Abstract
Purpose
The research on social media-based academic communication has made great progress with the development of the mobile Internet era, and while a large number of research results have emerged, clarifying the topology of the knowledge label network (KLN) in this field and showing the development of its knowledge labels and related concepts is one of the issues that must be faced. This study aims to discuss the aforementioned issue.
Design/methodology/approach
From a bibliometric perspective, 5,217 research papers in this field from CNKI from 2011 to 2021 are selected, and the title and abstract of each paper are subjected to subword processing and topic model analysis, and the extended labels are obtained by taking the merged set with the original keywords, so as to construct a conceptually expanded KLN. At the same time, appropriate time window slicing is performed to observe the temporal evolution of the network topology. Specifically, the basic network topological parameters and the complex modal structure are analyzed empirically to explore the evolution pattern and inner mechanism of the KLN in this domain. In addition, the ARIMA time series prediction model is used to further predict and compare the changing trend of network structure among different disciplines, so as to compare the differences among different disciplines.
Findings
The results show that the degree sequence distribution of the KLN is power-law distributed during the growth process, and it performs better in the mature stage of network development, and the network shows more stable scale-free characteristics. At the same time, the network has the characteristics of “short path and high clustering” throughout the time series, which is a typical small-world network. The KLN consists of a small number of hub nodes occupying the core position of the network, while a large number of label nodes are distributed at the periphery of the network and formed around these hub nodes, and its knowledge expansion pattern has a certain retrospective nature. More knowledge label nodes expand from the center to the periphery and have a gradual and stable trend. In addition, there are certain differences between different disciplines, and the research direction or topic of library and information science (LIS) is more refined and deeper than that of journalism and media and computer science. The LIS discipline has shown better development momentum in this field.
Originality/value
KLN is constructed by using extended labels and empirically analyzed by using network frontier conceptual motifs, which reflects the innovation of the study to a certain extent. In future research, the influence of larger-scale network motifs on the structural features and evolutionary mechanisms of KLNs will be further explored.
Details
Keywords
Guo-yuan Zhang, Jia-qi Dang, Wei-gang Zhao and Xiu-tian Yan
The serious friction and wear problem occurs on the mechanical seal’s faces during the start-up stage of the high-speed turbopump for a liquid rocket engine. This paper aims to…
Abstract
Purpose
The serious friction and wear problem occurs on the mechanical seal’s faces during the start-up stage of the high-speed turbopump for a liquid rocket engine. This paper aims to propose a kind of thick metal alloy coatings on the surface of the seal’s rotor so as reduce the friction and wear.
Design/methodology/approach
With the pin-disk (the graphite pin and the disk with the metal coating) tribology-tester, the tribological behaviors of four metal coatings are investigated. The special friction coefficients under the dry friction, boundary friction and different temperatures of water-lubricated conditions were obtained.
Findings
The test results show that the thick metal coating has a good performance of the wear resistance and friction reduction; and the friction coefficients of a Sn-Sb-Cu coating under the dry friction and water-lubricated conditions are 0.377 and 0.043, respectively, and the corresponding mass wear volumes are only 2.74 and 0.81 mg, respectively.
Originality/value
The thick metal coating scheme for the mechanical seal’s faces might lend itself to the harsh working conditions of the low-viscosity liquid rocket engine.
Details
Keywords
Khurram Shahzad, Shakeel Ahmad Khan and Abid Iqbal
For the provision of smart library services to end users, tools of the Internet of Things (IoT) play a significant role. The study aims to discover the factors influencing the…
Abstract
Purpose
For the provision of smart library services to end users, tools of the Internet of Things (IoT) play a significant role. The study aims to discover the factors influencing the adoption of IoT in university libraries, investigate the impact of IoT on university library services and identify challenges to adopt IoT applications in university libraries.
Design/methodology/approach
A systematic literature review was carried out to address the objectives of the study. The 40 most relevant research papers published in the world’s leading digital databases were selected to conduct the study.
Findings
The findings illustrated that rapid growth in technology, perceived benefits, the networked world and the changing landscape of librarianship positively influenced the adoption of IoT in university libraries. The study also displayed that IoT supported library professionals to initiate smart library services, assisted in service efficiency, offered context-based library services, provided tracking facilities and delivered effective management of library systems. Results also revealed that a lack of technical infrastructure, security and privacy concerns, a lack of technological skills and unavailability of policy and strategic planning caused barriers to the successful adoption of IoT applications in university libraries.
Originality/value
The study has provided theoretical implications through a valuable addition to the current literature. It has also offered managerial implications for policymakers to construct productive policies for the implementation of IoT applications in university libraries for the attainment of fruitful outcomes. Finally, the study provides a baseline for understanding the adoption of IoT in academic libraries.
Details
Keywords
Xuezheng Qin, Lixing Li and Yangyang Liu
The purpose of this paper is to estimate the value of a statistical life (VSL) in China using the hedonic wage model, and to explore the regional difference in VSL within the…
Abstract
Purpose
The purpose of this paper is to estimate the value of a statistical life (VSL) in China using the hedonic wage model, and to explore the regional difference in VSL within the country.
Design/methodology/approach
Using the hedonic wage regression, this paper estimates the compensating wage differential for incremental job mortality risk among Chinese workers. The implied VSL is derived for China and its different regions. The data is from the 2005 China inter‐census population survey, consisting of 1.3 million urban and rural workers. The authors also made important improvement in the model specification to explicitly address the missing variable issue in the previous studies.
Findings
The paper results indicate that the industry mortality risk has a significant impact on the wage rate. The implied VSL is 1.81 million RMB, a value substantially higher than previous estimates. The results also suggest a sizable urban‐rural difference, with the urban VSL being 4.3 times higher than the rural estimate. The strong urban‐rural inequality of income could be attributed to the segregation between the urban and rural labor markets.
Practical implications
The paper findings indicate the importance of reforming the current workers' compensation standard and improving the institutional environment, as well as enhancing the labor protection in the rural labor market.
Originality/value
This paper is the first attempt to estimate the value of life in China using the census based data. The paper results contribute to the growing literature in obtaining comparable VSL estimates in the developing countries.
Details
Keywords
Wei Yuan, Nannan Wang, Qianjian Guo, Wenhua Wang, Baotao Chi, Angang Yan and Jie Yu
The high-load operation of the engine crankshaft causes severe wear and fatigue. This study aims to prepare in situ textures with effective density and study their wear mechanism…
Abstract
Purpose
The high-load operation of the engine crankshaft causes severe wear and fatigue. This study aims to prepare in situ textures with effective density and study their wear mechanism on the surface of ductile cast iron, which optimizes the tribological properties of engine crankshafts and reduces wear.
Design/methodology/approach
A new method was proposed based on the hardness difference in graphite removal to form an in situ texture. The friction performance was evaluated using a combination of computational fluid dynamics and tribological testings. The influence of the texture characteristic parameters on the bearing capacity of the oil film was analyzed. The surface wear morphology was studied by scanning electron microscopy.
Findings
The texture density significantly affected the oil film bearing capacity. The surface texture can reduce the average friction coefficient (COF) by more than 35% owing to the oil film bearing and storage capacity. Specifically, the 13% texture density exhibited the lowest wear rate and COF under all three experimental conditions. The reduction in abrasive particles in the wear area of the textured surface indicates that the surface texture can improve the lubrication mechanism.
Originality/value
This study systematically explored the influence of the weight of each model parameter on tribological properties. Subsequently, focusing on the critical parameter (texture density), detailed tribological testings were carried out to reveal the specific effect of texture density on the wear mechanism under different working conditions, and the optimal texture density to achieve the optimal tribological performance was determined accordingly.
Details
Keywords
Shufeng Tang, Jingfang Ji, Yun Zhi, Wei Yuan, Hong Chang, Xin Wang and Xiaodong Guo
Continuum robots offer unique advantages in various specialized environments, particularly in confined or hard-to-reach spaces. Inverse kinematics and real-time shape estimation…
Abstract
Purpose
Continuum robots offer unique advantages in various specialized environments, particularly in confined or hard-to-reach spaces. Inverse kinematics and real-time shape estimation constitute crucial aspects of closed-loop control for continuum robots, presenting challenging problems. This paper aims to present an inverse kinematics and shape reconstruction method, which relies solely on the knowledge of base and end positions and orientations.
Design/methodology/approach
Based on the constant curvature assumption, continuum robots are regarded as spatial curves composed of circular arcs. Using geometric relationships, the mathematical relationships between the arc chords, points on the bisecting plane and the coordinate axes are established. On this basis, the analytical solution of the inverse kinematics of the continuum robots is derived. Using the positions and orientations of the base and end of the continuum robots, the Levenberg–Marquardt algorithm is used to solve the positions of the cubic Bezier curves, and a new method of spatial shape reconstruction of continuum robots is proposed.
Findings
The inverse kinematics and spatial shape reconstruction simulation of the continuum robot are carried out, and the spatial shape measurement experimental platform for the continuum robot is constructed to compare the measured and reconstructed spatial shapes. The results show that the maximum relative error between the actual shape and the reconstructed shape of the continuum robot is 2.08%, which verifies the inverse kinematics and shape reconstruction model. Additionally, when the bending angle of a single bending section of the continuum robot is less than 135°, the shape reconstruction accuracy is higher.
Originality/value
The proposed inverse kinematics solution method avoids iterative solving, and the shape reconstruction model does not rely on mechanical models. It has the advantages of being simple to solve, highly accurate and fast in computation, making it suitable for real-time control of continuum robots.
Details
Keywords
Jiazhi Miao, Yongqing Li, Xiang Rao, Libao Zhu, Zhiwei Guo and Chengqing Yuan
The emission from marine engines has a crucial effect on energy economy and environment pollution. One of the effective emission reduction schemes is to minimize the friction loss…
Abstract
Purpose
The emission from marine engines has a crucial effect on energy economy and environment pollution. One of the effective emission reduction schemes is to minimize the friction loss of main friction pairs such as cylinder liner-piston ring (CLPR). Micro-groove textures were designed to accomplish this aim.
Design/methodology/approach
The authors experimentally investigated the effects of micro-groove textures at different cylinder liner positions. The micro-groove texture was fabricated on samples by chemical etching and cut from the real CLPR pair. Sliding contact tests were conducted by a reciprocation test apparatus.
Findings
The average friction coefficient of grooves at 30° inclination were reduced up to 58.22% and produced better tribological behavior at most conditions. The operating condition was the critical factor that determined the optimum texture pattern. The surface morphology indicated that textures could produce smoother surfaces and less scratches as compared with the untextured surface.
Originality/value
Inclined grooves and V-grooves were designed and applied to real CLPR pairs. The knowledge obtained in this study will lead to practical basis for tribological design and manufacturing of CLPR pair in marine diesel engines.
Details
Keywords
Zhengchuan Xu and Ken Guo
Human factor is often cited as one of the biggest challenges for organizational information security management. The purpose of this paper is to investigate how and why employees…
Abstract
Purpose
Human factor is often cited as one of the biggest challenges for organizational information security management. The purpose of this paper is to investigate how and why employees fail to carry out required security tasks.
Design/methodology/approach
On the basis of coping theory, this paper develops a theoretical model to examine employee effortful security behavior (ESB). The model is tested with the data collected through a survey of computer users.
Findings
The results suggest that employee procrastination of security tasks and psychological detachment from security issues are two antecedents of ESB. Psychological detachment and procrastination are in turn influenced by perceived externalities of security risk and triage of business tasks over security issues by employees.
Originality/value
This paper contributes to the information systems security literature by providing a nuanced understanding of the antecedents and process of how employees cope with security task demands. It also offers some insights for practitioners in terms of the importance of designing and implementing security measures that are viewed as relevant to employees.
Details
Keywords
The purpose of this paper is to investigate the effectiveness of GM(1,1) model on linear growth sequences (LGS) by random experiments and global primary energy consumption is…
Abstract
Purpose
The purpose of this paper is to investigate the effectiveness of GM(1,1) model on linear growth sequences (LGS) by random experiments and global primary energy consumption is predicted as by the GM(1,1) and the autoregressive integrated moving average (ARIMA) model, which is used as a reference.
Design/methodology/approach
LGS generated randomly are used for GM(1,1) modeling. The results of the massive repeated random experiments are analyzed to test the effectiveness of the GM(1,1) model and global primary energy consumption is predicted using the GM(1,1) model and the ARIMA model.
Findings
The use of the GM(1,1) model is effective when used for a LGS and the model is proven to be reliable by the experiments. Global primary energy consumption is predicted with the GM(1,1) model and the ARIMA model as a case study, and the results show that GM(1,1) is quite good. Global primary energy consumption will increase by 1.03 percent in 2016.
Originality/value
The contribution of this paper includes the following: first, the applicability of the GM (1,1) model is further discussed with random experiments and it is feasible for a LGS; second, random experiments provide good proof that four data are enough for GM(1,1) modeling, and GM(1,1) model is reliable; third, prediction by using GM(1,1) model with small data is even better than time-series analysis in the case study.
Details
Keywords
Forough Nasirpouri Shadbad and David Biros
Since the emergence of the Internet in the twentieth century and the rapid growth of different types of information technologies (IT), our lives, either personal or professional…
Abstract
Since the emergence of the Internet in the twentieth century and the rapid growth of different types of information technologies (IT), our lives, either personal or professional, have become digitised. Adoption and diffusion of IT enhance individuals and organisational performance, yet scholars discovered a dual nature of IT in which IT usage may have negative aspects too. First, the inability to cope with IT in a healthy manner creates stress in users, termed technostress. Second, digitisation and adoption of new technologies (e.g. IoT and multi-cloud environments) have increased vulnerabilities to information security (InfoSec) threats. Although organisations utilise counteraction strategies (e.g., security systems, security policies), end-users remain the top source of security incidents. Existing behavioural research has approached technostress and InfoSec independently. However, it is not clear how technology-stressors influence employees’ security-related behaviours. This chapter reviews the interaction effect of these concepts in detail by proposing a conceptual model that explains that technostress is the main reason for employees’ non-compliance with security policies in which users with high-level perceptions of technostress are more likely to violate InfoSec policies. Counteraction strategies to mitigate technostress and security threats are also discussed.