Search results

1 – 10 of over 9000
Per page
102050
Citations:
Loading...
Access Restricted. View access options
Article
Publication date: 1 May 2019

Chang-E Zhou, Haidan Niu, Qing Zhang, Huixia Li, Chi Wai Kan, Chang Sun, Jinmei Du and Changhai Xu

This paper aims to prepare an associative thickener base on two polyacrylate-based copolymers, which can be used for digital printing of nylon carpet with enhanced performance.

172

Abstract

Purpose

This paper aims to prepare an associative thickener base on two polyacrylate-based copolymers, which can be used for digital printing of nylon carpet with enhanced performance.

Design/methodology/approach

An associative thickener was prepared by compounding two polyacrylate-based copolymers, cationic starch and polyacrylic acid; and mediated by polyethylene glycol and polyacrylamide crosslinker. The formulation of the associative thickener was optimized by using the orthogonal array testing strategy. The stability of the associative thickener was investigated by measuring effects of temperature, electrolytes, storage time and auxiliaries on viscosity. The associative thickener was compared with a commercial thickener by evaluating their performance in digital printing of nylon carpet.

Findings

The associative thickener provided same color strength and fastness in the printing of nylon carpet as the commercial one, but was more easily washed off for a better hand feeling of the printed carpet.

Practical implications

The prepared associative thickener can be applied for digital printing of nylon carpet.

Originality/value

The associative thickener can be facilely prepared from commercially available chemicals and suitable for digital printing of nylon carpet.

Details

Pigment & Resin Technology, vol. 48 no. 3
Type: Research Article
ISSN: 0369-9420

Keywords

Access Restricted. View access options
Article
Publication date: 5 June 2009

Wen‐Jer Chang, Cheung‐Chieh Ku and Wei Chang

The purpose of this paper is to propose a stability analysis and control synthesis for achieving passivity properties of a class of continuous‐time nonlinear systems. These…

329

Abstract

Purpose

The purpose of this paper is to propose a stability analysis and control synthesis for achieving passivity properties of a class of continuous‐time nonlinear systems. These nonlinear systems are represented via continuous affine Takagi‐Sugeno (T‐S) fuzzy models, which played an important role in nonlinear control systems. The affine T‐S fuzzy models are more approximate than homogeneous T‐S fuzzy models for modeling nonlinear systems. Using the energy concept of passivity theory with Lyapunov function, the conditions are derived to ensure the passivity and stability of nonlinear systems. Based on the parallel distribution compensation (PDC) technique, this paper proposes a fuzzy controller design approach to achieve the passivity and stability for the continuous affine T‐S fuzzy systems.

Design/methodology/approach

For solving stability and stabilization problems of affine T‐S fuzzy models, the conversion techniques and passive theory are employed to derive the stability conditions. By applying the linear matrix inequality technique, a modified iterative linear matrix inequality algorithm is proposed to determine and update the auxiliary variables for finding feasible solutions of these stability conditions.

Findings

By studying the numerical example, the proposed design technique of this paper is an effectiveness and useful approach to design the PDC‐based fuzzy controller. From the simulation results, the considered nonlinear system with external disturbances driven by proposed design fuzzy controller is stable and strictly input passive.

Originality/value

This paper is interesting for designing fuzzy controller to guarantee the stability and strict input passivity of affine T‐S fuzzy models.

Details

International Journal of Intelligent Computing and Cybernetics, vol. 2 no. 2
Type: Research Article
ISSN: 1756-378X

Keywords

Access Restricted. View access options
Article
Publication date: 5 March 2018

Huibin Sun and Zhiyong Chang

The functionality and reliability of an overhauled aero-engine is determined by all configuration changes in the overhaul process. Identifying, recording, auditing, tracking and…

258

Abstract

Purpose

The functionality and reliability of an overhauled aero-engine is determined by all configuration changes in the overhaul process. Identifying, recording, auditing, tracking and tracing of configuration modifications are significant and meaningful. Considering the barriers to these goals, this paper aims to put forward an approach to configuration management in the aero-engine overhaul process.

Design/methodology/approach

The overhaul configuration management model is proposed to describe an aero-engine’s configuration evolution trajectory in the overhaul process. The controlling and auditing procedures are put forward to control and audit parts’ return-to-zero statuses and overproof statuses. And some searching algorithms are also designed to enable tracking and tracing of the configuration status along the time coordinate, or get a snapshot of an aero-engine’s configuration at a certain time. The above model, procedures and algorithms have been implemented and adopted to fulfill the configuration management requirements in the aero-engine overhaul process.

Findings

The approach is effective in identifying, recording, controlling, auditing, tracking and tracing configuration changes in the overhaul process.

Practical implications

The approach’s implementation and adoption present a practical example for aero-engines’ configuration management issue in the overhaul process.

Originality/value

The work proposes an original aero-engine configuration management solution for the overhaul process and enables a reliable and accurate configuration management mode.

Details

Aircraft Engineering and Aerospace Technology, vol. 90 no. 2
Type: Research Article
ISSN: 1748-8842

Keywords

Access Restricted. View access options
Book part
Publication date: 20 May 2019

Murya Habbash

Recent accounting literature and Agency theory have predicted that corporate governance assists the convergence of interests between shareholders and managers, and thus enhances…

Abstract

Recent accounting literature and Agency theory have predicted that corporate governance assists the convergence of interests between shareholders and managers, and thus enhances the quality of financial reporting. This chapter discusses some of the empirical studies on corporate governance in Saudi Arabia; it also elaborates on the corporate governance regulations introduced by Capital Market Authority in Saudi Arabia. Studies cover various subjects that interact with corporate governance, such as earnings management, corporate social responsibility disclosure, ownership structure, environmental disclosure and voluntary disclosure in annual reports of Saudi's listed firms. It also discusses the effectiveness and determinants of corporate governance structures, such as the board of directors, audit committee and other sub-committees. Results were generally in line with previous research from the developed countries, but sometimes there are contradictions, and these results have been discussed and explained, and implications to regulators and investors are drawn where possible.

Details

Research in Corporate and Shari’ah Governance in the Muslim World: Theory and Practice
Type: Book
ISBN: 978-1-78973-007-4

Keywords

Access Restricted. View access options
Article
Publication date: 24 March 2022

Ya-Peng Jia, Wan-Chang Sun, Yan Xiao, Jing-Pei Liu, Cong-Xiao Zhang, Tong-Qiang Zhang and Ze-Feng Hou

This paper aims to research the effect of different concentrations for Nd(NO3)3 and Ce(NO3)3 on the microstructures and corrosion resistance of Ni-W-P composite coatings through…

149

Abstract

Purpose

This paper aims to research the effect of different concentrations for Nd(NO3)3 and Ce(NO3)3 on the microstructures and corrosion resistance of Ni-W-P composite coatings through electroless plating method.

Design/methodology/approach

Scanning electron microscope, attached energy dispersive spectroscopy system and X-ray diffraction were used in this work. Meanwhile, the immersion test and electrochemical tests were used to characterize the corrosion behavior of the coating.

Findings

The coatings prepared at 1.00 g·L−1 Nd(NO3)3 exhibit a dense structure and high phosphorus content (12.38 wt.%). In addition, compared to the addition of Ce(NO3)3, when Nd(NO3)3 was introduced at a concentration of 1.00 g·L−1, the minimum corrosion rate of the coating was 1.209 g·m−2·h−1, with a noble Ecorr (−0.29 V) and lower Icorr (8.29 × 10−4 A·cm−2).

Originality/value

The effects of rare earths on the deposition and corrosion resistance mechanisms of Ni-W-P composite coatings were explored, with the rare earth elements promoting the deposition of nickel and tungsten atoms. Simultaneously, the amorphization of the coating increases, which excellently enhances the corrosion resistance of the coating.

Details

Anti-Corrosion Methods and Materials, vol. 69 no. 3
Type: Research Article
ISSN: 0003-5599

Keywords

Access Restricted. View access options
Article
Publication date: 28 May 2024

Hasnan Baber, Mina Fanea-Ivanovici, Marius-Cristian Pana and Alina Magdalena Manole

Video streaming consumption has become a social and economic phenomenon in an age where the share of online entertainment has become larger and larger in the total entertainment…

130

Abstract

Purpose

Video streaming consumption has become a social and economic phenomenon in an age where the share of online entertainment has become larger and larger in the total entertainment pie. Besides the advancement of technology, the pandemic further contributed to its development. The aim of this study is to analyze the role of price consciousness, anti-socializing behavior and choice of content in shaping the video streaming consumption. Furthermore, we look at the moderating role of gender and marital status on the hypothesized relationships.

Design/methodology/approach

The data were collected from a sample of 533 Romanian respondents, and it was processed using Partial Least Square structural equation modeling. In addition, Necessary Condition Analysis was used to assess the necessity effect size of an independent variable for a specific outcome of a dependent variable.

Findings

We find that the main hypotheses are confirmed, and that gender as a moderating variable negatively influences the relationship between anti-socializing behavior and video streaming consumption.

Research limitations/implications

Besides the main findings pertaining to video streaming consumption determinants, psychology scholars concerned about the relationship between anti-socializing behavior and video streaming consumption as a part of the total time spent online could also benefit from the current findings.

Practical implications

The results of this study will be helpful to industry players in designing their video streaming offer after taking into consideration the influence of the discussed variables on the consumption behavior.

Social implications

While anti-socializing behavior drives consumers to a digital environment for which they control the settings, the content being streamed is a cultural product, influenced by society and its consumption immerses the viewer in the cultural mores of the time and place the content was created in or depicts; hence, anti-socializing behavior does not mean a complete break from society, but rather a different instantiation of people’s need to connect with their social environment.

Originality/value

The novelty of this research stands in the integration of anti-socializing behavior as an explanatory factor of video streaming consumption, which has not yet been used in models explaining online consumption so far.

Details

Online Information Review, vol. 48 no. 7
Type: Research Article
ISSN: 1468-4527

Keywords

Access Restricted. View access options
Article
Publication date: 2 August 2021

Mazen El-Masri and Eiman Mutwali Abdelmageed Hussain

Blockchain is evolving to become a platform for securing Internet of things (IoT) ecosystems. Still, challenges remain. The purpose of this literature review is to highlight the…

917

Abstract

Purpose

Blockchain is evolving to become a platform for securing Internet of things (IoT) ecosystems. Still, challenges remain. The purpose of this literature review is to highlight the applicability of blockchain as a medium to secure IoT ecosystems. A two-dimensional framework anchored on (1) IoT layers and (2) security goals is used to organize the existent IoT security threats and their corresponding countermeasures identified in the reviewed literature. The framework helped in mapping the IoT security threats with the inherent features of blockchain and accentuate their prominence to IoT security.

Design/methodology/approach

An approach integrating computerized natural language processing (NLP) with a systematic literature review methodology was adopted. A large corpus of 2,303 titles and abstracts of blockchain articles was programmatically analyzed in order to identify the relevant literature. The identified literature was subjected to a systematic review guided by a well-established method in IS research.

Findings

The literature evidently highlights the prominence of blockchain as a mean to IoT security due to the distinctive features it encompasses. The authors’ investigation revealed that numerous existent threats are better addressed with blockchain than conventional mechanisms. Nevertheless, blockchain consumes resources such as electricity, time, bandwidth and disk space at a rate that is not yet easily accessible to common IoT ecosystems.

Research limitations/implications

Results suggest that a configurational approach that aligns IoT security requirements with the resource requirements of different blockchain features is necessary in order to realize the proper balance between security, efficiency and feasibility.

Practical implications

Practitioners can make use of the classified lists of convention security mechanisms and the IoT threats they address. The framework can help underline the countermeasures that best achieve their security goals. Practitioners can also use the framework to identify the most important features to seek for in a blockchain technology that can help them achieve their security goals.

Originality/value

This study proposes a novel framework that can help classify IoT threats based on the IoT layer impacted and the security goal at risk. Moreover, it applies a combined man-machine approach to systematically analyze the literature.

Details

Journal of Enterprise Information Management, vol. 34 no. 5
Type: Research Article
ISSN: 1741-0398

Keywords

Access Restricted. View access options
Article
Publication date: 8 August 2019

Marieh Khorraminia, Zahra Lesani, Mahdi Ghasvari, Lila Rajabion, Mehdi Darbandi and Alireza Hassani

Nowadays, communications, products, services and costs are customized through the internet technology. The main theory to continue competitiveness in the organizations is customer…

742

Abstract

Purpose

Nowadays, communications, products, services and costs are customized through the internet technology. The main theory to continue competitiveness in the organizations is customer relationship management (CRM). CRM enables organizations to efficiently interact with customers and gather, store and examine their data for providing a complete view of them. On the other hand, the subject of cloud computing has increasingly become the bridge for the success of the CRM implementation. Therefore, this study aims to investigate the impact of cloud computing (new cloud facility, knowledge of information technology (IT), cloud security and cost) on the success of CRM systems.

Design/methodology/approach

The model and the questioners-based data are analyzed using the Smart PLS 3.0. The data were gathered based on 80 employees of three main agricultural companies in Iran.

Findings

The obtained results have indicated that all of the considered factors, new cloud facilities, knowledge of IT, cloud security and cost, play an important role in CRM systems’ success. Also, the evaluation and examination of the consistency and validity of the model are performed through the structural equation model.

Research limitations/implications

First, the authors have conducted a study in a single region. It cannot be guaranteed that the results can be generalized to other regions. Second, for this cross-sectional study, the research design was conducted that showed constant relationships between variables. The research done for this study is cross-sectional. Third, because of time and financial restrictions, the authors have gathered data using a sample from a single location.

Originality/value

Proposing a new model for investigating of the impact of cloud computing (new cloud facility, knowledge of Information Technology (IT), cloud security and cost) on the success of CRM systems is the main originality of this paper.

Details

Digital Policy, Regulation and Governance, vol. 21 no. 5
Type: Research Article
ISSN: 2398-5038

Keywords

Access Restricted. View access options
Article
Publication date: 28 September 2012

Dion Hoe‐Lian Goh, Khasfariyati Razikin, Chei Sian Lee, Ee Peng Lim, Kalyani Chatterjea and Chew Hung Chang

Mobile devices used in educational settings are usually employed within a collaborative learning activity in which learning takes place in the form of social interactions between…

783

Abstract

Purpose

Mobile devices used in educational settings are usually employed within a collaborative learning activity in which learning takes place in the form of social interactions between team members while performing a shared task. The authors aim to introduce MobiTOP (Mobile Tagging of Objects and People), a mobile annotation system that allows users to contribute and share geospatial multimedia annotations via mobile devices.

Design/methodology/approach

Field observations and interviews were conducted. A group of trainee teachers involved in a geography field study were instructed to identify rock formations by collaborating with each other using the MobiTOP system. The trainee teachers who were in the field were guided by their lab counterparts on the tasks required to identify the rock formations.

Findings

Participants were able to appreciate the fieldwork task as it augmented their classroom lessons. The system allowed them to communicate with one another in order to meet the objectives of the study. However, there were some technical difficulties in relation to the affordance of the mobile and web applications that affected the usefulness of the applications.

Originality/value

This study reports the design and implementation of a mobile annotation system that was evaluated in an actual classroom setting. The results of this work have implications for both mobile applications design and mobile learning.

Details

The Electronic Library, vol. 30 no. 5
Type: Research Article
ISSN: 0264-0473

Keywords

Access Restricted. View access options
Article
Publication date: 7 October 2021

Lantian Li and Bahareh Pahlevanzadeh

Cloud eases information processing, but it holds numerous risks, including hacking and confidentiality problems. It puts businesses at risk in terms of data security and…

140

Abstract

Purpose

Cloud eases information processing, but it holds numerous risks, including hacking and confidentiality problems. It puts businesses at risk in terms of data security and compliance. This paper aims to maximize the covered human resource (HR) vulnerabilities and minimize the security costs in the enterprise cloud using a fuzzy-based method and firefly optimization algorithm.

Design/methodology/approach

Cloud computing provides a platform to improve the quality and availability of IT resources. It changes the way people communicate and conduct their businesses. However, some security concerns continue to derail the expansion of cloud-based systems into all parts of human life. Enterprise cloud security is a vital component in ensuring the long-term stability of cloud technology by instilling trust. In this paper, a fuzzy-based method and firefly optimization algorithm are suggested for optimizing HR vulnerabilities while mitigating security expenses in organizational cloud environments. MATLAB is employed as a simulation tool to assess the efficiency of the suggested recommendation algorithm. The suggested approach is based on the firefly algorithm (FA) since it is swift and reduces randomization throughout the lookup for an optimal solution, resulting in improved performance.

Findings

The fuzzy-based method and FA unveil better performance than existing met heuristic algorithms. Using a simulation, all the results are verified. The study findings showed that this method could simulate complex and dynamic security problems in cloud services.

Practical implications

The findings may be utilized to assist the cloud provider or tenant of the cloud infrastructure system in taking appropriate risk mitigation steps.

Originality/value

Using a fuzzy-based method and FA to maximize the covered HR vulnerabilities and minimize the security costs in the enterprise cloud is the main novelty of this paper.

Details

Kybernetes, vol. 51 no. 6
Type: Research Article
ISSN: 0368-492X

Keywords

1 – 10 of over 9000
Per page
102050