D.J. Svetkoff, D.N. Smith and B.L. Doss
Recently great interest has developed for a high speed, flexible machine vision system which can accurately determine solder paste and component placement for both process…
Abstract
Recently great interest has developed for a high speed, flexible machine vision system which can accurately determine solder paste and component placement for both process verification and quality control inspection. Present SMT inspection systems must cope with the unpredictable appearance of components and backgrounds and are often used only to determine presence and absence. This paper describes a new approach which combines greyscale data with a three‐dimensional map of the board under test. Originally this method was proposed as a robust technique for locating components in low contrast greyscale images. However, experience working with manufacturers and developers of placement equipment has shown that emerging SMT inspection requirements indicate the importance of three‐dimensional information. In addition to the detection of components and measurement of orientation, examples are shown of solder paste volume measurements, lead co‐planarity, and tombstone effect detection.
Purpose – A decade after the heinous act of moral turpitude at Virginia Tech, this chapter examines considerations of deterrence and mitigation for campus violence, and discusses…
Abstract
Purpose – A decade after the heinous act of moral turpitude at Virginia Tech, this chapter examines considerations of deterrence and mitigation for campus violence, and discusses the arming of campus police.
Design/methodology/approach – This chapter incorporates campus violence from a phenomenological perspective.
Findings – This chapter highlights the notion that no universal panacea exists toward abating violence among higher education settings. However, various preventive and control strategies may be employed to support the long-term campus safety initiatives of higher education institutions.
Originality/value – This chapter provides a commentary regarding preventive strategies, control strategies, and policy considerations for higher education institutions. It emphasizes the notion that all higher educations are unique, and must craft their own individual policies that satisfy the requirements of their specific situations.
Details
Keywords
This chapter examines how Maragoli women farmers’ plot-level crop control, individual, and household variables affect yields. This chapter contributes to a holistic understanding…
Abstract
Purpose
This chapter examines how Maragoli women farmers’ plot-level crop control, individual, and household variables affect yields. This chapter contributes to a holistic understanding of the ramifications of quantitative and qualitative factors informing women farmers’ plot-level undertakings and yields as well as their innovative and creative strategies for optimizing output. It broadens the existing debate in the sub-Saharan African agricultural production literature by suggesting a composite measure of plot-level crop control as one factor influencing women farmers’ yields even in situations where land is owned by someone else. It also provides a rich discussion of the various and interlocking qualitative factors distorting women farmers’ incentive structures, efforts to increase plot-level yields and their strategies for minimizing the detrimental effects of the same.
Methodology/approach
A multimethod quantitative and qualitative ethnographic case study approach was used in this study.
Findings
This chapter demonstrates that women strategically bargained and invested more of their productive resources on the plots where they anticipated the greatest individual gains.
Practical implications
This chapter underscores women farmers’ ability to boost agricultural output when there are appropriate incentives for them to do so and suggests the theoretical and practical relevance of secure control and property rights over the products of the land not for the household (head), but for the cultivator. The chapter demonstrates and reaffirms that Africa women farmers respond appropriately to incentives and suggests that there is need for a customized, renewed, and sustained emphasis on women farmers’ empowerment and inclusion in all levels in the agricultural sector in order to actualize increased yields. Investing in women farmers and implementing policies that narrow existing gender disparities in African agricultural production systems is holistically beneficial.
Details
Keywords
Adoption of a separate capital budget in local governments receives little attention in the literature. It is important to look at various capital budgeting practices in local…
Abstract
Adoption of a separate capital budget in local governments receives little attention in the literature. It is important to look at various capital budgeting practices in local governments since a separate capital budget as different budget format and structure affects budgetary decisions, thus leading to different levels of investment in public infrastructure. This paper examines factors that facilitate or impede adoption of a separate capital budget by using time series data. Results show that local governments are more likely to adopt a separate capital budget in order to reflect local demands such as growth rate in capital spending.
When a parameter of interest is nondifferentiable in the probability, the existing theory of semiparametric efficient estimation is not applicable, as it does not have an…
Abstract
When a parameter of interest is nondifferentiable in the probability, the existing theory of semiparametric efficient estimation is not applicable, as it does not have an influence function. Song (2014) recently developed a local asymptotic minimax estimation theory for a parameter that is a nondifferentiable transform of a regular parameter, where the transform is a composite map of a continuous piecewise linear map with a single kink point and a translation-scale equivariant map. The contribution of this paper is twofold. First, this paper extends the local asymptotic minimax theory to nondifferentiable transforms that are a composite map of a Lipschitz continuous map having a finite set of nondifferentiability points and a translation-scale equivariant map. Second, this paper investigates the discontinuity of the local asymptotic minimax risk in the true probability and shows that the proposed estimator remains to be optimal even when the risk is locally robustified not only over the scores at the true probability, but also over the true probability itself. However, the local robustification does not resolve the issue of discontinuity in the local asymptotic minimax risk.
Details
Keywords
Adam J. Vanhove, Tiffany Brutus and Kristin A. Sowden
In recent years, a wide range of psychosocial health interventions have been implemented among military service members and their families. However, there are questions over the…
Abstract
In recent years, a wide range of psychosocial health interventions have been implemented among military service members and their families. However, there are questions over the evaluative rigor of these interventions. We conducted a systematic review of this literature, rating each relevant study (k = 111) on five evaluative rigor scales (type of control group, approach to participant assignment, outcome quality, number of measurement time points, and follow-up distality). The most frequently coded values on three of the five scales (control group type, participant assignment, and follow-up distality) were those indicating the lowest level of operationally defined rigor. Logistic regression results indicate that the evaluative rigor of intervention studies has largely remained consistent over time, with exceptions indicating that rigor has decreased. Analyses among seven military sub-populations indicate that interventions conducted among soldiers completing basic training, soldiers returning from combat deployment, and combat veterans have had, on average, the greatest evaluative rigor. However, variability in mean scores across evaluative rigor scales within sub-populations highlights the unique methodological hurdles common to different military settings. Recommendations for better standardizing the intervention evaluation process are discussed.
Details
Keywords
Joshua J. Turner, Olena Kopystynska, Kay Bradford, Brian J. Higginbotham and David G. Schramm
High divorce rates have coincided with higher rates of remarriage. Although remarriages are more susceptible to dissolution than first-order marriages, less research has focused…
Abstract
High divorce rates have coincided with higher rates of remarriage. Although remarriages are more susceptible to dissolution than first-order marriages, less research has focused on factors that promote vulnerabilities among remarried couples. In the current study, the authors focused on whether predictors of divorce differ by the number of times someone has been married. The authors examined some of the most common reasons for divorce, as identified by parents who completed a state-mandated divorce education course (n = 8,364), while also controlling for participant sociodemographic characteristics. Participants going through their first divorce were more likely to identify growing apart and infidelity as reasons for seeking a divorce. Conversely, those going through a subsequent divorce were more likely to list problems with alcohol/drug abuse, childrearing differences, emotional/psychological/verbal mistreatment, money problems, physical violence, and arguing. Multivariate analyses indicated that sociodemographic factors were stronger predictors of divorce number than commonly listed reasons for divorce for both male and female participants. Implications for remarital and stepfamily stability and directions for future research are discussed.
Details
Keywords
Hamed Sabouhi, Aref Doroudi, Mahmud Fotuhi-Firuzabad and Mahdi Bashiri
This paper aims to propose a novel matrix-based systematic approach for vulnerability assessment.
Abstract
Purpose
This paper aims to propose a novel matrix-based systematic approach for vulnerability assessment.
Design/methodology/approach
The proposed method consists of two major steps. First, the power network is modeled as a topological combination of edges (transmission lines, transformers, etc.) and nodes (buses, substations, etc.). The second step is to use an axiomatic design-based index for topology analysis. This index is based on the systematic counting of possible routes from the start (generators) to destination (loads), considering load importance, before and after a disruption.
Findings
The effectiveness of the proposed method is demonstrated through an illustrative example and the Institute of Electrical and Electronics Engineers (IEEE) 14-bus power system. It was shown that the load’s importance influences the results of the vulnerability analysis. The proposed method has some advantages over traditional graph theory such as an explicit description of multiple transmission nodes and assets with multiple conversion processes. Furthermore, it would help the power grid operators and asset investment managers to be better to assess the vulnerable components.
Research limitations/implications
The proposed method can be used in planning, optimization, robustness and hardening of power systems.
Originality/value
The paper presents a matrix-based systematic approach to evaluate and quantify the vulnerability of the power grid’s components.
Details
Keywords
Vishnu P. Murty and Kathryn C. Dickerson
Motivation significantly influences learning and memory. While a long history of research has focused on simple forms of associative learning, such as Pavlovian conditioning…
Abstract
Motivation significantly influences learning and memory. While a long history of research has focused on simple forms of associative learning, such as Pavlovian conditioning, recent research is beginning to characterize how motivation influences episodic memory. In this chapter we synthesize findings across behavioral, cognitive, and educational neuroscience to characterize motivation’s influence on memory. We provide evidence that neural systems underlying motivation, namely the mesolimbic dopamine system, interact with and facilitate activity within systems underlying episodic memory, centered on the medial temporal lobes. We focus on two mechanisms of episodic memory enhancement: encoding and consolidation. Together, the reviewed research supports an adaptive model of memory in which an individual’s motivational state (i.e., learning under states of reward or punishment) shapes the nature of memory representations in service of future goals. The impact of motivation on learning and memory, therefore, has very clear implications for and applications to educational settings.