Search results

1 – 10 of 177
Per page
102050
Citations:
Loading...
Access Restricted. View access options
Article
Publication date: 21 August 2017

Song Xiao Ting, Liu Feng and Wang Qin

Entrepreneurial mentoring is widely regarded as an effective way to train novice entrepreneurs all over the world. However, the effectiveness of this approach and the determinants…

1481

Abstract

Purpose

Entrepreneurial mentoring is widely regarded as an effective way to train novice entrepreneurs all over the world. However, the effectiveness of this approach and the determinants are not well understood under country-specific conditions. The purpose of this paper is to build a conceptual framework and use empirical analysis to explore the mentoring effect and its determinants, especially in the Chinese context.

Design/methodology/approach

The paper uses data from 172 young entrepreneurs which had been supported by Youth Business China, Mianyang Office since 2008. The factor analysis and structural equation model have been applied to analyze the data to investigate the quantitative relationship and path of the mentoring effect of entrepreneurship with mentor’s factors, young entrepreneurs (mentees’s factors) and their interrelationship.

Findings

The assessment scores of the entrepreneurship mentoring effect both in experience level and effectiveness level are relatively high, in the satisfactory range. The entrepreneurship mentoring effect, measured by the experience and the performance level, is determined by the coupling interaction of the mentor, the mentee and their interactive relationship. Among them, the mentor’s characteristic, the most important being his/her intention, has the biggest effect on the mentoring effect, significantly bigger than the mentor’s quality and skill. However, the mentor’s intention is not strong as expected. The interactive relationship between the mentor and the mentee also has a significant positive effect on entrepreneurial mentoring effect. The study also discovered the mentee factors have comparatively smaller effect on both the interactive relationship and the mentoring effect. Furthermore, it is found that the absorptive capability and learning intention of the young entrepreneur are relatively weak.

Research limitations/implications

The construction of the index system of this research reflects the overall characteristics of the research objects and their static relationships. Therefore, the dynamic change of the mentoring relationship in different phases of the mentorship has not been taken into account. Also, self-serving bias may exist as this research measures the mentoring effect by the feedback on the mentor’s perception, using surveys completed by the mentees to measure both the mentee’s traits and the mentor’s qualities.

Practical implications

This study provides guidance on how entrepreneurship could be promoted and on how educational institutions in China can make the mentoring process a positive and effective system in order to enhance the mentoring effect.

Social implications

The empirical conclusions of the present study can be applied to other business incubator, entrepreneurship education institutions and for the improvement and promotion of entrepreneurial mentoring system in China.

Originality/value

This paper probes into the mentoring system in the context of China from a new perspective and proposes an original conceptual model to study the entrepreneurship mentoring effect and its determinant.

Details

Management Decision, vol. 55 no. 7
Type: Research Article
ISSN: 0025-1747

Keywords

Access Restricted. View access options
Article
Publication date: 1 June 2005

Li‐teh Sun

Man has been seeking an ideal existence for a very long time. In this existence, justice, love, and peace are no longer words, but actual experiences. How ever, with the American…

824

Abstract

Man has been seeking an ideal existence for a very long time. In this existence, justice, love, and peace are no longer words, but actual experiences. How ever, with the American preemptive invasion and occupation of Afghanistan and Iraq and the subsequent prisoner abuse, such an existence seems to be farther and farther away from reality. The purpose of this work is to stop this dangerous trend by promoting justice, love, and peace through a change of the paradigm that is inconsistent with justice, love, and peace. The strong paradigm that created the strong nation like the U.S. and the strong man like George W. Bush have been the culprit, rather than the contributor, of the above three universal ideals. Thus, rather than justice, love, and peace, the strong paradigm resulted in in justice, hatred, and violence. In order to remove these three and related evils, what the world needs in the beginning of the third millenium is the weak paradigm. Through the acceptance of the latter paradigm, the golden mean or middle paradigm can be formulated, which is a synergy of the weak and the strong paradigm. In order to understand properly the meaning of these paradigms, however, some digression appears necessary.

Details

International Journal of Sociology and Social Policy, vol. 25 no. 6/7
Type: Research Article
ISSN: 0144-333X

Keywords

Access Restricted. View access options
Article
Publication date: 1 March 2013

Xiaosong Zhang, Ting Chen, Chun‐xiang Xu, Xiao‐hui Pan and Xue‐yang Wu

Nowadays, proactive P2P worm (PRWORM) poses a latent threat to internet infrastructure and common users for the fatal vulnerabilities in homogeneous P2P software. It is more…

154

Abstract

Purpose

Nowadays, proactive P2P worm (PRWORM) poses a latent threat to internet infrastructure and common users for the fatal vulnerabilities in homogeneous P2P software. It is more difficult to contain PRWORM because of its fast spread speed. Current techniques are not adequate to quarantine PRWORM, mainly because of their inaccuracy and slow response to attacks. The purpose of this paper is to propose an accurate and real‐time approach for PRWORM containment.

Design/methodology/approach

First, the authors present a new methodology to contain PRWORM via proper authentication of initiators of P2P communications. Second, three simple network protocols are proposed to fulfill automatic authentication.

Findings

Both simulations and strictly mathematical proof by Strand Space Model represent that the authors' work is able to accurately quarantine PRWORM in real time. Furthermore, proof shows the three network protocols are resistant to popular attacks such as man‐in‐the‐middle attack and replay attack.

Originality/value

First, the authors propose an authentication based method to contain proactive P2P worm and second, use strand space model to proof the effectiveness and security of the method.

Details

COMPEL - The international journal for computation and mathematics in electrical and electronic engineering, vol. 32 no. 2
Type: Research Article
ISSN: 0332-1649

Keywords

Access Restricted. View access options
Article
Publication date: 14 October 2020

Xianliang Zhang, Weibing Zhu, Xiande Wu, Ting Song, Yaen Xie and Han Zhao

The purpose of this paper is to propose a pre-defined performance robust control method for pre-assembly configuration establishment of in-space assembly missions, and collision…

170

Abstract

Purpose

The purpose of this paper is to propose a pre-defined performance robust control method for pre-assembly configuration establishment of in-space assembly missions, and collision avoidance is considered during the configuration establishment process.

Design/methodology/approach

First, six-degrees-of-freedom error kinematic and dynamic models of relative translational and rotational motion between transportation systems are developed. Second, the prescribed transient-state performance bounds of tracking errors are designed. In addition, based on the backstepping, combining the pre-defined performance control method with a robust control method, a pre-defined performance robust controller is designed.

Findings

By designing prescribed transient-state performance bounds of tracking errors to guarantee that there is no overshoot, collision-avoidance can be achieved. Combining the pre-defined performance control method with a robust control method, robustness to disturbance is guaranteed.

Originality/value

This paper proposed a pre-defined performance robust control method. Simulation results demonstrate that the proposed controller can achieve a pre-assembly configuration establishment with collision avoidance in the existence of external disturbances.

Details

Aircraft Engineering and Aerospace Technology, vol. 93 no. 1
Type: Research Article
ISSN: 1748-8842

Keywords

Access Restricted. View access options
Article
Publication date: 14 December 2018

De-gan Zhang, Ya-meng Tang, Yu-ya Cui, Jing-xin Gao, Xiao-huan Liu and Ting Zhang

The communication link in the engineering of Internet of Vehicle (IOV) is more frequent than the communication link in the Mobile ad hoc Network (MANET). Therefore, the highly…

325

Abstract

Purpose

The communication link in the engineering of Internet of Vehicle (IOV) is more frequent than the communication link in the Mobile ad hoc Network (MANET). Therefore, the highly dynamic network routing reliability problem is a research hotspot to be solved.

Design/methodology/approach

The graph theory is used to model the MANET communication diagram on the highway and propose a new reliable routing method for internet of vehicles based on graph theory.

Findings

The expanded graph theory can help capture the evolution characteristics of the network topology and predetermine the reliable route to promote quality of service (QoS) in the routing process. The program can find the most reliable route from source to the destination from the MANET graph theory.

Originality/value

The good performance of the proposed method is verified and compared with the related algorithms of the literature.

Details

Engineering Computations, vol. 36 no. 1
Type: Research Article
ISSN: 0264-4401

Keywords

Access Restricted. View access options
Article
Publication date: 1 March 2013

Ting Chen, Xiaosong Zhang, Xu Xiao, Yue Wu, Chun‐xiang Xu and Hong‐tian Zhao

Software vulnerabilities have been the greatest threat to the software industry for a long time. Many detection techniques have been developed to address this kind of issue, such…

229

Abstract

Purpose

Software vulnerabilities have been the greatest threat to the software industry for a long time. Many detection techniques have been developed to address this kind of issue, such as Fuzzing, but mere Fuzz Testing is not good enough, because the Fuzzing only alters the input of program randomly, and does not consider the basic semantics of the target software. The purpose of this paper is to introduce a new vulnerability exploring system, called “SEVE” to explore the target software more deeply and to generate more test cases with more accuracy.

Design/methodology/approach

Symbolic execution is the core technique of SEVE. The user can just input a standard input, and the SEVE system will record the execution path, alter the critical branches of it, and generate a totally different test case which will make the software under test execute a different path. In this way, some potential bugs or defects, even the exploitable vulnerabilities will be discovered. To alleviate path explosion, the authors propose heuristic method and function abstraction, which in turn improve the performance of SEVE even further.

Findings

We evaluate SEVE system to record critical data about its efficiency and performance. We have tested some real‐world vulnerabilities, from which the underlying file‐input programs suffer. After that, the results show that SEVE is not only re‐creating the discovery of these vulnerabilities, but also at a higher performance level than traditional techniques.

Originality/value

The paper proposes a new vulnerability exploring system, called “SEVE” to explore the target software and generate test cases automatically and also heuristic method and function abstraction to handle path explosion.

Details

COMPEL - The international journal for computation and mathematics in electrical and electronic engineering, vol. 32 no. 2
Type: Research Article
ISSN: 0332-1649

Keywords

Access Restricted. View access options
Article
Publication date: 16 October 2018

Dilong Chen, Qiang Lu, Dongliang Peng, Ke Yin, Chaoliang Zhong and Ting Shi

The purpose of this paper is to propose a receding horizon control approach for the problem of locating unknown wireless sensor networks by using a mobile robot.

244

Abstract

Purpose

The purpose of this paper is to propose a receding horizon control approach for the problem of locating unknown wireless sensor networks by using a mobile robot.

Design/methodology/approach

A control framework is used and consists of two levels: one is a decision level, while the other is a control level. In the decision level, a spatiotemporal probability occupancy grid method is used to give the possible positions of all nodes in sensor networks, where the posterior probability distributions of sensor nodes are estimated by capturing the transient signals. In the control level, a virtual robot is designed to move along the edge of obstacles such that the problem of obstacle avoidance can be transformed into a coordination problem of multiple robots. On the basis of the possible positions of sensor nodes and virtual robots, a receding horizon control approach is proposed to control mobile robots to locate sensor nodes, where a temporary target position method is utilized to avoid several special obstacles.

Findings

When the number of obstacles increases, the average localization errors between the actual locations and the estimated locations significantly increase.

Originality/value

The proposed control approach can guide the mobile robot to avoid obstacles and deal with the corresponding dynamical events so as to locate all sensor nodes for an unknown wireless network.

Details

Assembly Automation, vol. 39 no. 3
Type: Research Article
ISSN: 0144-5154

Keywords

Access Restricted. View access options
Article
Publication date: 13 April 2023

Ying Guo, Ting-Tsen Yeh, David C. Yang and Xiao-Yan Li

The purpose of this study is to understand the current trends and development of corporate social responsibility (CSR) reporting in emerging and developing economies and analyze…

433

Abstract

Purpose

The purpose of this study is to understand the current trends and development of corporate social responsibility (CSR) reporting in emerging and developing economies and analyze 106 Chinese central enterprises (CEs) that disclose CSR reports from 2004 to 2015.

Design/methodology/approach

This study analyzes all the CSR reports available to the public from CEs between 2004 and 2015 in China. This paper carefully examines the reporting patterns and standards in those CSR reports. CEs in China are focused on because state-owned companies account for a large proportion of the Chinese stock market because of their social and economic institutional characteristics.

Findings

The results in this paper confirm a growth trend in the numbers of CSR reports, as predicted. The results also suggest that the number of CSR reports from the CEs containing some assurance has dramatically increased. However, the findings indicate that the current content of the CSR reports may not fully meet the needs of users of information from different industries, regions and interests, as more than 20 CEs have formulated their own CSR framework. The lack of unified, sustainable reporting and assurance may reduce the comparability and effectiveness of CSR reporting.

Social implications

This study provides evidence of the trends and development of CSR reporting in China.

Originality/value

The findings extend the understanding of CSR reporting by analyzing Chinese CE data. The results also provide decision-useful information for the government and other policymakers when considering CSR reporting and assurance standards.

Details

Journal of Global Responsibility, vol. 14 no. 4
Type: Research Article
ISSN: 2041-2568

Keywords

Access Restricted. View access options
Article
Publication date: 7 March 2016

Zhiming Ma, Tiejun Zhao, Jianzhuang Xiao and Ting Guan

Rebar corrosion in reinforced concrete is the major reason for the durability degradation, especially under harsh environment. This paper presents an experiment conducted to…

443

Abstract

Purpose

Rebar corrosion in reinforced concrete is the major reason for the durability degradation, especially under harsh environment. This paper presents an experiment conducted to investigate the influence of freeze-thaw cycles on the rebar corrosion in reinforced concrete. The purpose of this paper is to provide fundamental information about rebar corrosion under frost environment and improvement measures.

Design/methodology/approach

The related elastic modulus and compressive strength of different concrete specimens were measured after different freeze-thaw cycles. The accelerated rebar corrosion test was carried out after different freeze-thaw cycles; additionally, the value of calomel half-cell potential was determined. The actual rebar corrosion appearance was checked to prove the accuracy of the results of calomel half-cell potential.

Findings

The results show that frost damage aggravates the rebar corrosion rate and degree under freeze-thaw environment; furthermore, the results become more obvious with the freeze-thaw cycles increasing. Mixing the air-entrained agent into fresh concrete to prepare air-entrained concrete, increasing the cover thickness and processing the surface of concrete with a waterproofing agent can significantly improve the resistance to rebar corrosion. From the actual appearance of rebar corrosion, the results of calomel half-cell potential can well reflect the actual rebar corrosion in reinforced concrete.

Originality/value

The durability of reinforced concrete is mainly determined on chloride penetration that brings about rebar corrosion in chloride environments. Furthermore, the degradation of concrete durability becomes more serious in the harsh environment. As the concrete exposure to the freeze-thaw cycles environment, the freeze-thaw cycles accelerate the concrete damage, and the penetration of chloride into the concrete becomes easier because of the growing pore and crack sizes. In addition, rebar corrosion caused by chloride is one of the major forms of environmental attack on reinforced concrete. The tests conducted in this paper will describe the rebar corrosion in reinforced concrete under freeze-thaw environment.

Details

Anti-Corrosion Methods and Materials, vol. 63 no. 2
Type: Research Article
ISSN: 0003-5599

Keywords

Access Restricted. View access options
Article
Publication date: 17 January 2022

Huimin Song, Ting-ting Zeng and Brian H. Yim

The purpose of this study was to examine the relationship between leisure involvement (LI), conspicuous sport consumption and subjective well-being (SW) for two luxury leisure…

569

Abstract

Purpose

The purpose of this study was to examine the relationship between leisure involvement (LI), conspicuous sport consumption and subjective well-being (SW) for two luxury leisure activities: golf and skiing.

Design/methodology/approach

The authors collected data from Guangdong Province (golf, n = 342) and Jilin Province (skiing, n = 310) and examined the proposed model using structural equation modeling (SEM) and tested the mediating effect of conspicuous sport consumption using bootstrapping method.

Findings

The findings show that the proposed model explained the relationships among LI, conspicuous sport consumption and SW. Furthermore, the findings suggest that LI and conspicuous consumption (CC) can elevate sport participants' perception of SW, enriching leisure-class theory.

Originality/value

The authors’ findings contribute to the domain of CC in sport participant and leisure research and provide significant implications for the sport tourism marketers.

Details

International Journal of Sports Marketing and Sponsorship, vol. 23 no. 4
Type: Research Article
ISSN: 1464-6668

Keywords

1 – 10 of 177
Per page
102050