With the analysis of the causes of corruption, this study aims to investigate specific anti-corruption measures that can be implemented to reform the political system and the…
Abstract
Purpose
With the analysis of the causes of corruption, this study aims to investigate specific anti-corruption measures that can be implemented to reform the political system and the social climate of China.
Design/methodology/approach
This study examines 97 severe corruption cases of high-ranking officials in China, which occurred between 2012 and 2015. As this insinuates that both institutional and social corruption are major problems in China, the analysis delves into multiple facts of corruption, including different types, four primary underlying causes, and suggestions regarding the implementation of three significant governmental shifts that focus on investigation, prevention tactics and legal regulations.
Findings
China’s corruption is not only individual-based but also it has developed into institutional corruption and social corruption. Besides human nature and instinct, the causes of corruption can be organised into four categories, namely, social customs, social transitions, institutional designs and institutional operations. For the removed high-ranking officials, the formation of interest chains was an important underlying cause behind their corruption.
Originality/value
This study makes a significant contribution to the literature because this study provides a well-rounded approach to a complex issue by highlighting the significance of democracy and the rule of law as ways to regulate human behaviour to combat future corruption.
Details
Keywords
Dongbei Bai, Lei Ye, ZhengYuan Yang and Gang Wang
Global climate change characterized by an increase in temperature has become the focus of attention all over the world. China is a sensitive and significant area of global climate…
Abstract
Purpose
Global climate change characterized by an increase in temperature has become the focus of attention all over the world. China is a sensitive and significant area of global climate change. This paper specifically aims to examine the association between agricultural productivity and the climate change by using China’s provincial agricultural input–output data from 2000 to 2019 and the climatic data of the ground meteorological stations.
Design/methodology/approach
The authors used the three-stage spatial Durbin model (SDM) model and entropy method for analysis of collected data; further, the authors also empirically tested the climate change marginal effect on agricultural productivity by using ordinary least square and SDM approaches.
Findings
The results revealed that climate change has a significant negative effect on agricultural productivity, which showed significance in robustness tests, including index replacement, quantile regression and tail reduction. The results of this study also indicated that by subdividing the climatic factors, annual precipitation had no significant impact on the growth of agricultural productivity; further, other climatic variables, including wind speed and temperature, had a substantial adverse effect on agricultural productivity. The heterogeneity test showed that climatic changes ominously hinder agricultural productivity growth only in the western region of China, and in the eastern and central regions, climate change had no effect.
Practical implications
The findings of this study highlight the importance of various social connections of farm households in designing policies to improve their responses to climate change and expand land productivity in different regions. The study also provides a hypothetical approach to prioritize developing regions that need proper attention to improve crop productivity.
Originality/value
The paper explores the impact of climate change on agricultural productivity by using the climatic data of China. Empirical evidence previously missing in the body of knowledge will support governments and researchers to establish a mechanism to improve climate change mitigation tools in China.
Details
Keywords
Gang Yang, Rangqi Liu, De'an Hu and Xu Han
This paper aims to study the ability of SPH method in simulating shock initiation process. The initiation and subsequent explosion processes of condensed explosive involve high…
Abstract
Purpose
This paper aims to study the ability of SPH method in simulating shock initiation process. The initiation and subsequent explosion processes of condensed explosive involve high pressure propagation and material large deformation, which increase the simulation difficulty in using traditional mesh-based method. The study aims to take the SPH method as an alternative method to shock initiation simulation.
Design/methodology/approach
The SPH method combined with some correct aspects is applied to simulate the shock initiation process. The condensed explosive is ignited by the impact of high speed flyer. In order to avoid the non-physical penetration between particles of high velocity flyer and condensed explosive, a particle-to-particle contact algorithm is employed. After the ignition, the detonation process of condensed explosive is represented by the ignition and growth model. A modified SPH method based on Riemann-solver is applied to smooth the numerical oscillation at shock front. Two numerical examples are implemented to illustrate the capability of SPH method in shock initiation simulation. One is the interface velocity experiment of PBX-9501. Another is the plate push experiment of PBX-9502. Both of the examples include the shock initiation process of condensed explosive.
Findings
Numerical results show that the shock initiation process of condensed explosive can be well predicted by SPH method. The characteristics of detonation are captured in the simulation. The measured data in numerical examples are also in good agreement with the experimental data.
Research limitations/implications
Because of the research purpose is to study the ability of SPH for shock initiation simulation, only one-dimension numerical examples are discussed in the paper. Therefore, researchers are encouraged to extend and test the proposed method to two or three dimension shock initiation problems simulation.
Originality/value
This paper provides an alternative method for shock initiation simulation. The implemented method can overcome the weaknesses of traditional mesh based method in simulation of shock initiation problems.
Abstract
Purpose
The purpose of this paper is to investigate the formation process of linear‐shaped charge jet using the smoothed particle hydrodynamics (SPH). Different material yield models are embed to test the performance of SPH method in the simulation of explosive driven metal liner. The effects of different ignition model to the formation of metal jet have also been studied.
Design/methodology/approach
The SPH method is used with the correction of artificial viscosity and penalty force to simulate the formation process of linear‐shaped charge jet, which includes the process of explosion and interaction between explosive gas and metal liner. The numerical results which got by SPH method are compared with these obtained by mesh‐based method. Different material yield models are implemented in the numerical examples to show the effect of material model to the formation process of metal jet. The single point and two point ignition models are used to study the effect of ignition models to the process of explosion and formation of metal jet.
Findings
Compared with the original mesh‐based method, the SPH method can simulate the physical process of linear‐shaped charge jet naturally, as well as the capturing of explosive wave propagation. The implementation of different material yields models to obtain the same formation tendency of metal jet, but some numerical difference exists. In two‐point ignition model the explosive pressure is superimposed at the location that two detonation waves intersect. Compared with two ignition models, the two point ignition model can form the metal jet faster and get the higher velocity metal jet.
Originality/value
There are a few references that address the application of SPH to simulate shaped charge explosion process. The feasibility of the SPH method to simulate the formation process of linear shaped charged jet is tested and verified in this paper. From the results which compared with mesh‐based method, it is shown that the SPH method has the advantage in tracking the large deformation of material and capturing the explosive wave propagation. The SPH method can be selected as a good alternative to traditional mesh‐based numerical methods in simulating similar explosively driven metal material problems which can be referenced from this paper.
Details
Keywords
With its worldwide fame for making action films, Hong Kong cinema has been defined as masculine. Action films, including the costumed martial arts films and the modern gangster…
Abstract
With its worldwide fame for making action films, Hong Kong cinema has been defined as masculine. Action films, including the costumed martial arts films and the modern gangster films, have been a major genre in Hong Kong cinema from the 1960s on. Despite the dominant masculinity, women still play significant roles in some of these films. In fact, fighting women leave footprints in the history of Hong Kong cinema, which precede their counterparts in the West and even provide models for Hollywood after 2000.
This chapter focuses on the female characters portrayed by the acclaimed Hong Kong director Wong Kar-wai, whose works have an ambiguous connection to mainstream genres. He modifies Hong Kong action films and creates unconventional female characters such as the drug dealer in Chungking Express (1994), the killer dispatcher in Fallen Angels (1995), the swordswoman in Ashes of Time (1994), and the kung fu master in The Grandmaster (2013). Wong's films have been mush discussed in academia, but the gender images therein are quite ignored. With high intertextuality, these characters are used to question mainstream action films and redefine women's roles in male's cinematic space. In addition, via the writing of these women, Wong constructs an open and ambivalent post-colonial Hong Kong identity. This paper contextualises the figures of sword-wielding and gun-shooting women and examines how Wong Kar-wai deploys these images to articulate the cultural identity of a post-colonial city.
Details
Keywords
The purpose of this paper is to determine the value of I‐Ching (also called Book of Changes), the ancient Chinese book of wisdom, which has been used for thousands of years to…
Abstract
Purpose
The purpose of this paper is to determine the value of I‐Ching (also called Book of Changes), the ancient Chinese book of wisdom, which has been used for thousands of years to help people make decisions in daily life. Recently, eastern and western scholars have begun discussing how to apply the wisdom of I‐Ching to the field of business administration, particularly decision‐making practices.
Design/methodology/approach
A content analysis method was adopted to uncover possible modern management decision‐making constructs. The single words approach did not find frequently appearing words that integrated decision‐making constructs in the context of I‐Ching. Further uncovering I‐Ching's administrative decision‐making approach, the managerial decision‐making model of I‐Ching is explained, including the premises, the decision contingencies, and the decision process.
Findings
By using an academic comparative analysis method, as it applies to managerial decision making, I‐Ching's early management decision‐making model is subsequently compared with western management decision models, which include rational decision making, bounded‐rationality decision making, intuitive decision making, implicit favorite decision making, and garbage‐can decision making.
Research limitations/implications
The majority of scholars that study I‐Ching focus on “practice divination” research, paying attention to the interpretation or critique of the text only. Unfortunately, related literature based upon a social science research foundation is limited.
Originality/value
The value of I‐Ching was determined to lie in allowing flexibility in the decision‐making process.
Details
Keywords
The purpose of this paper is to systematically study the research and development history of suspicious transaction reporting (STR) system in China, and introduce the core…
Abstract
Purpose
The purpose of this paper is to systematically study the research and development history of suspicious transaction reporting (STR) system in China, and introduce the core elements in constructing an intelligent surveillance system which could provide a solution to the situation of low effectiveness and efficiency in Chinese Financial Institutions (FIs) STR procedure nowadays. The solution outputs those falling out of the normal customer behavior profiles instead of only extracting data by the rules issued by authorities.
Design/methodology/approach
This paper reviews the latest literature, regulations and guidelines of STR gathered domestically and overseas, and hands out questionnaire surveys to hundreds of software vendors, regulators and FIs, details the current situation of poor deployment of intelligent in China and tells the difficulties of subjective STR decision procedures.
Findings
Few Chinese FIs have deployed real intelligent STR systems, most are using rule-based filtering systems conformed to the objective STR supervisory regulations. To change the embarrassing situation, the regulators have tried to introduce self-regulatory mode which allows the FIs to define STR decision procedures themselves. Limited by the FIs’ ability of information sharing and investigation scope, FIs could hardly unveil the whole schema of a money laundering organization. The pursuant objective FIs can reach is to construct a system that could tell what the normal customer behaviors look like and extract all those falling out of the system’s expectations as suspicious activities.
Research limitations/implications
Only the core elements of the total intelligent STR system are discussed, that is, what, why and how about the customer behavior pattern recognition system. Besides this, a total solution should also use a watch list, reporting decision, cases management, risk control, etc.
Originality/value
This paper for the first time argues that the orientation of regulatory rules in China has actually hindered the spreading of really effective intelligent system for these years. The author creatively puts forward a solution to the difficult problem for FIs to spot criminal schema directly, instead the FIs should only be required to determine whether the transactions carrying out currently are falling within the expected behavior pattern scopes, which is under the FIs’ capabilities due to the internationally accepted obligations of “Know Your Customer”.
Details
Keywords
Tae-Young Kim, Ju-Yeon Gang and Hyo-Jung Oh
This study explored spatial usage of a public library based on activity logs produced by real users. The purpose of this paper is to provide preliminary data for decision-making…
Abstract
Purpose
This study explored spatial usage of a public library based on activity logs produced by real users. The purpose of this paper is to provide preliminary data for decision-making when establishing the library operation policy.
Design/methodology/approach
To achieve the goal, the author collected a variety of data including 274,242 seat reservations logs, 3,361,284 collection usage logs, and 96,098 user information for the four years in which the National Library of Korea, Sejong actually operated. The crawled data were analyzed statistically in terms of demography, month, day of week, time of day and room by room. The author conducted additional in-depth analysis according to the external factors such as weather or social demographic environment. Finally, the author discussed several issues and verified feasibility of the proposals to support decision-making in operating a library in conclusion with a secondary librarian interview.
Findings
The usage rate in all the spaces of the National Library of Korea, Sejong, has been increasing since its opening, and, in particular, the usage rate increases sharply in January, February, July and August. In addition, the usage rate during weekends was higher than that during weekdays, and all the four spaces had a high usage rate during the afternoon. These results seem to be related to weather, users’ life pattern, users’ age, and position of PCs and seats. Based on the circulation logs analysis of children’s collections, users in their 10s and 40s showed the same space usage pattern.
Originality/value
This study has significance in that it attempted to analyze logs produced by real users during the actual library operation period, which has not been frequently attempted in the previous studies on libraries. The findings will be provided as basic data to support decision-making for efficient operation of libraries.
Details
Keywords
Hanqing Gong, Lingling Shi, Xiang Zhai, Yimin Du and Zhijing Zhang
The purpose of this study is to achieve accurate matching of new process cases to historical process cases and then complete the reuse of process knowledge and assembly experience.
Abstract
Purpose
The purpose of this study is to achieve accurate matching of new process cases to historical process cases and then complete the reuse of process knowledge and assembly experience.
Design/methodology/approach
By integrating case-based reasoning (CBR) and ontology technology, a multilevel assembly ontology is proposed. Under the general framework, the knowledge of the assembly domain is described hierarchically and associatively. On this basis, an assembly process case matching method is developed.
Findings
By fully considering the influence of ontology individual, case structure, assembly scenario and introducing the correction factor, the similarity between non-correlated parts is significantly reduced. Compared with the Triple Matching-Distance Model, the degree of distinction and accuracy of parts matching are effectively improved. Finally, the usefulness of the proposed method is also proved by the matching of four practical assembly cases of precision components.
Originality/value
The process knowledge in historical assembly cases is expressed in a specific ontology framework, which makes up for the defects of the traditional CBR model. The proposed matching method takes into account all aspects of ontology construction and can be used well in cross-ontology similarity calculations.