Search results

1 – 10 of over 3000
Article
Publication date: 1 February 1987

I. Storbeck and G. Leitner

The bowing of thick film substrates, wholly covered with copper pastes of the Du Pont base metal system DP 9922 and 9924, with one, four and ten layers has been measured from room…

Abstract

The bowing of thick film substrates, wholly covered with copper pastes of the Du Pont base metal system DP 9922 and 9924, with one, four and ten layers has been measured from room temperature up to 700°C. It could be shown that the bowing does not, as expected, decrease uniformly with increasing temperature up to the softening point of the glass, but a change occurs in the curvature of bowing between about 80° and 100°C. By removing the copper layers the glassy interlayer could be investigated on the substrate. Its temperature behaviour is quite linear up to the softening point and the curvature is in contrast to that of the complete copper layer on the substrate. The superposition of the curvature of the metal and the glassy interlayer leads to the above‐mentioned change in the curvature of the complete copper layer. The deviation of the bowing that was found experimentally and that calculated by means of the plates theory, discussed in a previous paper, can therefore be explained by that change in the curvature and by a plastic deformation process in the copper. The values are caused by a reduction of stresses by plastic deformation in the metal during the cooling process. These results offer some possibilities for a reduction of the bowing of multilayer interconnection modules for use in hybrid microelectronics.

Details

Microelectronics International, vol. 4 no. 2
Type: Research Article
ISSN: 1356-5362

Article
Publication date: 13 April 2015

Orland Hoeber and Taraneh Khazaei

Conducting academic searches within online digital libraries can be a difficult task due to the complexity of the searcher’s information need. The interfaces for such digital…

Abstract

Purpose

Conducting academic searches within online digital libraries can be a difficult task due to the complexity of the searcher’s information need. The interfaces for such digital libraries commonly use simple search features that provide limited support for the fundamental strategies that academic searchers employ. The authors have developed a novel visualisation interface called Bow Tie Academic Search to address some of these shortcomings, and present in this paper the findings from a user evaluation. The paper aims to discuss these issues.

Design/methodology/approach

A controlled laboratory study was conducted to compare a traditional search interface to Bow Tie Academic Search. In total, 24 graduate students were recruited to perform academic searches using the two candidate interfaces, guided by specific sub-tasks that focus on citation and keyword analysis strategies.

Findings

Although the use of the core visualisation and exploration features did not reveal differences in retrieval effectiveness or efficiency, the query refinement features were found to be effective. Strongly positive impressions of usefulness and ease of use of all aspects of the system were reported, along with a preference for using Bow Tie Academic Search for academic search tasks.

Originality/value

This study provides insight into the potential value for providing visual and interactive interfaces for supporting academic search tasks and strategies. While the quantitative improvements over the traditional search interface were minimal, the qualitative measures illustrate the value of Bow Tie Academic Search.

Details

Online Information Review, vol. 39 no. 2
Type: Research Article
ISSN: 1468-4527

Keywords

Article
Publication date: 18 December 2018

Jan Kotlarz, Romana Ratkiewicz and Wojciech Konior

This paper aims to demonstrate the impact of interstellar (IS) magnetic field on stellar shocks existence, shape and size in the stellar wind (SW) vs interstellar medium (ISM…

Abstract

Purpose

This paper aims to demonstrate the impact of interstellar (IS) magnetic field on stellar shocks existence, shape and size in the stellar wind (SW) vs interstellar medium (ISM) numerical models.

Design/methodology/approach

Comparison of hydrodynamics (HD) and magnetohydrodynamic (MHD) models results with or without ISM magnetic field, its intensity and ISM parameters.

Findings

ISM magnetic field facilitates formation and stabilises bow shocks around all astrophysical objects. ISM magnetic field may also be one of the reasons for a bow shock existence around the Sun.

Practical implications

ISM magnetic field should be implemented in MHD and future kinetic numerical models of the SW interaction with ISM plasma.

Originality/value

This paper presents the results of HD and MHD models of bow shocks and the importance of ISM magnetic field implementation, according to astronomical bow shock observations. The study also presents a review of the most important papers showing the numerical results of bow shock formation.

Details

Aircraft Engineering and Aerospace Technology, vol. 92 no. 3
Type: Research Article
ISSN: 1748-8842

Keywords

Article
Publication date: 9 May 2016

Zhaleh Abdi, Hamid Ravaghi, Mohsen Abbasi, Bahram Delgoshaei and Somayeh Esfandiari

The purpose of this paper is to apply Bow-tie methodology, a proactive risk assessment technique based on systemic approach, for prospective analysis of the risks threatening…

2067

Abstract

Purpose

The purpose of this paper is to apply Bow-tie methodology, a proactive risk assessment technique based on systemic approach, for prospective analysis of the risks threatening patient safety in intensive care unit (ICU).

Design/methodology/approach

Bow-tie methodology was used to manage clinical risks threatening patient safety by a multidisciplinary team in the ICU. The Bow-tie analysis was conducted on incidents related to high-alert medications, ventilator associated pneumonia, catheter-related blood stream infection, urinary tract infection, and unwanted extubation.

Findings

In total, 48 potential adverse events were analysed. The causal factors were identified and classified into relevant categories. The number and effectiveness of existing preventive and protective barriers were examined for each potential adverse event. The adverse events were evaluated according to the risk criteria and a set of interventions were proposed with the aim of improving the existing barriers or implementing new barriers. A number of recommendations were implemented in the ICU, while considering their feasibility.

Originality/value

The application of Bow-tie methodology led to practical recommendations to eliminate or control the hazards identified. It also contributed to better understanding of hazard prevention and protection required for safe operations in clinical settings.

Details

International Journal of Health Care Quality Assurance, vol. 29 no. 4
Type: Research Article
ISSN: 0952-6862

Keywords

Article
Publication date: 6 August 2020

Caner Acarbay and Emre Kiyak

Stable approach concept has great importance for the safe operation of an airline during the approach and landing phases. The purpose of this study is to analyse the unstabilized…

Abstract

Purpose

Stable approach concept has great importance for the safe operation of an airline during the approach and landing phases. The purpose of this study is to analyse the unstabilized approaches with bow-tie method and determine the threats that may cause risk in an unstable approach.

Design/methodology/approach

In this study, risk assessment of the unstabilized approaches is carried out by using fuzzy bow-tie method and Bayesian networks. Bow-tie method is the combination of event tree analysis and fault tree analysis. Bayesian network is used in the analysis to see interrelationship of basic and intermediate events as well as to update posterior probabilities. Finally, analysis results are verified by the safety performance indicator values.

Findings

In this study, the probabilistic values of the numerical model presented by the risk assessment system for risks were calculated using the fuzzy bow-tie method. Thus, the risk assessment system has been transformed into a structure that can be expressed in a probabilistic manner, and the relationship of the risks within the system has been examined and the effect of a possible change on the risk value has been found to be prevalent.

Originality/value

The bow-tie model is widely applied to assess the risks in aviation. Obtaining prior probabilities is not always possible in the risk assessment process. In this paper, innovative fuzzy bow-tie method is used to assess the risks to overcome the lack of prior probability problem in aviation operations.

Details

Aircraft Engineering and Aerospace Technology, vol. 92 no. 10
Type: Research Article
ISSN: 1748-8842

Keywords

Open Access
Article
Publication date: 20 June 2019

Per Håkon Meland, Karin Bernsmed, Christian Frøystad, Jingyue Li and Guttorm Sindre

Within critical-infrastructure industries, bow-tie analysis is an established way of eliciting requirements for safety and reliability concerns. Because of the ever-increasing…

4333

Abstract

Purpose

Within critical-infrastructure industries, bow-tie analysis is an established way of eliciting requirements for safety and reliability concerns. Because of the ever-increasing digitalisation and coupling between the cyber and physical world, security has become an additional concern in these industries. The purpose of this paper is to evaluate how well bow-tie analysis performs in the context of security, and the study’s hypothesis is that the bow-tie notation has a suitable expressiveness for security and safety.

Design/methodology/approach

This study uses a formal, controlled quasi-experiment on two sample populations – security experts and security graduate students – working on the same case. As a basis for comparison, the authors used a similar experiment with misuse case analysis, a well-known technique for graphical security modelling.

Findings

The results show that the collective group of graduate students, inexperienced in security modelling, perform similarly as security experts in a well-defined scope and familiar target system/situation. The students showed great creativity, covering most of the same threats and consequences as the experts identified and discovering additional ones. One notable difference was that these naïve professionals tend to focus on preventive barriers, leading to requirements for risk mitigation or avoidance, while experienced professionals seem to balance this more with reactive barriers and requirements for incident management.

Originality/value

Our results are useful in areas where we need to evaluate safety and security concerns together, especially for domains that have experience in health, safety and environmental hazards, but now need to expand this with cybersecurity as well.

Details

Information & Computer Security, vol. 27 no. 4
Type: Research Article
ISSN: 2056-4961

Keywords

Article
Publication date: 26 January 2022

Ziming Zeng, Shouqiang Sun, Tingting Li, Jie Yin and Yueyan Shen

The purpose of this paper is to build a mobile visual search service system for the protection of Dunhuang cultural heritage in the smart library. A novel mobile visual search…

Abstract

Purpose

The purpose of this paper is to build a mobile visual search service system for the protection of Dunhuang cultural heritage in the smart library. A novel mobile visual search model for Dunhuang murals is proposed to help users acquire rich knowledge and services conveniently.

Design/methodology/approach

First, local and global features of images are extracted, and the visual dictionary is generated by the k-means clustering. Second, the mobile visual search model based on the bag-of-words (BOW) and multiple semantic associations is constructed. Third, the mobile visual search service system of the smart library is designed in the cloud environment. Furthermore, Dunhuang mural images are collected to verify this model.

Findings

The findings reveal that the BOW_SIFT_HSV_MSA model has better search performance for Dunhuang mural images when the scale-invariant feature transform (SIFT) and the hue, saturation and value (HSV) are used to extract local and global features of the images. Compared with different methods, this model is the most effective way to search images with the semantic association in the topic, time and space dimensions.

Research limitations/implications

Dunhuang mural image set is a part of the vast resources stored in the smart library, and the fine-grained semantic labels could be applied to meet diverse search needs.

Originality/value

The mobile visual search service system is constructed to provide users with Dunhuang cultural services in the smart library. A novel mobile visual search model based on BOW and multiple semantic associations is proposed. This study can also provide references for the protection and utilization of other cultural heritages.

Details

Library Hi Tech, vol. 40 no. 6
Type: Research Article
ISSN: 0737-8831

Keywords

Article
Publication date: 5 June 2017

Eugene Yujun Fu, Hong Va Leong, Grace Ngai and Stephen C.F. Chan

Social signal processing under affective computing aims at recognizing and extracting useful human social interaction patterns. Fight is a common social interaction in real life…

Abstract

Purpose

Social signal processing under affective computing aims at recognizing and extracting useful human social interaction patterns. Fight is a common social interaction in real life. A fight detection system finds wide applications. This paper aims to detect fights in a natural and low-cost manner.

Design/methodology/approach

Research works on fight detection are often based on visual features, demanding substantive computation and good video quality. In this paper, the authors propose an approach to detect fight events through motion analysis. Most existing works evaluated their algorithms on public data sets manifesting simulated fights, where the fights are acted out by actors. To evaluate real fights, the authors collected videos involving real fights to form a data set. Based on the two types of data sets, the authors evaluated the performance of their motion signal analysis algorithm, which was then compared with the state-of-the-art approach based on MoSIFT descriptors with Bag-of-Words mechanism, and basic motion signal analysis with Bag-of-Words.

Findings

The experimental results indicate that the proposed approach accurately detects fights in real scenarios and performs better than the MoSIFT approach.

Originality/value

By collecting and annotating real surveillance videos containing real fight events and augmenting with well-known data sets, the authors proposed, implemented and evaluated a low computation approach, comparing it with the state-of-the-art approach. The authors uncovered some fundamental differences between real and simulated fights and initiated a new study in discriminating real against simulated fight events, with very good performance.

Details

International Journal of Pervasive Computing and Communications, vol. 13 no. 2
Type: Research Article
ISSN: 1742-7371

Keywords

Article
Publication date: 1 March 1986

I. Storbeck, H. Balke and M. Wolf

The production of interconnection modules with an increasing number of layers leads to problems in the planarity of modules and therefore in the chip mounting process. The present…

Abstract

The production of interconnection modules with an increasing number of layers leads to problems in the planarity of modules and therefore in the chip mounting process. The present paper discusses a model based on the theory of plates which allows the calculation of bowing degree in relation to the coefficients of thermal expansion αi, Young's moduli Ei, the thicknesses hi, and the softening point of the glassy components in the thick film pastes. The calculated values are compared with experimental data for substrates built up as entirely covered model substrates of up to 7 layers of one type of paste (conductor and dielectric, respectively) and of alternately printed layers.

Details

Microelectronics International, vol. 3 no. 3
Type: Research Article
ISSN: 1356-5362

Article
Publication date: 15 August 2019

Hossam Elamir

The growing importance of risk management programmes and practices in different industries has given rise to a new risk management approach, i.e. enterprise risk management. The…

2158

Abstract

Purpose

The growing importance of risk management programmes and practices in different industries has given rise to a new risk management approach, i.e. enterprise risk management. The purpose of this paper is to better understand the necessity, benefit, approaches and methodologies of managing risks in healthcare. It compares and contrasts between the traditional and enterprise risk management approaches within the healthcare context. In addition, it introduces bow tie methodology, a prospective risk assessment tool proposed by the American Society for Healthcare Risk Management as a visual risk management tool used in enterprise risk management.

Design/methodology/approach

This is a critical review of published literature on the topics of governance, patient safety, risk management, enterprise risk management and bow tie, which aims to draw a link between them and find the benefits behind their adoption.

Findings

Enterprise risk management is a generic holistic approach that extends the benefits of risk management programme beyond the traditional insurable hazards and/or losses. In addition, the bow tie methodology is a barrier-based risk analysis and management tool used in enterprise risk management for critical events related to the relevant day-to-day operations. It is a visual risk assessment tool which is used in many higher reliability industries. Nevertheless, enterprise risk management and bow ties are reported with limited use in healthcare.

Originality/value

The paper suggests the applicability and usefulness of enterprise risk management to healthcare, and proposes the bow tie methodology as a proactive barrier-based risk management tool valid for enterprise risk management implementation in healthcare.

Details

Business Process Management Journal, vol. 26 no. 3
Type: Research Article
ISSN: 1463-7154

Keywords

1 – 10 of over 3000