Examines the fifthteenth published year of the ITCRR. Runs the whole gamut of textile innovation, research and testing, some of which investigates hitherto untouched aspects…
Abstract
Examines the fifthteenth published year of the ITCRR. Runs the whole gamut of textile innovation, research and testing, some of which investigates hitherto untouched aspects. Subjects discussed include cotton fabric processing, asbestos substitutes, textile adjuncts to cardiovascular surgery, wet textile processes, hand evaluation, nanotechnology, thermoplastic composites, robotic ironing, protective clothing (agricultural and industrial), ecological aspects of fibre properties – to name but a few! There would appear to be no limit to the future potential for textile applications.
Details
Keywords
S. Shaikhzadeh Najar, E. Hezavehi, Sh. Hoseini Hashemi and A. Rashidi
The purpose of this paper is to describe a unique approach to investigate the wrinkle force of textile structures in a cylindrical model.
Abstract
Purpose
The purpose of this paper is to describe a unique approach to investigate the wrinkle force of textile structures in a cylindrical model.
Design/methodology/approach
In this research, an apparatus was designed and constructed in order to investigate the torsional and wrinkle behavior of textile structures in a cylindrical model under a different rotational level using data acquisition and micro‐controller systems.
Findings
In the light of research results, the fiber and fabric type, fabric physical and mechanical properties and imposed rotational level significantly contributed to wrinkle characteristics of worsted fabrics. It was noticed that with increase of rotational level, the wrinkle force, and energy increased along weft and warp directions. Wrinkle characteristics along warp direction exhibited greater values than in weft direction.
Originality/value
The study is aimed at determining wrinkle behavior of worsted fabrics under the combined influences of compression and torsional strains.
Details
Keywords
Emadaldin Hezavehi, Saeed Shaikhzadeh Najar, P. Zolgharnein and Hamed Yahya
The purpose of this paper is to analyze the stress‐relaxation behavior of different woven fabrics under constant torsional strain in a wrinkled state. For this purpose, a new…
Abstract
Purpose
The purpose of this paper is to analyze the stress‐relaxation behavior of different woven fabrics under constant torsional strain in a wrinkled state. For this purpose, a new method for determination of stress‐relaxation behavior of the fabric was used while keeping the torsional strain constant.
Design/methodology/approach
In this study, the behavior of stress relaxation of fabric is examined with modification of wrinkle force tester sophisticated electro‐mechanical method and fabricating a device which uses a computer and micro controller, with constant torsional strain by a rotational level of 9.1 turn/m in 280°, and in 300 s.
Findings
The results depict that stress‐relaxation percentage in fabric in weft alignment is more than warp alignment and the fabrics which tolerate more torsional force, possess less stress‐relaxation percentages. In this way, with increasing polyester percentage in fabric the scale of stress‐relaxation percentage decreases. Also, adoption of data derived from experiments with Maxwell model shows that the interlaced model is a suitable model for explaining the stress relaxation decline in fabric. Correlation coefficient of fabrics in weft alignment with Maxwell model is more than warp alignment.
Practical implications
This study has practical implications in the clothing as well as in technical textiles areas.
Originality/value
Knowing visco‐elastic properties is very important. However, there is no information available to study the stress relaxation of woven fabrics under the combined influences of compression and constant torsional strains.
Details
Keywords
Danila Feitosa, Diego Dermeval, Thiago Ávila, Ig Ibert Bittencourt, Bernadette Farias Lóscio and Seiji Isotani
Data providers have been increasingly publishing content as linked data (LD) on the Web. This process includes guidelines (i.e. good practices) to publish, share, and connect data…
Abstract
Purpose
Data providers have been increasingly publishing content as linked data (LD) on the Web. This process includes guidelines (i.e. good practices) to publish, share, and connect data on the Web. Several people in different areas, for instance, sciences, medicine, governments and so on, use these practices to publish data. The LD community has been proposing many practices to aid the publication of data on the Web. However, discovering these practices is a costly and time-consuming task, considering the practices that are produced by the literature. Moreover, the community still lacks a comprehensive understanding of how these practices are used for publishing LD. Thus, the purpose of this paper is to investigate and better understand how best practices support the publication of LD as well as identifying to what extent they have been applied to this field.
Design/methodology/approach
The authors conducted a systematic literature review to identify the primary studies that propose best practices to address the publication of LD, following a predefined review protocol. The authors then identified the motivations for recommending best practices for publishing LD and looked for evidence of the benefits of using such practices. The authors also examined the data formats and areas addressed by the studies as well as the institutions that have been publishing LD.
Findings
In summary, the main findings of this work are: there is empirical evidence of the benefits of using best practices for publishing LD, especially for defining standard practices, integrability and uniformity of LD; most of the studies used RDF as data format; there are many areas interested in dissemination data in a connected way; and there is a great variety of institutions that have published data on the Web.
Originality/value
The results presented in this systematic review can be very useful to the semantic web and LD community, since it gathers pieces of evidence from the primary studies included in the review, forming a body of knowledge regarding the use best practices for publishing LD pointing out interesting opportunities for future research.
Details
Keywords
Ever since Mark Weiser coined the term “ubiquitous computing” (ubicomp) in 1988, there has been a general interest in proposing various solutions that would support his vision…
Abstract
Purpose
Ever since Mark Weiser coined the term “ubiquitous computing” (ubicomp) in 1988, there has been a general interest in proposing various solutions that would support his vision. However, attacks targeting devices and services of a ubicomp environment have demonstrated not only different privacy issues, but also a risk of endangering user’s life (e.g. by modifying medical sensor readings). Thus, the aim of this paper is to provide a comprehensive overview of security challenges of ubicomp environments and the corresponding countermeasures proposed over the past decade.
Design/methodology/approach
The results of this paper are based on a literature review method originally used in evidence-based medicine called systematic literature review (SLR), which identifies, filters, classifies and summarizes the findings.
Findings
Starting from the bibliometric results that clearly show an increasing interest in the topic of ubicomp security worldwide, the findings reveal specific types of attacks and vulnerabilities that have motivated the research over the past decade. This review describes most commonly proposed countermeasures – context-aware access control and authentication mechanisms, cryptographic protocols that account for device’s resource constraints, privacy-preserving mechanisms, and trust mechanisms for wireless ad hoc and sensor networks.
Originality/value
To the best of our knowledge, this is the first SLR on security challenges in ubicomp. The findings should serve as a reference to an extensive list of scientific contributions, as well as a guiding point for the researchers’ novel to the security research in ubicomp.