Search results

1 – 10 of over 239000
Article
Publication date: 14 August 2007

Alain Bossavit

It is well known that complementarity can provide bilateral bounds on energy, in numerical approximations of nonlinear magnetostatics. Questions whether like force is, up to sign…

Abstract

Purpose

It is well known that complementarity can provide bilateral bounds on energy, in numerical approximations of nonlinear magnetostatics. Questions whether like force is, up to sign, the derivative of energy, can such bounds also apply to forces, torques, and other concepts?

Design/methodology/approach

This is a discussion paper exploring the issues conceptually.

Findings

On the face of it, no, since inequalities are not preserved by differentiation. Yet, useful bounds can be given in some cases, as shown in the discussion, following an idea by Matagne.

Originality/value

The paper aids the understanding of nonlinear magnetostatic systems.

Details

COMPEL - The international journal for computation and mathematics in electrical and electronic engineering, vol. 26 no. 4
Type: Research Article
ISSN: 0332-1649

Keywords

Article
Publication date: 1 July 2004

Fletcher N. Baldwin

Argues in this wideranging paper that the legitimacy of international law depends on the principle that pacts should be respected, reviewing the issues of self‐preservation…

Abstract

Argues in this wideranging paper that the legitimacy of international law depends on the principle that pacts should be respected, reviewing the issues of self‐preservation, proportionality and human rights in relation to this. Focuses on the economic war against terrorism by the USA preeminently, as expressed in the PATRIOT Act and the International Emergency Economic Powers Act and the Anti‐Terrorism and Effective Death Penalty Act. Concludes that the Patriot Act and the Homeland Security Act give the Executive branch of government extraordinary and warlike powers: but wars have an end whereas terrorism does not. Looks at the role of the US Federal courts in the context of national security, proportionality and human rights concerns, and finds them deficient; reports specific cases concerning Iranian resistance movements and their status as regards terrorism, and the Bajkajian, Austin and Alexander cases as regards proportionality.

Details

Journal of Money Laundering Control, vol. 7 no. 3
Type: Research Article
ISSN: 1368-5201

Keywords

Article
Publication date: 7 August 2019

Ryoko Minehisa, Yasuhito Takahashi, Koji Fujiwara, Norio Takahashi, Masafumi Fujita, Kazuma Tsujikawa and Ken Nagakura

This paper aims to propose a homogenization method considering magnetic anisotropy for a magnetic field analysis of a turbine generator. To verify the validity of the proposed…

Abstract

Purpose

This paper aims to propose a homogenization method considering magnetic anisotropy for a magnetic field analysis of a turbine generator. To verify the validity of the proposed method, the effects of magnetic anisotropy and a space factor on a no-load saturation curve and no-load iron loss of the turbine generator are discussed.

Design/methodology/approach

The proposed method was derived from the combination of the homogenization of microscopic fields in a laminated iron core with the modelling of two-dimensional magnetic properties based on free energy. To verify the validity, the proposed method was applied to a finite-element analysis of a simple ring core model. Finally, a no-load saturation curve and iron loss of the turbine generator was investigated by using the proposed method.

Findings

The computational accuracy of the homogenization method considering magnetic anisotropy is almost the same as that of the detailed modelling of the laminated structure in the magnetic field analysis of the laminated iron core. Furthermore, it is clarified that magnetic anisotropy does not have a large influence on the no-load saturation curve of the turbine generator because of the large air gap. On the other hand, the space factor affects the shape of the no-load saturation curve.

Originality/value

This paper verifies the validity of the homogenization method considering magnetic anisotropy method and elucidates the effects of magnetic anisotropy and a space factor on no-load characteristics of the turbine generator.

Details

COMPEL - The international journal for computation and mathematics in electrical and electronic engineering , vol. 38 no. 5
Type: Research Article
ISSN: 0332-1649

Keywords

Article
Publication date: 1 March 2002

Guoyang Liu

In this paper, we introduce the concept of a supporting set for a general system. We study basic properties of supporting sets for a general system, supporting sets for subsytems…

Abstract

In this paper, we introduce the concept of a supporting set for a general system. We study basic properties of supporting sets for a general system, supporting sets for subsytems of a system, homomorphic images of supporting sets for a system, and supporting sets for free sums and direct sums of systems.

Details

Kybernetes, vol. 31 no. 2
Type: Research Article
ISSN: 0368-492X

Keywords

Article
Publication date: 1 January 1988

Robert Datzer

12,2 Millionen Bundesbürger sind über 60 Jahre alt. Im Jahre 2000 werden es bereits 14 Millionen sein. Kein Wunder also, dass die Senioren für viele Wirtschaftszweige immer…

Abstract

12,2 Millionen Bundesbürger sind über 60 Jahre alt. Im Jahre 2000 werden es bereits 14 Millionen sein. Kein Wunder also, dass die Senioren für viele Wirtschaftszweige immer interessanter werden. Dies gilt auch für die Tourismusbranche, die mit der wachsenden Reisefreude der älteren Generation rechnen kann. Im vorliegenden Beitrag werden ausgewählte Ergebnisse einer Studie wiedergegeben, die das Institut für Freizeit‐ und Tourismusberatung aus Ettlingen Anfang des Jahres gemacht hatte.

Details

The Tourist Review, vol. 43 no. 1
Type: Research Article
ISSN: 0251-3102

Article
Publication date: 31 December 2004

Fletcher N. Baldwin

Begins with the Staff Report to the National Commission on Terrorist Attack on the United States, which indicates the methods used to trace, seize and freeze terrorist assets, and…

Abstract

Begins with the Staff Report to the National Commission on Terrorist Attack on the United States, which indicates the methods used to trace, seize and freeze terrorist assets, and the informal methods used by al‐Qaeda to transfer money. Questions the amount of progress made since September 11 to freeze funds. Focuses on encryption technology and how it allows illegal use of the Internet in the form of cyber laundering and e‐cash, and on the move by terrorists into narcotics production and trafficking ‐ which is defined as nacre‐terrorism. Describes efforts to proscribe cyber crime, including cyber laundering and cyber terrorism, including controls on privacy and encryption. Shows how business corporations can become involved with terrorism, including a case study on tanzanite.

Details

Journal of Money Laundering Control, vol. 8 no. 2
Type: Research Article
ISSN: 1368-5201

Keywords

Article
Publication date: 1 July 1959

D.E. Clippinger and G.J. Morris

THE use of liquid oxygen as an oxidizer for various fuels in liquid rocket propellent systems is not new. Professor Goddard used liquid oxygen in his rocket experiments and the…

Abstract

THE use of liquid oxygen as an oxidizer for various fuels in liquid rocket propellent systems is not new. Professor Goddard used liquid oxygen in his rocket experiments and the well known German V‐2 rockets used this material as an oxidizer. However, its effect on non‐metallic materials ordinarily used in rocket systems was not investigated until recent years. This investigation was prompted by phenomena which had been experienced by rocket engine and rocket aircraft manufacturers and by suppliers of the material. It was observed that when some organic materials came in intimate contact with liquid oxygen they became prone to detonation when subjected to certain impact energies. This was undoubtedly due to the formation of unstable organo‐peroxide compounds which when impacted released high levels of energy resulting in an explosion. Specifically, when liquid oxygen was accidently spilled on asphalt and inadvertently stepped on, the asphalt would often explode. Also, leather gaskets immersed in liquid oxygen and subjected to surge impact detonated with disastrous effects.

Details

Aircraft Engineering and Aerospace Technology, vol. 31 no. 7
Type: Research Article
ISSN: 0002-2667

Article
Publication date: 1 November 2023

Ahmed M. E. Bayoumi

This article proposes a relaxed gradient iterative (RGI) algorithm to solve coupled Sylvester-conjugate transpose matrix equations (CSCTME) with two unknowns.

Abstract

Purpose

This article proposes a relaxed gradient iterative (RGI) algorithm to solve coupled Sylvester-conjugate transpose matrix equations (CSCTME) with two unknowns.

Design/methodology/approach

This article proposes a RGI algorithm to solve CSCTME with two unknowns.

Findings

The introduced (RGI) algorithm is more efficient than the gradient iterative (GI) algorithm presented in Bayoumi (2014), where the author's method exhibits quick convergence behavior.

Research limitations/implications

The introduced (RGI) algorithm is more efficient than the GI algorithm presented in Bayoumi (2014), where the author's method exhibits quick convergence behavior.

Practical implications

In systems and control, Lyapunov matrix equations, Sylvester matrix equations and other matrix equations are commonly encountered.

Social implications

In systems and control, Lyapunov matrix equations, Sylvester matrix equations and other matrix equations are commonly encountered.

Originality/value

This article proposes a relaxed gradient iterative (RGI) algorithm to solve coupled Sylvester conjugate transpose matrix equations (CSCTME) with two unknowns. For any initial matrices, a sufficient condition is derived to determine whether the proposed algorithm converges to the exact solution. To demonstrate the effectiveness of the suggested method and to compare it with the gradient-based iterative algorithm proposed in [6] numerical examples are provided.

Details

Engineering Computations, vol. 40 no. 9/10
Type: Research Article
ISSN: 0264-4401

Keywords

Article
Publication date: 12 January 2023

Guoli Wang and Chenxin Ma

Motivated by the wide application of procurement strategies in retailing, this paper aims to examine the effect of procurement strategies on decisions and profits and strategic…

Abstract

Purpose

Motivated by the wide application of procurement strategies in retailing, this paper aims to examine the effect of procurement strategies on decisions and profits and strategic inventory (SI) is considered.

Design/methodology/approach

The game-theoretic models are developed under a two-period fresh product supply chain (FSC), and consist of the mode of purchasing products only in the first period without SI (Scenario S), the mode of purchasing products in every period without SI (Scenario T) and the mode of purchasing products in every period with SI (Scenario TS).

Findings

Conducting the calculating and comparing, some major findings can be concluded. In general, two-period purchasing strategies (Scenarios T and TS) promote a higher freshness-keeping effort than the single buying strategy (Scenario S). Regarding the pricing strategy, SI and Scenario S can both contribute to obtaining a lower wholesale price, the retailer's pricing is relatively complicated and hinges on the consumer's sensitivity to freshness-keeping effort and the holding cost. Besides, comparing the sales quantity and the profit, the authors find that Scenario TS stimulates more demands and brings more profits for the manufacturer. However, Scenario TS is not the optimal selection for the reason that SI sometimes hurts the retailer and even the whole supply chain. Whereas, when the holding cost is in a certain range, Scenario TS will lead to a win-win situation.

Originality/value

The main findings of this study can give the enterprises some advice on the procurement strategies of fresh products and the decisions of pricing and the freshness-keeping effort.

Details

Kybernetes, vol. 53 no. 4
Type: Research Article
ISSN: 0368-492X

Keywords

Article
Publication date: 1 February 2000

A. Ziadi and Y. Cherruault

The reducing transformation and global optimization technique called Alienor has been developed in the 1980s by Cherruault and Guillez. These methods are based on the…

Abstract

The reducing transformation and global optimization technique called Alienor has been developed in the 1980s by Cherruault and Guillez. These methods are based on the approximating properties of α ‐dense curves. The aim of this work is to give a very large class of functions generating α ‐dense curves in a hyper‐rectangle of Rn.

Details

Kybernetes, vol. 29 no. 1
Type: Research Article
ISSN: 0368-492X

Keywords

1 – 10 of over 239000