Search results

1 – 10 of 143
Article
Publication date: 2 January 2018

Xue Lian Wu, Chuan Peng Yang, Yu Qin Guo and Hong Yu Wang

This paper aims to focus on achieving triple-shape memory effect (triple-SME) of a commercial poly (ethylene terephthalate) (PET) film with the thickness of 100 µm.

Abstract

Purpose

This paper aims to focus on achieving triple-shape memory effect (triple-SME) of a commercial poly (ethylene terephthalate) (PET) film with the thickness of 100 µm.

Design/methodology/approach

The thermal characteristics and microstructure of PET film were characterized by differential scanning calorimetry, thermogravimetric analysis and wide-angle X-ray diffraction analysis. The dual-shape memory effect (dual-SME) of the PET film was then systematically investigated, and based on that, triple-SME in thin PET film was achieved.

Findings

Investigation of the dual-SME in PET film revealed the difference between recovery temperature and programming temperature reduced with increasing programming temperature. An obvious intermediate shape shifting between the original and final programmed shape was observed during shape recovery in triple-shape memory behaviors.

Research limitations/implications

Compared with dual-SME in polymer, relatively less work has been done on multi-SME in polymer, especially in thin polymer film. In this study, triple-SME in a PET film was investigated based on the results of dual-SME of the film. The main implication of the study is on how to achieve a watermark between the final programmed pattern and the original pattern, for the application of shape memory polymer in anti-counterfeiting label.

Originality/value

Dual- and triple-SMEs were achieved in a PET film that is only 100 µm in thickness, and the underlying mechanism for the difference between programming temperature and recovery temperature was discussed. For the novel application of triple-SME in anti-counterfeit label, the watermark during shape recovery in triple-SME can effectively prevent duplication.

Details

Pigment & Resin Technology, vol. 47 no. 1
Type: Research Article
ISSN: 0369-9420

Keywords

Article
Publication date: 24 May 2022

Yufeng Lian, Wenhuan Feng, Pai Li, Qiang Lei, Haitao Ma, Hongliang Sun and Binglin Li

The purpose of this paper is to propose a fractional order optimization method based on perturbation bound and gamma function of a DGM(r,1).

Abstract

Purpose

The purpose of this paper is to propose a fractional order optimization method based on perturbation bound and gamma function of a DGM(r,1).

Design/methodology/approach

By analyzing and minimizing perturbation bound, the sub-optimal solution on fractional order interval is obtained through offline solving without iterative calculation. By this method, an optimized fractional order non-equidistant ROGM (OFONEROGM) is applied in fitting and prediction water quality parameters for a surface water pollution monitoring system.

Findings

This method can narrow fractional order interval in this work. In a surface water pollution monitoring system, the fitting and prediction performances of OFONEROGM are demonstrated comparing with integer order non-equidistant ROGM (IONEROGM).

Originality/value

A method of offline solving the sub-optimal solution on fractional order interval is proposed. It can narrow the optimized fractional order range of NEROGM without iterative calculation. A large number of calculations are eliminated. Besides that, optimized fractional order interval is only related to the number of original data, and convenient for practical application. In this work, an OFONEROGM is modeled for predicting water quality trend for preventing water pollution or stealing sewage discharge. It will provide guiding significance in water quality parameter fitting and predicting for water environment management.

Details

Grey Systems: Theory and Application, vol. 13 no. 1
Type: Research Article
ISSN: 2043-9377

Keywords

Article
Publication date: 29 June 2023

Yanan He, Xindong Zhang, Panpan Hao, Xiaoyong Dai and Haiyan Xue

This paper investigates whether China's R&D tax deduction policy triggers firms to manipulate their R&D expenditures upward.

Abstract

Purpose

This paper investigates whether China's R&D tax deduction policy triggers firms to manipulate their R&D expenditures upward.

Design/methodology/approach

This paper employs the ratio of actual tax savings as a proxy for the benefits of the R&D tax deduction policy based on manually collected and systematically cross-checked data. The relationship between tax benefits and abnormal R&D spending is estimated in a sample of Chinese A-share listed companies for the period 2007–2018.

Findings

The findings suggest that tax deductions lead to positive abnormal R&D spending and that this deviation in R&D spending may be attributed to firms' upward R&D manipulation for tax avoidance. The results also indicate that this behavior is more significant for the period after the policy revision, in non-HNTEs (high and new technology enterprises), and in firms with a high ratio of R&D expenses.

Research limitations/implications

It is difficult to establish a sophisticated and unified model to identify the specific strategy of upward R&D manipulation that firms use to obtain tax benefits.

Practical implications

Managers should take into account upward R&D manipulation when designing governance mechanisms. Policymakers in developing countries may further pursue preferential tax policies that cover every stage of innovation activities gradually; the local provincial governments need to leverage their proximity and flexibility advantages to develop a tax collection and administration system.

Originality/value

This study contributes to the understanding of the complex effect of R&D tax incentives and helps more fully illuminate firms' upward R&D manipulation behavior from the perspective of tax planning strategies, which are underexplored in previous research.

Details

International Journal of Emerging Markets, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 1746-8809

Keywords

Article
Publication date: 14 April 2022

Lei Zhang, Huanbin Xue, Zeying Li and Yong Wei

The purpose of this paper is to study the dynamic behavior of complex-valued switched grey neural network models (SGNMs) with distributed delays when the system parameters and…

Abstract

Purpose

The purpose of this paper is to study the dynamic behavior of complex-valued switched grey neural network models (SGNMs) with distributed delays when the system parameters and external input are grey numbers.

Design/methodology/approach

Firstly, by using the properties of grey matrix, M-matrix theory and Homeomorphic mapping, the existence and uniqueness of equilibrium point of the SGNMs were discussed. Secondly, by constructing a proper Lyapunov functional and using the average dwell time approach and inequality technique, the robust exponential stability of the SGNMs under restricted switching was studied. Finally, a numerical example is given to verify the effectiveness of the proposed results.

Findings

Sufficient conditions for the existence and uniqueness of equilibrium point of the SGNMs have been established; sufficient conditions for guaranteeing the robust stability of the SGNMs under restricted switching have been obtained.

Originality/value

(1) Different from asymptotic stability, the exponential stability of SGNMs which include grey parameters and distributed time delays will be investigated in this paper, and the exponential convergence rate of the SGNMs can also be obtained; (2) the activation functions, self-feedback coefficients and interconnected matrices are with different forms in different subnetworks; and (3) the results obtained by LMIs approach are complicated, while the proposed sufficient conditions are straightforward, which are conducive to practical applications.

Details

Grey Systems: Theory and Application, vol. 12 no. 4
Type: Research Article
ISSN: 2043-9377

Keywords

Abstract

Details

The Emerald Handbook of Blockchain for Business
Type: Book
ISBN: 978-1-83982-198-1

Keywords

Article
Publication date: 27 April 2012

Min Wang, Yongsheng Qian and Xiaoping Guang

Shortest path problem has always been a hot topic in the study of graph theory, because of its wide application field, extending from operational research to the disciplines of…

416

Abstract

Purpose

Shortest path problem has always been a hot topic in the study of graph theory, because of its wide application field, extending from operational research to the disciplines of geography, automatic control, computer science and traffic. According to its concrete application, scholars in the relevant field have presented many algorithms, but most of them are solely improvements based on Dijkstra algorithm. The purpose of this paper is to enrich the kinds of (and improve the efficiency of) the shortest path algorithms.

Design/methodology/approach

This paper puts forward an improved calculation method of shortest path using cellular automata model, which is designed to search the shortest path from one node to another node. Cellular state set is adjusted with combination of breeding and mature states. Evolution rule is improved to enhance its parallelism. At the same time, recording manner of cellular state turnover is modified to record all information sources.

Findings

The result indicates that the improved algorithm is correct and more efficient, in that it could reduce the times of cellular state turnover; meanwhile, it can solve multi‐paths problem.

Originality/value

In this paper, cellular state set in exiting shortest path algorithm based on cellular automata theory is adjusted; evolution rule is improved; and recording manner of cellular state turnover is modified to record all information sources. All of which make the parallelism of this algorithm enhanced and the multi‐paths problem solved.

Abstract

Details

Strategic Information System Agility: From Theory to Practices
Type: Book
ISBN: 978-1-80043-811-8

Article
Publication date: 21 March 2019

Nianxin Wang, Huigang Liang, Shilun Ge, Yajiong Xue and Jing Ma

The purpose of this paper is to understand what inhibit or facilitate cloud computing (CC) assimilation.

Abstract

Purpose

The purpose of this paper is to understand what inhibit or facilitate cloud computing (CC) assimilation.

Design/methodology/approach

The authors investigate the effects of two enablers, top management support (TMS) and government support (GS), and two inhibitors, organization inertia (OI) and data security risk (DSR) on CC assimilation. The authors posit that enablers and inhibitors influence CC assimilation separately and interactively. The research model is empirically tested by using the field survey data from 376 Chinese firms.

Findings

Both TMS and GS positively and DSR negatively influence CC assimilation. OI negatively moderates the TMS–assimilation link, and DSR negatively moderates the GS–assimilation link.

Research limitations/implications

The results indicate that enablers and inhibitors influence CC assimilation in both separate and joint manners, suggesting that CC assimilation is a much more complex process and demands new knowledge to be learned.

Practical implications

For these firms with a high level of OI, only TMS is not enough, and top managers should find other effective way to successfully implement structural and behavioral change in the process of CC assimilation. For policy makers, they should actively play their supportive roles in CC assimilation.

Originality/value

A new framework is developed to identify key drivers of CC assimilation along two bipolar dimensions including enabling vs inhibiting and internal vs external.

Details

Internet Research, vol. 29 no. 6
Type: Research Article
ISSN: 1066-2243

Keywords

Article
Publication date: 2 August 2023

Shaoyi Liu, Song Xue, Peiyuan Lian, Jianlun Huang, Zhihai Wang, Lihao Ping and Congsi Wang

The conventional design method relies on a priori knowledge, which limits the rapid and efficient development of electronic packaging structures. The purpose of this study is to…

Abstract

Purpose

The conventional design method relies on a priori knowledge, which limits the rapid and efficient development of electronic packaging structures. The purpose of this study is to propose a hybrid method of data-driven inverse design, which couples adaptive surrogate model technology with optimization algorithm to to enable an efficient and accurate inverse design of electronic packaging structures.

Design/methodology/approach

The multisurrogate accumulative local error-based ensemble forward prediction model is proposed to predict the performance properties of the packaging structure. As the forward prediction model is adaptive, it can identify respond to sensitive regions of design space and sample more design points in those regions, getting the trade-off between accuracy and computation resources. In addition, the forward prediction model uses the average ensemble method to mitigate the accuracy degradation caused by poor individual surrogate performance. The Particle Swarm Optimization algorithm is then coupled with the forward prediction model for the inverse design of the electronic packaging structure.

Findings

Benchmark testing demonstrated the superior approximate performance of the proposed ensemble model. Two engineering cases have shown that using the proposed method for inverse design has significant computational savings while ensuring design accuracy. In addition, the proposed method is capable of outputting multiple structure parameters according to the expected performance and can design the packaging structure based on its extreme performance.

Originality/value

Because of its data-driven nature, the inverse design method proposed also has potential applications in other scientific fields related to optimization and inverse design.

Details

Soldering & Surface Mount Technology, vol. 35 no. 5
Type: Research Article
ISSN: 0954-0911

Keywords

Article
Publication date: 16 January 2024

Xiaojun Wu, Zhongyun Zhou and Shouming Chen

Artificial intelligence (AI) applications pose a potential threat to users' data security and privacy due to their high data-dependence nature. This paper aims to investigate an…

Abstract

Purpose

Artificial intelligence (AI) applications pose a potential threat to users' data security and privacy due to their high data-dependence nature. This paper aims to investigate an understudied issue in the literature, namely, how users perceive the threat of and decide to use a threatening AI application. In particular, it examines the influencing factors and the mechanisms that affect an individual’s behavioral intention to use facial recognition, a threatening AI.

Design/methodology/approach

The authors develop a research model with trust as the key mediating variable by integrating technology threat avoidance theory, the theory of planned behavior and contextual factors related to facial recognition. Then, it is tested through a sequential mixed-methods investigation, including a qualitative study (for model development) of online comments from various platforms and a quantitative study (for model validation) using field survey data.

Findings

Perceived threat (triggered by perceived susceptibility and severity) and perceived avoidability (promoted by perceived effectiveness, perceived cost and self-efficacy) have negative and positive relationships, respectively, with an individual’s attitude toward facial recognition applications; these relationships are partially mediated by trust. In addition, perceived avoidability is positively related to perceived behavioral control, which along with attitude and subjective norm is positively related to individuals' intentions to use facial recognition applications.

Originality/value

This paper is among the first to examine the factors that affect the acceptance of threatening AI applications and how. The research findings extend the current literature by providing rich and novel insights into the important roles of perceived threat, perceived avoidability, and trust in affecting an individual’s attitude and intention regarding using threatening AI applications.

Details

Internet Research, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 1066-2243

Keywords

1 – 10 of 143