Search results

1 – 10 of over 2000
Article
Publication date: 11 December 2023

Christopher Lee and Lynn Kahle

The purpose of this paper is to introduce emulation marketing as an important strategy to consider for services marketing researchers and practitioners, given the ability to plant…

Abstract

Purpose

The purpose of this paper is to introduce emulation marketing as an important strategy to consider for services marketing researchers and practitioners, given the ability to plant an aspirational goal in consumers' minds. Building on theories of lifestyle, values, self-concept and others, this conceptual paper presents the case for emulation marketing as an important consideration within services marketing.

Design/methodology/approach

To explore mechanisms that will define service research in the future, this conceptual paper reviews the literature across the spectrum of social comparison and learning, social adaptation, conformity, values, persuasion and role modeling. The authors analyze existing theories while proposing a new mechanism, emulation, to advance research in service literature.

Findings

This paper suggests mechanisms to promote emulation in services marketing through the consumer decision process. A research agenda for future work is provided with emphasis on lack of emulation, emulation and status, emulation and aging, emulation and technology, emulation and linguistics and the dark side of emulation. Within each area, a series of considerations are discussed.

Originality/value

This paper introduces emulation as an important mechanism within services marketing. It offers a research agenda focused on a variety of emerging areas in the field. The paper contributes to services marketing and future research by proposing a novel approach, via emulation, to services marketing.

Details

Journal of Services Marketing, vol. 38 no. 1
Type: Research Article
ISSN: 0887-6045

Keywords

Article
Publication date: 1 March 2013

Y.B. Liao, X. Han, Z.J. Zhu, Y. Wang and S. Kang

With the rapid development of integrated circuits, verification of SOC chips has become a great challenge due to its integration and complexity. Traditional software‐based…

Abstract

Purpose

With the rapid development of integrated circuits, verification of SOC chips has become a great challenge due to its integration and complexity. Traditional software‐based simulation methodology cannot meet verification needs. Therefore, FPGA‐based hardware acceleration technologies are requested in SOC verification. The classic methodology of hardware acceleration downloads the DUT (Device under Test) to the FPGA, while part of RTL codes and test bench is still run on the simulator in the workstation. Research found that the speed bottleneck of this methodology is mostly caused by the ping‐pong mode of data transmission between workstation software and the FPGA emulator, thus resulting in that channel transmission time takes too much proportion of total time. The purpose of this paper is to present a vector mode based hardware/software co‐emulation methodology, which leverages a pipeline structure to transmit, receive and buffer data. This methodology reduces the communication overhead by carrying out a parallel mechanism in that while user's design is under test in the emulator, signal data are transmitting in the channel simultaneously, thus increasing the speed of hardware acceleration and emulation.

Design/methodology/approach

The methodology of hardware acceleration proposed by this paper intercepts data for once from the emulation process of a traditional platform as test bench and utilizes direct memory access (DMA) channel to speed up data transfer, as well as increasing reasonable data caching mechanism, which reduces the ratio of channel transmission time in the entire emulation time, achieving accelerating emulation.

Findings

The proposed methodology and traditional hardware acceleration approach were tested on a quasi‐cyclic low‐density parity‐check (LDPC) decoder. Experiment results indicate that the proposed method can increase communication throughput 140 times compared with the traditional approach.

Originality/value

A vector mode based hardware/software co‐emulation methodology is presented in the paper. Higher communication throughput can be achieved by carrying out a parallel mechanism, as well as leveraging a pipeline structure to transmit, receive and buffer data.

Details

COMPEL - The international journal for computation and mathematics in electrical and electronic engineering, vol. 32 no. 2
Type: Research Article
ISSN: 0332-1649

Keywords

Article
Publication date: 17 July 2017

Giovanni Carta

The aim of this paper is to rethink the concept of significant properties in relationship to video game emulation.

1615

Abstract

Purpose

The aim of this paper is to rethink the concept of significant properties in relationship to video game emulation.

Design/methodology/approach

In this paper, video games are examined as complex digital objects, that is digital objects that are constituted by multiple layers that are interconnected with other objects. Starting from the assumption that metadata are fundamental to individuate the authenticity and accuracy of a complex digital object, the research is based on the analysis of the most recent frameworks that propose a substantial use of metadata to perform gaming emulation.

Findings

Technical metadata are being used within emulation frameworks to describe digital environments and objects. Although metadata cannot be considered a definitive solution for preserving significant properties of video games, they should be used in a more extensive way across frameworks.

Originality/value

This paper tries to provide insights on video game properties that can help to refine the debate on emulation.

Details

Records Management Journal, vol. 27 no. 2
Type: Research Article
ISSN: 0956-5698

Keywords

Article
Publication date: 26 July 2018

Naoum Tsolakis, Dimitrios Bechtsis and Jagjit Singh Srai

The purpose of this paper is twofold: first, to discuss key challenges associated with the use of either simulation or real-world application of intelligent autonomous vehicles…

1911

Abstract

Purpose

The purpose of this paper is twofold: first, to discuss key challenges associated with the use of either simulation or real-world application of intelligent autonomous vehicles (IAVs) in supply network operations; and second, to provide a theoretical and empirical evidence-based methodological framework that supports the integrated application of conceptualisation, simulation, emulation and physical application of IAVs for the effective design of digital supply networks.

Design/methodology/approach

First, this study performs a critical review of the extant literature to identify major benefits and shortcomings related to the use of either simulation modelling or real-word application of physical IAVs. Second, commercial and bespoke software applications, along with a three-dimensional validation and verification emulation tool, are developed to evaluate an IAV’s operations in a conceptual warehouse. Third, a commercial depth-sensor is used as a test bed in a physical setting.

Findings

The results demonstrate that conceptual and simulation modelling should be initially used to explore alternative supply chain operations in terms of ideal performance while emulation tools and real-world IAV test beds are eminent in validating preferred digital supply chain design options.

Research limitations/implications

The provided analysis framework was developed using literature evidence along with experimental work and research experience, without consulting any industry experts. In addition, this study was developed based on the application of a single physical device application as a test bed and, thus, the authors should further progress with the testing of a physical IAV in an industrial warehouse.

Practical implications

The study provides bespoke simulation modelling and emulation tools that can be useful for supply chain practitioners in effectively designing network operations.

Originality/value

This work contributes in the operations management field by providing both a multi-stage methodological framework and a practical “toolbox” for the proactive assessment and incorporation of IAVs in supply network operations.

Details

Business Process Management Journal, vol. 25 no. 3
Type: Research Article
ISSN: 1463-7154

Keywords

Open Access
Article
Publication date: 31 October 2018

Barbara Fedock, Armando Paladino, Liston Bailey and Belinda Moses

The purpose of this paper is to examine how robotics program developers perceived the role of emulation of human ethics when programming robots for use in educational settings. A…

2413

Abstract

Purpose

The purpose of this paper is to examine how robotics program developers perceived the role of emulation of human ethics when programming robots for use in educational settings. A purposive sampling of online robotics program developer professional sites which focused on the role of emulation of human ethics used when programming robots for use in educational settings was included in the study. Content related to robotics program developers’ perceptions on educational uses of robots and ethics were analyzed.

Design/methodology/approach

The design for this study was a qualitative summative content analysis. The researchers analyzed keywords related to a phenomenon. The phenomenon was the emulation of human ethics programmed in robots. Articles selected to be analyzed in this study were published by robotics program developers who focused on robots and ethics in the education. All articles analyzed in this study were posted online, and the public has complete access to the studies.

Findings

Robotics program developers viewed the importance of situational human ethics interpretations and implementations. To facilitate flexibility, robotics program developers programmed robots to search computer-based ethics related research, frameworks and case studies. Robotics program developers acknowledged the importance of human ethics, but they felt more flexibility was needed in the role of how classroom human ethical models were created, developed and used. Some robotic program developers expressed questions and concerns about the implementations of flexible robot ethical accountability levels and behaviors in the educational setting. Robotics program developers argued that educational robots were not designed or programmed to emulate human ethics.

Research limitations/implications

One limitation of the study was 32 online, public articles written by robotics program designers analyzed through qualitative content analysis to find themes and patterns. In qualitative content analysis studies, findings may not be as generalizable as in quantitative studies. Another limitation was only a limited number of articles written by robotics programs existed which addressed robotics and emulation of human ethics in the educational setting.

Practical implications

The significance of this study is the need for a renewed global initiative in education to promote debates, research and on-going collaboration with scientific leaders on ethics and programming robots. The implication for education leaders is to provide ongoing professional development on the role of ethics in education and to create best practices for using robots in education to promote increased student learning and enhance the teaching process.

Social implications

The implications of this study are global. All cultures will be affected by the robotics’ shift in how students are taught ethical decision making in the educational setting. Robotics program developers will create computational educational moral models which will replace archetypal educational ethics frameworks. Because robotics program developers do not classify robots as human, educators, parents and communities will continue to question the use of robots in educational settings, and they will challenge robotics ethical dilemmas, moral standards and computational findings. The examination of robotics program developers’ perspectives through different lens may help close the gap and establish a new understanding among all stakeholders.

Originality/value

Four university doctoral faculty members conducted this content analysis study. After discussions on robotics and educational ethics, the researchers discovered a gap in the literature on the use of robots in the educational setting and the emulation of human ethics in robots. Therefore, to explore the implications for educators, the researchers formed a group to research the topic to learn more about the topic. No personal gains resulted from the study. All research was original. All cultures will be affected by the robotics’ shift in how students are taught ethical decision making in the educational setting. Robotics program developers will create computational educational moral models which will replace archetypal educational ethics frameworks. Because robotics program developers do not classify robots as human, educators, parents and communities will continue to question the use of robots in educational settings, and they will challenge robotics ethical dilemmas, moral standards, and computational findings. The examination of robotics program developers’ perspectives through different lens may help close the gap and establish a new understanding among all stakeholders.

Details

Journal of Research in Innovative Teaching & Learning, vol. 11 no. 2
Type: Research Article
ISSN: 2397-7604

Keywords

Article
Publication date: 26 August 2014

Michael Roland, Josef Langer and Rene Mayrhofer

The purpose of this paper is to address the design, implementation, performance and limitations of an environment that emulates a secure element for rapid prototyping and…

Abstract

Purpose

The purpose of this paper is to address the design, implementation, performance and limitations of an environment that emulates a secure element for rapid prototyping and debugging. Today, it is difficult for developers to get access to a near field communication (NFC)-secure element in current smartphones. Moreover, the security constraints of smartcards make in-circuit emulation and debugging of applications impractical. Therefore, an environment that emulates a secure element brings significant advantages for developers.

Design/methodology/approach

The authors' approach to such an environment is the emulation of Java Card applets on top of non-Java Card virtual machines (e.g. Android Dalvik VM), as this would facilitate the use of existing debugging tools. As the operation principle of the Java Card VM is based on persistent memory technology, the VM and applications running on top of it have a significantly different life cycle compared to other Java VMs. The authors evaluate these differences and their impact on Java VM-based Java Card emulation. They compare possible strategies to overcome the problems caused by these differences, propose a possible solution and create a prototypical implementation to verify the practical feasibility of such an emulation environment.

Findings

While the authors found that the Java Card inbuilt persistent memory management is not available on other Java VMs, they present a strategy to model this persistence mechanism on other VMs to build a complete Java Card run-time environment on top of a non-Java Card VM. Their analysis of the performance degradation in a prototypical implementation caused by additional effort put into maintaining persistent application state revealed that the implementation of such an emulation environment is practically feasible.

Originality/value

This paper addresses the problem of emulating a complete Java Card run-time environment on top of non-Java Card virtual machines which could open and significantly ease the development of NFC secure element applications.

Details

International Journal of Pervasive Computing and Communications, vol. 10 no. 3
Type: Research Article
ISSN: 1742-7371

Keywords

Book part
Publication date: 20 January 2022

Konstantin Hondros and Lukas Vogelgsang

In this paper, we bridge the gap between imitation and creativity, as we examine whether and how it is possible to succeed in imitation, understood here as the intentional…

Abstract

In this paper, we bridge the gap between imitation and creativity, as we examine whether and how it is possible to succeed in imitation, understood here as the intentional creation of alikeness and, at the same time, the production of something novel and valuable. By distinguishing processes of copying, echoing, and eluding, we scrutinize how different imitation processes intended to create alikeness lead to the emergence of novelty. Using empirical data from two distinct empirical fields, music and pharmaceuticals, we discuss if and how these processes may even lead to emulation and thus the emergence of novelty superseding the imitated original. We find that novelty emerges during processes of imitation from the interplay of a guiding structure obtained from existing originals and the performative variation embedded in processes of imitation. We thereby identify performance enactment, translations between an imitated core and surrounding opportunities as well as the generative effects of intellectual property regulation as key ingredients to foster emulative novelty.

Details

The Generation, Recognition and Legitimation of Novelty
Type: Book
ISBN: 978-1-80117-998-0

Keywords

Article
Publication date: 1 January 1995

Rick Tilman and John H. Brown

Discusses the theories of Thorstein Veblen and C. Wright Mills onstatus emulation and craftsmanship. Applies these theories to thebusiness situataion, especially public…

751

Abstract

Discusses the theories of Thorstein Veblen and C. Wright Mills on status emulation and craftsmanship. Applies these theories to the business situataion, especially public administration. Concludes that, if contamination by emulatory values and behaviours can be limited, the ideal of authentic public administration emphasizing organizational humanism and craftsmanship is still possible.

Details

International Journal of Social Economics, vol. 22 no. 1
Type: Research Article
ISSN: 0306-8293

Keywords

Article
Publication date: 5 February 2018

Mengru Tu, Ming K. Lim and Ming-Fang Yang

The purpose of this paper is threefold: to present internet of things (IoT)-based cyber-physical system (CPS) architecture framework to facilitate the integration of IoT and CPS;…

3499

Abstract

Purpose

The purpose of this paper is threefold: to present internet of things (IoT)-based cyber-physical system (CPS) architecture framework to facilitate the integration of IoT and CPS; to implement an IoT-based CPS prototype based on the architecture framework for a PL application scenario of in a case study; and to devise evaluation methods and conduct experimental evaluations on an IoT-based CPS prototype.

Design/methodology/approach

The design research method, case study, emulation experiment method, and cost-benefit analysis are applied in this research. An IoT-based CPS architecture framework is proposed, and followed by the development of prototype system and testbed platform. Then, the emulation and experimental evaluation of IoT-based CPS are conducted on the testbed, and the experimental results are analyzed.

Findings

The emulation experiment results show that the proposed IoT-based CPS outperforms current barcode-based system regarding labor cost, efficiency, and operational adaptiveness. The evaluation of the IoT-based CPS prototype indicates significant improvements in PL tasks and reduced part inventory under a dynamic changing shop-floor environment.

Practical implications

The case study shows that the proposed architecture framework and prototype system can be applied to many discrete manufacturing industries, such as automobile, airplane, bicycle, home appliance, and electronics.

Originality/value

The proposed IoT-based CPS is among the first to address the need to integrate IoT and CPS for PL applications, and to conduct experimental evaluations and cost-benefit analysis of adopting IoT-based CPS for PL. This paper also contributes to the IoT research by using diverse research methods to offer broader insights into understanding IoT and CPS.

Details

Industrial Management & Data Systems, vol. 118 no. 1
Type: Research Article
ISSN: 0263-5577

Keywords

Article
Publication date: 1 October 2001

Adrienne Muir

The aim of legal deposit is to ensure the preservation of and access to a nation’s intellectual and cultural heritage over time. There is a global trend towards extending legal…

1505

Abstract

The aim of legal deposit is to ensure the preservation of and access to a nation’s intellectual and cultural heritage over time. There is a global trend towards extending legal deposit to cover digital publications in order to maintain comprehensive national archives. However, including digital publications in legal deposit regulations is not enough to ensure the long‐term preservation of these publications. Indeed, there are many practical difficulties associated with the entire deposit process. Conceptsm, principles and practices that are accepted and understood in the print environment, such as publication, publisher, place of publication and edition, may have new meanings or no longer be appropriate in a networked environment. Mechanisms for identifying, selecting and depositing digital material either do not exist or are inappropriate for some kinds of digital publication. There is a great deal of work on developing digital preservation strategies; this is at an early stage. National and other deposit libraries are at the forefront of research and development in this area, often in partnership with other libraries, publishers and technology vendors. Most of this activity is of a technical nature. There is some work on developing policies and strategies for managing digital resources. However, not all management issues or users’ needs are being addressed.

Details

Journal of Documentation, vol. 57 no. 5
Type: Research Article
ISSN: 0022-0418

Keywords

1 – 10 of over 2000