Virtual assembly with physical information: a review

2015 ◽  
Vol 35 (3) ◽  
pp. 206-220 ◽  
Author(s):  
Keyan Liu ◽  
Xuyue Yin ◽  
Xiumin Fan ◽  
Qichang He

Purpose – The purpose of this paper is to give a comprehensive survey on the physics-based virtual assembly (PBVA) technology in a novel perspective, to analyze current drawbacks and propose several promising future directions. Design/methodology/approach – To provide a deep insight of PBVA, a discussion of the developing context of PBVA and a comparison against constraint-based virtual assembly (CBVA) is put forward. The core elements and general structure are analyzed based on typical PBVA systems. Some common key issues as well as common drawbacks are discussed, based on which the research trend and several promising future directions are proposed. Findings – Special attention is paid to new research progresses and new ideas concerning recent development as well as new typical systems of the technology. Advantages of PBVA over CBVA are investigated. Based on the analysis of typical PBVA systems and the evolution of PBVA, the core elements of the technology and the general structure of its implementation are identified. Then, current PBVA systems are summarized and classified. After that, key issues in the technology and current drawbacks are explored in detail. Finally, promising future directions are given, including both the further perfecting of the technology and the combination with other technologies. Originality/value – The PBVA technology is put into a detailed review and analysis in a novel way, providing a better insight of both the theory and the implementation of the technology.

Cloud computing is the theoretical basis for future computing. All the global frameworks are now looking up to architecture which is purely based on cloud. Being the core of such a large web of network, it is important to consider the security aspects in a cloud based computing environment. This has resulted in a new research trend on the security issues of cloud. Cloud is a popular paradigm with extreme abilities and benefits for trending ICT environment. On the other end the major concern came in terms of security and privacy while adopting the cloud technology. This article is an effort to cover the challenges in fields like storage, virtualization and communication in cloud .Also it is a try to elaborate relevance of current cryptographic approach in order to increase security of cloud in ICT.


2021 ◽  
Vol ahead-of-print (ahead-of-print) ◽  
Author(s):  
Yaolin Zhou ◽  
Yun Bai ◽  
Yue Zhao

PurposeThis study aims to identify the prominent topics, the distribution and association characteristics of topics and the topic evolutionary trends of Documentary Heritage Preservation and Conservation (DHPAC) research in China.Design/methodology/approachKeywords of relevant papers in China National Knowledge Infrastructure (CNKI) were extracted as the data source in this study. First, frequency and co-occurrence of keywords of the selected papers were obtained by using SATI. Second, co-word network indicators were calculated with the Pajek software. Then, VOSviewer was applied to optimize the visualization of the sub-communities. Finally, a topics evolution map of this research field was implemented by CorTexT.FindingsThe research topics of DHPAC research in China were unbalanced but distinct. Topics of DHPAC research in China possessed inconspicuous orientation and consistency. The core topics had less influence on the overall network. A research system had formed with archival conservation and ancient books conservation as the core research directions. Research in this field had formed four continuous evolutionary paths about ancient books conservation, salvage conservation, archival conservation and archives conservation technology science with topics fusion and differentiation coexisting. Attentions on “ancient books conservation”, “paper relics conservation”, “electronic record”, “digitization”, “minority”, “documents in the republic of China” had increased during the past two decades and new hot topics of DHPAC research kept appearing in China.Originality/valueThis study synthesized and analyzed the research results of DHPAC research in China from a more comprehensive perspective and revealed the topic structure and longitudinal evolution process intuitively with co-word analysis and social network analysis, which can assist researchers to improve research systematization, discover new research directions and seek cooperative research path.


2016 ◽  
Vol 27 (3) ◽  
pp. 398-423 ◽  
Author(s):  
Prakash Bhattarai

Purpose This study aims to explore the conditions that lead to the occurrence of third-party interveners’ coordination in conflict resolution efforts. Design/methodology/approach The studied theme is elaborated by means of an analysis of two case studies: the Maoist armed conflict of Nepal and the Moro conflict of the Philippines. Importantly, this study solicits the views of third-party practitioners and other relevant stakeholders in the field and attempts to demonstrate how they perceive key issues in third-party coordination. Findings Third-party coordination is a contingent process, with varying needs and relevance in different phases and types of conflict. The escalation of violence, issues of international concern such as human rights and the homogeneity of interveners are other core elements that have often played a key role in third-party coordination. Research limitations/implications In the existing literature, there are no such indicator-based explanations regarding the occurrence of third-party coordination; thus, the findings of this research on this particular theme are well-developed and better conceptualized than what has been discussed in the literature to date. Practical implications The analysis undertaken in this study can contribute to the design of better policies and strategies for third-party coordination. Originality/value This study is based on in-depth interviews and interactions with a diverse range of third-party practitioners and other stakeholders working in real-world conflicts, who have perhaps the best understanding of various dimensions of third-party coordination. No previous research has been conducted on this particular theme by incorporating direct interaction with a wide range of interveners from two distinct conflict contexts.


2010 ◽  
Vol 16 (1) ◽  
pp. 78-95 ◽  
Author(s):  
Roderic Alley

Whether they are nationals reporting wars occurring within their countries or international news media staff, journalists are facing growing dangers when covering conflict events. As civilians, they are protected to some extent by international humanitarian law (IHL). But what are these rules and how adequate is such coverage? The article details the core elements of IHL, its relevance for journalists and key issues of implementation and compliance. The news media profession has attempted in the last decade to strengthen normative protections which are discussed. The issue is viewed as one of continuing salience for the Pacific. The article concludes by observing that the issue of protection in combat for journalists is something that the profession has to confront systematically.


2017 ◽  
Vol 30 (2) ◽  
pp. 137-146 ◽  
Author(s):  
Searat Ali

Purpose The purpose of this pitch research letter (PRL) is to apply the pitching template developed by Faff (2015) to an academic project on boardroom gender diversity and default risk. Design/methodology/approach The pitching template helps the pitcher to identify the core elements that form the framework of the research project. The PRL encloses a brief background about the pitcher and pitch, followed by a brief commentary on the pitch and personal reflections of the pitcher on the pitch exercise itself. Findings One of the best aspects of the pitching template is that it forced the researchers to think each item over and over, enabling a synthesis of scattered ideas in a systematic way. Hence, it is strongly recommend learning and applying the pitching template as a tool to refine embryonic research ideas and to track the progress on the research projects. Originality/value This PRL is novel as it highlights the worth of performing the pitching exercise (i.e. quality publication), potential adoptability challenge and solutions (i.e. unfamiliarity and training), systematic process of learning the pitching template and application of the “rule of three” in pitching research. Such reflections are believed to be useful for early career researchers (ECRs).


2014 ◽  
Vol 22 (3) ◽  
pp. 279-308 ◽  
Author(s):  
Mario Silic ◽  
Andrea Back

Purpose – The purpose of this literature review is to analyze current trends in information security and suggest future directions for research. Design/methodology/approach – The authors used literature review to analyze 1,588 papers from 23 journals and 5 conferences. Findings – The authors identified 164 different theories used in 684 publications. Distribution of research methods showed that the subjective-argumentative category accounted for 81 per cent, whereas other methods got very low focus. This research offers implications for future research directions on information security. They also identified existing knowledge gaps and how the existing themes are studied in academia. Research limitations/implications – The literature review did not include some dedicated security journals (i.e. Cryptography). Practical implications – The study reveals future directions and trend that the academia should consider. Originality/value – Information security is top concern for organizations, and this research analyzed how academia dealt with the topic since 1977. Also, the authors suggest future directions for research suggesting new research streams.


2020 ◽  
Vol 25 (4) ◽  
pp. 371-386
Author(s):  
Maiju Kyytsönen ◽  
Marco Tomietto ◽  
Moona Huhtakangas ◽  
Outi Kanste

PurposeThe purpose of this study is to review research on hospital-based shared governance (SG), focussing on its core elements.Design/methodology/approachA scoping review was conducted by searching the Medline (Ovid), CINAHL (EBSCO), Medic, ABI/INFORM Collection (ProQuest) and SveMed+ databases using SG and related concepts in hospital settings as search terms (May 1998–February 2019). Only original research articles examining SG were included. The reference lists of the selected articles were reviewed. Data were extracted from the selected articles by charting and then subjected to a thematic analysis.FindingsThe review included 13 original research articles that examined SG in hospital settings. The studied organizations had implemented SG in different ways, and many struggled to obtain satisfactory results. SG was executed within individual professions or multiple professions and was typically implemented at both unit- and organization-levels. The thematic analysis revealed six core elements of SG as follows: professionalism, shared decision-making, evidence-based practice, continuous quality improvement, collaboration and empowerment.Practical implicationsAn SG framework for hospital settings was developed based on the core elements of SG, the participants and the organizational levels involved. Hospitals considering SG should prepare for a time-consuming process that requires belief in the core elements of SG. The SG framework can be used as a tool to implement and strengthen SG in organizations.Originality/valueThe review resumes the tradition of systematically reviewing SG literature, which had not been done in the 21st century. General tendencies of the research scene and research gaps are pointed out.


Author(s):  
Steve Case ◽  
Phil Johnson ◽  
David Manlow ◽  
Roger Smith ◽  
Kate Williams

This chapter focuses on reflective learning and how it should be used by the criminology student to make the most of his/her degree. It guides the students on how to: engage with a reflective learning approach for enhancing their higher education; identify methods for independent learning in the different levels of higher education; apply reflective learning to their employability; and consider how their personal learning journey could help future directions of study for the discipline of criminology. The chapter encourages the students to do something with their newly acquired criminological knowledge and understanding. It also suggests how the core elements of reflective learning practice can be applied to the student's independent learning and official identity as an undergraduate.


2015 ◽  
Vol 1 (2) ◽  
pp. 99-110 ◽  
Author(s):  
Jane L. Ireland ◽  
Elisabeth Hansen

Purpose – The purpose of this paper is to provide some practice considerations for working with personality disorder, focusing on the application of assessment, formulation and therapy to complex populations such as forensic clients. In addressing this it outlines the concept of a Multi-Modal Integrated Therapy (MMIT) and how this is applied to personality disorder intervention. Design/methodology/approach – The core elements to consider in the provision of an integrated approach are outlined, informed by a review of the relevant literature. The paper does not aim to provide evaluation data but is intended to be a clinical practice document. Findings – The value of integrating the effective components of therapy to address all aspects of working with forensic populations is evidenced. It is argued that appropriate approaches will capture cognitive components (including Early Maladaptive Schemas and also adaptive schemas), Cognitive Analytic Therapeutic approaches and Dialectical Behaviour Therapy components to produce an effective framework to capture the complexities of personality disorder in forensic populations. Practical implications – The paper outlines how a move away from focusing on a single approach to understanding and intervening with personality disorder is key with complex populations, such as those found within forensic settings. The authors argue that practitioners should focus routinely on the importance of integration of principles relevant to personality disorder work. Originality/value – The paper argues for: Adopting a truly multi-modal integrated approach to interventions with personality disorder, highlighting the importance of MMIT. The importance of accounting for complexity in personality presentation in forensic populations and capturing positive as well as negative functioning. The value in identifying what is effective within existing therapies and applying these components as part of a wider package. The core elements of an effective approach are indicated.


2016 ◽  
Vol 30 (6) ◽  
pp. 569-575 ◽  
Author(s):  
Banwari Mittal

Purpose This paper aims to revisit the 1998 paper (“Why do customers switch […]”) published in this journal with the goal of documenting research progress since then and identifying gaps still present in the knowledge base on the relevant key issues. Design/methodology/approach The method is literature review, theoretical scrutiny and critical reflections on the findings of the research studies over the past two decades that deal with customer satisfaction, loyalty and switching behaviors, with particular emphasis on service businesses. Findings The core issue of why satisfaction may not explain loyalty has been examined by positing other co-predictors and moderators of loyalty such as relationship quality, price value, trust, image, etc. These predictors have been found significant, implying that satisfaction is not the only driver of customer loyalty. Additionally, other drivers of switching and staying behavior have been established such as attraction of the alternatives and switching costs, respectively. This paper points out, however, that the gains of the new research literature are attenuated due to assumption of linearity in the loyalty effects of satisfaction and due to a lack of separate analyses of customer segments who defy the satisfaction–loyalty logic. Research limitations/implications The relevant literature is so vast that any account of it within the scope of this paper had to be by design delimited. The paper not only sampled the literature selectively but also summarized the principal findings of the selected papers over-simplistically. Interested readers must get a firsthand read of the reviewed literature. Practical implications The spotlight on the nonlinearity implies that practitioners should analyze customer data separately for customer segments that experience low, moderate and high satisfaction, and also separately for segments that show the expected positive satisfaction–loyalty relationship versus those who would defect despite being satisfied. Originality/value Against the backdrop where most academic as well as industry research had presumed a positive loyalty effect of satisfaction, the 1998 paper drew attention to segments of consumers who exhibited the contrarian loyalty behavior. The present paper shines a light on that topic with even sharper focus, highlighting six unaddressed issues that must frame future research.


Sign in / Sign up

Export Citation Format

Share Document