Search results

1 – 10 of 157
Book part
Publication date: 19 October 2020

Hon Ho Kwok

This chapter develops a set of two-step identification methods for social interactions models with unknown networks, and discusses how the proposed methods are connected to the…

Abstract

This chapter develops a set of two-step identification methods for social interactions models with unknown networks, and discusses how the proposed methods are connected to the identification methods for models with known networks. The first step uses linear regression to identify the reduced forms. The second step decomposes the reduced forms to identify the primitive parameters. The proposed methods use panel data to identify networks. Two cases are considered: the sample exogenous vectors span Rn (long panels), and the sample exogenous vectors span a proper subspace of Rn (short panels). For the short panel case, in order to solve the sample covariance matrices’ non-invertibility problem, this chapter proposes to represent the sample vectors with respect to a basis of a lower-dimensional space so that we have fewer regression coefficients in the first step. This allows us to identify some reduced form submatrices, which provide equations for identifying the primitive parameters.

Article
Publication date: 1 April 1972

B. PORTER and T.R. CROSSLEY

In this paper, certain theoretical results due to Porter concerning the probability of stability of a class of linear dynamical systems are generalized significantly. These…

Abstract

In this paper, certain theoretical results due to Porter concerning the probability of stability of a class of linear dynamical systems are generalized significantly. These results are compared with the theoretical results obtained by Porter and also with certain empirical results obtained by Ashby.

Details

Kybernetes, vol. 1 no. 4
Type: Research Article
ISSN: 0368-492X

Content available
Book part
Publication date: 19 October 2020

Abstract

Details

The Econometrics of Networks
Type: Book
ISBN: 978-1-83867-576-9

Article
Publication date: 5 June 2020

Chengxi Zhang, Jin Wu, Ming-Zhe Dai, Bo Li and Mingjiang Wang

The purpose of this paper is to investigate the attitude cooperation control of multi-spacecraft with in-continuous communication.

Abstract

Purpose

The purpose of this paper is to investigate the attitude cooperation control of multi-spacecraft with in-continuous communication.

Design/methodology/approach

A decentralized state-irrelevant event-triggered control policy is proposed to reduce control updating frequency and further achieve in-continuous communication by introducing a self-triggered mechanism.

Findings

Each spacecraft transmits data independently, without the requirement for the whole system to communicate simultaneously. The local predictions and self-triggered mechanism avoid continuous monitoring of the triggering condition.

Research limitations/implications

This investigation is suitable for small Euler angle conditions.

Practical implications

The control policy based on event-triggered communication can provide potential solutions for saving communication resources.

Originality/value

This investigation uses event- and self-triggered policy to achieve in-communication for the multi-spacecraft system.

Details

Aircraft Engineering and Aerospace Technology, vol. 92 no. 7
Type: Research Article
ISSN: 1748-8842

Keywords

Article
Publication date: 9 November 2015

Cong Liu, Qiang Zhou and Xiaoguang Hu

– The purpose of this paper is to study the dynamical group consensus of heterogeneous multi-agent systems with fixed topologies.

Abstract

Purpose

The purpose of this paper is to study the dynamical group consensus of heterogeneous multi-agent systems with fixed topologies.

Design/methodology/approach

The tool used in this paper to model the topologies of multi-agent systems is algebraic graph theory. The matrix theory and stability theory are applied to research the group consensus of heterogeneous multi-agent systems with fixed topologies. The Laplace transform and Routh criterion are utilized to analyze the convergence properties of heterogeneous multi-agent systems.

Findings

It is discovered that the dynamical group consensus for heterogeneous multi-agent systems with first-order and second-order agents can be achieved under the reasonable hypothesizes. The group consensus condition is only relied on the nonzero eigenvalues of the graph Laplacian matrix.

Originality/value

The novelty of this paper is to investigate the dynamical group consensus of heterogeneous multi-agent systems with first-order and second-order agents and fixed topologies and obtain a sufficient group consensus condition.

Details

International Journal of Intelligent Computing and Cybernetics, vol. 8 no. 4
Type: Research Article
ISSN: 1756-378X

Keywords

Article
Publication date: 1 January 2013

R.C. Mittal, Ram Jiwari and Kapil K. Sharma

The purpose of this paper is to propose a numerical method to solve time dependent Burgers' equation with appropriate initial and boundary conditions.

Abstract

Purpose

The purpose of this paper is to propose a numerical method to solve time dependent Burgers' equation with appropriate initial and boundary conditions.

Design/methodology/approach

The presence of the nonlinearity in the problem leads to severe difficulties in the solution approximation. In construction of the numerical scheme, quasilinearization is used to tackle the nonlinearity of the problem which is followed by semi discretization for spatial direction using differential quadrature method (DQM). Semi discretization of the problem leads to a system of first order initial value problems which are followed by fully discretization using RK4 scheme. The method is analyzed for stability and convergence.

Findings

The method is illustrated and compared with existing methods via numerical experiments and it is found that the proposed method gives better accuracy and is quite easy to implement.

Originality/value

The new scheme is developed by using some numerical schemes. The scheme is analyzed for stability and convergence. In support of predicted theory some test examples are solved using the presented method.

Article
Publication date: 17 December 2021

Rawid Banchuin

The purpose of this paper is to comparatively analyze the electrical circuits defined with the conventional and revisited time domain circuit element definitions in the context of…

Abstract

Purpose

The purpose of this paper is to comparatively analyze the electrical circuits defined with the conventional and revisited time domain circuit element definitions in the context of fractional conformable calculus and to promote the combined usage of conventional definitions, fractional conformable derivative and conformable Laplace transform.

Design/methodology/approach

The RL, RC, LC and RLC circuits described by both conventional and revisited time domain circuit element definitions has been analyzed by means of the fractional conformable derivative based differential equations and conformable Laplace transform. The comparison among the obtained results and those based on the methodologies adopted in the previous works has been made.

Findings

The author has found that the conventional definitions-based solution gives a physically reasonable result unlike its revisited definitions-based counterpart and the solutions based on those previous methodologies. A strong agreement to the time domain state space concept-based solution can be observed. The author has also shown that the scalar valued solution can be directly obtained by singularity free conformable Laplace transform-based methodology unlike such state space concept based one.

Originality/value

For the first time, the revisited time domain definitions of resistance and inductance have been proposed and applied together with the revisited definition of capacitance in electrical circuit analyses. The advantage of the combined usage of conventional time definitions, fractional conformable derivative and conformable Laplace transform has been suggested and the impropriety of applying the revisited definitions in circuit analysis has been pointed out.

Book part
Publication date: 6 July 2021

Sansom Milton

Iraqi universities in the aftermath of invasion in 2003 experienced extremely high levels of “post”-war violence and insecurity. The most widely known dimension of this violence…

Abstract

Iraqi universities in the aftermath of invasion in 2003 experienced extremely high levels of “post”-war violence and insecurity. The most widely known dimension of this violence is the shocking assassination campaign that killed hundreds of Iraqi academics. This paper provides an analysis of violence and insecurity in post-2003 that takes a broader optic and considers multiple forms of vulnerability to attack including insurgencies, sectarian conflict, and criminal violence. It also considers the various responses to the security dilemma taken by Coalition forces – principally counter-terrorism and stabilization efforts – and by Iraqi policy-makers and higher education communities, including security measures, politicization, ethno-sectarianization, and displacement.

Article
Publication date: 9 October 2009

Jordan Shropshire

The paper focuses on intentional information security breaches by insiders. The purpose is to assess the relationship between insiders' backgrounds and motivations and their…

1781

Abstract

Purpose

The paper focuses on intentional information security breaches by insiders. The purpose is to assess the relationship between insiders' backgrounds and motivations and their deviant behaviors. Two outcome variables, information technology (IT) espionage and IT sabotage, are correlated with four predictors, financial changes, relationship strains, substance abuse, and job changes.

Design/methodology/approach

Some 62 cases of intentional information security breaches by insiders are examined using canonical analysis.

Findings

The results indicate that a significant relationship exists between financial hardship, relationship strains, and the theft and sale of proprietary data by insiders; and recent firings, substance abuse, and relationship strains are related to information system sabotage.

Research limitations/implications

Because little or no research has been conducted on this topic, there is a lack of validated measures for variables associated with information security. Thus, the measures used in this paper are necessarily simplistic. Because few organizations report information security weaknesses, the sample is relatively small.

Practical implications

In the majority of cases included in this paper, it is found that the insider convey a number of warning signs before committing the security breach. After reading this paper, diligent managers should be able to identify potential security breaches.

Originality/value

This is one of the first studies to explore insider security breaches using canonical analysis.

Details

Information Management & Computer Security, vol. 17 no. 4
Type: Research Article
ISSN: 0968-5227

Keywords

Article
Publication date: 21 February 2020

Hossein Safari, Elham Razghandi, Mohammad Reza Fathi, Virgilio Cruz-Machado and Maria do Rosário Cabrita

The purpose of this study is to clarify the relationship between getting quality awards by companies and their financial performance in Iran's business.

Abstract

Purpose

The purpose of this study is to clarify the relationship between getting quality awards by companies and their financial performance in Iran's business.

Design/methodology/approach

In the first step, the relationship between awards scores and financial performance by canonical correlation analysis was examined. Then, binary and multinomial logistic regression was used to determine the degree of impact of each financial performance measure on getting quality awards. Finally, two forecasting functions were explored: the probability of achieving quality awards and the probability of achieving different levels of these awards.

Findings

Based on the analyzed data of 112 companies through canonical correlation analysis, there was a weak relationship between financial performance and getting quality awards. Also, by using logistic regression, no result was found to prove the impact of financial performance measures on getting Iran's national quality awards. It can be concluded that conceptually, deployment of excellence organizational models will not result in favorable outcomes, especially in the financial scope. Also, practically, excellence models have not been well deployed in Iranian companies, or these models do not fit to Iran's business environment. Organizational culture may not be consistent with quality.

Originality/value

Quality awards are given to qualified companies following the establishment of models of excellence such as the European Foundation for Quality Management (EFQM). The main novelty of this research is to clarify the relationship between getting quality awards by companies and their financial performance in Iran's business.

1 – 10 of 157