Numerical simulation and verification of MHD-vortex

Author(s):  
Maxim Khatsayuk ◽  
Viktor Timofeev ◽  
Viktor Demidovich

Purpose The purpose of this study is research and development of the magnetohydrodynamics (MHD)-vortex technology. Design/methodology/approach The main instruments of research are mathematical modeling. For mathematical modeling used numerical and analytical both methods. For verification was made small copy of facility with forming of vortex in rotating magnetic field. Findings The design and manufacture of the industrial unit for melting small metal waste in a gas-fired smelt furnace has been completed. Originality/value Here shows new algorithm for engineering calculation of arc induction systems with take into account longitudinal edge effect and discrete distribution of current layers. Also shows verification of numerical results. Presented new MHD-technology for forming vortex in electromagnetic field.

2016 ◽  
Vol 29 (4) ◽  
pp. 688-716 ◽  
Author(s):  
Thomas Chesney ◽  
Swee-Hoon Chuah ◽  
Robert Hoffmann ◽  
Wendy Hui ◽  
Jeremy Larner

Purpose The purpose of this paper is to study the influence of user personality and vlaues on the number of connections users make, the number of requests for connections that users give out, and the number of connections invitations users receive. Design/methodology/approach This is a field study of 179 participants interacting in a novel virtual world. The world’s server logs are used to capture sociometrics about the users and their interaction. Findings Findings suggest that personality and values influence the number of friends users make and the number of friendship requests users give out, but not the number of friendship invitations users receive. Only one personality trait – conscientiousness – exhibits homophily. Originality/value Perosnality and social value orientation have rarely been studied together in information systems (IS) research, despite research showing the two have an impact on IS relevant constructs. The use of server logs for data capture is novel. Avatar friendship is an under-researched concept in IS.


2020 ◽  
Vol 33 (6) ◽  
pp. 1515-1541
Author(s):  
Roger Clarke ◽  
Robert M. Davison ◽  
Wanying Jia

PurposeThe purpose of this paper is to explore the nature of “researcher perspective” in articles published in the AIS Basket of 8 journals.Design/methodology/approachPurposive sampling: descriptive analysis of 659 articles published in three complete years of each of the eight leading journals (2001, 2008, 2015).FindingsWhen observing phenomena, IS researchers mostly adopt the perspective of one of the stakeholders in the activities, commonly that of the sponsor of the information system that is in focus. 96% of relevant articles adopted a single-perspective approach, and 93% of those were oriented towards the system sponsor.Research limitations/implicationsThe discipline has not been exploiting opportunities to deliver greater value firstly through the adoption of perspectives other than that of the system sponsor, and secondly through dual- and multi-perspective research. Further, the ignoring of the viewpoints of other stakeholders is inconsistent with the requirements of the recently-adopted AIS Code of Ethics.Practical implicationsThe dominance of single-perspective/system-sponsor-viewpoint research greatly constrains the benefits that IS research can deliver to IS practitioners and to the world at large.Originality/valueThe authors are not aware of any prior investigation into the nature of researcher perspective. We contend that an appreciation of the current bias is essential if IS research is to adapt, and thereby make far more useful contributions to practice.


2018 ◽  
Vol 31 (1) ◽  
pp. 111-133 ◽  
Author(s):  
Netta Iivari

Purpose In recent years, there has been a growing desire to more fully integrate informants into the overall research process. In response to this trend, the purpose of this paper is to scrutinize the usage and outcomes of the member checking technique for enabling more participatory interpretive research practices. Information systems (IS) research has utilized this technique, but it has not yet undergone a thorough analysis in this context. Additionally, interpretive IS research is in need of means and tools for engaging with informants during the data analysis and interpretation process. Design/methodology/approach The data for this study originated from an inquiry into the position of usability work within its cultural context, and this study has adopted a hermeneutic lens to make sense of the member checking technique, which positions informants as co-analysts and co-interpreters to make sense of both their organizational realities and researchers’ interpretations of those realities. Findings The analysis shows that during the research process, the informants reproduced, questioned, and cultivated the researcher-crafted texts that they were given to interpret, both individually and collaboratively. The study shows that member checking contributes to fulfilling the criteria set for interpretive IS research in a variety of ways. Research limitations/implications The study contributes to interpretive IS research method practice by offering IS researchers insights into and guidelines on the usage and potential outcomes of the member checking technique. Originality/value The examination of the member checking technique through a hermeneutic lens is a novel approach. For IS research, the study explicates the usages and outcomes of member checking in more participatory interpretive research practice. Also novel in this study is that member checking is examined as a collective endeavor.


2006 ◽  
Vol 19 (1) ◽  
pp. 5-11 ◽  
Author(s):  
Edoardo Jacucci ◽  
Ole Hanseth ◽  
Kalle Lyytinen

PurposeTo give an overview of the papers contained in this Special Issue.Design/methodology/approachLooks at how each of the papers reflects the theme of the Special Issue, “Complexity and IT design and evolution”.FindingsThe collection of papers in this Special Issue addresses complexity, drawing on multi‐faceted, multi‐theoretical lines of inquiry.Originality/valueFrameworks from complexity science, institutional theory, social science, philosophy, and recent thinking in science and technology studies (STS) are used as theoretical lenses to conceptualize and analyze complexity in IS and to offer ways to mitigate it.


2019 ◽  
Vol 22 (1) ◽  
pp. 5-8
Author(s):  
Ian Cummins

Purpose The purpose of this paper is to discuss the recent National Appropriate Adult Network (NAAN) report on the role of the appropriate adult. Design/methodology/approach This paper is based on the NAAN report and a review of relevant policy and research literature. Findings There to Help 2 highlights that there are still significant gaps in the provision of appropriate adult schemes across England and Wales. These gaps potentially place vulnerable adults at increased risk. Originality/value This paper is a review of recent research.


2019 ◽  
Vol 41 (4) ◽  
pp. 740-757 ◽  
Author(s):  
Sophie Hennekam ◽  
Subramaniam Ananthram ◽  
Steve McKenna

Purpose The purpose of this paper is to investigate how individuals perceive and react to the involuntary demotion of a co-worker in their organisation. Design/methodology/approach The authors draw on 46 semi-structured in-depth interviews (23 dyads) with co-workers of demoted individuals. Findings The findings suggest that an individual’s observation of the demotion of a co-worker has three stages: their perception of fairness, their emotional reaction and their behavioural reaction. The perception of fairness concerned issues of distributive, procedural, interpersonal and informational justice. The emotional responses identified were feelings of disappointment/disillusion, uncertainty, vulnerability and anger. Finally, the behavioural reactions triggered by their emotional responses included expressions of voice, loyalty, exit and adaptation. Originality/value Perceptions of (in)justice perpetrated on others stimulate emotional and behavioural responses, which impacts organisational functioning. Managers should therefore pay attention to the way a demotion is perceived, not only by those directly concerned, but also by co-workers as observers.


2019 ◽  
Vol 32 (4) ◽  
pp. 455-471
Author(s):  
Jorge Cruz-Cárdenas ◽  
Jorge Guadalupe-Lanas ◽  
Ekaterina Zabelina ◽  
Andrés Palacio-Fierro ◽  
Margarita Velín-Fárez ◽  
...  

Purpose The purpose of this paper is to understand in-depth how consumers create value in their lives using WhatsApp, the leading mobile instant messaging (MIM) application. Design/methodology/approach The study adopts the perspective of customer-dominant logic (CDL) and uses a qualitative multimethod design involving 3 focus groups and 25 subsequent in-depth interviews. The research setting was Ecuador, a Latin American country. Findings Analysis and interpretation of the participants’ stories made it possible to identify and understand the creation of four types of value: maintaining and strengthening relationships; improving role performance; emotional support; and entertainment and fun. In addition, the present study proposes a conceptual model of consumer value creation as it applies to MIM. Practical implications Understanding the way consumers create value in their lives using MIM is important not only for organizations that offer MIM applications, but also for those companies that develop other applications for mobile phones or for those who wish to use MIM as an electronic word-of-mouth vehicle. Originality/value The current study is one of the first to address the topic of consumer behavior in the use of technologies from the perspective of CDL; this perspective enables an integrated qualitative vision of value creation in which the consumer is the protagonist.


2019 ◽  
Vol 25 (3) ◽  
pp. 378-396 ◽  
Author(s):  
Arian Razmi-Farooji ◽  
Hanna Kropsu-Vehkaperä ◽  
Janne Härkönen ◽  
Harri Haapasalo

Purpose The purpose of this paper is twofold: first, to understand data management challenges in e-maintenance systems from a holistically viewpoint through summarizing the earlier scattered research in the field, and second, to present a conceptual approach for addressing these challenges in practice. Design/methodology/approach The study is realized as a combination of a literature review and by the means of analyzing the practices on an industry leader in manufacturing and maintenance services. Findings This research provides a general understanding over data management challenges in e-maintenance and summarizes their associated proposed solutions. In addition, this paper lists and exemplifies different types and sources of data which can be collected in e-maintenance, across different organizational levels. Analyzing the data management practices of an e-maintenance industry leader provides a conceptual approach to address identified challenges in practice. Research limitations/implications Since this paper is based on studying the practices of a single company, it might be limited to generalize the results. Future research topics can focus on each of mentioned data management challenges and also validate the applicability of presented model in other companies and industries. Practical implications Understanding the e-maintenance-related challenges helps maintenance managers and other involved stakeholders in e-maintenance systems to better solve the challenges. Originality/value The so-far literature on e-maintenance has been studied with narrow focus to data and data management in e-maintenance appears as one of the less studied topics in the literature. This research paper contributes to e-maintenance by highlighting the deficiencies of the discussion surrounding the perspectives of data management in e-maintenance by studying all common data management challenges and listing different types of data which need to be acquired in e-maintenance systems.


2020 ◽  
Vol 27 (3) ◽  
pp. 755-770
Author(s):  
Maria Krambia-Kapardis

Purpose The purpose of this study is to develop a profile of whistleblowers and to determine whether whistleblowing legislation would encourage those individuals to bring to light some illegal or unethical behaviour that otherwise would remain in the shadows. Design/methodology/approach Having identified whistleblowing correlation, a survey was carried out in Cyprus of actual whistleblowers and could-have-been whistleblowers. Findings Males between 46 and55 years of age, regardless of whether they have dependents or hold senior positions in organizations are significantly more likely to blow the whistle. However, could-have-been whistleblowers did not go ahead because they felt that the authorities would not act on their information. Research limitations/implications Because of the sensitive nature of the research topic and the fact that only whistleblowers or intended whistleblowers could participate in the study, the sample size is limited as a result. This, in turn, limits both the number of respondents in each category (actual and intended) as well as constrains the statistical analysis that could be carried out on the data. Practical implications It remains to be seen whether EU Member States shall implement the European Directive 2019/1937 on the protection of persons who report breaches of Union Law, in its entirety by the due date, namely December 2021. Originality/value This study provides a literature review of whistleblowing and reports an original survey against the backdrop of the European Directive.


2019 ◽  
Vol 37 (1) ◽  
pp. 134-142
Author(s):  
Alberto Bueno-Guerrero

Purpose This paper aims to study the conditions for the hedging portfolio of any contingent claim on bonds to have no bank account part. Design/methodology/approach Hedging and Malliavin calculus techniques recently developed under a stochastic string framework are applied. Findings A necessary and sufficient condition for the hedging portfolio to have no bank account part is found. This condition is applied to a barrier option, and an example of a contingent claim whose hedging portfolio has a bank account part different from zero is provided. Originality/value To the best of the authors’ knowledge, this is the first time that this issue has been addressed in the literature.


Sign in / Sign up

Export Citation Format

Share Document