Search results
1 – 6 of 6Farag Edghiem, Xiuli Guo, Carl Bridge and Martin McAreavey
Based on initial observation, this paper aims to explore the current practices of collaborative knowledge sharing (KS) between North West Universities and highlight new avenues of…
Abstract
Purpose
Based on initial observation, this paper aims to explore the current practices of collaborative knowledge sharing (KS) between North West Universities and highlight new avenues of future relevant research.
Design/methodology/approach
A netnographic observation was conducted to unveil the current practices of KS between North West Universities.
Findings
The paper concludes that there is little or no evidence of collaborative KS practices amongst North West Universities in response to the present Covid-19 transition.
Practical implications
This paper provides useful, practical insight that may assist decision-makers to establish KS initiatives within North West Universities and beyond. A strategy is also proposed to nurture collaborative KS amongst North West Universities and within wider work-applied management practice.
Originality/value
This paper presents an unconventional conceptualisation of KS practices amid the present Covid-19 pandemic with the fresh perspective of North West England Universities.
Details
Keywords
Neha Singh, Rohit Biswas and Mamoni Banerjee
The purpose of this article is to develop relationships between many major issues relevant to the agriculture supply chain.
Abstract
Purpose
The purpose of this article is to develop relationships between many major issues relevant to the agriculture supply chain.
Design/methodology/approach
With the purpose of gaining an all-encompassing understanding of the agriculture supply chain, this work uses 233 filtered research articles and three bibliometric analysis tools, namely VOSviewer, term frequency-inverse document frequency (TF-IDF) and Person correlation. The collected research publications were also catalogued using Preferred Reporting Items for Systematic Reviews and Meta-Analysis (PRISMA).
Findings
Using analytic techniques, a total of 12 keywords were obtained. The study found that agri-products are in dire need of digitisation via Internet of things (IoT) and blockchain due to the usage of economic variables and comprehensive management of total food waste throughout transportation, anchoring quality and the predominant variable.
Research limitations/implications
The study was limited to the Scopus and Web of Science (WoS) indexing in order to assess the viability of the linked idea and problem.
Originality/value
This study aims to generate vital knowledge in the field of horticulture-focused agriculture supply chain based on previous justification and relationship formation.
Details
Keywords
The present study provides a comprehensive review of the advancements in five active heating modes for cold-proof clothing as of 2021. It aims to evaluate the current state of…
Abstract
Purpose
The present study provides a comprehensive review of the advancements in five active heating modes for cold-proof clothing as of 2021. It aims to evaluate the current state of research for each heating mode and identify their limitations. Further, the study provides insights into the optimization of intelligent temperature control algorithms and design considerations for intelligent cold-proof clothing.
Design/methodology/approach
This article presents a classification of active heating systems based on five different heating principles: electric heating system, solar heating system, phase-change material (PCM) heating system, chemical heating system and fluid/air heating system. The systems are analyzed and evaluated in terms of heating principle, research advancement, scientific challenges and application potential in the field of cold-proof clothing.
Findings
The rational utilization of active heating modes enhances the thermal efficiency of cold-proof clothing, resulting in enhanced cold-resistance and reduced volume and weight. Despite progress in the development of the five prevalent heating modes, particularly with regard to the improvement and advancement of heating materials, the current integration of heating systems with cold-proof clothing is limited to the torso and limbs, lacking consideration of the thermal physiological requirements of the human body. Additionally, the heating modes of each system tend to be uniform and lack differentiation to meet the varying cold protection needs of various body parts.
Research limitations/implications
The effective application of multiple heating modes helps the human body to maintain a constant body temperature and thermal equilibrium in a cold environment. The research of heating mode is the basis for realizing the temperature control of cold-proof clothing and provides an effective guarantee for the future development of the intelligent algorithms for temperature control of non-uniform heating of body segments.
Practical implications
The integration of multiple heating modes ensures the maintenance of a constant body temperature and thermal balance for the wearer in cold environments. The research of heating modes forms the foundation for the temperature regulation of cold-proof clothing and lays the groundwork for the development of intelligent algorithms for non-uniform heating control of different body segments.
Originality/value
The present article systematically reviews five active heating modes suitable for use in cold-proof clothing and offers guidance for the selection of heating systems in future smart cold-proof clothing. Furthermore, the findings of this research provide a basis for future research on non-uniform heating modes that are aligned with the thermal physiological needs of the human body, thus contributing to the development of cold-proof clothing that is better suited to meet the thermal needs of the human body.
Details
Keywords
Ying Kit Cherry Kwan, Mei Wa Chan and Dickson K.W. Chiu
In the 21st century, libraries are experiencing a significant decline in users due to shifting reading habits and the impact of technology, necessitating library transformation…
Abstract
Purpose
In the 21st century, libraries are experiencing a significant decline in users due to shifting reading habits and the impact of technology, necessitating library transformation and a heightened emphasis on library marketing. Special libraries, in particular, rely heavily on patrons for survival, often due to their private ownership and limited resources. This paper aims to discuss the aforementioned objectives.
Design/methodology/approach
This paper examines the Taste Library, a special library in Hong Kong, and analyzes its current practices based on an interview with its founder, website content, and social media presence. The 7Ps Marketing Mix model is employed to assess the strengths and weaknesses of the library's current market position.
Findings
The Taste Library's existing practices exhibit limitations in attracting young patrons. To address this issue, we propose marketing strategies focused on enhancing social network presence, offering digitized content, and engaging in school outreach.
Practical implications
By concentrating on youth marketing, this study offers valuable insights for special libraries in developing strategic plans for transitioning and maintaining sustainability.
Originality/value
Few studies concentrate on marketing small special libraries, particularly in the East, within today's digitized economy.
Details
Keywords
Yinhu Xi, Jinhui Deng and Yiling Li
The purpose of this study is to solve the Reynolds equation for finite journal bearings by using the physics-informed neural networks (PINNs) method. As a meshless method, it is…
Abstract
Purpose
The purpose of this study is to solve the Reynolds equation for finite journal bearings by using the physics-informed neural networks (PINNs) method. As a meshless method, it is unnecessary to use big data to train the neural networks, but to satisfy the Reynolds equation and the corresponding boundary conditions by using the known physics information.
Design/methodology/approach
Here, the boundary conditions are enforced through the loss function firstly, i.e. the soft constrain method. After this, an equation was constructed to build a surrogate model for satisfying the corresponding boundary conditions naturally, i.e. the hard constrain method.
Findings
For the soft one, in brief, the pressure results agree well with existing results, apart from the ones on the boundaries. While for the hard one, it can be noted that the discrepancies on the boundaries are reduced significantly.
Originality/value
The PINNs method is used to solve the Reynolds equation for finite journal bearings, and the error values on the boundaries for the results of the soft constrain method are improved by using the hard constrain method. Therefore, the hard constraint maybe also a good option when the pressure results on the boundaries are emphasized.
Peer review
The peer review history for this article is available at: https://publons.com/publon/10.1108/ILT-02-2023-0045/
Details
Keywords
Aya Khaled Youssef Sayed Mohamed, Dagmar Auer, Daniel Hofer and Josef Küng
Authorization and access control have been a topic of research for several decades. However, existing definitions are inconsistent and even contradicting each other. Furthermore…
Abstract
Purpose
Authorization and access control have been a topic of research for several decades. However, existing definitions are inconsistent and even contradicting each other. Furthermore, there are numerous access control models and even more have recently evolved to conform with the challenging requirements of resource protection. That makes it hard to classify the models and decide for an appropriate one satisfying security needs. Therefore, this study aims to guide through the plenty of access control models in the current state of the art besides this opaque accumulation of terms meaning and how they are related.
Design/methodology/approach
This study follows the systematic literature review approach to investigate current research regarding access control models and illustrate the findings of the conducted review. To provide a detailed understanding of the topic, this study identified the need for an additional study on the terms related to the domain of authorization and access control.
Findings
The authors’ research results in this paper are the distinction between authorization and access control with respect to definition, strategies, and models in addition to the classification schema. This study provides a comprehensive overview of existing models and an analysis according to the proposed five classes of access control models.
Originality/value
Based on the authors’ definitions of authorization and access control along with their related terms, i.e. authorization strategy, model and policy as well as access control model and mechanism, this study gives an overview of authorization strategies and propose a classification of access control models providing examples for each category. In contrast to other comparative studies, this study discusses more access control models, including the conventional state-of-the-art models and novel ones. This study also summarizes each of the literature works after selecting the relevant ones focusing on the database system domain or providing a survey, a classification or evaluation criteria of access control models. Additionally, the introduced categories of models are analyzed with respect to various criteria that are partly selected from the standard access control system evaluation metrics by the National Institute of Standards and Technology.
Details