Search results
1 – 10 of 27J. Seguin, F. Dandurand, D.A. Lowther and J.K. Sykulski
The paper presents a novel method of utilising neural networks for optimisation systems. First, a conventional magnetic circuit model of the device is developed to create a set of…
Abstract
The paper presents a novel method of utilising neural networks for optimisation systems. First, a conventional magnetic circuit model of the device is developed to create a set of sensitivity rules which guide the optimisation. The rules are coded in a knowledge‐based neural network. Second, an error network is developed to correct the approximations inherent in the magnetic circuit approach and this combines with the first network to generate realistic outputs. Finally, the error network can be trained on‐line with a finite element system. Over time, the network replaces the finite element analysis, thus speeding up the optimisation process.
Details
Keywords
Design and optimisation of many practical electromechanical devices involve intensive field simulation studies and repetitive usage of time‐consuming software such as finite…
Abstract
Design and optimisation of many practical electromechanical devices involve intensive field simulation studies and repetitive usage of time‐consuming software such as finite elements (FEs), finite differences of boundary elements. This is a costly, but unavoidable process and thus a lot of research is currently directed towards finding ways by which the number of necessary function calls could be reduced. New algorithms are being proposed based either on stochastic or deterministic techniques where a compromise is achieved between accuracy and speed of computation. Four different approaches appear to be particularly promising and are summarised in this review paper. The first uses a deterministic algorithm, known as minimal function calls approach, introduces online learning and dynamic weighting. The second technique introduced as ES/DE/MQ – as it combines evolution strategy, differential evolution and multiquadrics interpolation – offers all the advantages of a stochastic method, but with much reduced number of function calls. The third recent method uses neuro‐fuzzy modelling and leads to even further economy of computation, although with slightly reduced accuracy of computation. Finally, a combined FE/neural network approach offers a novel approach to optimisation if a conventional magnetic circuit model could also be used.
Details
Keywords
S. Subramanian and R. Bhuvaneswari
The power transformer is one of the most important pieces of equipment in a power system. The necessity for the optimum design of a power transformer arises because the design…
Abstract
Purpose
The power transformer is one of the most important pieces of equipment in a power system. The necessity for the optimum design of a power transformer arises because the design chosen should satisfy all the limitations and restrictions placed on it. This paper presents an improved fast evolutionary programming (IFEP) technique for the optimal design of a three‐phase power transformer.
Design/methodology/approach
The optimization of the transformer design problem is formulated as an NLP problem, expressing the objective and constraint functions in terms of the selected independent variables. Here the cost of the transformer is considered as the objective function and is the sum of material cost of stampings and copper windings, cost of cooling tube arrangements, cost of cooling medium, insulation cost and labour cost. A computer program is written from which the optimal design parameters are obtained. For optimization, the classical evolutionary programming (CEP) technique and its variant the IFEP technique are used and the results are compared.
Findings
The application of CEP and IFEP for transformer design has been demonstrated on two test cases. It has been observed that this IFEP outperforms the CEP in obtaining the optimum design of transformers of smaller as well as larger ratings in terms of execution time, convergence rate, quality and success rate.
Originality/value
The proposed method results in the economical design of a three‐phase power transformer which can significantly reduce the cost of manufacturing transformers.
Details
Keywords
C. Magele, W. Renhart and B. Brandstätter
The process of identifying unknown hidden objects by taking advantage of electromagnetic effects becomes more and more important. Clearing of mines or finding electrical…
Abstract
The process of identifying unknown hidden objects by taking advantage of electromagnetic effects becomes more and more important. Clearing of mines or finding electrical conductors in concrete should be mentioned here. Magnetisation and eddy currents are the phenomena which are used in general. In this case, the layout and arrangement of the excitation coils and receiving coils influences the effectiveness and accuracy crucially. This design optimization process can be done by simulating the electromagnetic field with a 3D finite element method. Once a satisfying configuration has been found, the question arises, which quantities of the measured (and hence simulated) signals contain the most reliable information? Since the 3D finite element calculations are very time consuming, the inverse problem (detecting the ferrous object from some measured signals) is performed by approximating the corresponding electromagnetic signal by a neural network. Investigations on a ferrous conductive rod will be described in the paper.
Details
Keywords
– This paper aims to examine whether from a factual standpoint, it is sufficiently reasonable to address the suppression of terrorist financing by analogy with money laundering.
Abstract
Purpose
This paper aims to examine whether from a factual standpoint, it is sufficiently reasonable to address the suppression of terrorist financing by analogy with money laundering.
Design/methodology/approach
The process of terrorist financing will be examined in regard to the funding requirements of terrorists and the methods and tools that terrorists use to raise, move and store their funds. The process of money laundering will be compared with terrorist financing. The role of money laundering in terrorist financing will be discussed. In the core part of this paper, the assumptions justifying the inclusion of anti-money laundering measures to terrorist financing will be challenged.
Findings
What terrorist financing and money laundering share in common is money. However, there are fundamental differences between them with regard to the sources of funds and the direction of financial flows. None of the elements –“accumulation” and “legitimization”– involved in money laundering are necessarily engaged in the process of terrorist financing. This questions the authenticity of the assumptions which underlie the adopted approach. It also requires further investigation on the effectiveness of the integrated counter-terrorist regime, which will not be covered by this paper.
Originality/value
This paper provides a comprehensive introduction for those dealing with the greater question of whether the terrorist financing can and should be tackled by anti-money laundering measures.
Details
Keywords
Jacques Masounave, Youssef A. Youssef, Yves Beauchamp and Marc Thomas
Investigates the effects of the most influential cutting parameters (cutting speed, feed rate, depth of cut, tool nose radius, tool length and work piece length) on surface…
Abstract
Investigates the effects of the most influential cutting parameters (cutting speed, feed rate, depth of cut, tool nose radius, tool length and work piece length) on surface roughness quality and on the formation of built‐up edge in a lathe dry turning process of mild carbon steel samples. A full factorial design (384 experiments), taking into account the three‐level interactions between the independent variables has been conducted. The results show that the following three‐level interactions: feed rate × cutting speed × depth of cut, feed rate × cutting speed × tool nose radius and tool nose radius × depth of cut × tool length have significant effects on surface roughness in this type of machining operation. Shows that the analysis of main effects alone and even two‐level interactions could lead to a false interpretation of the results. The analysis of variance revealed that the best surface roughness is achieved with a low feed rate, a large tool nose radius and a high cutting speed. The results also show that the depth of cut has no significant effect on surface roughness when operating at cutting speeds higher than 160m/min. Furthermore, it is shown that built‐up edge formation deteriorates surface roughness when machining mild carbon steel at specific feed rate, tool nose radius and cutting speed levels. Proposes a new model for evaluating the limiting cutting speed to avoid the built‐up edge formation. Finally, shows through experimentation that an increase in depth of cut would lead to improved surface roughness when tool vibration is increased.
Details
Keywords
This paper aims to investigate the obstacles to the sharing of information, as envisaged in the United Nations Convention against Corruption (UNCAC), and therefore, its…
Abstract
Purpose
This paper aims to investigate the obstacles to the sharing of information, as envisaged in the United Nations Convention against Corruption (UNCAC), and therefore, its accessibility to developing countries. The findings of this paper could help States to limit corruption in interstate interactions and civil society groups calling for measures that can help assess potential corruption.
Design/methodology/approach
This research is based on qualitative analysis – usual normative analysis was undertaken in law and economics. For this purpose, an analysis of the literature on cooperation generated by the UNCAC and State practice within defence deals was undertaken.
Findings
It is found that States where defence manufacturers reside can prevent information sharing and thereby hinder investigations against corruption. It is found that defence importing States can overcome the limitations of the UNCAC, to enforce information sharing, by including guarantees into their contracts.
Originality/value
As research on information sharing practices of States are scarce or non-existent, this paper contributes to the literature on this aspect of cooperation envisaged in the UNCAC. Further, this paper elaborates on what States could do to limit non-cooperation in the sharing of information.
Details
Keywords
This paper aims to provide a guide to significant primary and secondary resources relevant to the study of Emily Dickinson and her poetry.
Abstract
Purpose
This paper aims to provide a guide to significant primary and secondary resources relevant to the study of Emily Dickinson and her poetry.
Design/methodology/approach
Online catalogs, bibliographies, and the worldwide web were searched to identify relevant items. In some cases, citation analysis and other bibliometric measures were used to determine the highest‐impact sources. Items were annotated after personal examination by the author. The paper is divided into two main sections: primary sources (anthologies, databases and web resources) and secondary sources (bibliographies, databases, biographical resources, reference resources, monographs, journals and web resources).
Findings
The paper introduces each resource, indicating its scope and contribution to the study of Dickinson. It acknowledges in particular the developments in recent Dickinson scholarship.
Originality/value
Dickinson remains popular among both scholars and laypeople, but the most recent bibliographies of Dickinson scholarship date to the late 1980s. This guide provides a late twentieth‐ to early twenty‐first‐century update to those earlier works.
Details
Keywords
When the first edition of Poems by Emily Dickinson was published in 1890, Samuel G. Ward, a writer for the Dial, commented, “I am with all the world intensely interested in Emily…
Abstract
When the first edition of Poems by Emily Dickinson was published in 1890, Samuel G. Ward, a writer for the Dial, commented, “I am with all the world intensely interested in Emily Dickinson. She may become world famous or she may never get out of New England” (Sewall 1974, 26). A century after Emily Dickinson's death, all the world is intensely interested in the full nature of her poetic genius and her commanding presence in American literature. Indeed, if fame belonged to her she could not escape it (JL 265). She was concerned about becoming “great.” Fame intrigued her, but it did not consume her. She preferred “To earn it by disdaining it—”(JP 1427). Critics say that she sensed her genius but could never have envisioned the extent to which others would recognize it. She wrote, “Fame is a bee./It has a song—/It has a sting—/Ah, too, it has a wing” (JP 1763). On 7 May 1984 the names of Emily Dickinson and Walt Whitman were inscribed on stone tablets and set into the floor of the newly founded United States Poets' Corner of the Cathedral of St. John the Divine in New York City, “the first poets elected to this pantheon of American writers” (New York Times 1985). Celebrations in her honor draw a distinguished assemblage of international scholars, renowned authors and poets, biographers, critics, literary historians, and admirers‐at‐large. In May 1986 devoted followers came from places as distant as Germany, Poland, Scandinavia, and Japan to Washington, DC, to participate in the Folger Shakespeare Library's conference, “Emily Dickinson, Letter to the World.”
Dina Zemke and Stowe Shoemaker
The purpose of this paper is to provide an overview of the extant research around the non‐pathological gaming customer and then propose research for future study of this customer.
Abstract
Purpose
The purpose of this paper is to provide an overview of the extant research around the non‐pathological gaming customer and then propose research for future study of this customer.
Design/methodology/approach
Academic literature combined with the results of primary research is used to examine the incidence of gambling and non‐problem gaming research trends in the hospitality industry.
Findings
The overview of the publicly available research on the casino gaming consumer leads to a host of suggestions for future research.
Practical implications
The practical implications include recent developments in gaming consumer profiles, as well as suggested for future research to further understand the non‐problem gaming consumer.
Originality/value
The paper examines existing literature and is valuable for anyone who wishes to begin studying the gaming consumer. This paper provides direction for future study.
Details