Guo-yuan Zhang, Jia-qi Dang, Wei-gang Zhao and Xiu-tian Yan
The serious friction and wear problem occurs on the mechanical seal’s faces during the start-up stage of the high-speed turbopump for a liquid rocket engine. This paper aims to…
Abstract
Purpose
The serious friction and wear problem occurs on the mechanical seal’s faces during the start-up stage of the high-speed turbopump for a liquid rocket engine. This paper aims to propose a kind of thick metal alloy coatings on the surface of the seal’s rotor so as reduce the friction and wear.
Design/methodology/approach
With the pin-disk (the graphite pin and the disk with the metal coating) tribology-tester, the tribological behaviors of four metal coatings are investigated. The special friction coefficients under the dry friction, boundary friction and different temperatures of water-lubricated conditions were obtained.
Findings
The test results show that the thick metal coating has a good performance of the wear resistance and friction reduction; and the friction coefficients of a Sn-Sb-Cu coating under the dry friction and water-lubricated conditions are 0.377 and 0.043, respectively, and the corresponding mass wear volumes are only 2.74 and 0.81 mg, respectively.
Originality/value
The thick metal coating scheme for the mechanical seal’s faces might lend itself to the harsh working conditions of the low-viscosity liquid rocket engine.
Details
Keywords
Zhang Guo-yuan, Wei-gang Zhao and Yan Xiu Tian
A new type of hydrostatic and hydrodynamic non-contacting face seals has been designed to meet the requirements of lower leakage, longer life and more repeatedly start and stop on…
Abstract
Purpose
A new type of hydrostatic and hydrodynamic non-contacting face seals has been designed to meet the requirements of lower leakage, longer life and more repeatedly start and stop on shaft seals raised by liquid rocket engine turbopumps. And an experimental study on the performance of the face seal in the actual liquid oxygen turbopump was completed where low-viscosity water was selected as the seal fluid for the sake of safety. The paper aims to discuss these issues.
Design/methodology/approach
Different performances of face seals under preset conditions were obtained by repeatedly running tests, and the main performance parameters encompass leakage, fluid film pressure between the faces, operating power, face temperature, and so on.
Findings
The results indicate that the designed face seal has a smaller amount of leakage, with a minimum value of 3 ml/s. Furthermore, the designed face seal has been proved to demand lower operating power. Since its operating power changes slightly with different sealed fluid pressures, the new seal can be deployed in the harsh working condition with high pressure or with high speed (greater than 20,000 rpm). However, one proviso is that when liquid is employed as the seal fluid, the groove depth should be relatively deeper (greater than 10 μm).
Research limitations/implications
In response to future engineering requirements, study on the controllable spiral-groove face seals to improve the current design is being conducted.
Originality/value
The advancement of such non-contacting face seals proffers important insights to the design of turbo-pump shaft seal in a new generation of liquid rocket engine with regard to the requirement of frequent start and stop as well as long life on it.
Details
Keywords
Abstract
Purpose
The research on social media-based academic communication has made great progress with the development of the mobile Internet era, and while a large number of research results have emerged, clarifying the topology of the knowledge label network (KLN) in this field and showing the development of its knowledge labels and related concepts is one of the issues that must be faced. This study aims to discuss the aforementioned issue.
Design/methodology/approach
From a bibliometric perspective, 5,217 research papers in this field from CNKI from 2011 to 2021 are selected, and the title and abstract of each paper are subjected to subword processing and topic model analysis, and the extended labels are obtained by taking the merged set with the original keywords, so as to construct a conceptually expanded KLN. At the same time, appropriate time window slicing is performed to observe the temporal evolution of the network topology. Specifically, the basic network topological parameters and the complex modal structure are analyzed empirically to explore the evolution pattern and inner mechanism of the KLN in this domain. In addition, the ARIMA time series prediction model is used to further predict and compare the changing trend of network structure among different disciplines, so as to compare the differences among different disciplines.
Findings
The results show that the degree sequence distribution of the KLN is power-law distributed during the growth process, and it performs better in the mature stage of network development, and the network shows more stable scale-free characteristics. At the same time, the network has the characteristics of “short path and high clustering” throughout the time series, which is a typical small-world network. The KLN consists of a small number of hub nodes occupying the core position of the network, while a large number of label nodes are distributed at the periphery of the network and formed around these hub nodes, and its knowledge expansion pattern has a certain retrospective nature. More knowledge label nodes expand from the center to the periphery and have a gradual and stable trend. In addition, there are certain differences between different disciplines, and the research direction or topic of library and information science (LIS) is more refined and deeper than that of journalism and media and computer science. The LIS discipline has shown better development momentum in this field.
Originality/value
KLN is constructed by using extended labels and empirically analyzed by using network frontier conceptual motifs, which reflects the innovation of the study to a certain extent. In future research, the influence of larger-scale network motifs on the structural features and evolutionary mechanisms of KLNs will be further explored.
Details
Keywords
Arnaud Denis, Tatjana Volkova, Simon Grima, Graţiela Georgiana Noja and Mirela Cristea
Current research aims to investigate whether it would be possible to identify all information security policy (ISP) writing styles and how these would influence ISP compliance…
Abstract
Current research aims to investigate whether it would be possible to identify all information security policy (ISP) writing styles and how these would influence ISP compliance. Almost all businesses use ISPs to establish boundaries and require secure behaviour from their employees. Unfortunately, professional surveys and academic research demonstrate a high level of non-compliance with the ISP. While the justification for the employee’s behaviour has been discussed, very few research papers have investigated whether the ISP writing style impacted the intent to comply with ISP. The research methodology incorporates content analysis and a quantitative descriptive review of published papers on ISP and non-IS policy compliance. The theoretical research allowed the identification of five major ISP writing styles: belonging, deterrence, goal, motivation, and specialist, as well as writing style influencers such as timeliness and readability. To achieve a higher level of compliance with the ISP, it was suggested that the writing styles of belonging, goal, and motivation be used primarily. Deterrence is generally discouraged. The study enabled us to determine when ISP writing styles were mentioned and the type of influence on the intent to comply with ISP. It also allowed for comparison and possible differences in ISPs versus standard workplace policies. There are proposals on which writing styles to put forward, along with recommendations on creating an ISP.
Details
Keywords
Forough Nasirpouri Shadbad and David Biros
Since the emergence of the Internet in the twentieth century and the rapid growth of different types of information technologies (IT), our lives, either personal or professional…
Abstract
Since the emergence of the Internet in the twentieth century and the rapid growth of different types of information technologies (IT), our lives, either personal or professional, have become digitised. Adoption and diffusion of IT enhance individuals and organisational performance, yet scholars discovered a dual nature of IT in which IT usage may have negative aspects too. First, the inability to cope with IT in a healthy manner creates stress in users, termed technostress. Second, digitisation and adoption of new technologies (e.g. IoT and multi-cloud environments) have increased vulnerabilities to information security (InfoSec) threats. Although organisations utilise counteraction strategies (e.g., security systems, security policies), end-users remain the top source of security incidents. Existing behavioural research has approached technostress and InfoSec independently. However, it is not clear how technology-stressors influence employees’ security-related behaviours. This chapter reviews the interaction effect of these concepts in detail by proposing a conceptual model that explains that technostress is the main reason for employees’ non-compliance with security policies in which users with high-level perceptions of technostress are more likely to violate InfoSec policies. Counteraction strategies to mitigate technostress and security threats are also discussed.
Details
Keywords
Khurram Shahzad, Shakeel Ahmad Khan and Abid Iqbal
For the provision of smart library services to end users, tools of the Internet of Things (IoT) play a significant role. The study aims to discover the factors influencing the…
Abstract
Purpose
For the provision of smart library services to end users, tools of the Internet of Things (IoT) play a significant role. The study aims to discover the factors influencing the adoption of IoT in university libraries, investigate the impact of IoT on university library services and identify challenges to adopt IoT applications in university libraries.
Design/methodology/approach
A systematic literature review was carried out to address the objectives of the study. The 40 most relevant research papers published in the world’s leading digital databases were selected to conduct the study.
Findings
The findings illustrated that rapid growth in technology, perceived benefits, the networked world and the changing landscape of librarianship positively influenced the adoption of IoT in university libraries. The study also displayed that IoT supported library professionals to initiate smart library services, assisted in service efficiency, offered context-based library services, provided tracking facilities and delivered effective management of library systems. Results also revealed that a lack of technical infrastructure, security and privacy concerns, a lack of technological skills and unavailability of policy and strategic planning caused barriers to the successful adoption of IoT applications in university libraries.
Originality/value
The study has provided theoretical implications through a valuable addition to the current literature. It has also offered managerial implications for policymakers to construct productive policies for the implementation of IoT applications in university libraries for the attainment of fruitful outcomes. Finally, the study provides a baseline for understanding the adoption of IoT in academic libraries.