Chang-E Zhou, Haidan Niu, Qing Zhang, Huixia Li, Chi Wai Kan, Chang Sun, Jinmei Du and Changhai Xu
This paper aims to prepare an associative thickener base on two polyacrylate-based copolymers, which can be used for digital printing of nylon carpet with enhanced performance.
Abstract
Purpose
This paper aims to prepare an associative thickener base on two polyacrylate-based copolymers, which can be used for digital printing of nylon carpet with enhanced performance.
Design/methodology/approach
An associative thickener was prepared by compounding two polyacrylate-based copolymers, cationic starch and polyacrylic acid; and mediated by polyethylene glycol and polyacrylamide crosslinker. The formulation of the associative thickener was optimized by using the orthogonal array testing strategy. The stability of the associative thickener was investigated by measuring effects of temperature, electrolytes, storage time and auxiliaries on viscosity. The associative thickener was compared with a commercial thickener by evaluating their performance in digital printing of nylon carpet.
Findings
The associative thickener provided same color strength and fastness in the printing of nylon carpet as the commercial one, but was more easily washed off for a better hand feeling of the printed carpet.
Practical implications
The prepared associative thickener can be applied for digital printing of nylon carpet.
Originality/value
The associative thickener can be facilely prepared from commercially available chemicals and suitable for digital printing of nylon carpet.
Details
Keywords
Wen‐Jer Chang, Cheung‐Chieh Ku and Wei Chang
The purpose of this paper is to propose a stability analysis and control synthesis for achieving passivity properties of a class of continuous‐time nonlinear systems. These…
Abstract
Purpose
The purpose of this paper is to propose a stability analysis and control synthesis for achieving passivity properties of a class of continuous‐time nonlinear systems. These nonlinear systems are represented via continuous affine Takagi‐Sugeno (T‐S) fuzzy models, which played an important role in nonlinear control systems. The affine T‐S fuzzy models are more approximate than homogeneous T‐S fuzzy models for modeling nonlinear systems. Using the energy concept of passivity theory with Lyapunov function, the conditions are derived to ensure the passivity and stability of nonlinear systems. Based on the parallel distribution compensation (PDC) technique, this paper proposes a fuzzy controller design approach to achieve the passivity and stability for the continuous affine T‐S fuzzy systems.
Design/methodology/approach
For solving stability and stabilization problems of affine T‐S fuzzy models, the conversion techniques and passive theory are employed to derive the stability conditions. By applying the linear matrix inequality technique, a modified iterative linear matrix inequality algorithm is proposed to determine and update the auxiliary variables for finding feasible solutions of these stability conditions.
Findings
By studying the numerical example, the proposed design technique of this paper is an effectiveness and useful approach to design the PDC‐based fuzzy controller. From the simulation results, the considered nonlinear system with external disturbances driven by proposed design fuzzy controller is stable and strictly input passive.
Originality/value
This paper is interesting for designing fuzzy controller to guarantee the stability and strict input passivity of affine T‐S fuzzy models.
Details
Keywords
The functionality and reliability of an overhauled aero-engine is determined by all configuration changes in the overhaul process. Identifying, recording, auditing, tracking and…
Abstract
Purpose
The functionality and reliability of an overhauled aero-engine is determined by all configuration changes in the overhaul process. Identifying, recording, auditing, tracking and tracing of configuration modifications are significant and meaningful. Considering the barriers to these goals, this paper aims to put forward an approach to configuration management in the aero-engine overhaul process.
Design/methodology/approach
The overhaul configuration management model is proposed to describe an aero-engine’s configuration evolution trajectory in the overhaul process. The controlling and auditing procedures are put forward to control and audit parts’ return-to-zero statuses and overproof statuses. And some searching algorithms are also designed to enable tracking and tracing of the configuration status along the time coordinate, or get a snapshot of an aero-engine’s configuration at a certain time. The above model, procedures and algorithms have been implemented and adopted to fulfill the configuration management requirements in the aero-engine overhaul process.
Findings
The approach is effective in identifying, recording, controlling, auditing, tracking and tracing configuration changes in the overhaul process.
Practical implications
The approach’s implementation and adoption present a practical example for aero-engines’ configuration management issue in the overhaul process.
Originality/value
The work proposes an original aero-engine configuration management solution for the overhaul process and enables a reliable and accurate configuration management mode.
Details
Keywords
Recent accounting literature and Agency theory have predicted that corporate governance assists the convergence of interests between shareholders and managers, and thus enhances…
Abstract
Recent accounting literature and Agency theory have predicted that corporate governance assists the convergence of interests between shareholders and managers, and thus enhances the quality of financial reporting. This chapter discusses some of the empirical studies on corporate governance in Saudi Arabia; it also elaborates on the corporate governance regulations introduced by Capital Market Authority in Saudi Arabia. Studies cover various subjects that interact with corporate governance, such as earnings management, corporate social responsibility disclosure, ownership structure, environmental disclosure and voluntary disclosure in annual reports of Saudi's listed firms. It also discusses the effectiveness and determinants of corporate governance structures, such as the board of directors, audit committee and other sub-committees. Results were generally in line with previous research from the developed countries, but sometimes there are contradictions, and these results have been discussed and explained, and implications to regulators and investors are drawn where possible.
Details
Keywords
Ya-Peng Jia, Wan-Chang Sun, Yan Xiao, Jing-Pei Liu, Cong-Xiao Zhang, Tong-Qiang Zhang and Ze-Feng Hou
This paper aims to research the effect of different concentrations for Nd(NO3)3 and Ce(NO3)3 on the microstructures and corrosion resistance of Ni-W-P composite coatings through…
Abstract
Purpose
This paper aims to research the effect of different concentrations for Nd(NO3)3 and Ce(NO3)3 on the microstructures and corrosion resistance of Ni-W-P composite coatings through electroless plating method.
Design/methodology/approach
Scanning electron microscope, attached energy dispersive spectroscopy system and X-ray diffraction were used in this work. Meanwhile, the immersion test and electrochemical tests were used to characterize the corrosion behavior of the coating.
Findings
The coatings prepared at 1.00 g·L−1 Nd(NO3)3 exhibit a dense structure and high phosphorus content (12.38 wt.%). In addition, compared to the addition of Ce(NO3)3, when Nd(NO3)3 was introduced at a concentration of 1.00 g·L−1, the minimum corrosion rate of the coating was 1.209 g·m−2·h−1, with a noble Ecorr (−0.29 V) and lower Icorr (8.29 × 10−4 A·cm−2).
Originality/value
The effects of rare earths on the deposition and corrosion resistance mechanisms of Ni-W-P composite coatings were explored, with the rare earth elements promoting the deposition of nickel and tungsten atoms. Simultaneously, the amorphization of the coating increases, which excellently enhances the corrosion resistance of the coating.
Details
Keywords
Hasnan Baber, Mina Fanea-Ivanovici, Marius-Cristian Pana and Alina Magdalena Manole
Video streaming consumption has become a social and economic phenomenon in an age where the share of online entertainment has become larger and larger in the total entertainment…
Abstract
Purpose
Video streaming consumption has become a social and economic phenomenon in an age where the share of online entertainment has become larger and larger in the total entertainment pie. Besides the advancement of technology, the pandemic further contributed to its development. The aim of this study is to analyze the role of price consciousness, anti-socializing behavior and choice of content in shaping the video streaming consumption. Furthermore, we look at the moderating role of gender and marital status on the hypothesized relationships.
Design/methodology/approach
The data were collected from a sample of 533 Romanian respondents, and it was processed using Partial Least Square structural equation modeling. In addition, Necessary Condition Analysis was used to assess the necessity effect size of an independent variable for a specific outcome of a dependent variable.
Findings
We find that the main hypotheses are confirmed, and that gender as a moderating variable negatively influences the relationship between anti-socializing behavior and video streaming consumption.
Research limitations/implications
Besides the main findings pertaining to video streaming consumption determinants, psychology scholars concerned about the relationship between anti-socializing behavior and video streaming consumption as a part of the total time spent online could also benefit from the current findings.
Practical implications
The results of this study will be helpful to industry players in designing their video streaming offer after taking into consideration the influence of the discussed variables on the consumption behavior.
Social implications
While anti-socializing behavior drives consumers to a digital environment for which they control the settings, the content being streamed is a cultural product, influenced by society and its consumption immerses the viewer in the cultural mores of the time and place the content was created in or depicts; hence, anti-socializing behavior does not mean a complete break from society, but rather a different instantiation of people’s need to connect with their social environment.
Originality/value
The novelty of this research stands in the integration of anti-socializing behavior as an explanatory factor of video streaming consumption, which has not yet been used in models explaining online consumption so far.
Details
Keywords
Mazen El-Masri and Eiman Mutwali Abdelmageed Hussain
Blockchain is evolving to become a platform for securing Internet of things (IoT) ecosystems. Still, challenges remain. The purpose of this literature review is to highlight the…
Abstract
Purpose
Blockchain is evolving to become a platform for securing Internet of things (IoT) ecosystems. Still, challenges remain. The purpose of this literature review is to highlight the applicability of blockchain as a medium to secure IoT ecosystems. A two-dimensional framework anchored on (1) IoT layers and (2) security goals is used to organize the existent IoT security threats and their corresponding countermeasures identified in the reviewed literature. The framework helped in mapping the IoT security threats with the inherent features of blockchain and accentuate their prominence to IoT security.
Design/methodology/approach
An approach integrating computerized natural language processing (NLP) with a systematic literature review methodology was adopted. A large corpus of 2,303 titles and abstracts of blockchain articles was programmatically analyzed in order to identify the relevant literature. The identified literature was subjected to a systematic review guided by a well-established method in IS research.
Findings
The literature evidently highlights the prominence of blockchain as a mean to IoT security due to the distinctive features it encompasses. The authors’ investigation revealed that numerous existent threats are better addressed with blockchain than conventional mechanisms. Nevertheless, blockchain consumes resources such as electricity, time, bandwidth and disk space at a rate that is not yet easily accessible to common IoT ecosystems.
Research limitations/implications
Results suggest that a configurational approach that aligns IoT security requirements with the resource requirements of different blockchain features is necessary in order to realize the proper balance between security, efficiency and feasibility.
Practical implications
Practitioners can make use of the classified lists of convention security mechanisms and the IoT threats they address. The framework can help underline the countermeasures that best achieve their security goals. Practitioners can also use the framework to identify the most important features to seek for in a blockchain technology that can help them achieve their security goals.
Originality/value
This study proposes a novel framework that can help classify IoT threats based on the IoT layer impacted and the security goal at risk. Moreover, it applies a combined man-machine approach to systematically analyze the literature.
Details
Keywords
Marieh Khorraminia, Zahra Lesani, Mahdi Ghasvari, Lila Rajabion, Mehdi Darbandi and Alireza Hassani
Nowadays, communications, products, services and costs are customized through the internet technology. The main theory to continue competitiveness in the organizations is customer…
Abstract
Purpose
Nowadays, communications, products, services and costs are customized through the internet technology. The main theory to continue competitiveness in the organizations is customer relationship management (CRM). CRM enables organizations to efficiently interact with customers and gather, store and examine their data for providing a complete view of them. On the other hand, the subject of cloud computing has increasingly become the bridge for the success of the CRM implementation. Therefore, this study aims to investigate the impact of cloud computing (new cloud facility, knowledge of information technology (IT), cloud security and cost) on the success of CRM systems.
Design/methodology/approach
The model and the questioners-based data are analyzed using the Smart PLS 3.0. The data were gathered based on 80 employees of three main agricultural companies in Iran.
Findings
The obtained results have indicated that all of the considered factors, new cloud facilities, knowledge of IT, cloud security and cost, play an important role in CRM systems’ success. Also, the evaluation and examination of the consistency and validity of the model are performed through the structural equation model.
Research limitations/implications
First, the authors have conducted a study in a single region. It cannot be guaranteed that the results can be generalized to other regions. Second, for this cross-sectional study, the research design was conducted that showed constant relationships between variables. The research done for this study is cross-sectional. Third, because of time and financial restrictions, the authors have gathered data using a sample from a single location.
Originality/value
Proposing a new model for investigating of the impact of cloud computing (new cloud facility, knowledge of Information Technology (IT), cloud security and cost) on the success of CRM systems is the main originality of this paper.
Details
Keywords
Dion Hoe‐Lian Goh, Khasfariyati Razikin, Chei Sian Lee, Ee Peng Lim, Kalyani Chatterjea and Chew Hung Chang
Mobile devices used in educational settings are usually employed within a collaborative learning activity in which learning takes place in the form of social interactions between…
Abstract
Purpose
Mobile devices used in educational settings are usually employed within a collaborative learning activity in which learning takes place in the form of social interactions between team members while performing a shared task. The authors aim to introduce MobiTOP (Mobile Tagging of Objects and People), a mobile annotation system that allows users to contribute and share geospatial multimedia annotations via mobile devices.
Design/methodology/approach
Field observations and interviews were conducted. A group of trainee teachers involved in a geography field study were instructed to identify rock formations by collaborating with each other using the MobiTOP system. The trainee teachers who were in the field were guided by their lab counterparts on the tasks required to identify the rock formations.
Findings
Participants were able to appreciate the fieldwork task as it augmented their classroom lessons. The system allowed them to communicate with one another in order to meet the objectives of the study. However, there were some technical difficulties in relation to the affordance of the mobile and web applications that affected the usefulness of the applications.
Originality/value
This study reports the design and implementation of a mobile annotation system that was evaluated in an actual classroom setting. The results of this work have implications for both mobile applications design and mobile learning.
Details
Keywords
Lantian Li and Bahareh Pahlevanzadeh
Cloud eases information processing, but it holds numerous risks, including hacking and confidentiality problems. It puts businesses at risk in terms of data security and…
Abstract
Purpose
Cloud eases information processing, but it holds numerous risks, including hacking and confidentiality problems. It puts businesses at risk in terms of data security and compliance. This paper aims to maximize the covered human resource (HR) vulnerabilities and minimize the security costs in the enterprise cloud using a fuzzy-based method and firefly optimization algorithm.
Design/methodology/approach
Cloud computing provides a platform to improve the quality and availability of IT resources. It changes the way people communicate and conduct their businesses. However, some security concerns continue to derail the expansion of cloud-based systems into all parts of human life. Enterprise cloud security is a vital component in ensuring the long-term stability of cloud technology by instilling trust. In this paper, a fuzzy-based method and firefly optimization algorithm are suggested for optimizing HR vulnerabilities while mitigating security expenses in organizational cloud environments. MATLAB is employed as a simulation tool to assess the efficiency of the suggested recommendation algorithm. The suggested approach is based on the firefly algorithm (FA) since it is swift and reduces randomization throughout the lookup for an optimal solution, resulting in improved performance.
Findings
The fuzzy-based method and FA unveil better performance than existing met heuristic algorithms. Using a simulation, all the results are verified. The study findings showed that this method could simulate complex and dynamic security problems in cloud services.
Practical implications
The findings may be utilized to assist the cloud provider or tenant of the cloud infrastructure system in taking appropriate risk mitigation steps.
Originality/value
Using a fuzzy-based method and FA to maximize the covered HR vulnerabilities and minimize the security costs in the enterprise cloud is the main novelty of this paper.