Search results

1 – 10 of over 2000
Article
Publication date: 5 March 2021

Kapil Bhardwaj and Mayank Srivastava

The purpose of the paper is to report an emulation configuration of a three pinch-off memristor (TPM), whose transient characteristics consist three cross-over points on the…

Abstract

Purpose

The purpose of the paper is to report an emulation configuration of a three pinch-off memristor (TPM), whose transient characteristics consist three cross-over points on the voltage-current plane, which is dissimilar to a conventional memristor. These characteristics can be very useful in memristor-based multi-bit memory devices and hyperchaotic oscillators.

Design/methodology/approach

The work describes the Mathematical framework for TPM and a circuit emulator based on the derived conditions. The configuration is based on five operational transconductance amplifier (OTAs) and four grounded passive elements. After which, we have verified its operation using personal simulation program with integrated circuit emphasis simulation environment. Finally, the implementation of OTA-based TPM using commercial integrated circuit (IC) LM13700 has also been presented.

Findings

It has been shown that a flux-dependent memductance expression of cubic order can show three intersections on the VI contour under certain parameter related constraints. Moreover, the OTA-based emulator reported in the work is very compact in nature because of the no use of external multiplier IC/circuitry, which has been popular in previous emulators.

Originality/value

For the first time, a multiple cross-over memristor emulator has been reported which can operate under practical operating conditions such as at practical operating frequencies and sinusoidal excitation.

Details

Circuit World, vol. 48 no. 2
Type: Research Article
ISSN: 0305-6120

Keywords

Article
Publication date: 21 July 2020

Arshey M. and Angel Viji K. S.

Phishing is a serious cybersecurity problem, which is widely available through multimedia, such as e-mail and Short Messaging Service (SMS) to collect the personal information of…

Abstract

Purpose

Phishing is a serious cybersecurity problem, which is widely available through multimedia, such as e-mail and Short Messaging Service (SMS) to collect the personal information of the individual. However, the rapid growth of the unsolicited and unwanted information needs to be addressed, raising the necessity of the technology to develop any effective anti-phishing methods.

Design/methodology/approach

The primary intention of this research is to design and develop an approach for preventing phishing by proposing an optimization algorithm. The proposed approach involves four steps, namely preprocessing, feature extraction, feature selection and classification, for dealing with phishing e-mails. Initially, the input data set is subjected to the preprocessing, which removes stop words and stemming in the data and the preprocessed output is given to the feature extraction process. By extracting keyword frequency from the preprocessed, the important words are selected as the features. Then, the feature selection process is carried out using the Bhattacharya distance such that only the significant features that can aid the classification are selected. Using the selected features, the classification is done using the deep belief network (DBN) that is trained using the proposed fractional-earthworm optimization algorithm (EWA). The proposed fractional-EWA is designed by the integration of EWA and fractional calculus to determine the weights in the DBN optimally.

Findings

The accuracy of the methods, naive Bayes (NB), DBN, neural network (NN), EWA-DBN and fractional EWA-DBN is 0.5333, 0.5455, 0.5556, 0.5714 and 0.8571, respectively. The sensitivity of the methods, NB, DBN, NN, EWA-DBN and fractional EWA-DBN is 0.4558, 0.5631, 0.7035, 0.7045 and 0.8182, respectively. Likewise, the specificity of the methods, NB, DBN, NN, EWA-DBN and fractional EWA-DBN is 0.5052, 0.5631, 0.7028, 0.7040 and 0.8800, respectively. It is clear from the comparative table that the proposed method acquired the maximal accuracy, sensitivity and specificity compared with the existing methods.

Originality/value

The e-mail phishing detection is performed in this paper using the optimization-based deep learning networks. The e-mails include a number of unwanted messages that are to be detected in order to avoid the storage issues. The importance of the method is that the inclusion of the historical data in the detection process enhances the accuracy of detection.

Details

Data Technologies and Applications, vol. 54 no. 4
Type: Research Article
ISSN: 2514-9288

Keywords

Article
Publication date: 9 August 2013

Carlos E. Ortiz, Charles A. Stone and Anne Zissu

One of the main risks to investors in securitized reverse mortgages is that the value of the reverse mortgage exceeds that of the property. The purpose of this paper is to develop…

Abstract

Purpose

One of the main risks to investors in securitized reverse mortgages is that the value of the reverse mortgage exceeds that of the property. The purpose of this paper is to develop a model that determines paths of constant cross‐over points across any pairs of interest and inflation rate.

Design/methodology/approach

To study the behavior of hyper‐surfaces, multivariate calculus was used.

Findings

Knowing that the value of a reverse mortgage increases above that of the property value once it goes beyond the cross‐over point t*, it is possible to construct a pool of reverse mortgages, such that for any pairs of inflation rate and interest rate (x, r), these reverse mortgages move along lines of constant cross‐over points t*.

Originality/value

The paper develops a model that determines paths of constant cross‐over points across any pairs of interest and inflation rate, which can be used when structuring pools of reverse mortgage‐backed securities, to credit‐enhance investors.

Details

The Journal of Risk Finance, vol. 14 no. 4
Type: Research Article
ISSN: 1526-5943

Keywords

Article
Publication date: 1 June 2000

P.Di Barba

Introduces papers from this area of expertise from the ISEF 1999 Proceedings. States the goal herein is one of identifying devices or systems able to provide prescribed…

Abstract

Introduces papers from this area of expertise from the ISEF 1999 Proceedings. States the goal herein is one of identifying devices or systems able to provide prescribed performance. Notes that 18 papers from the Symposium are grouped in the area of automated optimal design. Describes the main challenges that condition computational electromagnetism’s future development. Concludes by itemizing the range of applications from small activators to optimization of induction heating systems in this third chapter.

Details

COMPEL - The international journal for computation and mathematics in electrical and electronic engineering, vol. 19 no. 2
Type: Research Article
ISSN: 0332-1649

Keywords

Book part
Publication date: 29 January 2018

Gábor Nagy, Carol M. Megehee and Arch G. Woodside

The study here responds to the view that the crucial problem in strategic management (research) is firm heterogeneity – why firms adopt different strategies and structures, why…

Abstract

The study here responds to the view that the crucial problem in strategic management (research) is firm heterogeneity – why firms adopt different strategies and structures, why heterogeneity persists, and why competitors perform differently. The present study applies complexity theory tenets and a “neo-configurational perspective” of Misangyi et al. (2016) in proposing complex antecedent conditions affecting complex outcome conditions. Rather than examining variable directional relationships using null hypotheses statistical tests, the study examines case-based conditions using somewhat precise outcome tests (SPOT). The complex outcome conditions include firms with high financial performances in declining markets and firms with low financial performances in growing markets – the study focuses on seemingly paradoxical outcomes. The study here examines firm strategies and outcomes for separate samples of cross-sectional data of manufacturing firms with headquarters in one of two nations: Finland (n = 820) and Hungary (n = 300). The study includes examining the predictive validities of the models. The study contributes conceptual advances of complex firm orientation configurations and complex firm performance capabilities configurations as mediating conditions between firmographics, firm resources, and the two final complex outcome conditions (high performance in declining markets and low performance in growing markets). The study contributes by showing how fuzzy-logic computing with words (Zadeh, 1966) advances strategic management research toward achieving requisite variety to overcome the theory-analytic mismatch pervasive currently in the discipline (Fiss, 2007, 2011) – thus, this study is a useful step toward solving the crucial problem of how to explain firm heterogeneity.

Details

Improving the Marriage of Modeling and Theory for Accurate Forecasts of Outcomes
Type: Book
ISBN: 978-1-78635-122-7

Keywords

Article
Publication date: 24 August 2012

David Lewis

Organizational life and policy making is increasingly conceived in terms of a “three sector” model – public, private and “third”. The purpose of this research paper is to examine…

Abstract

Purpose

Organizational life and policy making is increasingly conceived in terms of a “three sector” model – public, private and “third”. The purpose of this research paper is to examine a little‐studied phenomenon that increasingly characterises societies in both the “developed” and the “developing” worlds. It aims to argue that these “sectors” have permeable boundaries, and that increasing numbers of activists and professionals operate across such boundaries, with important implications for policy and work.

Design/methodology/approach

The research paper reports on a set of new ethnographic life‐work history data from the UK, Bangladesh and Philippines to explore experiences of people who cross between, or straddle, the third sector and the public sector.

Findings

The paper constructs a preliminary typology of boundary crosser archetypes for purposes of further analysis. This is based on motivations and levels of boundary crossing. Boundary crossing of this kind is linked with the concept of “work role transition”, and with the micro‐politics of policy contention.

Practical implications

The paper concludes by suggesting that such work may offer new practical insights into strengthening the capacity of both third sector and government agencies.

Originality/value

The paper aims to be original in opening up this new topic for further discussion (and in particular problematizing the idea of sector boundaries), and through using the life history method to as part of organisational ethnography.

Details

Journal of Organizational Ethnography, vol. 1 no. 2
Type: Research Article
ISSN: 2046-6749

Keywords

Article
Publication date: 1 December 2000

Hui‐Yuan Fan, Jane Wei‐Zhen Lu and Zong‐Ben Xu

Genetic algorithms have been extensively used in different domains as a type of robust optimization method. They have a much better chance of achieving global optima than…

Abstract

Genetic algorithms have been extensively used in different domains as a type of robust optimization method. They have a much better chance of achieving global optima than conventional gradient‐based methods which usually converge to local sub‐optima. However, convergence speeds of genetic algorithms are often not good enough at their current stage. For this reason, improving the existing algorithms becomes a very important aspect of accelerating the development of the algorithms. Three improved strategies for genetic algorithms are proposed based on Holland’s simple genetic algorithm (SGA). The three resultant improved models are studied empirically and compared, in feasibility and performance evaluation, with a set of artificial test functions which are usually used as performance benchmarks for genetic algorithms. The simulation results demonstrate that the three proposed strategies can significantly improve the SGA.

Details

Engineering Computations, vol. 17 no. 8
Type: Research Article
ISSN: 0264-4401

Keywords

Article
Publication date: 15 August 2019

Xiaohong Lu, Yongquan Wang, Jie Li, Yang Zhou, Zongjin Ren and Steven Y. Liang

The purpose of this paper is to solve the problem that the analytic solution model of spatial three-dimensional coordinate measuring system based on dual-position sensitive…

Abstract

Purpose

The purpose of this paper is to solve the problem that the analytic solution model of spatial three-dimensional coordinate measuring system based on dual-position sensitive detector (PSD) is complex and its precision is not high.

Design/methodology/approach

A new three-dimensional coordinate measurement algorithm by optimizing back propagation (BP) neural network based on genetic algorithm (GA) is proposed. The mapping relation between three-dimensional coordinates of space points in the world coordinate system and light spot coordinates formed on dual-PSD has been built and applied to the prediction of three-dimensional coordinates of space points.

Findings

The average measurement error of three-dimensional coordinates of space points at three-dimensional coordinate measuring system based on dual-PSD based on GA-BP neural network is relatively small. This method does not require considering the lens distortion and the non-linearity of PSD. It has simple structure and high precision and is suitable for three-dimensional coordinate measurement of space points.

Originality/value

A new three-dimensional coordinate measurement algorithm by optimizing BP neural network based on GA is proposed to predict three-dimensional coordinates of space points formed on three-dimensional coordinate measuring system based on dual-PSD.

Details

Engineering Computations, vol. 36 no. 6
Type: Research Article
ISSN: 0264-4401

Keywords

Article
Publication date: 1 January 1990

I.D.E. Videlo and R.R. Sutherland

It is proposed that reliable multilevel thick‐film conductor interconnect, having high track conductivity, can be fabricated with conventional air‐firing thick‐film materials, by…

Abstract

It is proposed that reliable multilevel thick‐film conductor interconnect, having high track conductivity, can be fabricated with conventional air‐firing thick‐film materials, by combining the high conductivity of a pure silver conductor with the solderability of a palladium‐silver conductor. Thick‐film conductor interconnect fabricated in this manner was shown to meet comfortably the stringent requirements of a 20 year service life. A development in the standard technology used to obtain high conductivity interconnect, nitrogen‐firing copper thick‐film materials was also evaluated. It was found that new lower porosity dielectrics may allow copper thick‐film conductor interconnect to be as reliable as the air‐firing alternatives. The activation energy for the process of silver migration through a thick‐film dielectric in a humid environment was found to be in the region of 0.6 eV. The accelerating influence of humidity was also measured.

Details

Microelectronics International, vol. 7 no. 1
Type: Research Article
ISSN: 1356-5362

Article
Publication date: 28 October 2014

Kun Zhou and Zhu He

The purpose of this paper is to investigate aerosol evolution in a planar mixing layer from a Lagrangian point of view. After using Monte Carlo (MC) method to simulate the…

Abstract

Purpose

The purpose of this paper is to investigate aerosol evolution in a planar mixing layer from a Lagrangian point of view. After using Monte Carlo (MC) method to simulate the evolution of aerosol dynamics along particles trajectories, the particles size distributions are obtained, which are unavailable in mostly used methods of moments.

Design/methodology/approach

Nucleation and growth of dibutyl phthalate (DBP) particles are simulated using the quadrature method of moments in a planar mixing layer, where a fast hot stream with DBP vapor is mixing with a slow cool stream without vapor. Trajectories of aerosol particles are recorded. MC method is used to simulate the aerosol evolution along trajectories.

Findings

Investigation on aerosol evolution along the trajectories prompts to classify these trajectories into three groups: first, trajectories away from the active nucleation zone; second, trajectories starting from the active nucleation zone; and third, trajectories crossing over the active nucleation zone. Particle size distributions (psds) along selected representative trajectories are investigated. The psd evolution exhibits interesting behavior due to the synthetic effects of nucleation and condensation. Condensation growth tends to narrow down the psd, and form a sharp front on the side of big particle size. Nucleation is able to broaden the psd through generating the smallest particles. The duration and strength of nucleation have significant effect on the shape of psd.

Originality/value

As far as the authors knowledge, it is the first simulation of aerosol evolution that takes a Lagrangian point of view, and uses MC simulation along particles trajectories to provide the particles size distribution.

Details

International Journal of Numerical Methods for Heat & Fluid Flow, vol. 24 no. 8
Type: Research Article
ISSN: 0961-5539

Keywords

1 – 10 of over 2000