Search results

1 – 10 of over 25000
Per page
102050
Citations:
Loading...
Access Restricted. View access options
Article
Publication date: 1 June 1997

Jaroslav Mackerle

Gives a bibliographical review of the finite element methods (FEMs) applied for the linear and nonlinear, static and dynamic analyses of basic structural elements from the…

6101

Abstract

Gives a bibliographical review of the finite element methods (FEMs) applied for the linear and nonlinear, static and dynamic analyses of basic structural elements from the theoretical as well as practical points of view. The range of applications of FEMs in this area is wide and cannot be presented in a single paper; therefore aims to give the reader an encyclopaedic view on the subject. The bibliography at the end of the paper contains 2,025 references to papers, conference proceedings and theses/dissertations dealing with the analysis of beams, columns, rods, bars, cables, discs, blades, shafts, membranes, plates and shells that were published in 1992‐1995.

Details

Engineering Computations, vol. 14 no. 4
Type: Research Article
ISSN: 0264-4401

Keywords

Access Restricted. View access options
Book part
Publication date: 25 October 2014

Diego Quer-Ramón, Enrique Claver-Cortés and Laura Rienda-García

Since the beginning of the 21st century, China’s outward foreign direct investment (OFDI) is growing steadily and Chinese multinationals (MNCs) are playing an increasingly…

Abstract

Purpose

Since the beginning of the 21st century, China’s outward foreign direct investment (OFDI) is growing steadily and Chinese multinationals (MNCs) are playing an increasingly important role in the global economy. Thus, the number of papers focusing on China’s OFDI and Chinese MNCs has been increasing during the last years. The aim of this chapter is to carry out a review of the empirical papers dealing with Chinese MNCs published between 2002 and 2012 in high-impact international business and management journals.

Design/methodology/approach

This chapter reviews 43 empirical papers focusing on Chinese MNCs that were published in nine major scholarly journals between 2002 and 2012.

Findings

We report individual and institutional contributions, the theories and methods used, the research topics, and the main findings. We also discuss implications for future research.

Originality/value

Some previous literature reviews have dealt with research on China’s OFDI and Chinese MNCs. Nevertheless, none of the earlier reviews dealt specifically with empirical papers; neither did they provide an analysis of both individual and institutional contributions.

Details

Multinational Enterprises, Markets and Institutional Diversity
Type: Book
ISBN: 978-1-78441-421-4

Keywords

Access Restricted. View access options
Article
Publication date: 14 April 2020

Yu Yan, Wei Jiang, Dehua Zou, Wusheng Quan, Hong Jun Li, YunFei Lei and Zhan fan Zhou

In the long-term network operation, the power distribution network will be subjected to the effects of ultra-high voltage, strong electromagnetic interference and harsh natural…

312

Abstract

Purpose

In the long-term network operation, the power distribution network will be subjected to the effects of ultra-high voltage, strong electromagnetic interference and harsh natural environment on the power system, which will lead to the occurrence of different faults in the distribution network and directly affect the normal operation of the power grid.

Design/methodology/approach

The purpose of this study is to solve the problems of labor intensity, high risk and low efficiency of distribution network manual maintenance operation, this paper proposed a new configuration of the live working robot for distribution network maintenance, the robot is equipped with dual working arms through the mobile platform, which can realize the coordination movement, the autonomous reorganization and replacement of the end tools, respectively, so as the robot power distribution maintenance function such as stripping, trimming, wiring and the operation control problem of the distribution network-robot with small arms and in small operation space can be realized.

Findings

To effective elimination or reduce the adverse effects of the internal forces in the closed chain between the working object and manipulator under the typical task of the 10 kV distribution network, this paper has established the robot coordinated control dynamics model in the closed-chain between the dual-working object and proposed the dynamic distribution method of closed-chain internal force and the effectiveness has been proved by simulation experiments and 10 kV field operation.

Originality/value

The force-position hybrid control can realize the mutual compensation of force and position so as to effectively reduce the internal force in the closed chain. Finally, the engineering practicality of the method is verified by field operation experiment, the effective implementation of this control method greatly improves the robot working efficiency and the operation reliability, the promotion and application of the control method have great theoretical and practical value and maintenance management system, so as to achieve automation of electric.

Details

Industrial Robot: the international journal of robotics research and application, vol. 47 no. 3
Type: Research Article
ISSN: 0143-991X

Keywords

Access Restricted. View access options
Book part
Publication date: 2 December 2024

Vítor Corado Simões, John Cantwell and Philippe Gugler

Abstract

Details

The History of EIBA: A Tale of the Co-evolution between International Business Issues and a Scholarly Community
Type: Book
ISBN: 978-1-83608-665-9

Access Restricted. View access options
Article
Publication date: 19 July 2024

Tao Jiang and Zitong Zhang

Customers will develop a stronger desire to purchase when more people are waiting in line for service due to the herding effect. However, this also leads to longer queue times…

113

Abstract

Purpose

Customers will develop a stronger desire to purchase when more people are waiting in line for service due to the herding effect. However, this also leads to longer queue times, causing customers to experience a waiting patience time. This study examines these two psychological aspects of delay-sensitive customers in service systems, considering both homogeneous and heterogeneous customer scenarios to explore the optimal pricing strategy for service providers.

Design/methodology/approach

Using queueing theory, we construct and optimally solve the customer's service utility function and the service provider's service revenue function. Further, the model is extended to account for heterogeneous customers, solving the utility and revenue functions accordingly.

Findings

Results show that service revenue increases with the intensity of herding behavior and the length of patience time. If customers have low herding intensity and short patience time, the service provider only needs to serve a portion of the customers. For heterogeneous customers, if a large proportion exhibits high herding intensity, the service provider should focus on serving them. Otherwise, the service provider should serve all high-intensity herding customers while striving to attract low-intensity herding customers.

Originality/value

This paper considers the combined utility of multiple customer psychology and examines homogeneous and heterogeneous customers. The findings provide valuable managerial insights for service providers' pricing and service strategies.

Details

Kybernetes, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 0368-492X

Keywords

Access Restricted. View access options
Article
Publication date: 29 December 2023

Haining Sun and Jianhu Cai

This paper aims to study the preferences of the supply chain (SC) members on various power structures under demand information asymmetry considering competing retailers.

197

Abstract

Purpose

This paper aims to study the preferences of the supply chain (SC) members on various power structures under demand information asymmetry considering competing retailers.

Design/methodology/approach

A two-level SC with one manufacturer and two retailers is designed. The retailers are in Bertrand competition. The manufacturer who holds the confidential demand information chooses the appropriate information sharing (IS) format. Three IS formats are provided, i.e. no IS (the manufacturer never shares with the retailers), partial IS (the manufacturer shares with one retailer), full IS (the manufacturer shares with all retailers). In addition, the authors model two power structures based on the decision sequences in the SC, i.e. retailers or manufacturer-dominant SC. The authors characterize the equilibrium solutions and payoffs and then investigate the members’ preferences for IS formats.

Findings

It is shown that in retailers (manufacturer)-dominant SC, the retailers prefer full (no) IS, but the manufacturer prefers no (full) IS. Moreover, the authors analyze the members’ preferences on power structures under demand information asymmetry, which has a relationship with the degrees of demand uncertainty and competition intensity.

Originality/value

The analysis regarding the preferences of the SC members on power structure under demand information asymmetry provides valuable managerial insights to enhance cooperation and achieve a win-win result.

Details

Journal of Business & Industrial Marketing, vol. 39 no. 5
Type: Research Article
ISSN: 0885-8624

Keywords

Access Restricted. View access options
Article
Publication date: 14 November 2024

Minghao Zhu, Shucheng Miao, Hugo K.S. Lam, Chen Liang and Andy C.L. Yeung

This study aims to investigate the impact of geopolitical risk (GPR) on supply chain concentration (SCC) and the roles of operational capabilities and resources in this…

437

Abstract

Purpose

This study aims to investigate the impact of geopolitical risk (GPR) on supply chain concentration (SCC) and the roles of operational capabilities and resources in this relationship.

Design/methodology/approach

Secondary longitudinal data from multiple sources is collected and combined to test for a direct impact of GPR on SCC. We further examine the moderating effects of firms’ operational capabilities and resources (i.e. firm resilience, operational slack and cash holding). Fixed-effect regression models are applied to test the hypotheses, followed by a series of robustness tests to check the consistency of the results.

Findings

Consistent with the tenets of resource dependence theory, our analysis reveals a significant negative impact of GPR on SCC. Moreover, we find that this adverse effect is attenuated for firms with higher levels of resilience, more operational slack and greater cash holdings. Further analysis suggests that maintaining a diversified supply chain base during heightened GPR is associated with a firm’s improved financial performance.

Originality/value

This study contributes to the supply chain management (SCM) literature by integrating GPR into the supply chain risk management framework. Additionally, it demonstrates the roles of diversification and operational resources in addressing GPR-induced challenges.

Details

International Journal of Operations & Production Management, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 0144-3577

Keywords

Access Restricted. View access options
Article
Publication date: 22 June 2022

Shubangini Patil and Rekha Patil

Until now, a lot of research has been done and applied to provide security and original data from one user to another, such as third-party auditing and several schemes for…

94

Abstract

Purpose

Until now, a lot of research has been done and applied to provide security and original data from one user to another, such as third-party auditing and several schemes for securing the data, such as the generation of the key with the help of encryption algorithms like Rivest–Shamir–Adleman and others. Here are some of the related works that have been done previously. Remote damage control resuscitation (RDCR) scheme by Yan et al. (2017) is proposed based on the minimum bandwidth. By enabling the third party to perform the verification of public integrity. Although it supports the repair management for the corrupt data and tries to recover the original data, in practicality it fails to do so, and thus it takes more computation and communication cost than our proposed system. In a paper by Chen et al. (2015), using broadcast encryption, an idea for cloud storage data sharing has been developed. This technique aims to accomplish both broadcast data and dynamic sharing, allowing users to join and leave a group without affecting the electronic press kit (EPK). In this case, the theoretical notion was true and new, but the system’s practicality and efficiency were not acceptable, and the system’s security was also jeopardised because it proposed adding a member without altering any keys. In this research, an identity-based encryption strategy for data sharing was investigated, as well as key management and metadata techniques to improve model security (Jiang and Guo, 2017). The forward and reverse ciphertext security is supplied here. However, it is more difficult to put into practice, and one of its limitations is that it can only be used for very large amounts of cloud storage. Here, it extends support for dynamic data modification by batch auditing. The important feature of the secure and efficient privacy preserving provable data possession in cloud storage scheme was to support every important feature which includes data dynamics, privacy preservation, batch auditing and blockers verification for an untrusted and an outsourced storage model (Pathare and Chouragadec, 2017). A homomorphic signature mechanism was devised to prevent the usage of the public key certificate, which was based on the new id. This signature system was shown to be resistant to the id attack on the random oracle model and the assault of forged message (Nayak and Tripathy, 2018; Lin et al., 2017). When storing data in a public cloud, one issue is that the data owner must give an enormous number of keys to the users in order for them to access the files. At this place, the knowledge assisted software engineering (KASE) plan was publicly unveiled for the first time. While sharing a huge number of documents, the data owner simply has to supply the specific key to the user, and the user only needs to provide the single trapdoor. Although the concept is innovative, the KASE technique does not apply to the increasingly common manufactured cloud. Cui et al. (2016) claim that as the amount of data grows, distribution management system (DMS) will be unable to handle it. As a result, various proven data possession (PDP) schemes have been developed, and practically all data lacks security. So, here in these certificates, PDP was introduced, which was based on bilinear pairing. Because of its feature of being robust as well as efficient, this is mostly applicable in DMS. The main purpose of this research is to design and implement a secure cloud infrastructure for sharing group data. This research provides an efficient and secure protocol for multiple user data in the cloud, allowing many users to easily share data.

Design/methodology/approach

The methodology and contribution of this paper is given as follows. The major goal of this study is to design and implement a secure cloud infrastructure for sharing group data. This study provides an efficient and secure protocol for multiple user data in cloud, allowing several users to share data without difficulty. The primary purpose of this research is to design and implement a secure cloud infrastructure for sharing group data. This research develops an efficient and secure protocol for multiple user data in the cloud, allowing numerous users to exchange data without difficulty. Selection scheme design (SSD) comprises two algorithms; first algorithm is designed for limited users and algorithm 2 is redesigned for the multiple users. Further, the authors design SSD-security protocol which comprises a three-phase model, namely, Phase 1, Phase 2 and Phase 3. Phase 1 generates the parameters and distributes the private key, the second phase generates the general key for all the users that are available and third phase is designed to prevent the dishonest user to entertain in data sharing.

Findings

Data sharing in cloud computing provides unlimited computational resources and storage to enterprise and individuals; moreover, cloud computing leads to several privacy and security concerns such as fault tolerance, reliability, confidentiality and data integrity. Furthermore, the key consensus mechanism is fundamental cryptographic primitive for secure communication; moreover, motivated by this phenomenon, the authors developed SSDmechanismwhich embraces the multiple users in the data-sharing model.

Originality/value

Files shared in the cloud should be encrypted for security purpose; later these files are decrypted for the users to access the file. Furthermore, the key consensus process is a crucial cryptographic primitive for secure communication; additionally, the authors devised the SSD mechanism, which incorporates numerous users in the data-sharing model, as a result of this phenomena. For evaluation of the SSD method, the authors have considered the ideal environment of the system, that is, the authors have used java as a programming language and eclipse as the integrated drive electronics tool for the proposed model evaluation. Hardware configuration of the model is such that it is packed with 4 GB RAM and i7 processor, the authors have used the PBC library for the pairing operations (PBC Library, 2022). Furthermore, in the following section of this paper, the number of users is varied to compare with the existing methodology RDIC (Li et al., 2020). For the purposes of the SSD-security protocol, a prime number is chosen as the number of users in this work.

Details

International Journal of Pervasive Computing and Communications, vol. 20 no. 4
Type: Research Article
ISSN: 1742-7371

Keywords

Access Restricted. View access options
Book part
Publication date: 20 January 2021

Yao Lixia

Abstract

Details

Energy Security in Times of Economic Transition: Lessons from China
Type: Book
ISBN: 978-1-83982-465-4

Access Restricted. View access options
Book part
Publication date: 7 January 2015

Abstract

Details

Adoption of Anglo-American Models of Corporate Governance and Financial Reporting in China
Type: Book
ISBN: 978-1-78350-898-3

1 – 10 of over 25000
Per page
102050