Abstract
Details
Keywords
Describes the benefits that arise from the use of Light Emitting Diodes (LEDs) for illumination in industrial machine vision systems. These include long life, stability and narrow…
Abstract
Describes the benefits that arise from the use of Light Emitting Diodes (LEDs) for illumination in industrial machine vision systems. These include long life, stability and narrow frequency bands. Also discusses precautions that need to be taken for obtaining a uniform illumination and pulsed operation.
Details
Keywords
Why is it that some car component manufacturers achieve twice the productivity of their rivals, yet incur just one‐hundredth of their rivals' defect rates?
Electronic packaging technologies, such as pin grid arrays, increasingly small pitch surface mount, and double‐sided assemblies are all aimed towards the highest possible product…
Abstract
Electronic packaging technologies, such as pin grid arrays, increasingly small pitch surface mount, and double‐sided assemblies are all aimed towards the highest possible product density, with improved performance. The gap between inspection effectiveness and advances made in packaging technologies is becoming larger. As efforts proceed, to learn more about critical factors influencing reliability of solder joints, it is prudent to ensure that printed wiring assembly (PWA) design rules evolve to permit the broadest range of anticipated automated inspection requirements. The range of automated inspection technologies can all be made more effective through careful design of electronics for inspection. Significant opportunities lie in both PWA layout and design, as well as electronic component design, tolerancing, and standardisation. Many inspection issues are shared, but with increased recognition of digital radiography's unique capabilities; this discussion will emphasise X‐ray inspection issues.
Richard C. Whitfield and Kam‐Ming Kwok
Reports a case study in using a team approach to improve the quality, cycle time and yield of integrated circuits assembled in Hong Kong. Ford’s eight‐disciplines (8‐D) process is…
Abstract
Reports a case study in using a team approach to improve the quality, cycle time and yield of integrated circuits assembled in Hong Kong. Ford’s eight‐disciplines (8‐D) process is the methodology used, and significant improvements are acheived with it. Within the framework of the 8‐D process, the work involves using simple quality tools to analyse and correct production problems. Demonstrates that a tightly‐focused approach, which follows well‐documented and methodical procedures using simple tools and techniques, can bring considerable benefits within a short time.
Details
Keywords
In this study, workplace spirituality is discussed in the context of remote work and the COVID-19 pandemic. First, the focus is on the changes in the meaning and function of…
Abstract
In this study, workplace spirituality is discussed in the context of remote work and the COVID-19 pandemic. First, the focus is on the changes in the meaning and function of employees in the organization during the evolutionary process of industrialization and management paradigms. Afterward, conceptual frameworks for spirituality and workplace spirituality are presented, and in the last section, academic studies that deal with workplace spirituality with distance or hybrid work arrangements are included. Early studies offer insights and recommendations on conceptualizing, developing, and managing workplace spirituality. They all emphasize that spirituality is necessary for remote work as a tool to overcome stress and mental health problems and increase employee well-being. Unfortunately, the remote work and workplace spirituality literature is relatively narrow and needs to be expanded.
Details
Keywords
Kalyan Nagaraj, Biplab Bhattacharjee, Amulyashree Sridhar and Sharvani GS
Phishing is one of the major threats affecting businesses worldwide in current times. Organizations and customers face the hazards arising out of phishing attacks because of…
Abstract
Purpose
Phishing is one of the major threats affecting businesses worldwide in current times. Organizations and customers face the hazards arising out of phishing attacks because of anonymous access to vulnerable details. Such attacks often result in substantial financial losses. Thus, there is a need for effective intrusion detection techniques to identify and possibly nullify the effects of phishing. Classifying phishing and non-phishing web content is a critical task in information security protocols, and full-proof mechanisms have yet to be implemented in practice. The purpose of the current study is to present an ensemble machine learning model for classifying phishing websites.
Design/methodology/approach
A publicly available data set comprising 10,068 instances of phishing and legitimate websites was used to build the classifier model. Feature extraction was performed by deploying a group of methods, and relevant features extracted were used for building the model. A twofold ensemble learner was developed by integrating results from random forest (RF) classifier, fed into a feedforward neural network (NN). Performance of the ensemble classifier was validated using k-fold cross-validation. The twofold ensemble learner was implemented as a user-friendly, interactive decision support system for classifying websites as phishing or legitimate ones.
Findings
Experimental simulations were performed to access and compare the performance of the ensemble classifiers. The statistical tests estimated that RF_NN model gave superior performance with an accuracy of 93.41 per cent and minimal mean squared error of 0.000026.
Research limitations/implications
The research data set used in this study is publically available and easy to analyze. Comparative analysis with other real-time data sets of recent origin must be performed to ensure generalization of the model against various security breaches. Different variants of phishing threats must be detected rather than focusing particularly toward phishing website detection.
Originality/value
The twofold ensemble model is not applied for classification of phishing websites in any previous studies as per the knowledge of authors.