Search results

1 – 10 of over 1000
Article
Publication date: 25 November 2024

Wei Lin, Cheng Wang, Qingyi Zou, Min Lei and Yulong Li

This paper aims to conduct work to obtain high-quality brazed joint of YAG ceramic and kovar alloy.

Abstract

Purpose

This paper aims to conduct work to obtain high-quality brazed joint of YAG ceramic and kovar alloy.

Design/methodology/approach

Wetting and spreading behavior of AgCuTi filler alloy on YAG ceramic and kovar alloy under vacuum (2∼3 × 10–4 Pa) and argon conditions was investigated and compared. Then, YAG ceramic was brazed to kovar alloy under a high vacuum of 2∼3 × 10–4 Pa; the influence of holding time on the interface structure of the joint was investigated.

Findings

The wettability of AgCuTi on YAG is poor in the argon atmosphere, the high oxygen content in the reaction layer hinders the formation of the TiY2O5 reaction layer, thereby impeding the wetting of AgCuTi on YAG; in the vacuum, a contact angle (?=16.6°) is obtained by wetting AgCuTi filler alloy on the YAG substrate; the microstructure of the YAG/AgCuTi/kovar brazed joint is characterized to be YAG/Y2O3/(Fe, Ni)Ti/Ag(s, s) + Cu(s, s)/Fe2Ti + Ni3Ti/Fe2Ti/kovar; at 870 °C for the holding time of 10 min, a (Fe, Ni) Ti layer of approximately 1.8 µm is formed on the YAG side.

Originality/value

Wetting and spreading behavior of the brazing filler alloy under different conditions and the influence of the holding time on the interface microstructure of the joint were studied to provide references for obtaining high-quality brazed joints.

Details

Soldering & Surface Mount Technology, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 0954-0911

Keywords

Article
Publication date: 28 October 2024

Xiaoyong Wei and Cheng Wang

The commercial sharing service (CSS) represents an emerging business model in which users pay a minor fee to rent a product for a short period of time. Fashion CSSs enable…

Abstract

Purpose

The commercial sharing service (CSS) represents an emerging business model in which users pay a minor fee to rent a product for a short period of time. Fashion CSSs enable individuals to rent various garments and accessories with the goal of enhancing one’s public image while saving money. Marketers have strived to popularize fashion CSSs, but concerns related to contamination have thwarted their efforts. Based on face consciousness theory, this research examines how consumers’ desire to enhance their public image (i.e. to “gain face”) can attenuate the negative impacts of contamination concerns and thus facilitate fashion CSS usage.

Design/methodology/approach

Two scenario-based studies were conducted to collect data. Participants were recruited via online survey platforms in mainland China. The hypotheses were tested by partial least squares (PLS) path modeling and linear regression analysis.

Findings

The analysis results revealed a two-stage mediation model. Contamination concerns were found to inhibit consumers’ participation in fashion-sharing by increasing their perceived risk, which further decreased the perceived value of the CSS. However, consumers’ desire to gain face can mitigate the negative (direct and indirect) effects of contamination concerns on CSS usage, facilitating CSS adoption.

Originality/value

Our findings suggest that eliciting consumers’ desire to gain face can promote fashion CSS usage and attenuate the negative impacts of contamination concerns. Moreover, consumers are less risk-averse and less concerned about shared pieces being contaminated when they seek to enhance their face through fashion products. Practical implications for fashion marketers are discussed.

Details

Journal of Fashion Marketing and Management: An International Journal, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 1361-2026

Keywords

Article
Publication date: 11 April 2024

Yun Li, Zhe Cheng, Jiangbin Yin, Zhenshan Yang and Ming Xu

Infrastructure financialization plays a critical role in infrastructure development and urban growth around the world. However, on the one hand, the existing research on the…

Abstract

Purpose

Infrastructure financialization plays a critical role in infrastructure development and urban growth around the world. However, on the one hand, the existing research on the infrastructure financialization focuses on qualitative and lacks quantitative country-specific studies. On the other hand, the spatial heterogeneity and influencing factors of infrastructure financialization are ignored. This study takes China as a typical case to identify and analyze the spatial characteristics, development process and impact factors of infrastructure financialization.

Design/methodology/approach

To assess the development and characteristics of infrastructure financialization in China, this study constructs an evaluation index of infrastructure financialization based on the infrastructure financialization ratio (IFR). This study then analyzes the evolution process and spatial pattern of China's infrastructure financialization through the spatial analysis method. Furthermore, this study identifies and quantitatively analyzes the influencing factors of infrastructure financialization based on the spatial Dubin model. Finally, this study offers a policy suggestion as a governance response.

Findings

The results demonstrate that infrastructure financialization effectively promotes the development of infrastructure in China. Second, there are significant spatial differences in China’s infrastructure financialization. Third, many factors affect infrastructure financialization, with government participation having the greatest impact. In addition, over-financialization of infrastructure has the potential to lead to government debt risks, which is a critical challenge the Chinese Government must address. Finally, this study suggests that infrastructure financialization requires more detailed, tailored,and place-specific policy interventions by the government.

Originality/value

This study not only contributes to enriching the knowledge body of global financialization theory but also helps optimize infrastructure investment and financing policies in China and provides peer reference for other developing countries.

Details

Engineering, Construction and Architectural Management, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 0969-9988

Keywords

Article
Publication date: 29 March 2024

Jiming Hu, Zexian Yang, Jiamin Wang, Wei Qian, Cunwan Feng and Wei Lu

This study proposes a novel method utilising a speech-word pair bipartite network to examine the correlation structure between members of parliament (MPs) in the context of the…

Abstract

Purpose

This study proposes a novel method utilising a speech-word pair bipartite network to examine the correlation structure between members of parliament (MPs) in the context of the UK- China relationship.

Design/methodology/approach

We construct MP-word pair bipartite networks based on the co-occurrence relationship between MPs and words in their speech content. These networks are then mapped into monopartite MPs correlation networks. Additionally, the study calculates correlation network indicators and identifies MP communities and factions to determine the characteristics of MPs and their interrelation in the UK-China relationship. This includes insights into the distribution of key MPs, their correlation structure and the evolution and development trends of MP factions.

Findings

Analysis of the parliamentary speeches on China-related affairs in the British Parliament from 2011 to 2020 reveals that the distribution and interrelationship of MPs engaged in UK-China affairs are centralised and discrete, with a few core MPs playing an integral role in the UK-China relationship. Among them, MPs such as Lord Ahmad of Wimbledon, David Cameron, Lord Hunt of Chesterton and Lord Howell of Guildford formed factions with significant differences; however, the continuity of their evolution exhibits unstableness. The core MP factions, such as those led by Lord Ahmad of Wimbledon and David Cameron, have achieved a level of maturity and exert significant influence.

Research limitations/implications

The research has several limitations that warrant acknowledgement. First, we mapped the MP-word pair bipartite network into the MP correlation network for analysis without directly analysing the structure of MPs based on the bipartite network. In future studies, we aim to explore various types of analysis based on the proposed bipartite networks to provide more comprehensive and accurate references for studying UK-China relations. In addition, we seek to incorporate semantic-level analyses, such as sentiment analysis of MPs, into the MP-word -pair bipartite networks for in-depth analysis. Second, the interpretations of MP structures in the UK-China relationship in this study are limited. Consequently, expertise in UK-China relations should be incorporated to enhance the study and provide more practical recommendations.

Practical implications

Firstly, the findings can contribute to an objective understanding of the characteristics and connotations of UK-China relations, thereby informing adjustments of focus accordingly. The identification of the main factions in the UK-China relationship emphasises the imperative for governments to pay greater attention to these MPs’ speeches and social relationships. Secondly, examining the evolution and development of MP factions aids in identifying a country’s diplomatic focus during different periods. This can assist governments in responding promptly to relevant issues and contribute to the formulation of effective foreign policies.

Social implications

First, this study expands the research methodology of parliamentary debates analysis in previous studies. To the best of our knowledge, we are the first to study the UK-China relationship through the MP-word-pair bipartite network. This outcome inspires future researchers to apply various knowledge networks in the LIS field to elucidate deeper characteristics and connotations of UK-China relations. Second, this study provides a novel perspective for UK-China relationship analysis, which deepens the research object from keywords to MPs. This finding may offer important implications for researchers to further study the role of MPs in the UK-China relationship.

Originality/value

This study proposes a novel scheme for analysing the correlation structure between MPs based on bipartite networks. This approach offers insights into the development and evolving dynamics of MPs.

Details

Aslib Journal of Information Management, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 2050-3806

Keywords

Article
Publication date: 5 December 2024

Chengxia Liu, Jiawen Gu, Lan Yao and Ying Zhang

As an ancient art form, embroidery has strong practicality and artistic value. However, current embroidery style migration models produce images with unclear textures and a lack…

Abstract

Purpose

As an ancient art form, embroidery has strong practicality and artistic value. However, current embroidery style migration models produce images with unclear textures and a lack of stitch detail. So, in this paper, we propose a cyclic consistent embroidery style migration network with texture constraints, which is called Texture Cycle GAN (TCGAN).

Design/methodology/approach

The model is based on the existing Cycle GAN network with an additional texture module. This texture module is implemented using a pre-trained Markovian adversarial network to synthesize embroidery texture features. The overall algorithm consists of two generative adversarial networks (for style migration) and the Markovian adversarial network (for texture synthesis).

Findings

Qualitative and quantitative experiments show that, compared with the existing convolutional neural network style transfer algorithm, the introduction of the texture-constrained embroidery style transfer model TCGAN can effectively learn the characteristics of style images, generate digital embroidery works with clear texture and natural stitches and achieve more realistic embroidery simulation effects.

Originality/value

By improving the algorithm for image style migration and designing a reasonable loss function, the generated embroidery patterns are made more detailed, which shows that the model can improve the realism of embroidery style simulation and help to improve the standard of embroidery craftsmanship, thus promoting the development of the embroidery industry.

Details

International Journal of Clothing Science and Technology, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 0955-6222

Keywords

Article
Publication date: 12 September 2024

Zhanglin Peng, Tianci Yin, Xuhui Zhu, Xiaonong Lu and Xiaoyu Li

To predict the price of battery-grade lithium carbonate accurately and provide proper guidance to investors, a method called MFTBGAM is proposed in this study. This method…

Abstract

Purpose

To predict the price of battery-grade lithium carbonate accurately and provide proper guidance to investors, a method called MFTBGAM is proposed in this study. This method integrates textual and numerical information using TCN-BiGRU–Attention.

Design/methodology/approach

The Word2Vec model is initially employed to process the gathered textual data concerning battery-grade lithium carbonate. Subsequently, a dual-channel text-numerical extraction model, integrating TCN and BiGRU, is constructed to extract textual and numerical features separately. Following this, the attention mechanism is applied to extract fusion features from the textual and numerical data. Finally, the market price prediction results for battery-grade lithium carbonate are calculated and outputted using the fully connected layer.

Findings

Experiments in this study are carried out using datasets consisting of news and investor commentary. The findings reveal that the MFTBGAM model exhibits superior performance compared to alternative models, showing its efficacy in precisely forecasting the future market price of battery-grade lithium carbonate.

Research limitations/implications

The dataset analyzed in this study spans from 2020 to 2023, and thus, the forecast results are specifically relevant to this timeframe. Altering the sample data would necessitate repetition of the experimental process, resulting in different outcomes. Furthermore, recognizing that raw data might include noise and irrelevant information, future endeavors will explore efficient data preprocessing techniques to mitigate such issues, thereby enhancing the model’s predictive capabilities in long-term forecasting tasks.

Social implications

The price prediction model serves as a valuable tool for investors in the battery-grade lithium carbonate industry, facilitating informed investment decisions. By using the results of price prediction, investors can discern opportune moments for investment. Moreover, this study utilizes two distinct types of text information – news and investor comments – as independent sources of textual data input. This approach provides investors with a more precise and comprehensive understanding of market dynamics.

Originality/value

We propose a novel price prediction method based on TCN-BiGRU Attention for “text-numerical” information fusion. We separately use two types of textual information, news and investor comments, for prediction to enhance the model's effectiveness and generalization ability. Additionally, we utilize news datasets including both titles and content to improve the accuracy of battery-grade lithium carbonate market price predictions.

Details

Kybernetes, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 0368-492X

Keywords

Article
Publication date: 28 November 2024

Chao Li, Weimin Zhai, Weiming Fu, Jiahu Qin and Yu Kang

This study aims to introduce a method for predicting the remaining useful life (RUL) of bearings based on parallel feature extraction. The proposed model provides prior knowledge…

Abstract

Purpose

This study aims to introduce a method for predicting the remaining useful life (RUL) of bearings based on parallel feature extraction. The proposed model provides prior knowledge and removes redundant handcrafted feature information, additionally, which focuses on the important features at different time scales.

Design/methodology/approach

Distinct from traditional parallel feature extraction methods, which can lead to information redundancy, a one-dimensional convolutional autoencoder is introduced to process selected indicators to remove redundancy and retain useful feature information. To fully capture the important degradation information within different stages in the feature sequences, a novel multi-scale attention feature fusion module is proposed to extract degradation features at different time scales. Considering the impact of degradation modes on RUL prediction, a dual-task prediction module based on no degradation mode labels is designed to obtain accurate RUL.

Findings

Comparative experiments and ablation studies on the PHM2012 bearing dataset verified the effectiveness of the proposed method. Furthermore, the rationality of the selected parameters is confirmed through model parameter analysis.

Originality/value

The novelty of the proposed method is that it not only provides prior knowledge but also further removes redundant information from prior knowledge. In addition, the distribution differences between the original features and their multi-scale convolution results are measured through Kullback–Leibler divergence as the attention scores, which allows the proposed method to focus on important information at different time scales.

Details

Robotic Intelligence and Automation, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 2754-6969

Keywords

Article
Publication date: 23 October 2024

Mervat Elsaied

This study aimed to investigate the impact of benevolent leadership on proactive customer service performance by creating a moderated mediation model. The model focuses on the…

Abstract

Purpose

This study aimed to investigate the impact of benevolent leadership on proactive customer service performance by creating a moderated mediation model. The model focuses on the role of harmonious passion as a mediator in the relationship between benevolent leadership and proactive customer service performance as well as the moderating influence of proactive personality on this mediation.

Design/methodology/approach

The model was tested using data from 339 immediate supervisor-subordinate pairs in eight five-star hotels in Egypt. Frontline service employees and their immediate supervisors completed separate questionnaires, and the responses were matched using identification numbers.

Findings

The results indicate that harmonious passion fully mediates the positive relationship between benevolent leadership and proactive customer service performance. Additionally, proactive personality was found to moderate the mediated relationship between benevolent leadership and proactive customer service performance through harmonious passion, such that the mediation was stronger for employees with higher proactive personalities.

Research limitations/implications

By testing the moderated mediation model, this study contributes to our theoretical understanding of the motivational mechanism through which benevolent leadership influences proactive customer service performance.

Originality/value

This research offers initial evidence of the mediating role of harmonious passion in the positive relationship between benevolent leadership and proactive customer service performance. The moderated mediation model extends existing findings by incorporating proactive personality as a significant moderator in explaining the impact of benevolent leadership on proactive customer service performance.

Details

Leadership & Organization Development Journal, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 0143-7739

Keywords

Article
Publication date: 16 July 2024

Michael J Rooney, Yair Levy, Wei Li and Ajoy Kumar

The increased use of Information Systems (IS) as a working tool for employees increases the number of accounts and passwords required. Despite being more aware of password…

Abstract

Purpose

The increased use of Information Systems (IS) as a working tool for employees increases the number of accounts and passwords required. Despite being more aware of password entropy, users still often participate in deviant password behaviors, known as “password workarounds” or “shadow security.” These deviant password behaviors can put individuals and organizations at risk, resulting in a data breach. This paper aims to engage IS users and Subject Matter Experts (SMEs), focused on designing, developing and empirically validating the Password Workaround Cybersecurity Risk Taxonomy (PaWoCyRiT) – a 2x2 taxonomy constructed by aggregated scores of perceived cybersecurity risks from Password Workarounds (PWWAs) techniques and their usage frequency.

Design/methodology/approach

This research study was a developmental design conducted in three phases using qualitative and quantitative methods: (1) A set of 10 PWWAs that were identified from the literature were validated by SMEs along with their perspectives on the PWWAs usage and risk for data breach; (2) A pilot study was conducted to ensure reliability and validity and identify if any measurement issues would have hindered the results and (3) The main study data collection was conducted with a large group of IS users, where also they reported on coworkers' engagement frequencies related to the PWWAs.

Findings

The results indicate that statistically significant differences were found between SMEs and IS users in their aggregated perceptions of risks of the PWWAs in causing a data breach, with IS users perceiving higher risks. Engagement patterns varied between the two groups, as well as factors like years of IS experience, gender and job level had statistically significant differences among groups.

Practical implications

The PaWoCyRiT taxonomy that the we have developed and empirically validated is a handy tool for organizational cyber risk officers. The taxonomy provides organizations with a quantifiable means to assess and ultimately mitigate cybersecurity risks.

Social implications

Passwords have been used for a long time to grant controlled access to classified spaces, electronics, networks and more. However, the dramatic increase in user accounts over the past few decades has exposed the realization that technological measures alone cannot ensure a high level of IS security; this leaves the end-users holding a critical role in protecting their organization and personal information. Thus, the taxonomy that the authors have developed and empirically validated provides broader implications for society, as it assists organizations in all industries with the ability to mitigate the risks of data breaches that can result from PWWAs.

Originality/value

The taxonomy the we have developed and validated, the PaWoCyRiT, provides organizations with insights into password-related risks and behaviors that may lead to data breaches.

Details

Information & Computer Security, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 2056-4961

Keywords

Article
Publication date: 17 October 2024

Junjun Cheng and Jiaxuan Wang

Fashion marketers are adopting attractive virtual personalities to replace human influencers on social media, but the impact of consumer bias against virtual influencer acceptance…

Abstract

Purpose

Fashion marketers are adopting attractive virtual personalities to replace human influencers on social media, but the impact of consumer bias against virtual influencer acceptance is not fully understood. Drawing upon match-up hypothesis, attribution theory and speciesism against artificial intelligence (AI), this research investigates how speciesism shapes the influencer-product attractiveness transference in AI-powered influencer marketing for fashion products.

Design/methodology/approach

Three studies were conducted (N = 1,385) to test the influencer-product attractiveness transference, the moderating role of influencer type and the moderated moderating role of speciesism against AI.

Findings

Our studies validated the attractiveness transference and revealed that influencers’ attractiveness promotes purchase intention via perceived product attractiveness. The adoption of virtual (vs human) influencers weakens the attractiveness transference and attenuates the mediating effect. Low speciesism boosts the effectiveness of virtual influencers, such that attractiveness transference disappears only when high-speciesism consumers react to virtual influencers.

Originality/value

Our findings clarify how influencers’ physical appearance, AI application and speciesism together impact interactive fashion marketing, offering practical insights into successful influencer strategies on social media.

Details

Journal of Research in Interactive Marketing, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 2040-7122

Keywords

1 – 10 of over 1000