two systems in the experiment. The first is the proposed UAV, and the other is the Vicon system, our reference system for comparison purposes. Vicon positioning error can be considered lower than 2 mm from low to high-speed experiments. After comparison, experimental results demonstrated that the system could fully meet the requirements (less than 50 mm) in real-time positioning of the indoor quadrotor UAV flight. It verifies the accuracy and robustness of the proposed method compared with that of Vicon and achieves the aim of a stable indoor flight preliminarily.

Originality/value

Vicon positioning error can be considered lower than 2 mm from low to high-speed experiments. After comparison, experimental results demonstrated that the system could fully meet the requirements (less than 50 mm) in real-time positioning of the indoor quadrotor UAV flight. It verifies the accuracy and robustness of the proposed method compared with that of Vicon and achieves the aim of a stable indoor flight preliminarily.

Details

International Journal of Intelligent Unmanned Systems, vol. 12 no. 1
Type: Research Article
ISSN: 2049-6427

Keywords

Article
Publication date: 4 April 2024

Dong Li, Yu Zhou, Zhan-Wei Cao, Xin Chen and Jia-Peng Dai

This paper aims to establish a lattice Boltzmann (LB) method for solid-liquid phase transition (SLPT) from the pore scale to the representative elementary volume (REV) scale. By…

Abstract

Purpose

This paper aims to establish a lattice Boltzmann (LB) method for solid-liquid phase transition (SLPT) from the pore scale to the representative elementary volume (REV) scale. By applying this method, detailed information about heat transfer and phase change processes within the pores can be obtained, while also enabling the calculation of larger-scale SLPT problems, such as shell-and-tube phase change heat storage systems.

Design/methodology/approach

Three-dimensional (3D) pore-scale enthalpy-based LB model is developed. The computational input parameters at the REV scale are derived from calculations at the pore scale, ensuring consistency between the two scales. The approaches to reconstruct the 3D porous structure and determine the REV of metal foam were discussed. The implementation of conjugate heat transfer between the solid matrix and the solid−liquid phase change material (SLPCM) for the proposed model is developed. A simple REV-scale LB model under the local thermal nonequilibrium condition is presented. The method of bridging the gap between the pore-scale and REV-scale enthalpy-based LB models by the REV is given.

Findings

This coupled method facilitates detailed simulations of flow, heat transfer and phase change within pores. The approach holds promise for multiscale calculations in latent heat storage devices with porous structures. The SLPT of the heat sinks for electronic device thermal control was simulated as a case, demonstrating the efficiency of the present models in designing and optimizing SLPT devices.

Originality/value

A coupled pore-scale and REV-scale LB method as a numerical tool for investigating phase change in porous materials was developed. This innovative approach allows for the capture of details within pores while addressing computations over a large domain. The LB method for simulating SLPT from the pore scale to the REV scale was given. The proposed method addresses the conjugate heat transfer between the SLPCM and the solid matrix in the enthalpy-based LB model.

Details

International Journal of Numerical Methods for Heat & Fluid Flow, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 0961-5539

Keywords

Article
Publication date: 7 February 2024

Moh’d Anwer AL-Shboul

This study attempts to explore the linkages between reliable big and cloud data analytics capabilities (RB&CDACs) and the comparative advantage (CA) that applies in the…

Abstract

Purpose

This study attempts to explore the linkages between reliable big and cloud data analytics capabilities (RB&CDACs) and the comparative advantage (CA) that applies in the manufacturing sector in the countries located in North Africa (NA). These are considered developing countries through generating green product innovation (GPI) and using green process innovations (GPrLs) in their processes and functions as mediating factors, as well as the moderating role of data-driven competitive sustainability (DDCS).

Design/methodology/approach

To achieve the aim of this study, 346 useable surveys out of 1,601 were analyzed, and valid responses were retrieved for analysis, representing a 21.6% response rate by applying the quantitative methodology for collecting primary data. Convergent validity and discriminant validity tests were applied to structural equation modeling (SEM) in the CB-covariance-based structural equation modeling (SEM) program, and the data reliability was confirmed. Additionally, a multivariate analysis technique was used via CB-SEM, as hypothesized relationships were evaluated through confirmatory factor analysis (CFA), and then the hypotheses were tested through a structural model. Further, a bootstrapping technique was used to analyze the data. We included GPI and GPrI as mediating factors, while using DDCS as a moderated factor.

Findings

The empirical findings indicated that the proposed moderated-mediation model was accepted due to the relationships between the constructs being statistically significant. Further, the findings showed that there is a significant positive effect in the relationship between reliable BCDA capabilities and CAs as well as a mediating effect of GPI and GPrI, which is supported by the proposed formulated hypothesis. Additionally, the findings confirmed that there is a moderating effect represented by data-driven competitive advantage suitability between GPI, GPrI and CA.

Research limitations/implications

One of the main limitations of this study is that an applied cross-sectional study provides a snapshot at a given moment in time. Furthermore, it used only one type of methodological approach (i.e. quantitative) rather than using mixed methods to reach more accurate data.

Originality/value

This study developed a theoretical model that is obtained from reliable BCDA capabilities, CA, DDCS, green innovation and GPrI. Thus, this piece of work bridges the existing research gap in the literature by testing the moderated-mediation model with a focus on the manufacturing sector that benefits from big data analytics capabilities to improve levels of GPI and competitive advantage. Finally, this study is considered a road map and gaudiness for the importance of applying these factors, which offers new valuable information and findings for managers, practitioners and decision-makers in the manufacturing sector in the NA region.

Details

International Journal of Productivity and Performance Management, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 1741-0401

Keywords

Article
Publication date: 25 January 2024

Lanxia Zhang, Jia-Min Li, Mengyu Mao and Lijie Na

This study aims to explore the mechanism of abusive supervision differentiation on employee work-family conflict, and examine the chain mediating role of work-related rumination…

Abstract

Purpose

This study aims to explore the mechanism of abusive supervision differentiation on employee work-family conflict, and examine the chain mediating role of work-related rumination and organizational citizenship behavior/deviant workplace behavior, as well as the moderating role of work-family boundary segmentation preference.

Design/methodology/approach

The authors designed two studies: Study 1 was a scenario experiment with 120 Master of Business Administration students. To further explore this finding, the authors conducted a multiwave survey in Study 2 with 345 employees from various organizations.

Findings

The results of Study 1 showed that abusive supervision differentiation had a positive effect on work-related rumination, and work-related rumination mediated the relationship between differentiated abusive supervision and organizational citizenship behavior/deviant workplace behavior. The results of Study 2 not only confirmed the conclusions of Study 1 but also revealed that organizational citizenship behavior/deviant workplace behavior significantly affected work-family conflict. Abusive supervision differentiation had a positive effect on work-family conflict through work-related rumination and organizational citizenship behavior/deviant workplace behavior. In addition, work-family boundary segmentation preference negatively moderated the relationship between organizational citizenship behavior and work-family conflict.

Originality/value

First, to the best of the authors’ knowledge, this study is the first paper to test the spillover effect of abusive supervision differentiation on the family domain through a chain mediation model. It extends the research on abusive supervision differentiation from the work domain to the family domain. Second, previous research has highlighted role conflict or role insufficiency as significant factors contributing to work-family conflict. However, this study suggests that abusive supervision differentiation from workplace managers can also trigger work-family conflict, providing a new perspective in the study of precursors to work-family conflict.

Details

International Journal of Conflict Management, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 1044-4068

Keywords

Article
Publication date: 25 April 2023

Hong Zhu, Yijiao Ye, Mingjian Zhou and Yaoqi Li

Drawing on social exchange theory, this study aims to investigate the relation of customer sexual harassment (CSH) and customer-oriented organizational citizenship behaviors…

Abstract

Purpose

Drawing on social exchange theory, this study aims to investigate the relation of customer sexual harassment (CSH) and customer-oriented organizational citizenship behaviors (customer-oriented OCB), as well as the mediation of customer–employee exchange (CEX) and the moderation of hostile attribution bias.

Design/methodology/approach

The hypotheses were examined through a field study performed in six hotels in three Chinese cities and an experimental study.

Findings

The results revealed that CSH undermined the quality of CEX, leading employees to withdraw from customer-oriented OCB. Additionally, the hostile attribution bias of service employees reinforced the direct relationship between CSH and CEX and its indirect relationship with customer-oriented OCB via CEX.

Practical implications

The findings suggest that hospitality organizations should endeavor to reduce the occurrence of CSH, and that by valuing and encouraging the development of high-quality CEX, they can mitigate its detrimental effects. Special attention should also be paid to hospitality employees holding strong hostile attribution bias.

Originality/value

First, to the best of the authors’ knowledge, this is one of the first studies to explore the influence of CSH on customer-oriented OCB among hotel employees. In addition, examining the effect of CSH from the social exchange perspective represents a new theoretical approach. The finding also contributes to the literature on CEX by identifying an important antecedent. Finally, by investigating hostile attribution bias as a moderator, this research provides insights into how individual differences moderate the destructive influence of CSH.

Details

International Journal of Contemporary Hospitality Management, vol. 35 no. 12
Type: Research Article
ISSN: 0959-6119

Keywords

Article
Publication date: 19 February 2024

Peixu He, Hanhui Zhou, Qiongyao Zhou, Cuiling Jiang and Amitabh Anand

Employees may adopt deceptive knowledge hiding (DKH) due to nonworking time information and communication technology (ICT) demands. Drawing from the conservation of resources…

Abstract

Purpose

Employees may adopt deceptive knowledge hiding (DKH) due to nonworking time information and communication technology (ICT) demands. Drawing from the conservation of resources (COR) theory, this study aims to develop and test a model of deceptive knowledge hiding (DKH) due to nonworking time information and communication technology (ICT) demands.

Design/methodology/approach

In total, 300 service employees have joined the three-wave surveys. Path analysis and bootstrapping methods were used to test the theoretical model.

Findings

Results suggest that knowledge requests during nonworking time could deplete employees’ resources and increase their tendency to engage in DKH, whereas work recovery and emotional exhaustion mediate this relationship. In addition, employees’ work–family segmentation preferences (WFSP) were found to moderate the direct effects of nonworking time ICT demands on employees’ work recovery and emotional exhaustion and the indirect effects of knowledge requests after working hours on DKH through employees’ work recovery and emotional exhaustion.

Originality/value

First, the findings of this study shed light on the relationship between knowledge requests during employees’ nonworking time and knowledge hiding, suggesting that knowledge hiding could occur beyond working hours. Second, drawing on COR theory, this study explored two joint processes of resource replenishment failure and depletion and how nonworking time ICT demands trigger knowledge hiding. Third, the interaction effect of individuals’ WFSP and nonworking time factors on knowledge hiding deepens the understanding of when nonworking time ICT demands may induce knowledge hiding through various processes.

Article
Publication date: 26 December 2023

Raghad Ahmed Alaloosi, Onur Çomakli, Mustafa Yazici and Ziad A. Taha

This paper aims to investigate the influence of scan speed on the corrosion and tribocorrosion features of the CoCrMoW samples fabricated via the selective laser melting (SLM…

Abstract

Purpose

This paper aims to investigate the influence of scan speed on the corrosion and tribocorrosion features of the CoCrMoW samples fabricated via the selective laser melting (SLM) process.

Design/methodology/approach

CoCrMoW samples were produced by SLM at different scan speeds. Produced samples were made via structural surveys (X-ray diffraction examinations and scanning electron microscopic analyses), hardness measurements and electrochemical and tribocorrosion experiments.

Findings

Outcomes displayed that the corrosion and tribocorrosion properties of CoCrMoW alloy were significantly influenced by scanning speeds. Also, these properties of the alloy increased with increasing scanning speeds. CoCrMoW samples produced at a laser scan speed of 1,000 mm/s showed the best resistance to corrosion and tribocorrosion. This could be related to the high hardness and low grain structure of the fabricated samples.

Originality/value

This paper may be a practical reference and offers insight into the effect of scanning speeds on the increase of hardness, tribological and corrosion performance of CoCrMoW alloys. This study can help in the further advancement of cobalt-chromium alloy in situ produced by SLM for both electrochemical and tribocorrosion behavior for biomedical applications.

Details

Rapid Prototyping Journal, vol. 30 no. 3
Type: Research Article
ISSN: 1355-2546

Keywords

Article
Publication date: 5 April 2024

Katarzyna Piwowar-Sulej and Qaisar Iqbal

The aim of this study is to offer evidence-based knowledge of the most popular research topics in studies on spiritual leadership (SL) and the research approaches and theories in…

Abstract

Purpose

The aim of this study is to offer evidence-based knowledge of the most popular research topics in studies on spiritual leadership (SL) and the research approaches and theories in use. Another aim is to create a comprehensive research framework covering the antecedents and outcomes of SL, as well as the underlying mechanisms and conditional factors. This study also synthesizes future research avenues presented in the literature.

Design/methodology/approach

This study used a systematic literature review method. The presented analysis covered both bibliometric studies and in-depth manual content analysis. In total, 274 articles indexed in the Scopus database were analyzed, with a particular focus on 126 empirical papers.

Findings

This study shows that most of the research took place in developing countries and focused on the links between SL and workplace spirituality, employee well-being and engagement. It provides a complex research framework which orders previous variables according to their levels. Future research is required that would use a multilevel research approach and determine the impact of SL on society and the leaders themselves, as well as determining the reverse impact of organizational performance on the development of SL.

Originality/value

This study takes advantages of both bibliometric and in-depth content analysis to expand the understanding of the state of the art in SL research. It demonstrates how different factors contribute to SL and how they subsequently influence outcomes. It also offers numerous future research directions which go beyond those identified so far in the literature to further develop the theory of SL.

Details

Journal of Organizational Change Management, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 0953-4814

Keywords

Article
Publication date: 10 November 2023

Wensheng Li, Yiding Zhang, Yanwei Xu, Guangming Jiao, Dunwen Zuo, Wenting Lu, Quanshi Cheng, Jiaqi Yu and Yajun Chen

This study aims to investigate the effect of post-treatment on anti-corrosion performance of Al coating on the surface of Ti-6Al-4V (TC4) fastener.

Abstract

Purpose

This study aims to investigate the effect of post-treatment on anti-corrosion performance of Al coating on the surface of Ti-6Al-4V (TC4) fastener.

Design/methodology/approach

The Al coatings with different layer structures were prepared on TC4 by middle-frequency and direct-current combined magnetron sputtering. The cross-sectional morphology and surface roughness of coatings were characterized by scanning electron microscope and atomic force microscope. The corrosion resistance was evaluated by electrochemical method. The monolayer coating was post-treated by Alodine chemical conversion, Ar+ bombardment and a combination of two methods above.

Findings

The results show that the interfaces in bilayer and trilayer coatings reduce the defects. Ar+ bombardment reduces the corrosion current density, and Alodine chemical conversion leads to a higher pitting corrosion potential. The combined post-treatment has the highest polarization resistance.

Originality/value

The corrosion resistance of the Al coating is enhanced as the layer quantity increases. The combination of two post-treatments, Ar+ bombardment and Alodine chemical conversion, could achieve an overall improvement in corrosion resistance of Al coating.

Details

Anti-Corrosion Methods and Materials, vol. 71 no. 1
Type: Research Article
ISSN: 0003-5599

Keywords

Article
Publication date: 16 January 2023

Faisal Lone, Harsh Kumar Verma and Krishna Pal Sharma

The purpose of this study is to extensively explore the vehicular network paradigm, challenges faced by them and provide a reasonable solution for securing these vulnerable…

Abstract

Purpose

The purpose of this study is to extensively explore the vehicular network paradigm, challenges faced by them and provide a reasonable solution for securing these vulnerable networks. Vehicle-to-everything (V2X) communication has brought the long-anticipated goal of safe, convenient and sustainable transportation closer to reality. The connected vehicle (CV) paradigm is critical to the intelligent transportation systems vision. It imagines a society free of a troublesome transportation system burdened by gridlock, fatal accidents and a polluted environment. The authors cannot overstate the importance of CVs in solving long-standing mobility issues and making travel safer and more convenient. It is high time to explore vehicular networks in detail to suggest solutions to the challenges encountered by these highly dynamic networks.

Design/methodology/approach

This paper compiles research on various V2X topics, from a comprehensive overview of V2X networks to their unique characteristics and challenges. In doing so, the authors identify multiple issues encountered by V2X communication networks due to their open communication nature and high mobility, especially from a security perspective. Thus, this paper proposes a trust-based model to secure vehicular networks. The proposed approach uses the communicating nodes’ behavior to establish trustworthy relationships. The proposed model only allows trusted nodes to communicate among themselves while isolating malicious nodes to achieve secure communication.

Findings

Despite the benefits offered by V2X networks, they have associated challenges. As the number of CVs on the roads increase, so does the attack surface. Connected cars provide numerous safety-critical applications that, if compromised, can result in fatal consequences. While cryptographic mechanisms effectively prevent external attacks, various studies propose trust-based models to complement cryptographic solutions for dealing with internal attacks. While numerous trust-based models have been proposed, there is room for improvement in malicious node detection and complexity. Optimizing the number of nodes considered in trust calculation can reduce the complexity of state-of-the-art solutions. The theoretical analysis of the proposed model exhibits an improvement in trust calculation, better malicious node detection and fewer computations.

Originality/value

The proposed model is the first to add another dimension to trust calculation by incorporating opinions about recommender nodes. The added dimension improves the trust calculation resulting in better performance in thwarting attacks and enhancing security while also reducing the trust calculation complexity.

Details

International Journal of Pervasive Computing and Communications, vol. 20 no. 1
Type: Research Article
ISSN: 1742-7371

Keywords

1 – 10 of 346