Books and journals Case studies Expert Briefings Open Access
Advanced search

Search results

1 – 10 of 28
To view the access options for this content please click here
Article
Publication date: 3 September 2018

Numerical simulation of keyhole behaviors and droplet transfer in laser-MIG hybrid welding of Invar alloy

Dan Zhang, Yanhong Wei, Xiaohong Zhan, Jie Chen, Hao Li and Yuhua Wang

This paper aims to describe a three-dimensional mathematical and numerical model based on finite volume method to simulate the fluid dynamics in weld pool, droplet…

HTML
PDF (2.5 MB)

Abstract

Purpose

This paper aims to describe a three-dimensional mathematical and numerical model based on finite volume method to simulate the fluid dynamics in weld pool, droplet transfer and keyhole behaviors in the laser-MIG hybrid welding process of Fe36Ni Invar alloy.

Design/methodology/approach

Double-ellipsoidal heat source model and adaptive Gauss rotary body heat source model were used to describe electric arc and laser beam heat source, respectively. Besides, recoil pressure, electromagnetic force, Marangoni force, buoyancy as well as liquid material flow through a porous medium and the heat, mass, momentum transfer because of droplets were taken into consideration in the computational model.

Findings

The results of computer simulation, including temperature field in welded plate and velocity field in the fusion zone were presented in this article on the basis of the solution of mass, momentum and energy conservation equations. The correctness of elaborated models was validated by experimental results and this proposed model exhibited close correspondence with the experimental results with respect to weld geometry.

Originality/value

It lays foundation for understanding the physical phenomena accompanying hybrid welding and optimizing the process parameters for laser-MIG hybrid welding of Invar alloy.

Details

International Journal of Numerical Methods for Heat & Fluid Flow, vol. 28 no. 9
Type: Research Article
DOI: https://doi.org/10.1108/HFF-07-2017-0266
ISSN: 0961-5539

Keywords

  • Mathematical models
  • Fluid flow
  • Droplet transfer
  • Fe36Ni Invar alloy
  • Laser-MIG hybrid welding

To view the access options for this content please click here
Article
Publication date: 21 September 2015

Sensors distribution optimization for impact localization using NSGA-II

Peng Li, Yuhua Wang, Jingru Hu and Jianmin Zhou

– The purpose of this study which resulted in this work is to propose an optimization method of sensors distribution for structural impact localization.

HTML
PDF (394 KB)

Abstract

Purpose

The purpose of this study which resulted in this work is to propose an optimization method of sensors distribution for structural impact localization.

Design/methodology/approach

This paper presents a multi-objective optimization study of a novel sensors distribution technique, where two optimization objective functions are considered: sensors number and sensors location optimization performance index. In addition, the finite element analysis, the time-frequency transform and the principal component analysis are combined to quantize the above objective functions. The non-dominated sorting genetic algorithm II (NSGA-II) is used to acquire Pareto solutions.

Findings

The effectiveness of this method is validated through a prototype laboratory called the piezoelectric intelligent structure where promising results are obtained.

Originality/value

An optimization method of this novel sensors distribution technique is built and produced a set of efficiency solutions for the real-world problem of impact localization where two conflicting objectives are involved.

Details

Sensor Review, vol. 35 no. 4
Type: Research Article
DOI: https://doi.org/10.1108/SR-02-2015-0028
ISSN: 0260-2288

Keywords

  • Sensors
  • Finite element analysis
  • Genetic algorithms
  • Impact localization
  • NSGA-II
  • Sensors distribution

To view the access options for this content please click here
Article
Publication date: 4 January 2016

Particle capture of elliptic cross-section matrices for parallel stream high gradient magnetic separation

Xiayu Zheng, Yuhua Wang and Dongfang Lu

The purpose of this paper is to model the particle capture of elliptic magnetic matrices for parallel stream type high magnetic separation, which can be a guidance for the…

HTML
PDF (1 MB)

Abstract

Purpose

The purpose of this paper is to model the particle capture of elliptic magnetic matrices for parallel stream type high magnetic separation, which can be a guidance for the development of novel elliptic cylinder matrices for high-gradient magnetic separation (HGMS).

Design/methodology/approach

The magnetic field distribution around the elliptic matrices is investigated quantitatively and the magnetic field and gradient were calculated. The motion equations of the magnetic particles around the matrices were derived and the particle capture cross-section of elliptic matrices was studied and was compared with that of the conventional circular matrices.

Findings

Elliptic matrices can present larger particle capture cross-section than the conventional circular matrices and can be a kind of promising matrices to be applied to HGMS.

Originality/value

There is little literature investigating the magnetic characteristics and the particle capture of the elliptic matrices in HGMS, the study is of great significance for the development of novel elliptic magnetic matrices in HGMS.

Details

COMPEL: The International Journal for Computation and Mathematics in Electrical and Electronic Engineering, vol. 35 no. 1
Type: Research Article
DOI: https://doi.org/10.1108/COMPEL-03-2015-0140
ISSN: 0332-1649

Keywords

  • Magnetic devices
  • Magnetism
  • Magnetic separation
  • Magnetic field and gradient
  • Elliptic cylinder matrices
  • Capture cross-section

To view the access options for this content please click here
Book part
Publication date: 18 April 2017

When Does Repression Trigger Mass Protest? The 2013 Gezi Protests

Defne Över and Başak Taraktaş

This chapter offers a mechanism-based explanation of how single-cause oriented protest events are transformed into a mass movement where previously fragmented causes of…

HTML
PDF (1.3 MB)
EPUB (413 KB)

Abstract

This chapter offers a mechanism-based explanation of how single-cause oriented protest events are transformed into a mass movement where previously fragmented causes of contention come to be expressed in conjoint action. Drawing on the case of 2013 Gezi protests in Turkey, we map the protest waves and identify two mechanisms that mediate the influence of repression on mobilization of dissent. The first mechanism is the perceived nature of the cause of contention. Repression leads to scale shift (McAdam et al., 2008) in the first wave when exercised over those who protest for an issue perceived to be innocent. The second mechanism is the experience of repression. Boundary deactivation among protesters and the resulting continuity in protest activity follow scale shift in the second and third waves as experience of repression transforms perceptions of those that were previously framed as others. Our analysis relies on data collected via participant observation, in-depth interviews, and an online survey with 1,352 protesters.

Details

Non-State Violent Actors and Social Movement Organizations
Type: Book
DOI: https://doi.org/10.1108/S0163-786X20170000041017
ISBN: 978-1-78714-190-2

Keywords

  • Social movements
  • culture
  • perception
  • repression
  • Turkey
  • Gezi protests

To view the access options for this content please click here
Article
Publication date: 1 May 2020

A systems approach for green public procurement implementation

Conghu Wang, Yuhua Qiao and Xiaoming Li

This paper aims to identify important factors in green public procurement (GPP) implementation and then to clarify how these factors affect GPP implementation.

HTML
PDF (229 KB)

Abstract

Purpose

This paper aims to identify important factors in green public procurement (GPP) implementation and then to clarify how these factors affect GPP implementation.

Design/methodology/approach

The authors applied the Delphi method first and then conducted a focused and constrained multiple case study at 18 government procurement centers across China.

Findings

The authors identified four clusters of factors for successful GPP implementation: more clear, consistent and operational policy goals; a nation-wide green procurement campaign to enhance social capital and cultural resources; promoting staff’s ethics, professionalism, capacity and knowledge; and establishing checks and balances among organizations involved in the whole purchasing process.

Social implications

GPP can significantly improve environmental protection and sustainable development.

Originality/value

Based on key insights from systems theory and agency theory, the authors emphasize that GPP implementation must take down its own functional silos and adopt a process approach across organizational tiers to synchronize human resource based and inter-organizational capabilities into a unified whole through information sharing, communications and collaboration.

Details

Journal of Public Procurement, vol. 20 no. 3
Type: Research Article
DOI: https://doi.org/10.1108/JOPP-03-2019-0017
ISSN: 1535-0118

Keywords

  • China
  • Policy implementation
  • Green public procurement

To view the access options for this content please click here
Article
Publication date: 6 April 2020

Porous polystyrene nanoparticles as nanocontainers of inhibitors for corrosion protection of low-alloy steel

Yuhua Dong, Chundong Geng, Xiang Wang and Qiong Zhou

This paper aims to investigate effect of porous polystyrene microspheres encapsulated inhibitor on the protection performance of epoxy resin coating.

HTML
PDF (2.4 MB)

Abstract

Purpose

This paper aims to investigate effect of porous polystyrene microspheres encapsulated inhibitor on the protection performance of epoxy resin coating.

Design/methodology/approach

Porous polystyrene (PS) microspheres were synthesized by soap-free emulsion polymerization. The morphology of microspheres was observed by scanning electron microscopy and transmission electron microscopy. Corrosion inhibitor benzotriazole was encapsulated into porous PS microspheres. The protection performance of epoxy resin coating with different contents of PS microspheres was tested by polarization curve.

Findings

The findings of electrochemical impedance spectroscopy and scanning vibrating electrode technique showed that addition of corrosion inhibitor to porous PS microspheres further improved the protection performance of the coatings.

Practical implications

Porous PS microspheres could be used as nanocontainer to encapsulate corrosion inhibitor.

Originality/value

Addition of porous PS microspheres with corrosion inhibitor improved the protection performance of the coatings.

Details

Pigment & Resin Technology, vol. 49 no. 4
Type: Research Article
DOI: https://doi.org/10.1108/PRT-04-2019-0034
ISSN: 0369-9420

Keywords

  • Porous polystyrene
  • Nanocontainer
  • Inhibitor
  • Self-healing

To view the access options for this content please click here
Article
Publication date: 15 July 2019

Quality detection of laser additive manufacturing process based on coaxial vision monitoring

Bo Chen, Yongzhen Yao, Yuhua Huang, Wenkang Wang, Caiwang Tan and Jicai Feng

This paper aims to explore the influences of different process parameters, including laser power, scanning speed, defocusing distance and scanning mode, on the shape…

HTML
PDF (3.2 MB)

Abstract

Purpose

This paper aims to explore the influences of different process parameters, including laser power, scanning speed, defocusing distance and scanning mode, on the shape features of molten pool and, based on the obtained relationship, realize the diagnosis of forming defects during the process.

Design/methodology/approach

Molten pool was captured on-line based on a coaxial CCD camera mounted on the welding head, then image processing algorithms were developed to obtain melt pool features that could reflect the forming status, and it suggested that the molten pool area was the most sensitive characteristic. The influence of the processing parameters such as laser power, traverse speed, powder feed rate, defocusing distance and the melt pool area was studied, and then the melt pool area was used as the characteristic to detect the forming defects during the cladding and additive manufacturing process.

Findings

The influences of different process parameters on molten pool area were explored. Based on the relationship, different types of defects were accurately detected through analyzing the relationship between the molten pool area and time.

Originality/value

The findings would be helpful for the quality control of laser additive manufacturing.

Details

Sensor Review, vol. 39 no. 4
Type: Research Article
DOI: https://doi.org/10.1108/SR-03-2018-0068
ISSN: 0260-2288

Keywords

  • Laser additive manufacturing
  • Forming defects
  • Molten pool area
  • Visual sensing

To view the access options for this content please click here
Article
Publication date: 5 September 2016

Glove-based virtual hand grasping for virtual mechanical assembly

JingRong Li, YuHua Xu, JianLong Ni and QingHui Wang

Hand gesture-based interaction can provide far more intuitive, natural and immersive feelings for users to manipulate 3D objects for virtual assembly (VA). A mechanical…

HTML
PDF (1.8 MB)

Abstract

Purpose

Hand gesture-based interaction can provide far more intuitive, natural and immersive feelings for users to manipulate 3D objects for virtual assembly (VA). A mechanical assembly consists of mostly general-purpose machine elements or mechanical parts that can be defined into four types based on their geometric features and functionalities. For different types of machine elements, engineers formulate corresponding grasping gestures based on their domain knowledge or customs for ease of assembly. Therefore, this paper aims to support a virtual hand to assemble mechanical parts.

Design/methodology/approach

It proposes a novel glove-based virtual hand grasping approach for virtual mechanical assembly. The kinematic model of virtual hand is set up first by analyzing the hand structure and possible movements, and then four types of grasping gestures are defined with joint angles of fingers for connectors and three types of parts, respectively. The recognition of virtual hand grasping is developed based on collision detection and gesture matching. Moreover, stable grasping conditions are discussed.

Findings

A prototype system is designed and developed to implement the proposed approach. The case study on VA of a two-stage gear reducer demonstrates the functionality of the system. From the users’ feedback, it is found that more natural and stable hand grasping interaction for VA of mechanical parts can be achieved.

Originality/value

It proposes a novel glove-based virtual hand grasping approach for virtual mechanical assembly.

Details

Assembly Automation, vol. 36 no. 4
Type: Research Article
DOI: https://doi.org/10.1108/AA-01-2016-002
ISSN: 0144-5154

Keywords

  • Virtual assembly
  • Data glove
  • Gesture recognition
  • Human-computer interaction

To view the access options for this content please click here
Article
Publication date: 1 March 2013

City responses to economic downturns 2003 to 2009: Statistical and textual analyses of comprehensive annual financial reports

John F. Sacco and Gerard R. Busheé

This paper analyzes the impact of economic downturns on the revenue and expense sides of city financing for the period 2003 to 2009 using a convenience sample of the…

HTML
PDF (864 KB)

Abstract

This paper analyzes the impact of economic downturns on the revenue and expense sides of city financing for the period 2003 to 2009 using a convenience sample of the audited end of year financial reports for thirty midsized US cities. The analysis focuses on whether and how quickly and how extensively revenue and spending directions from past years are altered by recessions. A seven year series of Comprehensive Annual Financial Report (CAFR) data serves to explore whether citiesʼ revenues and spending, especially the traditional property tax and core functions such as public safety and infrastructure withstood the brief 2001 and the persistent 2007 recessions? The findings point to consumption (spending) over stability (revenue minus expense) for the recession of 2007, particularly in 2008 and 2009.

Details

Journal of Public Budgeting, Accounting & Financial Management, vol. 25 no. 3
Type: Research Article
DOI: https://doi.org/10.1108/JPBAFM-25-03-2013-B003
ISSN: 1096-3367

To view the access options for this content please click here
Article
Publication date: 9 July 2018

A risk analysis model for mining accidents using a fuzzy approach based on fault tree analysis

Fatma Yasli and Bersam Bolat

Risk analysis is a critical investigation field for many sectors and organizations to maintain the information management reliable. Since mining is one of the riskiest…

HTML
PDF (602 KB)

Abstract

Purpose

Risk analysis is a critical investigation field for many sectors and organizations to maintain the information management reliable. Since mining is one of the riskiest sectors for both workers and management, comprehensive risk analysis should be carried out. The purpose of this paper is to explore comprehensively the undesired events that may occur during a particular process with their main reasons and to perform a risk analysis for these events, by developing a risk analysis methodology. For performing risk analysis, discovering and defining the potential accidents and incidents including their root causes are important contributions of the study as distinct from the related literature. The fuzzy approach is used substantially to obtain the important inferences about the hazardous process by identifying the critical risk points in the processes. In the scope of the study, the proposed methodology is applied to an underground chrome mine and obtaining significant findings of mining risky operations is targeted.

Design/methodology/approach

Fault tree analysis and fuzzy approach are used for performing the risk analysis. When determining the probability and the consequences of the events which are essential components for the risk analysis, expressions of the heterogeneous expert group are considered by means of the linguistic terms. Fault tree analysis and fuzzy approach present a quiet convenience solution together to specify the possible accidents and incidents in the particular process and determine the values for the basis risk components.

Findings

This study primarily presents a methodology for a comprehensive risk analysis. By implementing the proposed methodology to the underground loading and conveying processes of a chrome mine, 28 different undesired events that may occur during the processes are specified. By performing risk analysis for these events, it is established that the employee’s physical constraint while working with the shovel in the fore area, the falling of materials on employees from the chute and the scaling bar injuries are the riskiest undesired events in the underground loading and conveying process of the mine.

Practical implications

The proposed methodology provides a confidential and comprehensive method for risk analysis of the undesired events in a particular process. The capability of fault tree analysis for specifying the undesired events systematically and the applicability of fuzzy approach for converting the experts’ linguistic expressions to the mathematical values provide a significant advantage and convenience for the risk analysis.

Originality/value

The major contribution of this paper is to develop a methodology for the risk analysis of a variety of mining accidents and incidents. The proposed methodology can be applied to many production processes to investigate the dangerous operations comprehensively and find out the efficient management strategies. Before performing the risk analysis, determining the all possible accidents and incidents in the particular process using the fault tree analysis provides the effectiveness and the originality of the study. Also, using the fuzzy logic to find out the consequences of the events with experts’ linguistic expressions provides an efficient method for performing risk analysis.

Details

Journal of Enterprise Information Management, vol. 31 no. 4
Type: Research Article
DOI: https://doi.org/10.1108/JEIM-02-2017-0035
ISSN: 1741-0398

Keywords

  • Risk analysis
  • Fuzzy logic
  • Fault tree analysis
  • Chrome mining

Access
Only content I have access to
Only Open Access
Year
  • Last 3 months (1)
  • Last 6 months (2)
  • Last 12 months (6)
  • All dates (28)
Content type
  • Article (24)
  • Book part (2)
  • Earlycite article (2)
1 – 10 of 28
Emerald Publishing
  • Opens in new window
  • Opens in new window
  • Opens in new window
  • Opens in new window
© 2021 Emerald Publishing Limited

Services

  • Authors Opens in new window
  • Editors Opens in new window
  • Librarians Opens in new window
  • Researchers Opens in new window
  • Reviewers Opens in new window

About

  • About Emerald Opens in new window
  • Working for Emerald Opens in new window
  • Contact us Opens in new window
  • Publication sitemap

Policies and information

  • Privacy notice
  • Site policies
  • Modern Slavery Act Opens in new window
  • Chair of Trustees governance statement Opens in new window
  • COVID-19 policy Opens in new window
Manage cookies

We’re listening — tell us what you think

  • Something didn’t work…

    Report bugs here

  • All feedback is valuable

    Please share your general feedback

  • Member of Emerald Engage?

    You can join in the discussion by joining the community or logging in here.
    You can also find out more about Emerald Engage.

Join us on our journey

  • Platform update page

    Visit emeraldpublishing.com/platformupdate to discover the latest news and updates

  • Questions & More Information

    Answers to the most commonly asked questions here