Search results
1 – 10 of over 7000Lijie Ding, Yijia Cao, Guangzeng Wang and Meijun Liu
The purpose of this paper is to study the failures spread in complex power grids, and what topology of power grids is best for preventing or reducing blackouts.
Abstract
Purpose
The purpose of this paper is to study the failures spread in complex power grids, and what topology of power grids is best for preventing or reducing blackouts.
Design/methodology/approach
Based on the study of cascading failure models of complex power networks, an extended dynamical cascading failure model is proposed. Based on this model, two representatives of the complex power grids, the small‐world network and the scale‐free network, were simulated for line cascading failure. The power loss caused by cascading failures and the spreading speed of cascading failure are discussed.
Findings
Power loss caused by cascading failures in the small‐world network is much larger than that in the scale‐free network, and the speed of cascading failure propagation in the small‐world network is much faster than that in the scale‐free network.
Research limitations/implications
The establishment of the dynamical cascading failure model considering other protection devices needs further study.
Practical implications
The results of this study can be beneficial in system planning and upgrading.
Originality/value
An extended dynamical cascading failure model is proposed and cascading failures in different topology of power grid are discussed.
Details
Keywords
The purpose of this paper is to review recent contributions to the theoretical and empirical literature on informational cascades.
Abstract
Purpose
The purpose of this paper is to review recent contributions to the theoretical and empirical literature on informational cascades.
Design/methodology/approach
This paper reviews and synthesises the existing literature, methodologies and evidence on informational cascades.
Findings
Many financial settings foster situations where informational cascades and herding are likely. Cascades remain mainly an area of experimental research, leaving the empirical evidence inconclusive. Existing measures have limitations that do not allow for a direct test of cascading behaviour. More accurate models and methods for empirical testing of informational cascades could provide more conclusive evidence on the matter.
Practical implications
Outlined findings have implications for designing policies and regulatory requirements, as well as for the design of collective decisions processes.
Originality/value
The paper reviews and critiques existing theory; it summarises the recent laboratory and empirical evidence and identifies issues for future research. Most of other theoretical work reviews informational cascades as a subsection of herding. This paper focusses on informational cascades specifically. It distinguishes between informational cascade and herding. The paper also reviews most recent empirical evidence on cascades, presents review and synthesis of the theoretical and empirical development on information cascades up to date, and reviews the model of informational cascades with model criticism.
Details
Keywords
Pinsheng Duan and Jianliang Zhou
The construction industry is an industry with a high incidence of safety accidents, and the interactions of unsafe behaviors of construction workers are the main cause of…
Abstract
Purpose
The construction industry is an industry with a high incidence of safety accidents, and the interactions of unsafe behaviors of construction workers are the main cause of accidents. The neglect of the interactions may lead to serious underestimation of safety risks. This research aims to analyze the cascading vulnerability of unsafe behaviors of construction workers from the perspective of network modeling.
Design/methodology/approach
An unsafe behavior network of construction workers and a cascading vulnerability analysis model were established based on 296 actual accident cases. The cascading vulnerability of each unsafe behavior was analyzed based on the degree attack strategy.
Findings
Complex network with 85 unsafe behavior nodes is established based on the collected accidents in total. The results showed that storing in improper location, does not wear a safety helmet, working with illness and working after drinking are unsafe behaviors with high cascading vulnerability. Coupling analysis revealed that differentiated management strategies of unsafe behaviors should be applied. Besides, more focus should be put on high cascading vulnerability behaviors.
Originality/value
This research proposed a method to construct the cascading failure model of unsafe behavior for individual construction workers. The key parameters of the cascading failure model of unsafe behaviors of construction workers were determined, which could provide a reference for the research of cascading failure of unsafe behaviors. Additionally, a dynamic vulnerability research framework based on complex network theory was proposed to analyze the cascading vulnerability of unsafe behaviors. The research synthesized the results of dynamic and static analysis and found the key control nodes to systematically control unsafe construction behaviors.
Details
Keywords
Joohyun Kim, Ohsung Kwon and Duk Hee Lee
The purpose of this paper is to explore how hubs’ social influence on social network decisions can cause the behavior of information cascades in a market.
Abstract
Purpose
The purpose of this paper is to explore how hubs’ social influence on social network decisions can cause the behavior of information cascades in a market.
Design/methodology/approach
The authors establish understanding of the fundamental mechanism of information cascades through a computational simulation approach.
Findings
Eigenvector centrality, betweenness centrality, and PageRank are statistically correlated with the occurrence of information cascades among agents; the hubs’ incorrect decisions in the early diffusion stage can significantly cause misled shift cascades; and the bridge role of hubs is more influential than their pivotal position role in the process of misled shift cascades.
Originality/value
This implication can be extendable in the field of marketing, sequential voting, and technology, or innovation adoption.
Details
Keywords
Chao Ren, Xiaoxing Liu and Ziyan Zhu
The purpose of this paper is to test the invulnerability of the guarantee network at the equilibrium point.
Abstract
Purpose
The purpose of this paper is to test the invulnerability of the guarantee network at the equilibrium point.
Design/methodology/approach
This paper introduces a tractable guarantee network model that captures the invulnerability of the network in terms of cascade-based attack. Furthermore, the equilibrium points are introduced for banks to determine loan origination.
Findings
The proposed approach not only develops equilibrium analysis as an extended perspective in the guarantee network, but also applies cascading failure method to construct the guarantee network. The equilibrium points are examined by simulating experiment. The invulnerability of the guarantee network is quantified by the survival of firms in the simulating progress.
Research limitations/implications
There is less study in equilibrium analysis of the guarantee network. Additionally, cascading failure model is expressed in the presented approach. Moreover, agent-based model can be extended in generating the guarantee network in the future study.
Originality/value
The approach of this paper presents a framework to analyze the equilibrium of the guarantee network. For this, the systemic risk of the whole guarantee network and each node's contribution are measured to predict the probability of default on cascading failure. Focusing on cascade failure process based on equilibrium point, the invulnerability of the guarantee network can be quantified.
Details
Keywords
Hang Yin, Jishan Hou, Chengju Gong and Chen Xu
The behavior of the entities in a small and medium-sized enterprise (SME) cooperation network is influenced by the core enterprise. Addressing the problem of how the network…
Abstract
Purpose
The behavior of the entities in a small and medium-sized enterprise (SME) cooperation network is influenced by the core enterprise. Addressing the problem of how the network vulnerability changes when the core enterprise is attacked is a challenging topic. The purpose of this paper is to reveal the failure process of SME cooperation networks caused by the failure of the core SME from the perspective of cascading failure.
Design/methodology/approach
According to the Torch High Technology Industry Development Center, Ministry of Science & Technology in China, 296 SMEs in Jiangsu province were used to construct an SME cooperation network of technology-based SMEs and an under-loading cascading failure model. The weight-based attack strategy was selected to mimic a deliberate node attack and was used to analyze the vulnerability of the SME cooperation network.
Findings
Some important conclusions are obtained from the simulation analysis: (1) The minimum boundary of node enterprises has a negative relationship with networks' invulnerability, while the breakdown probability has an inverted-U relationship with networks' invulnerability. (2) The combined effect of minimum boundary and breakdown probability indicates that the vulnerability of networks is mainly determined by the breakdown probability; while, minimum boundary helps prevent cascading failure occur. Furthermore, according to the case study, adapting capital needs and resilience in the cooperation network is the core problem in improving the robustness of SME cooperation networks.
Originality/value
This research proposed an under-loading cascading failure model to investigate the under-loading failure process caused by the shortage of resources when the core enterprise fails or withdraws from the SME cooperation network. Two key parameters in the proposed model—minimum capacity and breakdown probability—could serve as a guide for research on the vulnerability of SME cooperation networks. Additionally, practical meanings for each parameter in the proposed model are given, to suggest novel insights regarding network protection to facilitate the robustness and vulnerability in real SME cooperation networks.
Details
Keywords
K.W.G. Rekha Nianthi and M.A.S. Jayakumara
Sri Lanka, as an island located near the southern tip of India and the Asian Continent and in the core area of the South Asian Monsoon has developed its own unique forms of…
Abstract
Sri Lanka, as an island located near the southern tip of India and the Asian Continent and in the core area of the South Asian Monsoon has developed its own unique forms of Hydraulic Civilization. Sri Lanka is covered with a network of thousands of man-made lakes and ponds, known locally as “tanks,” numbering more than 25,000. Some are in the functional mode and others still remaining abandoned type. Many are thousands of years old and almost all show a high degree of sophistication in their construction and design. Sri Lanka's tanks are fascinatingly distributed in the cascades of tanks one below the other conserving water and soil and most effectively, acting as buffers against droughts while giving due consideration to maintaining the ecosystem equilibrium.
Expansion through mergers and acquisitions (M&As) continues to be a viable international strategy utilised by industrial firms. A striking feature of this is that global giant…
Abstract
Expansion through mergers and acquisitions (M&As) continues to be a viable international strategy utilised by industrial firms. A striking feature of this is that global giant firms lead the M&A wave and generate an unimaginable impact on relatively small and weak firms across sectors and even nations. There seems to be a kind of ‘cascade effect’ between the industrial consolidations in these areas. A combined cascade model developed in this paper explains that, the power imbalance caused by the degree of consolidation of the players within a firm's value system determines the movement and direction of the ‘cascade effect’. With the existence of such effect, M&A will be a mutually interdependent, dynamic, reversible and endless process among industries.
Yun Huang, Kaizhou Gao, Kai Wang, Haili Lv and Fan Gao
The purpose of this paper is to adopt a three-stage cloud-based management system for optimizing greenhouse gases (GHG) emission and marketing decisions with supplier selection…
Abstract
Purpose
The purpose of this paper is to adopt a three-stage cloud-based management system for optimizing greenhouse gases (GHG) emission and marketing decisions with supplier selection and product family design in a multi-level supply chain with multiple suppliers, one single manufacturer and multiple retailers.
Design/methodology/approach
The manufacturer purchases optional components of a certain functionality from his alternative suppliers and customizes a set of platform products for retailers in different independent market segments. To tackle the studied problem, a hierarchical analytical target cascading (ATC) model is proposed, Jaya algorithm is applied and supplier selection and product family design are implemented in its encoding procedure.
Findings
A case study is used to verify the effectiveness of the ATC model in solving the optimization problem and the corresponding algorithm. It has shown that the ATC model can not only obtain close optimization results as a central optimization method but also maintain the autonomous decision rights of different supply chain members.
Originality/value
This paper first develops a three-stage cloud-based management system to optimize GHG emission, marketing decisions, supplier selection and product family design in a multi-level supply chain. Then, the ATC model is proposed to obtain the close optimization results as central optimization method and also maintain the autonomous decision rights of different supply chain members.
Details
Keywords
The purpose of this paper is to propose an optimal predictive model for the short-term forecast of real-time non-stationary machine variables by combining time series prediction…
Abstract
Purpose
The purpose of this paper is to propose an optimal predictive model for the short-term forecast of real-time non-stationary machine variables by combining time series prediction with adaptive algorithms to minimize the error and to improve the prediction accuracy.
Design/methodology/approach
The proposed model is applied for prediction of speed and controller set point of three-phase induction motor operating on closed loop speed control with AC drive and PI controller. At Stage 1, the trend of the machine variables has been extracted and added to auto-regressive moving average (ARMA) time series prediction. ARMA prediction has been carried out using different combinations of AR and MA methods in order to make prediction with less Mean Squared Error (MSE).
Findings
The prediction error indicates the inadequacy of the model to estimate the data characteristics, which has been resolved at the subsequent stage by cascading an adaptive least mean square finite impulse response filter to the time series model. The adaptive filter receives the predicted output including training data and iteratively adjusts its coefficients for zero error convergence.
Research limitations/implications
The componentized data prediction based on time series and cascade adaptive filter algorithm decomposes the non-stationary data characteristics for predictive maintenance. Evaluation of the model with different combination of time series algorithms and parameter settings of adaptive filter has been carried out to illustrate the performance of the prediction model. This prediction accuracy is compared with existing linear adaptive filter prediction using MSE as comparison index. The wide margin in the MSE values substantiates the prediction efficiency of the proposed model for machine data.
Originality/value
This model predicts the dynamic machine data with component decomposition at high accuracy, which enables to interpret the system response under dynamic conditions efficiently.
Details