scholarly journals Robust dexterous telemanipulation following object-orientation commands

Author(s):  
Andrés Montaño ◽  
Raúl Suárez

Purpose This paper aims to present a procedure to change the orientation of a grasped object using dexterous manipulation. The manipulation is controlled by teleoperation in a very simple way, with the commands introduced by an operator using a keyboard. Design/methodology/approach The paper shows a teleoperation scheme, hand kinematics and a manipulation strategy to manipulate different objects using the Schunk Dexterous Hand (SDH2). A state machine is used to model the teleoperation actions and the system states. A virtual link is used to include the contact point on the hand kinematics of the SDH2. Findings Experiments were conducted to evaluate the proposed approach with different objects, varying the initial grasp configuration and the sequence of actions commanded by the operator. Originality/value The proposed approach uses a shared telemanipulation schema to perform dexterous manipulation; in this schema, the operator sends high-level commands and a local system uses this information, jointly with tactile measurements and the current status of the system, to generate proper setpoints for the low-level control of the fingers, which may be a commercial close one. The main contribution of this work is the mentioned local system, simple enough for practical applications and robust enough to avoid object falls.

2019 ◽  
Vol 119 (8) ◽  
pp. 1841-1858 ◽  
Author(s):  
Juyeon Ham ◽  
Yunmo Koo ◽  
Jae-Nam Lee

Purpose To create the expected value and benefits through open data, appropriate provision and usage of data are required simultaneously. However, the level of provision and usage of open data differs from country to country. Moreover, previous research on open data has only focused on either open data provision or usage. To fill the research gap, the purpose of this paper is threefold: first, to understand the current status of the provision and usage of open data; second, to identify patterns in the provision and usage of open data; and third, to provide appropriate future directions and guidelines for the transformation paths of each pattern. Design/methodology/approach The authors analyzed the data collected from open data portals of 13 countries that provide information on the provision and usage of open data together. Findings The authors identified four patterns of the provision and usage of open data, namely, availability-driven, government-driven, market-driven and interaction-driven patterns. Furthermore, three strategic paths of transformation reach a high level of open data provision and usage, namely, data provision-focused, data usage-focused and balanced transformation paths. Originality/value This study provides a foundation that enables researchers to build a holistic theory that can integrate fragmented and incomplete knowledge of open data and usage, particularly in the context of government.


2020 ◽  
Vol ahead-of-print (ahead-of-print) ◽  
Author(s):  
Faris Elghaish ◽  
Sandra Matarneh ◽  
Saeed Talebi ◽  
Michail Kagioglou ◽  
M. Reza Hosseini ◽  
...  

PurposeIn this study, a critical literature review was utilized in order to provide a clear review of the relevant existing studies. The literature was analyzed using the meta-synthesis technique to evaluate and integrate the findings in a single context.Design/methodology/approachDigital transformation in construction requires employing a wide range of various technologies. There is significant progress of research in adopting technologies such as unmanned aerial vehicles (UAVs), also known as drones, and immersive technologies in the construction industry over the last two decades. The purpose of this research is to assess the current status of employing UAVs and immersive technologies toward digitalizing the construction industry and highlighting the potential applications of these technologies, either individually or in combination and integration with each other.FindingsThe key findings are: (1) UAVs in conjunction with 4D building information modeling (BIM) can be used to assess the project progress and compliance checking of geometric design models, (2) immersive technologies can be used to enable controlling construction projects remotely, applying/checking end users’ requirements, construction education and team collaboration.Practical implicationsA detailed discussion around the application of UAVs and immersive technologies is provided. This is expected to support gaining an in-depth understanding of the practical applications of these technologies in the industry.Originality/valueThe review contributes a needed common basis for capturing progress made in UAVs and immersive technologies to date and assessing their impact on construction projects. Moreover, this paper opens a new horizon for novice researchers who will conduct research toward digitalized construction.


2014 ◽  
Vol 6 (1) ◽  
pp. 30-43 ◽  
Author(s):  
Gregory F. Lorenz

Purpose – The leadership lifestyle lived by academic leaders is characterized by fast pace, high responsibility, and little personal time. This lifestyle may be unattractive for professionals seeking high-level academic leadership positions. The purpose of this paper is to discover the meaning of wellness for leaders in higher education and better understand how they achieve and maintain wellness in their lives. Design/methodology/approach – This study used a qualitative methodology and specifically a grounded theory approach. Grounded theory was the chosen methodological approach due to its applicability to academic and non-academic audiences as well as its ability to better understanding the processes associated with certain phenomenon such as wellness. Findings – The results yielded a grounded theory called wellness maturity with four supporting axial categories: intention, gauge of wellness, reflection, and adaptation. Wellness maturity, depicted as a continuum, represents an optimal wellness destination with constant movement toward the destination for each leader. Practical implications – The results of this study offer greater insight into practical applications and considerations necessary for the achievement or maintenance of wellness while working in a higher education environment. Originality/value – This is critical as the future of higher education suggests a large number of vacancies of leadership posts. With the increasing pressures for administrators, the need to create a desirable and attractive climate for potential leaders is necessary.


2015 ◽  
Vol 33 (6) ◽  
pp. 990-1001
Author(s):  
Qian Hu

Purpose – The paper aims to propose a user-centred collaborative framework for providing integrated information services (IIS) to corporate users in China. The framework is conceptualized based on a literature review of IIS models and a case study. The authors provide suggestions with regard to the implementation of effective and efficient information services for corporate users based on the proposed framework. Design/methodology/approach – This paper reviews the efforts of investigating appropriate models for integrated information services (IIS) and proposes a user-centred collaborative framework for providing IIS for corporate users. It is organized as follows: first is an overview through a review of the related literature of the current status of information resource services in China. Then, a case study of IIS in Hubei Province is analysed. Next, a user-centred collaborative IIS framework is presented that aims to address the needs of corporate users. The paper concludes with a summary and suggestions for future study to build effective and efficient IIS systems. Findings – Through an exploratory survey conducted in 2009, it was discovered that, in general, corporate users need all kinds of information, not only scientific publications but also business and market information. Their channel to obtain needed information was mainly the Internet. Books and domain-specific databases were also used by most of the participants. The major challenges for corporate users to obtain needed information included the high cost of purchasing or leasing desired information resources, the low quality of information on the Internet, limited information workers or their skills and the quality of high-level information services. Research limitations/implications – The survey served as a tool to gather primitive information on user needs. It was an incomplete, unsystematic exploration. However, the authors could still gain some insights on the users’ information needs and directions for future IIS. The results showed that Hubei Science and Technology Information Sharing Service, which was an implementation of the agency collaboration-based IIS model, satisfied the needs of less than 30 per cent of the participants. It has much room for improvement. Practical implications – This paper proposes a user-centred collaborative integrated information services (UCIIS) framework. The UCIIS framework takes the idea of the user-centred integrated information service (IIS) model that the construction of IIS should start from understanding the users of the services, but it also takes important characteristics from the agency collaboration-based IIS model. Originality/value – The discussion in this paper is basically on the macro level, leaving a lot of interesting future work to design, develop and evaluate IIS systems based on the proposed framework. Specifically, interest is in developing user models through systematic and comprehensive investigation of corporate information users’ needs, and examining current library and information science curricula to produce qualified information professionals who can carry out user experience studies, and high-level knowledge discovery tasks using various advanced computational technologies.


2020 ◽  
Vol 65 (1) ◽  
pp. e01948-20
Author(s):  
Dalin Rifat ◽  
Si-Yang Li ◽  
Thomas Ioerger ◽  
Keshav Shah ◽  
Jean-Philippe Lanoix ◽  
...  

ABSTRACTThe nitroimidazole prodrugs delamanid and pretomanid comprise one of only two new antimicrobial classes approved to treat tuberculosis (TB) in 50 years. Prior in vitro studies suggest a relatively low barrier to nitroimidazole resistance in Mycobacterium tuberculosis, but clinical evidence is limited to date. We selected pretomanid-resistant M. tuberculosis mutants in two mouse models of TB using a range of pretomanid doses. The frequency of spontaneous resistance was approximately 10−5 CFU. Whole-genome sequencing of 161 resistant isolates from 47 mice revealed 99 unique mutations, of which 91% occurred in 1 of 5 genes previously associated with nitroimidazole activation and resistance, namely, fbiC (56%), fbiA (15%), ddn (12%), fgd (4%), and fbiB (4%). Nearly all mutations were unique to a single mouse and not previously identified. The remaining 9% of resistant mutants harbored mutations in Rv2983 (fbiD), a gene not previously associated with nitroimidazole resistance but recently shown to be a guanylyltransferase necessary for cofactor F420 synthesis. Most mutants exhibited high-level resistance to pretomanid and delamanid, although Rv2983 and fbiB mutants exhibited high-level pretomanid resistance but relatively small changes in delamanid susceptibility. Complementing an Rv2983 mutant with wild-type Rv2983 restored susceptibility to pretomanid and delamanid. By quantifying intracellular F420 and its precursor Fo in overexpressing and loss-of-function mutants, we provide further evidence that Rv2983 is necessary for F420 biosynthesis. Finally, Rv2983 mutants and other F420H2-deficient mutants displayed hypersusceptibility to some antibiotics and to concentrations of malachite green found in solid media used to isolate and propagate mycobacteria from clinical samples.


2014 ◽  
Vol 26 (2) ◽  
pp. 87-95 ◽  
Author(s):  
J. Mittal ◽  
K.L. Lin

Purpose – This paper aims to compare the reflow and Zn diffusion behaviors in Sn-Zn and Sn-8.5Zn-0.5Ag-0.01Al-0.1Ga (5E) solders during soldering on a Ni/Cu substrate under infrared (IR) reflow. The study proposes a model on the effect of various elements particularly Zn diffusion behavior in the solders on the formation of intermetallic compounds (IMCs). Design/methodology/approach – The melting activities of two solders near their melting points on copper substrates are visualized in an IR reflow furnace. Reflowed solder joints were analyzed using scanning electron microscope and energy dispersive X-ray spectroscopy. Findings – Reflow behaviors of the solders are similar. During melting, solder balls are first merged into each other and then reflow on the substrate from top to bottom. Both solders show a reduced amount of Zn in the solder. Theoretical calculations demonstrate a higher Zn diffusion in the 5E solder; however, the amount of Zn actually observed at the solder/substrate interface is lower than Sn-9Zn solder due to the formation of ZnAg3 in the solder. A thinner IMC layer is formed at the interface in the 5E solder than the Sn-Zn solder. Research limitations/implications – The present work compares the 5E solder only with Sn-Zn solder. Additional research work may be required to compare 5E solder with other solders like Sn-Ag, SnAgCu, etc. to further establish its practical applications. Practical implications – The study ascertains the advantages of 5E solder over Sn-Zn solder for all practical applications. Originality/value – The significance of this paper is the understanding of the relation between reflow behavior of solders and reactivity of different elements in the solder alloys and substrate to form various IMCs and their influence on the formation of IMC layer at solder/substrate interface. Emphasis is provided for the diffusion behavior of Zn during reflow and respective reaction mechanisms.


2014 ◽  
Vol 4 (2) ◽  
pp. 35-45
Author(s):  
Margarita Jaitner

The increased adoption of social media has presented security and law enforcement authorities with significant new challenges. For example, the Swedish Security Service (SÄPO) asserts that a large proportion of radicalization takes place in open fora online. Still, approaches to contain social media-driven challenges to security, particularly in democratic societies, remain little explored. Nonetheless, this type of knowledge may become relevant in European countries in the near future: Amongst other factors, the challenging economic situation has resulted in increased public discontent leading to emergence or manifestation of groups that seek to challenge the existing policies by almost any means. Use of social media multiplies the number of vectors that need law enforcement attention. First, a high level of social media adaption allows groups to reach and attract a wider audience. Unlike previously, many groups today consist of a large but very loosely connected network. This lack of cohesion can present a challenge for authorities, to identify emerging key actors and assess threat levels. Second, a high level of mobile web penetration has allowed groups to ad-hoc organize, amend plans and redirect physical activities. Third, the tool social media is as not exclusive to potential perpetrators of unlawful action, but is as well available to law enforcement authorities. Yet, efficient utilization of social media requires a deep understanding of its nature and a well-crafted, comprehensive approach. Acknowledging the broad functionality of social media, as well as its current status in the society, this article describes a model process for security authorities and law enforcement work with social media in general and security services work in particular. The process is cyclic and largely modular. It provides a set of goals and tasks for each stage of a potential event, rather than fixed activities. This allows authorities to adapt the process to individual legal frameworks and organization setups. The approach behind the process is holistic where social media is regarded as both source and destination of information. Ultimately, the process aims at efficiently and effectively mitigating the risk of virtual and physical violence.


2016 ◽  
Vol 48 (4) ◽  
pp. 208-214 ◽  
Author(s):  
Rameshwar Dubey ◽  
Angappa Gunasekaran ◽  
Nezih Altay ◽  
Stephen J Childe ◽  
Thanos Papadopoulos

Purpose – At a time when the number and seriousness of disasters seems to be increasing, humanitarian organizations find that besides their challenging work they are faced with problems caused by a high level of turnover of staff. The paper aims to discuss these issues. Design/methodology/approach – Based on the 24 variables leading to employee turnover identified by Cotton and Tuttle (1986) the authors analyse the work-related, external and personal factors affecting employee turnover in humanitarian organizations, using a survey of members of the Indian National Institute of Disaster Management. Findings – Results indicated that the three factors are present. Of the external factors, only employment perception had a factor loading over 0.7; of the work-related factors, all were significant; of the personal factors, biographical information, marital status, number of dependants, aptitude and ability and intelligence had the highest loadings. It was also shown that behavioural intentions and net expectation were not significant. Originality/value – Only a few studies reported on employee turnover and its reasons are not well understood in the context of humanitarian organizations. To address this need, the aim of this paper is to explore the personal reasons impacting employee turnover in humanitarian organizations. In the study the authors have adopted 24 variables used in Cotton and Tuttle (1986) and classified into constructs to explain turnover, and further tested the model using data gathered from humanitarian organizations.


2013 ◽  
Vol 116 (1) ◽  
pp. 125-141 ◽  
Author(s):  
Manoj Dora ◽  
Dirk Van Goubergen ◽  
Maneesh Kumar ◽  
Adrienn Molnar ◽  
Xavier Gellynck

Purpose – Recent literature emphasizes the application of lean manufacturing practices to food processing industries in order to improve operational efficiency and productivity. Only a very limited number of studies have focused on the implementation of lean manufacturing practices within small and medium-sized enterprises (SMEs) operating in the food sector. The majority of these studies used the case study method and concentrated on individual lean manufacturing techniques geared towards resolving efficiency issues. This paper aims to analyze the status of the lean manufacturing practices and their benefits and barriers among European food processing SMEs. Design/methodology/approach – A structured questionnaire was developed to collect data. A total of 35 SMEs' representatives, mostly CEOs and operations managers, participated in the survey. The study investigated the role of two control variables in lean implementation: size of the company and country of origin. Findings – The findings show that lean manufacturing practice deployment in food processing SMEs is generally low and still evolving. However, some lean manufacturing practices are more prevalent than others; e.g. flow, pull and statistical process control are not widely used by the food processing SMEs, whereas total productive maintenance, employee involvement, and customer association are more widespread. The key barriers encountered by food SMEs in the implementation of lean manufacturing practices result from the special characteristics of the food sector, such as highly perishable products, complicated processing, extremely variable raw materials, recipes and unpredictable demand. In addition, lack of knowledge and resources makes it difficult for food processing SMEs to embark on the lean journey. Originality/value – The gap in the literature regarding the application of lean manufacturing in the food sector is identified and addressed in this study. The originality of this paper lies in analyzing the current status of the use of lean manufacturing practices among food SMEs in Europe and identifying potential barriers.


2017 ◽  
Vol 15 (3) ◽  
pp. 213-231
Author(s):  
Kiyoshi Murata ◽  
Yasunori Fukuta ◽  
Andrew A. Adams ◽  
Dang Ronghua

Purpose This study aims to investigate how Snowden’s revelations are viewed by young people in the People’s Republic of China (PRC) and Taiwan through questionnaire surveys of and follow-up interviews with university students in the two countries, taking into account the histories and current status of state surveillance in these countries and the current complicated and delicate cross-strait relationships. Design/methodology/approach Questionnaire surveys of 315 PRC and 111 Taiwanese university students (a majority studying in those places but a few studying abroad) and semi-structured follow-up interviews with 16 master’s course students from the PRC and one from Taiwan (all studying at Meiji University in Japan) were conducted, in addition to reviews of the literature on privacy and state surveillance in the PRC and Taiwan. The outcomes of the survey were statistically analysed and qualitative analyses of the interview results were also performed. Findings Youngsters living in the PRC had greater interest in and more knowledge about Snowden’s revelations than those living in Taiwan, and the revelations were positively evaluated in both countries as serving public interest. However, PRC students indicated they were less likely to emulate Snowden than those from Taiwan did. Originality/value This study is the first attempt to investigate the social impact of Snowden’s revelations on PRC and Taiwanese youngsters’ attitudes towards privacy and state surveillance as part of cross-cultural analyses between eight countries.


Sign in / Sign up

Export Citation Format

Share Document