Search results

1 – 10 of over 1000
Per page
102050
Citations:
Loading...
Available. Open Access. Open Access
Article
Publication date: 2 May 2022

Ao Li, Dingli Zhang, Zhenyu Sun, Jun Huang and Fei Dong

The microseismic monitoring technique has great advantages on identifying the location, extent and the mechanism of damage process occurring in rock mass. This study aims to…

467

Abstract

Purpose

The microseismic monitoring technique has great advantages on identifying the location, extent and the mechanism of damage process occurring in rock mass. This study aims to analyze distribution characteristics and the evolution law of excavation damage zone of surrounding rock based on microseismic monitoring data.

Design/methodology/approach

In situ test using microseismic monitoring technique is carried out in the large-span transition tunnel of Badaling Great Wall Station of Beijing-Zhangjiakou high-speed railway. An intelligent microseismic monitoring system is built with symmetry monitoring point layout both on the mountain surface and inside the tunnel to achieve three-dimensional and all-round monitoring results.

Findings

Microseismic events can be divided into high density area, medium density area and low density area according to the density distribution of microseismic events. The positions where the cumulative distribution frequencies of microseismic events are 60 and 80% are identified as the boundaries between high and medium density areas and between medium and low density areas, respectively. The high density area of microseismic events is regarded as the high excavation damage zone of surrounding rock, which is affected by the grade of surrounding rock and the span of tunnel. The prediction formulas for the depth of high excavation damage zone of surrounding rock at different tunnel positions are given considering these two parameters. The scale of the average moment magnitude parameters of microseismic events is adopted to describe the damage degree of surrounding rock. The strong positive correlation and multistage characteristics between the depth of excavation damage zone and deformation of surrounding rock are revealed. Based on the depth of high excavation damage zone of surrounding rock, the prestressed anchor cable (rod) is designed, and the safety of anchor cable (rod) design parameters is verified by the deformation results of surrounding rock.

Originality/value

The research provides a new method to predict the surrounding rock damage zone of large-span tunnel and also provides a reference basis for design parameters of prestressed anchor cable (rod).

Details

Railway Sciences, vol. 1 no. 1
Type: Research Article
ISSN: 2755-0907

Keywords

Access Restricted. View access options
Article
Publication date: 22 January 2025

Ao Li and Ruolong Qi

On account of the flexibility, large working space and system openness, manipulators are often adopted in automatic grinding and polishing operations. In the flexible roboticized…

3

Abstract

Purpose

On account of the flexibility, large working space and system openness, manipulators are often adopted in automatic grinding and polishing operations. In the flexible roboticized polishing process for complex surfaces with narrow spatial structures, such as aero-engine blades, the contact mode between the tool and the workpiece changes with the transformation of the manipulator’s end posture and the alternation of the workpiece curvature, which often leads to processing contact faults. These faults result in the obsolescence of expensive aerospace components and reduced efficiency. The purpose of this study is to collect vibration signals during the machining process and extract fault characteristic parameters for monitoring and diagnosis for diagnosing faults in automated flexible polishing to protect the workpiece.

Design/methodology/approach

This paper proposes a whale optimization algorithm (WAO)-support vector machine model based on the support vector machine and WAO. From the original grinding and polishing vibration signal, 11 time-domain features that can reflect the fluctuation of the vibration signal are extracted as detection features.

Findings

Experimental results indicate that this method effectively reflects the relationship between contact faults and diagnostic results, demonstrating good real-time performance and diagnostic capability.

Originality/value

This method provides a crucial theoretical basis for real-time fault diagnosis and monitoring in automatic flexible machining, ensuring reliable automatic flexible polishing processes.

Details

Industrial Robot: the international journal of robotics research and application, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 0143-991X

Keywords

Access Restricted. View access options
Article
Publication date: 19 June 2020

Julian Seger, Ao Li and Andreas Pfnuer

The purpose of this paper is to examine the influence of corporate real estate (CRE) holdings on firm performance. Unlike previous studies, the paper does not only consider the…

294

Abstract

Purpose

The purpose of this paper is to examine the influence of corporate real estate (CRE) holdings on firm performance. Unlike previous studies, the paper does not only consider the firms’ primary business segment but also their activities in different business fields. This is of particular interest because additional segments often have different requirements for the provision of space and thus for the ownership strategy, which could have led to a possible bias in previous studies. Furthermore, additional business areas are becoming more relevant through integrated solutions.

Design/methodology/approach

The study uses a balance sheet data set of companies in the six largest European economies for the period from 2000 to 2016. Germany serves as a suitable laboratory for deeper analyses. Holdings of 490 firms are regressed to the stock market performance using a two-stage approach. This procedure is repeated by considering additional business segments.

Findings

The analyses reveal that ownership reduces stock market performance. Additional business activities also appear to influence the relevance of ownership for firm performance.

Practical implications

The research shows that ownership is priced depending on its primary and additional business activities. First, this insight helps capital market players to choose the right investment strategy. Second, it provides CRE decision-makers with information on the optimal provision of real estate.

Originality/value

This is the first paper to examine the contribution of real estate ownership on firm performance in light of the fact that companies operate in more than one sector.

Details

Journal of European Real Estate Research , vol. 13 no. 2
Type: Research Article
ISSN: 1753-9269

Keywords

Access Restricted. View access options
Article
Publication date: 9 February 2022

Hafiz Muhammad Athar Farid and Muhammad Riaz

The authors develop some prioritized operators named Pythagorean fuzzy prioritized averaging operator with priority degrees and Pythagorean fuzzy prioritized geometric operator…

171

Abstract

Purpose

The authors develop some prioritized operators named Pythagorean fuzzy prioritized averaging operator with priority degrees and Pythagorean fuzzy prioritized geometric operator with priority degrees. The properties of the existing method are routinely compared to those of other current approaches, emphasizing the superiority of the presented work over currently used methods. Furthermore, the impact of priority degrees on the aggregate outcome is thoroughly examined. Further, based on these operators, a decision-making approach is presented under the Pythagorean fuzzy set environment. An illustrative example related to the selection of the best alternative is considered to demonstrate the efficiency of the proposed approach.

Design/methodology/approach

In real-world situations, Pythagorean fuzzy numbers are exceptionally useful for representing ambiguous data. The authors look at multi-criteria decision-making issues in which the parameters have a prioritization relationship. The idea of a priority degree is introduced. The aggregation operators are formed by awarding non-negative real numbers known as priority degrees among strict priority levels. Consequently, the authors develop some prioritized operators named Pythagorean fuzzy prioritized averaging operator with priority degrees and Pythagorean fuzzy prioritized geometric operator with priority degrees.

Findings

The authors develop some prioritized operators named Pythagorean fuzzy prioritized averaging operator with priority degrees and Pythagorean fuzzy prioritized geometric operator with priority degrees. The properties of the existing method are routinely compared to those of other current approaches, emphasizing the superiority of the presented work over currently used methods. Furthermore, the impact of priority degrees on the aggregate outcome is thoroughly examined. Further, based on these operators, a decision-making approach is presented under the Pythagorean fuzzy set environment. An illustrative example related to the selection of the best alternative is considered to demonstrate the efficiency of the proposed approach.

Originality/value

The aggregation operators are formed by awarding non-negative real numbers known as priority degrees among strict priority levels. Consequently, the authors develop some prioritized operators named Pythagorean fuzzy prioritized averaging operator with priority degrees and Pythagorean fuzzy prioritized geometric operator with priority degrees. The properties of the existing method are routinely compared to those of other current approaches, emphasizing the superiority of the presented work over currently used methods. Furthermore, the impact of priority degrees on the aggregate outcome is thoroughly examined.

Details

International Journal of Intelligent Computing and Cybernetics, vol. 15 no. 4
Type: Research Article
ISSN: 1756-378X

Keywords

Access Restricted. View access options
Article
Publication date: 12 April 2024

Yibin Ao, Panyu Peng, Mingyang Li, Jiayue Li, Yan Wang and Igor Martek

Building Information Modeling (BIM) competitions are a beneficial approach to enhance BIM education, offering students practical experience in BIM application, including mastering…

191

Abstract

Purpose

Building Information Modeling (BIM) competitions are a beneficial approach to enhance BIM education, offering students practical experience in BIM application, including mastering workflows and technical tools. However, research exploring the individual perceptions influencing participation intentions and behaviors in BIM competitions is limited. Therefore, this study aims to investigate the factors affecting university students' behavioral intention and behavior in BIM competitions, providing theoretical support for BIM competitions and educational reform.

Design/methodology/approach

This study employs the Structural Equation Modeling (SEM) based on the Unified Theory of Acceptance and Use of Technology (UTAUT) framework to analyze the factors influencing BIM competition participation among 970 Architecture, Engineering, and Construction (AEC) university students.

Findings

The results of the study show that social influence, attitude, and self-efficacy play critical roles in shaping students' intentions to participate in BIM competitions. Furthermore, self-efficacy, facilitating conditions, and behavioral intention significantly influence students' actual engagement in such competitions. Surprisingly, effort expectancy negatively influences intentions, as less challenging tasks can lead students to perceive their participation as less impactful on their skills and learning, reducing their behavioral intention to participate.

Originality/value

This research provides valuable insights into the effectiveness of BIM competitions in enhancing BIM education for AEC students. Extending the UTAUT model to include self-efficacy and attitude, provides a novel perspective for understanding students' intentions and behaviors regarding BIM competitions. The study’s theoretical support proposes incorporating BIM competitions to augment BIM teaching methods and offers suggestions for advancing the efficacy of students' involvement in BIM competitions within higher education, thus contributing to educational reform in the AEC sector.

Details

Engineering, Construction and Architectural Management, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 0969-9988

Keywords

Access Restricted. View access options
Article
Publication date: 26 January 2024

Merly Thomas and Meshram B.B.

Denial-of-service (DoS) attacks develop unauthorized entry to various network services and user information by building traffic that creates multiple requests simultaneously…

35

Abstract

Purpose

Denial-of-service (DoS) attacks develop unauthorized entry to various network services and user information by building traffic that creates multiple requests simultaneously making the system unavailable to users. Protection of internet services requires effective DoS attack detection to keep an eye on traffic passing across protected networks, freeing the protected internet servers from surveillance threats and ensuring they can focus on offering high-quality services with the fewest response times possible.

Design/methodology/approach

This paper aims to develop a hybrid optimization-based deep learning model to precisely detect DoS attacks.

Findings

The designed Aquila deer hunting optimization-enabled deep belief network technique achieved improved performance with an accuracy of 92.8%, a true positive rate of 92.8% and a true negative rate of 93.6.

Originality/value

The introduced detection approach effectively detects DoS attacks available on the internet.

Details

International Journal of Web Information Systems, vol. 20 no. 1
Type: Research Article
ISSN: 1744-0084

Keywords

Access Restricted. View access options
Article
Publication date: 30 November 2021

Fei Tong, Jie Yang, Meng Qiang Duan, Xu Fei Ma and Gao Chao Li

The purpose of this article is to understand the current research status and future development trends in the field of numerical simulation on rock mass grouting.

588

Abstract

Purpose

The purpose of this article is to understand the current research status and future development trends in the field of numerical simulation on rock mass grouting.

Design/methodology/approach

This article first searched the literature database (EI, Web of Science, CNKI, etc.) for keywords related to the numerical simulation of rock mass grouting to obtain the initial literature database. Then, from the initial database, several documents with strong relevance to the numerical simulation theme of rock mass grouting and high citation rate were selected; some documents from the references were selected as supplements, forming the sample database of this review study (a total of 90 articles). Finally, through sorting out the relationship among the literature, this literature review was carried out.

Findings

The numerical simulation of rock mass grouting is mainly based on the porous media model and the fractured media model. It has experienced the development process from Newtonian fluid to non-Newtonian fluid, from time-invariant viscosity to time-varying viscosity, and from generalized theoretical model to engineering application model. Based on this, this article summarizes four scientific problems that need to be solved in the future in this research field: the law of grout distribution at the cross fissures, the grout diffusion mechanism under multi-field coupling, more accurate grouting theoretical model and simulation technology with strong engineering applicability.

Originality/value

This research systematically analyzes the current research status and shortcomings of numerical simulation on rock mass grouting, summarizes four key issues in the future development of this research field and provides new ideas for the future research on numerical simulation on rock mass grouting.

Details

Engineering Computations, vol. 39 no. 5
Type: Research Article
ISSN: 0264-4401

Keywords

Access Restricted. View access options
Book part
Publication date: 25 May 2007

Tse-min Lin and Brian Roberts

Abstract

Details

Topics in Analytical Political Economy
Type: Book
ISBN: 978-1-84950-809-4

Access Restricted. View access options
Article
Publication date: 7 November 2017

Naveed Riaz, Ayesha Riaz and Sajid Ali Khan

The security of the stored biometric template is itself a challenge. Feature transformation techniques and biometric cryptosystems are used to address the concerns and improve the…

538

Abstract

Purpose

The security of the stored biometric template is itself a challenge. Feature transformation techniques and biometric cryptosystems are used to address the concerns and improve the general acceptance of biometrics. The purpose of this paper is to provide an overview of different techniques and processes for securing the biometric templates. Furthermore, the paper explores current research trends in this area.

Design/methodology/approach

In this paper, the authors provide an overview and survey of different features transformation techniques and biometric cryptosystems.

Findings

Feature transformation techniques and biometric cryptosystems provide reliable biometric security at a high level. There are many techniques that provide provable security with practical viable recognition rates. However, there remain several issues and challenges that are being faced during the deployment of these technologies.

Originality/value

This paper provides an overview of currently used techniques for securing biometric templates and also outlines the related issues and challenges.

Details

Sensor Review, vol. 38 no. 1
Type: Research Article
ISSN: 0260-2288

Keywords

Available. Open Access. Open Access
Article
Publication date: 28 November 2023

Qian Qin

This research explores the intricate dynamics of national interests realised through Japan's official development assistance (ODA) to China. It aims to deepen the understanding of…

1054

Abstract

Purpose

This research explores the intricate dynamics of national interests realised through Japan's official development assistance (ODA) to China. It aims to deepen the understanding of these mechanisms, detailing the extent to which Japan has accomplished its national interests.

Design/methodology/approach

The paper applies the role theory and narrative analysis to elucidate Japan's national role conception and its categories of national interests with regards to its ODA policy. It utilises both qualitative and quantitative methods to examine the success rate in achieving Japan's diplomatic objectives and how those interests have manifested over time.

Findings

The findings suggest a mixed outcome. Whilst Japan's ODA to China has helped in expanding trade and fostering mutual understanding and cooperation, it has been less successful in promoting democratic governance in China or effectively counterbalancing China's regional power. Hence, the realisation of national interests through ODA is a complex process contingent upon numerous factors.

Originality/value

This study stands out for its multifaceted approach in examining Japan's ODA policy towards China, integrating both quantitative and qualitative methodologies and applying the role theory in the context of international development aid. It fills a significant gap in the literature by analysing the interplay between national interests and foreign aid, providing nuanced insights into the successes and challenges of Japan's pursuit of its diplomatic objectives. The study's findings have important implications for understanding the complexity of international aid dynamics and can inform future policy decisions in the realm of international relations and foreign aid.

Details

International Trade, Politics and Development, vol. 8 no. 1
Type: Research Article
ISSN: 2586-3932

Keywords

1 – 10 of over 1000
Per page
102050