Ishaq Amrani, Ahmed Cheriet and Mouloud Feliachi
The purpose of this paper is to propose to simulate an arbitrary movement in electromagnetic problems by means of a 3D nonconforming finite volume method (NC-FVM). The moving part…
Abstract
Purpose
The purpose of this paper is to propose to simulate an arbitrary movement in electromagnetic problems by means of a 3D nonconforming finite volume method (NC-FVM). The moving part can be displaced according to the x, y and/or z direction.
Design/methodology/approach
The 3D nonconforming mesh technique coupled to the FVM is used to handle arbitrary displacement of moving parts. Accordingly, the whole problem domain is divided into two parts: moving part and fixed part. Both parts are meshed independently. By using a suitable connection between both fixed and moved meshes, the movement can be performed according to the three axes.
Findings
The TEAM Workshop Problem No. 23 is used to test the proposed method. The calculated values of the magnetic force applied to the permanent magnet for different positions of the magnet show the efficiency of the proposed method.
Originality/value
This paper introduces the NC-FVM to solve electromagnetic problems which contain moving parts. Here, the movement can be performed according to the three axes.
Details
Keywords
Ahmed Cheriet, Mouloud Feliachi and Souri Mohamed Mimoune
The purpose of this paper is to propose modelling 3D eddy current non destructive testing (EC NDT) problems by the finite volume method (FVM). Furthermore, the movement of the…
Abstract
Purpose
The purpose of this paper is to propose modelling 3D eddy current non destructive testing (EC NDT) problems by the finite volume method (FVM). Furthermore, the movement of the probe coil is taken into account.
Design/methodology/approach
The nonconforming mesh technique is used to handle the displacement of the probe coil. Thus, the whole problem is divided into two parts; moving part (probe coil) and fixed part (specimen with crack), and then each part meshes independently. A computer code is built under Matlab program to generate 3D nonconforming mesh, to calculate magnetic and electric potentials and to evaluate the impedance change of the coil due to the presence of the crack.
Findings
The JSAEM No. 6 problem is used to test the proposed method. The calculated values of the impedance change of the probe coil due to the presence of crack, shows the efficiency of the developed software. A small difference is obtained between calculated values and measured values.
Originality/value
The paper introduces the FVM in solving EC NDT problems where the probe displacement is taken into account.
Details
Keywords
Amine Zaidi, Ouarda Izemmouren, Bachir Taallah and Abdelhamid Guettala
Earthen construction does not meet today’s requirements due to certain limitations such as low water resistance and its high vulnerability to cracking damage. The purpose of this…
Abstract
Purpose
Earthen construction does not meet today’s requirements due to certain limitations such as low water resistance and its high vulnerability to cracking damage. The purpose of this study is to improve the mechanical properties and low durability of adobe blocks by incorporating date palm wastes as a natural reinforcement and lime as a stabilizer.
Design/methodology/approach
Soil from the region of Biskra in Algeria was mixed with sand and lime in suitable ratios. Then, date palm wastes were added to the previous mixture at different ratios (0.3%, 0.6% and 0.9%) by dry mix weight to manufacture adobes. Cubical and cylindrical specimens were prepared and tested in a laboratory to investigate the curing time, mechanical and durability characteristics of the formulated blocks. In addition, X-ray diffraction and scanning electron microscopy (SEM) tests were used to identify the materials.
Findings
It has been observed that the addition of lime to the soil is very beneficial for its stabilization, in particular for an optimum of 12%. The presence of date palm waste in the mixture (soil + lime) generated a significant improvement in tensile strength reaching a rate of about 67%. The same observation was made for the tests of resistance to dry abrasion, resistance to erosion, attack by external sulphate and wetting/drying. However, for cases of compressive strength, water absorption and swelling an unfavorable effect was recorded.
Originality/value
Based on the above-mentioned findings, this paper presents a novel solution to increase the durability of adobe materials using date palm wastes with oven curing at 65°C for about nine days. Adopting such an approach would certainly encourage building durable mud housing on a large scale. This can contribute to solving the acute housing shortage, particularly in poor countries.
Details
Keywords
Chowdhury Noushin Novera, Zobayer Ahmed, Rafsanjany Kushol, Peter Wanke and Md. Abul Kalam Azad
Although there has been a significant amount of research on Smart Tourism, the articles have not yet been combined into a thorough literature review that can examine research…
Abstract
Purpose
Although there has been a significant amount of research on Smart Tourism, the articles have not yet been combined into a thorough literature review that can examine research streams and the scope of future research. The purpose of this study is to examine the literature on the impact of deploying the Internet of Things (IoT) in tourism sector development to attract more visitors using a text mining technique and citation based bibliometric analysis for the first time.
Design/methodology/approach
This study uses R programming to do a full-text analysis of 36 publications on IoT in tourism and visualization of similarities viewer software to conduct a bibliometric citation analysis of 469 papers from the Scopus database. Aside from that, the documents were subjected to a longitudinal study using Excel and word frequency using a trending topic using the R-tool.
Findings
Results from the bibliometric study revealed the networks that exist in the literature of Tourism Management. With the use of log-likelihood, the findings from text mining identified nine theme models on the basis of relevancy, which is presented alongside an overview of the existing papers and a list of the primary authors with posterior probability using latent Dirichlet allocation.
Originality/value
This study examines tourism literature in which IoT plays a significant role. To the best of the authors’ knowledge, this study is the first to combine text mining with a bibliometric review. It significantly analyzes and discusses the impact of technology in the tourism sector development on attracting tourists while presenting the most important and frequently discussed topics and research in these writings. These findings provide researchers, tourism managers and technology professionals with a complete understanding of e-tourism and to provide smart devices to attract tourists.
Propósito
Aunque ha habido un número importante de estudios sobre el turismo inteligente, todavía no se dispone de una revisión bibliográfica exhaustiva que permita examinar las corrientes de investigación y las sugerencias de investigación futuras. Este estudio examina la literatura sobre el impacto del Internet de las cosas en el desarrollo del sector turístico para atraer más visitantes utilizando una técnica de minería de textos y un análisis bibliométrico basado en citas.
Metodología
Este estudio utiliza la programación R para hacer un análisis de texto completo de 36 publicaciones sobre IoT en el turismo y el software de visualización de similitudes (VOS) para realizar un análisis bibliométrico de citas de 469 documentos de la base de datos Scopus. Además, los documentos fueron sometidos a un estudio longitudinal mediante Excel y a la frecuencia de palabras mediante un tema de tendencia utilizando la herramienta R.
Resultados
Los resultados del estudio bibliométrico revelaron las redes existentes en la literatura de la Gestión Turística. Con el uso de la log-verosimilitud, los resultados de la minería de textos identificaron nueve modelos temáticos sobre la base de la relevancia, que se presentan junto con una visión general de los documentos existentes y una lista de los autores principales con probabilidad posterior utilizando la asignación latente de dirichlets.
Originalidad
Este estudio examina la literatura sobre turismo en la que la IoT desempeña un papel importante. Este estudio es el primero que combina la minería de textos con una revisión bibliométrica. Analiza y discute de forma significativa el impacto de la tecnología en el desarrollo del sector turístico para atraer a los turistas, a la vez que presenta los temas e investigaciones más importantes y más frecuentemente discutidos en estos escritos. Estos resultados proporcionan a los investigadores, gestores turísticos y profesionales de la tecnología una comprensión integral del turismo electrónico y los dispositivos inteligentes para atraer a los turistas.
目的
虽然已经有大量关于智慧旅游的研究, 但这些文章尚未整合成一个全面的文献综述, 可以检阅目前的研究流和未来研究的范畴。本研究首次使用文本挖掘技术和基于引文的文献计量分析, 来研究有关在旅游业发展中部署物联网对吸引更多游客的影响的文献。
方法
本研究使用R编程对36篇关于旅游业物联网的文章进行全文分析, 并使用相似性可视化(VOS)查看器软件对Scopus数据库中的469篇论文进行文献计量引文分析。除此之外, 还利用Excel对这些文献进行了纵向研究, 并使用R工具对趋势主题进行了词频分析。
结果
文献计量研究的结果揭示了旅游管理文献中现有的网络。通过使用对数似然, 文本挖掘的结果根据相关性确定了9个主题模型, 这些模型与现有论文的概述和主要作者名单在使用潜在狄里奇分配(LDA)的后验概率一起呈现。
原创性
本研究对旅游物联网相关文献进行了分析研究, 它首次将文本挖掘与文献计量学审查相结合。这项研究着重分析和讨论了技术在旅游行业发展中对吸引游客的影响, 同时介绍了这些文章中最重要和经常讨论的主题和研究。这些发现为研究人员、旅游管理者和技术专家提供了对科技与旅游的全面了解, 并提供关于智能设备来吸引游客的建议。
Details
Keywords
The recent appointment of a number of women to leading policy making positions in the Arab Gulf State of Oman marks a significant departure from the traditionally exclusive male…
Abstract
Purpose
The recent appointment of a number of women to leading policy making positions in the Arab Gulf State of Oman marks a significant departure from the traditionally exclusive male dominated decision‐making arena, and ushers an end to an era of exclusive patriarchal dominance in leadership positions. This study aims to shed light on this evolving phase of women's empowerment in Oman, and attempts to capture their traits, experiences and challenges as women leaders in conservative, male dominated work environments.
Design/methodology/approach
The study analyzes the views of ten Omani women who achieved extraordinary levels of career success. In depth interviews were conducted using an interview guide purposely designed to solicit responses pertaining to their early socialization patterns; personal traits; work/family role conflict and their vision of the challenges facing working and professional women in Omani society.
Findings
Contrary to social perceptions and stereotypes, Omani women in leading positions are highly motivated and ambitious. Their successful transition to elevated positions can be attributed to their early socialization experiences which valued education, supportive parents (particularly the father), and equal treatment with their male siblings. They are challenged by the incongruence of their roles as female leaders relative to the prevailing social values and expectations towards women and their traditional role in society.
Research limitations/implications
The study does not investigate the extent to which such appointments may have transformed gender relations in Oman nor its impact on women's roles in Omani organizations.
Practical implications
Empowering women requires policies and human resource programs that support this goal. This paper has implications for gender policy development as well as diversity and leadership training for women.
Originality/value
Given the dearth of research on this topic, the study contributes to understanding the dynamics of female leadership in this increasingly important world region, and raises awareness among women (and men alike) regarding the unique experiences and challenges of Arab women leaders.
Details
Keywords
Effective information security management (ISM) contributes to building a healthy organizational digital ecology. However, few studies have built an analysis framework for…
Abstract
Purpose
Effective information security management (ISM) contributes to building a healthy organizational digital ecology. However, few studies have built an analysis framework for critical influencing factors to discuss the combined influence mechanism of multiple factors on ISM performance (ISMP). This study aims to explore the critical success factors and understand how these factors contribute to ISMP.
Design/methodology/approach
This study used a mixed-method approach to achieve this study’s research goals. In Study 1, the authors conducted a qualitative analysis to take a series of International Organization for Standardization/International Electrotechnical Commission standard documents as the basis to refine the critical factors that may influence organizations’ ISMP. In Study 2, the authors built a research model based on the organizational control perspective and used the survey-based partial least squares-based structural equation modeling (PLS-SEM) approach to understand the relationships between these factors in promoting ISMP. In Study 3, the authors used the fuzzy set qualitative comparative analysis (fsQCA) method to empirically analyze the complex mechanisms of how the combinations of the factors affect ISMP.
Findings
The following three research findings are obtained. First, based on the text-based qualitative analysis, the authors refined the critical success factors that may increase ISMP, including information security policies (ISP), top management support (TMS), alignment (ALI), information security risk assessment (IRA), information security awareness (ISA) and information security culture (ISC). Second, the PLS-SEM testing results confirmed TMS is the antecedent variable motivating organization’s formation (ISP) and information control (ISC) approaches; these two types of organization control approaches increase IRA, ISA and ALI and then promote ISMP directly and indirectly. Third, the fsQCA testing results found two configurations that can achieve high ISMP and one driving path that leads to non-high ISMP.
Originality/value
This study extends knowledge by exploring configuration factors to improve or impede the performances of organizations’ ISM. To the best of the authors’ knowledge, this study is one of the first to explore the use of the fsQCA approach in information security studies, and the results not only revealed causal associations between single factors but also highlighted the critical role of configuration factors in developing organizational ISMP. This study calls attention to information security managers of an organization should highlight the combined effect between the factors and reasonably allocate organizational resources to achieve high ISMP.
Details
Keywords
Wayne D. Kearney and Hennie A. Kruger
The purpose of this paper is to discuss and theorise on the appropriateness and potential impact of risk homeostasis in the context of information security.
Abstract
Purpose
The purpose of this paper is to discuss and theorise on the appropriateness and potential impact of risk homeostasis in the context of information security.
Design/methodology/approach
The discussion is mainly based on a literature survey backed up by illustrative empirical examples.
Findings
Risk homeostasis in the context of information security is an under-explored topic. The principles, assumptions and methodology of a risk homeostasis framework offer new insights and knowledge to explain and predict contradictory human behaviour in information security.
Practical implications
The paper shows that explanations for contradictory human behaviour (e.g. the privacy paradox) would gain from considering risk homeostasis as an information security risk management model. The ideas discussed open up the prospect to theorise on risk homeostasis as a framework in information security and should form a basis for further research and practical implementations. On a more practical level, it offers decision makers useful information and new insights that could be advantageous in a strategic security planning process.
Originality/value
This is the first systematic comprehensive review of risk homeostasis in the context of information security behaviour and readers of the paper will find new theories, guidelines and insights on risk homeostasis.
Details
Keywords
Ana Faizi, Ali Padyab and Andreas Naess
This study aims to address the issue of practicing information security risk assessment (ISRA) on cloud solutions by studying municipalities and large organizations in Sweden.
Abstract
Purpose
This study aims to address the issue of practicing information security risk assessment (ISRA) on cloud solutions by studying municipalities and large organizations in Sweden.
Design/methodology/approach
Four large organizations and five municipalities that use cloud services and conduct ISRA to adhere to their information security risk management practices were studied. Data were gathered qualitatively to answer the study’s research question: How is ISRA practiced on the cloud? The Coat Hanger model was used as a theoretical lens to study and theorize the practices.
Findings
The results showed that the organizations aimed to follow the guidelines, in the form of frameworks or their own experience, to conduct ISRA; furthermore, the frameworks were altered to fit the organizations’ needs. The results further indicated that one of the main concerns with the cloud ISRA was the absence of a culture that integrates risk management. Finally, the findings also stressed the importance of a good understanding and a well-written legal contract between the cloud providers and the organizations using the cloud services.
Originality/value
As opposed to the previous research, which was more inclined to try out and evaluate various cloud ISRA, the study provides insights into the practice of cloud ISRA experienced by the organizations. This study represents the first attempt to investigate cloud ISRA that organizations practice in managing their information security.