Search results

1 – 7 of 7
Article
Publication date: 2 May 2017

Tao Cheng, Keqin Yan, Jun-Jie Zheng, Xian-Feng Luo, Ding-Bang Zhang, Wan-Hui Xu, Ren-Jie Hu and Yi Zhang

This paper aims to present a simplified solution method for the elasto-plastic consolidation problem under different stress paths.

Abstract

Purpose

This paper aims to present a simplified solution method for the elasto-plastic consolidation problem under different stress paths.

Design/methodology/approach

First, a double-yield-surface model is introduced as the constitutive model framework, and a partial derivative coefficient sequence is obtained by using numerical approximation using Gauss nuclear function to construct a discretization constitutive model which can reflect the influence of different stress paths. Then, the model is introduced to Biot’s consolidation theory. Volumetric strain of each step as the right-hand term, the continuity equation is simplified as a Poisson equation and the fundamental solution is derived by the variable separation method. Based on it, a semi-analytical and semi-numerical method is presented and implemented in a finite element program.

Findings

The method is a simplified solution that is more convenient than traditional coupling stiffness matrix method. Moreover, the consolidation of the semi-infinite foundation model is analyzed. It is shown that the numerical method is sufficiently stable and can reflect the influence of stress path, loading distribution width and some other factors on the deformation of soil skeleton and pore water pressure.

Originality/value

Original features of this research include semi-numerical semi-analytical consolidation method; pore water pressure and settlements of different stress paths are different; maximum surface uplift at 3.5a; and stress path is the main influence factor for settlement when loading width a > 10 m.

Article
Publication date: 12 October 2012

Xiao Bing, Jiang Yan and Jin Hongbin

The purpose of this paper is to present an approach which can evaluate the ability that successfully achieves command and control, both in qualitative and quantitative modes, to…

239

Abstract

Purpose

The purpose of this paper is to present an approach which can evaluate the ability that successfully achieves command and control, both in qualitative and quantitative modes, to improve decision accuracy and speed, as well as construct an executable architecture for analyzing and verifying different decision projects.

Design/methodology/approach

By defining command and control (C2) decision architecture and decomposing C2 decision processes into measurable subfunctions, measures and metrics will be associated with each of the lowest level decomposed functions, and will be used to provide support for performance evaluation. Both Markov decision process analysis and conditional probability (CP) logic are used for modeling the decision‐making process of course of action (COA). Meanwhile, an executable architecture constructed by Petri net is applied to logic structural verification and performance evaluation.

Findings

The paper presents an idea and methodology for net‐centric command and control decision‐making process analysis.

Research limitations/implications

The paper describes and decomposes C2 decision processes for complex missions in uncertain environments.

Practical implications

The paper could be an important reference of analysis and application in net‐centric command and control of decision making.

Originality/value

The paper combines methodology with qualitative methods (decision process decomposition), quantitative method (Markov decision process analysis and CP logic), as well as structural verification and performance evaluation.

Article
Publication date: 17 April 2023

Ping Li, Zhipeng Chang and Wenhe Chen

To maintain the bottom line of food import risk in China, this paper proposes a novel risk state evaluation model based on bottom-line thinking after analyzing the decision-making…

Abstract

Purpose

To maintain the bottom line of food import risk in China, this paper proposes a novel risk state evaluation model based on bottom-line thinking after analyzing the decision-making ideas embedded in the bottom-line thinking method.

Design/methodology/approach

First, the order relation analysis method (G1 method) and Laplacian score (LS) are applied to calculate the constant weights of indexes. Then, the worst-case scenario of food import risk can be estimated to strive for the best result, so the penalty state variable weight function is introduced to obtain variable weights of indexes. Finally, the study measures the risk state of China's food import from the overall situation using the set pair analysis (SPA) method and identifies the key factors affecting food import risk.

Findings

The risk states of food supply in eight countries are in the state of average potential and partial back potential as a whole. The results indicate that China's food import risks are at medium and upper-medium risk levels in most years, fluctuating slightly from 2010 to 2020. In addition, some factors are diagnosed as the primary control objects for holding the bottom line of food import risk in China, including food output level, food export capacity, bilateral relationship and political risk.

Originality/value

This paper proposes a novel risk state evaluation model following bottom-line thinking for food import risk in China. Besides, SPA is first applied to the risk evaluation of food import, expanding the application field of the SPA method.

Details

Kybernetes, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 0368-492X

Keywords

Article
Publication date: 29 November 2018

Feifei Chen

The purpose of this paper is to examine how microblog communication enabled a new form of hybrid net-roots third-sector organization that rely heavily on the internet to achieve…

Abstract

Purpose

The purpose of this paper is to examine how microblog communication enabled a new form of hybrid net-roots third-sector organization that rely heavily on the internet to achieve multiple organizational successes in civil society, social movement and service providing in China, where the government holds predominating power over the third sector.

Design/methodology/approach

A qualitative inductive analysis was conducted to analyze two successful organizations’ Sina tweets sent from their Weibo debuts to the dates when they achieved their first milestone successes. In the analysis, the author iteratively alternated between emic data coding and etic reference to literature on social movement rhetoric and nonprofits’ microblog communication.

Findings

This study developed an indigenous communication framework featuring three key communication strategies: changing perceptions, mobilizing action, and building and maintaining relationships, each associated with specific tactics. These strategies and tactics allowed both organizations to tap into social media’s interactive features to engage publics and construct legitimacy.

Research limitations/implications

This paper enriches social media-based communication research and classic social movement rhetoric, and further illustrates strategic communication’s active role in reacting to and reforming institutional contexts. Findings from study might be extended to address similar problems experienced by nonprofits across countries, especially within those that operate in a context where institutional separation from a predominant government is unavailable.

Originality/value

This original communication framework developed in this study crystalizes strategic microblog use by a nascent type of nonprofit when fulfilling functions reflects civil society, social movements and traditional nonprofit organizations in an understudied political and social context.

Details

Corporate Communications: An International Journal, vol. 24 no. 1
Type: Research Article
ISSN: 1356-3289

Keywords

Article
Publication date: 11 December 2020

Jiajun Liu and Pingyu Jiang

Social manufacturing has emerged. It aims to integrate the manufacturing resources of micro- and small-scale manufacturing enterprises (MSMEs) and help MSMEs cope with the…

543

Abstract

Purpose

Social manufacturing has emerged. It aims to integrate the manufacturing resources of micro- and small-scale manufacturing enterprises (MSMEs) and help MSMEs cope with the dynamic, service-oriented and personalized market demands. In social manufacturing, MSMEs cooperate with each other through manufacturing resource sharing. However, because MSMEs are distributed and decentralized, the efficiency of establishing reliable cooperation between MSMEs is relatively low. Therefore, this paper presents a blockchain-driven cyber-credit evaluation system (BCCES) to implement distributed cyber-credit evaluation. BCCES can provide reliable cyber-credit for distributed MSMEs without the trusted third party. This can improve the efficiency of establishing reliable cooperation among unauthentic MSMEs.

Design/methodology/approach

The paper proposes a BCCES to evaluate MSMEs' cyber-credit in decentralized environment. In BCCES, a cyber-credit evaluation model is proposed by improving set pair analysis (SPA) method, and cyber-credit smart contract and distributed consensus mechanism are designed according to the runtime logic of distributed cyber-credit evaluation.

Findings

The results confirmed that BCCES is feasible and effective to implement cyber-credit evaluation without the trusted third party. With the advantages of blockchain, BCCES can automatically realize cyber-credit evaluation through smart contract and distributed consensus. At the same time, BCCES can evaluate the real-time cyber-credit of MSMEs based on their latest service evaluation. In addition, we can design corresponding smart contracts according to actual requirements, which makes blockchain applicable to different distributed scenarios.

Originality/value

The paper combines blockchain and SPA to implement cyber-credit evaluation in social manufacturing and provides a new feasible idea for cyber-credit evaluation without the trusted third party. This can also provide MSMEs a reference of applying blockchain to other distributed scenarios through combining smart contract and different algorithms.

Details

Industrial Management & Data Systems, vol. 121 no. 4
Type: Research Article
ISSN: 0263-5577

Keywords

Article
Publication date: 3 December 2018

Caiyun Sun and Li Shi

The purpose of this paper is to evaluate doctoral candidates’ innovative ability tendency.

Abstract

Purpose

The purpose of this paper is to evaluate doctoral candidates’ innovative ability tendency.

Design/methodology/approach

This study uses the theory of gray target contribution to analyze the influence degree of doctoral candidates’ individual personality factor toward their innovative ability and calculate gray impact quantitative values.

Findings

Based on the theory of contribution degree of gray target, a nine-factor model of innovative personality of doctoral candidates is built. IP=f (B, H, G, Q1, Q2, A, I, F, O), (therein: B – intelligence, H – social boldness, G – perseverance, Q1 – experimental, Q2 – independence, A – gregariousness, I – sensibility, F – excitability, O – anxiety).

Practical implications

This study based on gray target contribution theory builds nine-factor doctoral candidates’ innovative personality model to test the innovative ability tendency of doctoral candidates, which makes cultivating units, mentors and doctoral candidates to know their innovative ability tendency well, perfecting their own knowledge structure in time, effectively improving their innovative ability. The system can also be applied to the work of doctoral candidates as a reference tool to evaluate the innovative ability of applicants.

Originality/value

This study quantitatively evaluates the influence of doctoral candidates’ personality index on the tendency of doctoral candidates’ innovative ability.

Details

Grey Systems: Theory and Application, vol. 9 no. 1
Type: Research Article
ISSN: 2043-9377

Keywords

Article
Publication date: 7 March 2023

Preeti Godabole and Girish Bhole

The main purpose of the paper is timing analysis of mixed critical applications on the multicore system to identify an efficient task scheduling mechanism to achieve three main…

Abstract

Purpose

The main purpose of the paper is timing analysis of mixed critical applications on the multicore system to identify an efficient task scheduling mechanism to achieve three main objectives improving schedulability, achieving reliability and minimizing the number of cores used. The rise in transient faults in embedded systems due to the use of low-cost processors has led to the use of fault-tolerant scheduling and mapping techniques.

Design/methodology/approach

The paper opted for a simulation-based study. The simulation of mixed critical applications, like air traffic control systems and synthetic workloads, is carried out using a litmus-real time testbed on an Ubuntu machine. The heuristic algorithms for task allocation based on utilization factors and task criticalities are proposed for partitioned approaches with multiple objectives.

Findings

Both partitioned earliest deadline first (EDF) with the utilization-based heuristic and EDF-virtual deadline (VD) with a criticality-based heuristic for allocation works well, as it schedules the air traffic system with a 98% success ratio (SR) using only three processor cores with transient faults being handled by the active backup of the tasks. With synthetic task loads, the proposed criticality-based heuristic works well with EDF-VD, as the SR is 94%. The validation of the proposed heuristic is done with a global and partitioned approach of scheduling, considering active backups to make the system reliable. There is an improvement in SR by 11% as compared to the global approach and a 17% improvement in comparison with the partitioned fixed-priority approach with only three processor cores being used.

Research limitations/implications

The simulations of mixed critical tasks are carried out on a real-time kernel based on Linux and are generalizable in Linux-based environments.

Practical implications

The rise in transient faults in embedded systems due to the use of low-cost processors has led to the use of fault-tolerant scheduling and mapping techniques.

Originality/value

This paper fulfills an identified need to have multi-objective task scheduling in a mixed critical system. The timing analysis helps to identify performance risks and assess alternative architectures used to achieve reliability in terms of transient faults.

Details

International Journal of Pervasive Computing and Communications, vol. 20 no. 1
Type: Research Article
ISSN: 1742-7371

Keywords

1 – 7 of 7