Search results

1 – 10 of over 1000
Article
Publication date: 2 April 2024

Chenyu Zhang, Hongtao Xu and Yaodong Da

Thermal protection of a flange is critical for preventing tower icing and collapse of wind turbines (WTs) in extremely cold weather. This study aims to develop a novel thermal…

22

Abstract

Purpose

Thermal protection of a flange is critical for preventing tower icing and collapse of wind turbines (WTs) in extremely cold weather. This study aims to develop a novel thermal protection system for the WTs flanges using an electrical heat-tracing element.

Design/methodology/approach

A three-dimensional model and the Poly-Hexacore mesh structure are used, and the fluid-solid coupling method was validated and then deployed to analyze the heat transfer and convection process. Intra-volumetric heat sources are applied to represent the heat generated by the heating element, and the dynamic boundary conditions are considered. The steady temperature and temperature uniformity of the flange are the assessment criteria for the thermal protection performance of the heating element.

Findings

Enlarging the heating area and increasing the heating power improved the flange's temperature and temperature uniformity. A heating power of 4.9 kW was suitable for engineering applications with the lowest temperature nonuniformity. Compared with continuous heating, the increased temperature nonuniformity was buffered, and the electrical power consumption was reduced by half using pulse heating. Pulse heating time intervals of 1, 3 and 4 h were determined for the spring, autumn and winter, respectively.

Originality/value

The originality of this study is to propose a novel electrical heat-tracing thermal protection system for the WTs flanges. The effect of different arrangements, heating powers and heating strategies was studied, by which the theoretical basis is provided for a stable and long-term utilization of the WT flange.

Details

International Journal of Numerical Methods for Heat & Fluid Flow, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 0961-5539

Keywords

Article
Publication date: 9 February 2024

Chengpeng Zhang, Zhihua Yu, Jimin Shi, Yu Li, Wenqiang Xu, Zheyi Guo, Hongshi Zhang, Zhongyuan Zhu and Sheng Qiang

Hexahedral meshing is one of the most important steps in performing an accurate simulation using the finite element analysis (FEA). However, the current hexahedral meshing method…

Abstract

Purpose

Hexahedral meshing is one of the most important steps in performing an accurate simulation using the finite element analysis (FEA). However, the current hexahedral meshing method in the industry is a nonautomatic and inefficient method, i.e. manually decomposing the model into suitable blocks and obtaining the hexahedral mesh from these blocks by mapping or sweeping algorithms. The purpose of this paper is to propose an almost automatic decomposition algorithm based on the 3D frame field and model features to replace the traditional time-consuming and laborious manual decomposition method.

Design/methodology/approach

The proposed algorithm is based on the 3D frame field and features, where features are used to construct feature-cutting surfaces and the 3D frame field is used to construct singular-cutting surfaces. The feature-cutting surfaces constructed from concave features first reduce the complexity of the model and decompose it into some coarse blocks. Then, an improved 3D frame field algorithm is performed on these coarse blocks to extract the singular structure and construct singular-cutting surfaces to further decompose the coarse blocks. In most modeling examples, the proposed algorithm uses both types of cutting surfaces to decompose models fully automatically. In a few examples with special requirements for hexahedral meshes, the algorithm requires manual input of some user-defined cutting surfaces and constructs different singular-cutting surfaces to ensure the effectiveness of the decomposition.

Findings

Benefiting from the feature decomposition and the 3D frame field algorithm, the output blocks of the proposed algorithm have no inner singular structure and are suitable for the mapping or sweeping algorithm. The introduction of internal constraints makes 3D frame field generation more robust in this paper, and it can automatically correct some invalid 3–5 singular structures. In a few examples with special requirements, the proposed algorithm successfully generates valid blocks even though the singular structure of the model is modified by user-defined cutting surfaces.

Originality/value

The proposed algorithm takes the advantage of feature decomposition and the 3D frame field to generate suitable blocks for a mapping or sweeping algorithm, which saves a lot of simulation time and requires less experience. The user-defined cutting surfaces enable the creation of special hexahedral meshes, which was difficult with previous algorithms. An improved 3D frame field generation method is proposed to correct some invalid singular structures and improve the robustness of the previous methods.

Details

Engineering Computations, vol. 41 no. 1
Type: Research Article
ISSN: 0264-4401

Keywords

Article
Publication date: 24 October 2023

Doron Goldbarsht

The rise of cryptocurrencies and other digital assets has triggered concerns about regulation and security. Governments and regulatory bodies are challenged to create frameworks…

Abstract

Purpose

The rise of cryptocurrencies and other digital assets has triggered concerns about regulation and security. Governments and regulatory bodies are challenged to create frameworks that protect consumers, combat money laundering and address risks linked to digital assets. Conventional approaches to confiscation and anti-money laundering are deemed insufficient in this evolving landscape. The absence of a central authority and the use of encryption hinder the identification of asset owners and the tracking of illicit activities. Moreover, the international and cross-border nature of digital assets complicates matters, demanding global coordination. The purpose of this study is to highlight that the effective combat of money laundering, legislative action, innovative investigative techniques and public–private partnerships are crucial.

Design/methodology/approach

The focal point of this paper is Australia’s approach to law enforcement in the realm of digital assets. It underscores the pivotal role of robust confiscation mechanisms in disrupting criminal networks operating through digital means. The paper firmly asserts that staying ahead of the curve and maintaining an agile stance is paramount. Criminals are quick to embrace emerging technologies, necessitating proactive measures from policymakers and law enforcement agencies.

Findings

It is argued that an agile and comprehensive approach is vital in countering money laundering, as criminals adapt to new technologies. Policymakers and law enforcement agencies must remain proactively ahead of these developments to efficiently identify, trace and seize digital assets involved in illicit activities, thereby safeguarding the integrity of the global financial system.

Originality/value

This paper provides a distinctive perspective by examining Australia’s legal anti-money laundering and counterterrorism financing framework, along with its law enforcement strategies within the realm of the digital asset landscape. While there is a plethora of literature on both asset confiscation and digital assets, there is a noticeable absence of exploration into their interplay, especially within the Australian context.

Details

Journal of Money Laundering Control, vol. 27 no. 3
Type: Research Article
ISSN: 1368-5201

Keywords

Open Access
Article
Publication date: 19 June 2023

Nathalie Brender, Marion Gauthier, Jean-Henry Morin and Arber Salihi

While the three lines model (TLM) provides an organizational structure to execute risk and control duties, research and practice show limitations in the model's implementation…

1011

Abstract

Purpose

While the three lines model (TLM) provides an organizational structure to execute risk and control duties, research and practice show limitations in the model's implementation. These limitations result in governance issues. Such issues, together with control weaknesses, could be addressed by leveraging properties of distribution, transparency, and immutability of blockchain technology. To this end, in this paper the authors propose a conceptual control framework based on blockchain technology to augment control practice.

Design/methodology/approach

The design of the resulting blockchain-based control framework (BBCF) and its prototype, based on the design science research methodology (DSRM), is presented and discussed in terms of the potential impact in the context of the identified problems within the TLM.

Findings

One potential outcome of BBCF could be to redefine the scope and boundaries of some of the activities in audit and control practices from a more static to a more dynamic and prospective role. In a larger context of improving governance practices, the BBCF could set the path for a more inclusive and participatory interaction between the different governance actors of an organization.

Research limitations/implications

However, this assumes that blockchain is more widely adopted despite its complexity and rigidity.

Practical implications

BBCF covering both a conceptual model design and a reference implementation provides an innovation in audit and control. BBCF could include all relevant stakeholders who have an interest in corporate governance and control activities, including the regulators.

Originality/value

The contribution intends to serve both as a starting point for discussing the evolution of audit and control practice based on blockchain technology, as well as an initial actionable prototype for experimentation and further development.

Details

Journal of Applied Accounting Research, vol. 25 no. 1
Type: Research Article
ISSN: 0967-5426

Keywords

Article
Publication date: 20 December 2022

Randa Salamoun, Charlotte M. Karam and Crystel Abdallah

The authors explore the entanglement of smartphone technology and power in this paper. This paper explores the following question: In what ways does the actualization of…

Abstract

Purpose

The authors explore the entanglement of smartphone technology and power in this paper. This paper explores the following question: In what ways does the actualization of smartphone affordances result in empowering outcomes (i.e. increase or reduce oppression) in the daily lives of refugees? Leveraging both affordance and feminist theories, the authors develop a hybrid lens bringing attention to the contextualized relationship between social process goals and affordances for sociality, upon which the authors introduce the notion of “goal-affordance interrelations”. The authors then trace how the actualization of these interrelations increases or reduces oppression.

Design/methodology/approach

Using an abductive approach, the authors analyze 32 semi-structured interview transcriptions conducted with Syrian refugees in Lebanon.

Findings

The analysis in this study reveals four categories of social process goals (meet financial needs, satisfy security needs, communicate and learn and maintain pre-existing social ties) that are intimate components of contextually meaningful affordances. When actualized, the goal–affordance interrelations fundamentally shape refugee experiences of power outcomes. The findings suggest forms of empowerment where powerlessness, marginalization, violence and exploitation are perceived to be reduced. Actualization outcomes are also found to increase perceived oppression. Additionally, the findings reveal that not all interrelations are actualized, such that the anticipation of an oppressive power outcome may limit the actualization of affordances for sociality.

Originality/value

This research raises considerations concerning technology and oppression, and that efforts to empower refugees through technology should critically question whether the lived experiences of oppression will be reduced. The findings of this study reveal various forms of less empowering (i.e. oppressive) outcomes for the refugees sampled, they also point to the potential politicization of the actualization of goal–affordance interrelations.

Details

Information Technology & People, vol. 37 no. 1
Type: Research Article
ISSN: 0959-3845

Keywords

Open Access
Article
Publication date: 27 March 2023

Michael Adu Kwarteng, Alex Ntsiful, Christian Nedu Osakwe and Kwame Simpe Ofori

This study proposes and validates an integrated theoretical model involving the theory of planned behavior (TPB), health belief model (HBM), personal norms and information privacy…

1199

Abstract

Purpose

This study proposes and validates an integrated theoretical model involving the theory of planned behavior (TPB), health belief model (HBM), personal norms and information privacy to understand determinants of acceptance and resistance to the use of mobile contact tracing app (MCTA) in a pandemic situation.

Design/methodology/approach

This study draws on online surveys of 194 research respondents and uses partial least squares structural equation modeling (PL-SEM) to test the proposed theoretical model.

Findings

The study establishes that a positive attitude towards MCTA is the most important predictor of individuals' willingness to use MCTA and resistance to use MCTA. Furthermore, barriers to taking action positively influence resistance to the use of MCTA. Personal norms negatively influence resistance to the use of MCTA. Information privacy showed a negative and positive influence on willingness to use MCTA and use the resistance of MCTA, respectively, but neither was statistically significant. The authors found no significant influence of perceived vulnerability, severity, subjective norms and perceived behavioral control on either acceptance or use resistance of MCTA.

Originality/value

The study has been one of the first in the literature to propose an integrated theoretical model in the investigation of the determinants of acceptance and resistance to the use of MCTA in a single study, thereby increasing the scientific understanding of the factors that can facilitate or inhibit individuals from engaging in the use of a protection technology during a pandemic situation.

Peer review

The peer review history for this article is available at: https://publons.com/publon/10.1108/OIR-10-2021-0533

Details

Online Information Review, vol. 48 no. 1
Type: Research Article
ISSN: 1468-4527

Keywords

Article
Publication date: 25 December 2023

Muhammad Saleem Sumbal, Mujtaba Hassan Agha, Aleena Nisar and Felix T.S. Chan

This study aims to investigate the various systems in logistics industry of Pakistan through the lens of the World Bank's logistics performance indicators (LPI) and understand…

342

Abstract

Purpose

This study aims to investigate the various systems in logistics industry of Pakistan through the lens of the World Bank's logistics performance indicators (LPI) and understand their impact on the China–Pakistan economic corridor (CPEC) that is a vital part of China's belt and road initiative (BRI).

Design/methodology/approach

In this study thematic analysis was performed on twenty-three semi-structured interviews with experts in Pakistan's logistics and supply chain sector to gain an in-depth insight into the logistics performance relative to CPEC.

Findings

A performance gap exists in the logistics systems in Pakistan, both for hard and soft infrastructure. The significant challenges are the inefficiencies of the government, minimal use of information and computing technology (ICT), and an incapable workforce. It is essential to be cognizant of the ground realities and amendments required in the existing policies and practices in light of the challenges faced and best practices adopted by developed and developing countries with good standing in logistics performance. This study will guide policymakers and practitioners for hard and soft logistics infrastructure improvement, which may benefit economic corridors in general and CPEC in particular.

Originality/value

This study contributes to the existing literature by highlighting the role of ICT in improving both soft and hard logistics infrastructure, which can lead to significant development of economic corridors. The study makes use of a case study of the CPEC to demonstrate the lack of ICT can hamper the growth of an economic corridor despite billions of dollars of investment in the hard infrastructure development projects.

Details

Industrial Management & Data Systems, vol. 124 no. 3
Type: Research Article
ISSN: 0263-5577

Keywords

Article
Publication date: 2 February 2023

Lai-Wan Wong, Garry Wei-Han Tan, Keng-Boon Ooi and Yogesh Dwivedi

The deployment of artificial intelligence (AI) technologies in travel and tourism has received much attention in the wake of the pandemic. While societal adoption of AI has…

1298

Abstract

Purpose

The deployment of artificial intelligence (AI) technologies in travel and tourism has received much attention in the wake of the pandemic. While societal adoption of AI has accelerated, it also raises some trust challenges. Literature on trust in AI is scant, especially regarding the vulnerabilities faced by different stakeholders to inform policy and practice. This work proposes a framework to understand the use of AI technologies from the perspectives of institutional and the self to understand the formation of trust in the mandated use of AI-based technologies in travelers.

Design/methodology/approach

An empirical investigation using partial least squares-structural equation modeling was employed on responses from 209 users. This paper considered factors related to the self (perceptions of self-threat, privacy empowerment, trust propensity) and institution (regulatory protection, corporate privacy responsibility) to understand the formation of trust in AI use for travelers.

Findings

Results showed that self-threat, trust propensity and regulatory protection influence trust in users on AI use. Privacy empowerment and corporate responsibility do not.

Originality/value

Insights from the past studies on AI in travel and tourism are limited. This study advances current literature on affordance and reactance theories to provide a better understanding of what makes travelers trust the mandated use of AI technologies. This work also demonstrates the paradoxical effects of self and institution on technologies and their relationship to trust. For practice, this study offers insights for enhancing adoption via developing trust.

Details

Internet Research, vol. 34 no. 2
Type: Research Article
ISSN: 1066-2243

Keywords

Article
Publication date: 8 March 2024

Lijie Ma, Xinhui Mao, Chenrui Li, Yu Zhang, Fengnan Li, Minghua Pang and Qigao Feng

The purpose of this study is to reveal the friction reduction performance and mechanism of granular flow lubrication during the milling of difficult-to-machining materials and…

Abstract

Purpose

The purpose of this study is to reveal the friction reduction performance and mechanism of granular flow lubrication during the milling of difficult-to-machining materials and provide a high-performance lubrication method for the precision cutting of nickel-based alloys.

Design/methodology/approach

The milling tests for Inconel 718 superalloy under dry cutting, flood lubrication and granular flow lubrication were carried out, and the milling force and machined surface quality were used to evaluate their friction reduction effect. Furthermore, based on the energy dispersive spectrometer (EDS) spectrums and the topographical features of machined surface, the lubrication mechanism of different granular mediums was explored during granular flow lubrication.

Findings

Compared with flood lubrication, the granular flow lubrication had a significant force reduction effect, and the maximum milling force was reduced by about 30%. At the same time, the granular flow lubrication was more conducive to reducing the tool trace size, repressing surface damage and thus achieving better surface quality. The soft particles had better friction reduction performance than the hard particles with the same particle size, and the friction reduction performance of nanoscale hard particles was superior to that of microscale hard particles. The friction reduction mechanism of MoS2 and WS2 soft particles is the mending effect and adsorption film effect, whereas that of SiO2 and Al2O3 hard particles is mainly manifested as the rolling and polishing effect.

Originality/value

Granular flow lubrication was applied in the precision milling of Inconel 718 superalloy, and a comparative study was conducted on the friction reduction performance of soft particles (MoS2, WS2) and hard particles (SiO2, Al2O3). Based on the EDS spectrums and topographical features of machined surface, the friction reduction mechanism of soft and hard particles was explored.

Details

Industrial Lubrication and Tribology, vol. 76 no. 3
Type: Research Article
ISSN: 0036-8792

Keywords

Article
Publication date: 29 March 2024

Pratheek Suresh and Balaji Chakravarthy

As data centres grow in size and complexity, traditional air-cooling methods are becoming less effective and more expensive. Immersion cooling, where servers are submerged in a…

Abstract

Purpose

As data centres grow in size and complexity, traditional air-cooling methods are becoming less effective and more expensive. Immersion cooling, where servers are submerged in a dielectric fluid, has emerged as a promising alternative. Ensuring reliable operations in data centre applications requires the development of an effective control framework for immersion cooling systems, which necessitates the prediction of server temperature. While deep learning-based temperature prediction models have shown effectiveness, further enhancement is needed to improve their prediction accuracy. This study aims to develop a temperature prediction model using Long Short-Term Memory (LSTM) Networks based on recursive encoder-decoder architecture.

Design/methodology/approach

This paper explores the use of deep learning algorithms to predict the temperature of a heater in a two-phase immersion-cooled system using NOVEC 7100. The performance of recursive-long short-term memory-encoder-decoder (R-LSTM-ED), recursive-convolutional neural network-LSTM (R-CNN-LSTM) and R-LSTM approaches are compared using mean absolute error, root mean square error, mean absolute percentage error and coefficient of determination (R2) as performance metrics. The impact of window size, sampling period and noise within training data on the performance of the model is investigated.

Findings

The R-LSTM-ED consistently outperforms the R-LSTM model by 6%, 15.8% and 12.5%, and R-CNN-LSTM model by 4%, 11% and 12.3% in all forecast ranges of 10, 30 and 60 s, respectively, averaged across all the workloads considered in the study. The optimum sampling period based on the study is found to be 2 s and the window size to be 60 s. The performance of the model deteriorates significantly as the noise level reaches 10%.

Research limitations/implications

The proposed models are currently trained on data collected from an experimental setup simulating data centre loads. Future research should seek to extend the applicability of the models by incorporating time series data from immersion-cooled servers.

Originality/value

The proposed multivariate-recursive-prediction models are trained and tested by using real Data Centre workload traces applied to the immersion-cooled system developed in the laboratory.

Details

International Journal of Numerical Methods for Heat & Fluid Flow, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 0961-5539

Keywords

1 – 10 of over 1000