This research aims to propose a practical framework designed for the automatic analysis of a product’s comprehensive functionality and security vulnerabilities,generating applicable guidelines based on real-world sof...This research aims to propose a practical framework designed for the automatic analysis of a product’s comprehensive functionality and security vulnerabilities,generating applicable guidelines based on real-world software.The existing analysis of software security vulnerabilities often focuses on specific features or modules.This partial and arbitrary analysis of the security vulnerabilities makes it challenging to comprehend the overall security vulnerabilities of the software.The key novelty lies in overcoming the constraints of partial approaches.The proposed framework utilizes data from various sources to create a comprehensive functionality profile,facilitating the derivation of real-world security guidelines.Security guidelines are dynamically generated by associating functional security vulnerabilities with the latest Common Vulnerabilities and Exposure(CVE)and Common Vulnerability Scoring System(CVSS)scores,resulting in automated guidelines tailored to each product.These guidelines are not only practical but also applicable in real-world software,allowing for prioritized security responses.The proposed framework is applied to virtual private network(VPN)software,wherein a validated Level 2 data flow diagram is generated using the Spoofing,Tampering,Repudiation,Information Disclosure,Denial of Service,and Elevation of privilege(STRIDE)technique with references to various papers and examples from related software.The analysis resulted in the identification of a total of 121 vulnerabilities.The successful implementation and validation demonstrate the framework’s efficacy in generating customized guidelines for entire systems,subsystems,and selected modules.展开更多
A new multi-level analysis method of introducing the super-element modeling method, derived from the multi-level analysis method first proposed by O. F. Hughes, has been proposed in this paper to solve the problem of ...A new multi-level analysis method of introducing the super-element modeling method, derived from the multi-level analysis method first proposed by O. F. Hughes, has been proposed in this paper to solve the problem of high time cost in adopting a rational-based optimal design method for ship structural design. Furthermore,the method was verified by its effective application in optimization of the mid-ship section of a container ship. A full 3-D FEM model of a ship,suffering static and quasi-static loads, was used as the analyzing object for evaluating the structural performance of the mid-ship module, including static strength and buckling performance. Research results reveal that this new method could substantially reduce the computational cost of the rational-based optimization problem without decreasing its accuracy, which increases the feasibility and economic efficiency of using a rational-based optimal design method in ship structural design.展开更多
Low-carbon living represents both a new lifestyle and an environmental responsibility vital for sustainable development,positioning it as a central theme in environmental public service advertisements(PSAs).This resea...Low-carbon living represents both a new lifestyle and an environmental responsibility vital for sustainable development,positioning it as a central theme in environmental public service advertisements(PSAs).This research employs a multimodal discourse analysis approach to examining eight public service posters advocating low-carbon living from Xinhua News Agency,primarily utilizing the visual grammar framework established by Kress and Van Leeuwen.The study explores these posters through three key perspectives:representational meaning,interactive meaning,and compositional meaning.By analyzing the interplay between visual and linguistic modalities,this research contributes to the overall understanding of public service posters and supports the promotion of China’s low-carbon development initiatives.展开更多
We discuss the evolution of object oriented software development process based on software pattern. For developing mature software framework and component, we advocate to elicit and incorporate software patterns for ...We discuss the evolution of object oriented software development process based on software pattern. For developing mature software framework and component, we advocate to elicit and incorporate software patterns for ensuing quality and reusability of software frameworks. On the analysis base of requirement specification for business application domain, we present analysis method and basic role model of software framework. We also elicit analysis pattern of framework architecture, and design basic role classes and their structure.展开更多
An idea is presented about the development of a data processing and analysis system for ICF experiments, which is based on an object oriented framework. The design and preliminary implementation of the data processing...An idea is presented about the development of a data processing and analysis system for ICF experiments, which is based on an object oriented framework. The design and preliminary implementation of the data processing and analysis framework based on the ROOT system have been completed. Software for unfolding soft X-ray spectra has been developed to test the functions of this framework.展开更多
This paper explores the contribution of teamwork skills in serious adverse events, using the TeamSTEPPS<sup>®</sup> framework. Adverse events are the undesirable events that are not due to the natu...This paper explores the contribution of teamwork skills in serious adverse events, using the TeamSTEPPS<sup>®</sup> framework. Adverse events are the undesirable events that are not due to the natural course of a disease;they are considered serious when they prolong a hospital stay, lead to a physical disability or to death. Failures in teamwork, particularly with interprofessional teams, can lead to potential risks to patient safety. Using a dataset of de-identified reports of serious adverse events in 2016 in a tertiary teaching hospital, we explored the contribution of teamwork skills according to the TeamSTEPPS<sup>®</sup> framework to these adverse events. We found that 61% of the 41 analyzed events involved failures in teamwork skills, with 80% of these involving communication, 52% in situation monitoring and team structure, 44% in mutual support and 40% in leadership. Sixty-four percent of the events involved more than one teamwork component. Our findings emphasize the need to improve teamwork training in healthcare, focusing not only on communication, but also on other teamwork skills as they often contribute together in adverse events. Future analyses of serious adverse events should include a focus on teamwork competencies, to guide the development of future quality and safety training programs.展开更多
The increasing use of digital video everyday in a multitude of electronic devices, including mobile phones, tablets and laptops, poses the need for quick development of cross-platform video software. However current a...The increasing use of digital video everyday in a multitude of electronic devices, including mobile phones, tablets and laptops, poses the need for quick development of cross-platform video software. However current approaches to this direction usually require a long learning curve, and their development lacks standardization. This results in software components that are difficult to reuse, and hard to maintain or extend. In order to overcome such issues, we propose a novel object-oriented framework for efficient development of software systems for video analysis. It consists of a set of four abstract components, suitable for the implementation of independent plug-in modules for video acquisition, preprocessing, analysis and output handling. The extensibility of each module can be facilitated by sub-modules specifying additional functionalities. This architecture enables quick responses to changes and re-configurability;thus conforming to the requirements of agile software development practices. Considering the need for platform independency, the proposed Java Video Analysis (JVA) framework is implemented in Java. It is publicly available through the web as open-access software, supported by a growing collection of implemented modules. Its efficiency is empirically validated for the development of a representative video analysis system.展开更多
The importance of the project selection phase in any six sigma initiative cannot be emphasized enough. The successfulness of the six sigma initiative is affected by successful project selection. Recently, Data Envelop...The importance of the project selection phase in any six sigma initiative cannot be emphasized enough. The successfulness of the six sigma initiative is affected by successful project selection. Recently, Data Envelopment Analysis (DEA) has been proposed as a six sigma project selection tool. However, there exist a number of different DEA formulations which may affect the selection process and the wining project being selected. This work initially applies nine different DEA formulations to several case studies and concludes that different DEA formulations select different wining projects. Also in this work, a Multi-DEA Unified Scoring Framework is proposed to overcome this problem. This framework is applied to several case studies and proved to successfully select the six sigma project with the best performance. The framework is also successful in filtering out some of the projects that have “selective” excellent performance, i.e. projects with excellent performance in some of the DEA formulations and worse performance in others. It is also successful in selecting stable projects;these are projects that perform well in the majority of the DEA formulations, even if it has not been selected as a wining project by any of the DEA formulations.展开更多
Massive rural-to-urban migration in China is consequential for political trust: rural-to-urban migrants have been found to hold lower levels of trust in local government than their rural peers who choose to stay in th...Massive rural-to-urban migration in China is consequential for political trust: rural-to-urban migrants have been found to hold lower levels of trust in local government than their rural peers who choose to stay in the countryside (mean 4.92 and 6.34 out of 10, respectively, p < 0.001). This article explores why migrants have a certain level of political trust in their county-level government. Using data of rural-to-urban migrants from the China Family Panel Survey, this study performs a hierarchical linear modeling (HLM) to unpack the multi-level explanatory factors of rural-to-urban migrants’ political trust. Findings show that the individual-level socio-economic characteristics and perceptions of government performance (Level-1), the neighborhood-level characteristics-the physical and social status and environment of neighborhoods (Level-2), and the objective macroeconomic performance of county-level government (Level-3), work together to explain migrants’ trust levels. These results suggest that considering the effects of neighborhood-level factors on rural-to-urban migrants’ political trust merits policy and public management attention in rapidly urbanizing countries.展开更多
The economic regionalization practice led by China local governments has gradually evolved into chaos. Local governments compete to declare for higher-leveled and large-scaled economic regions to obtain more economic ...The economic regionalization practice led by China local governments has gradually evolved into chaos. Local governments compete to declare for higher-leveled and large-scaled economic regions to obtain more economic resources and policy support in the way of policy game. The author argues that the regionalization chaos is attributed to the reason that the present theoretical support for economic regionalization overemphasizes the economic growth brought about by the economic regionalization but ignores the effect of transaction cost, which leads to constraint loss on the economic regionalization theory analysis framework. Then, the introduction of economic regionalization analysis framework based on the conflicts between scale expansion and transaction costs would establish equilibrium conditions to set up a moderate scale development for economic regions. The author hopes that the acceptance of this framework into the economic regionalization decision-making system would give guidance for making more appropriate regionalization decisions.展开更多
This paper takes the financial statements of MI from 2017to 2019,and uses Harvard analysis framework to analyse the financial situation of MI.The analysis content mainly includes enterprise macro environment,industry ...This paper takes the financial statements of MI from 2017to 2019,and uses Harvard analysis framework to analyse the financial situation of MI.The analysis content mainly includes enterprise macro environment,industry competitive analysis and financial ratio analysis.This paper tried to understand the current situation and development prospect of MI.Based on the analysis of MI’s financial situation under the framework of Harvard,we summarized the existing problems and put forward suggestions.展开更多
The Critical Discourse Analysis(CDA)is an interdisciplinary tool in various conditions,which aims to provide a better understanding of sociocultural aspects of texts and accounts of the production of internal structur...The Critical Discourse Analysis(CDA)is an interdisciplinary tool in various conditions,which aims to provide a better understanding of sociocultural aspects of texts and accounts of the production of internal structure,and overall organization of texts as well as to provide a critical dimension in its theoretical and descriptive accounts of texts.Since June last year,HK protests or HK violence have been frequently reported by worldwide media.In this paper,the author aims to find out how the HK protesters and the Mainland media describe the same event based on the three-dimensional framework of CDA.At last,the author concludes that the mainland media generally describe the event as violence and riot while the HK protesters define themselves as warriors striving for more freedom,justice and democracy.Besides,on this event,the Mainland media mainly accuses some western countries of interference into HK affairs,which is undoubtedly of China’s internal affairs,and the media give full support to the HK police in safeguarding the peace and stability of Hong Kong.But from the perspective of HK protesters,they firmly believe that they are using their actions to protect all the people of HK,and they are defending their values such as freedom,democracy and justice.These are two totally different systems of language,and the author also gives its potential reasons in the paper so as to offer some viewpoints in this aspect in combination with the CDA theory.展开更多
The“burden reduction”policy aims to reduce the workload of primary and secondary school teachers to alleviate their burdens.While it has improved the quality of teachers,implementation challenges still exist.This st...The“burden reduction”policy aims to reduce the workload of primary and secondary school teachers to alleviate their burdens.While it has improved the quality of teachers,implementation challenges still exist.This study utilizes rational choice institutionalism and Ostrom’s institutional analysis and development framework to examine the policy.By considering the preferences of the Ministry of Education,local governments,schools,and teachers,it explores interactions and outcomes,identifies challenges,and provides policy suggestions.展开更多
This paper is a continuation of our last paper [1] which describes the theory of Virt-BLP model. Based on Virt-BLP model,this paper implements a mandatory access control(MAC) framework applicable to multi-level securi...This paper is a continuation of our last paper [1] which describes the theory of Virt-BLP model. Based on Virt-BLP model,this paper implements a mandatory access control(MAC) framework applicable to multi-level security(MLS) in Xen. The Virt-BLP model is the theoretical basis of this MAC framework,and this MAC framework is the implementation of Virt-BLP model. Our last paper focuses on Virt-BLP model,while this paper concentrates on the design and implementation of MAC framework. For there is no MAC framework applicable to MLS in virtual machine system at present,our MAC framework fills the blank by applying Virt-BLP model to Xen,which is better than current researches to guarantee the security of communication between virtual machines(VMs) . The experimental results show that our MAC framework is effective to manage the communication between VMs.展开更多
The public procurement system in Bangladesh has been running by traditional manual process under the flagship of Public Procurement Act (PPA 2006) and Public Procurement Rules (PPR 2008). Public procurement agencies h...The public procurement system in Bangladesh has been running by traditional manual process under the flagship of Public Procurement Act (PPA 2006) and Public Procurement Rules (PPR 2008). Public procurement agencies have been facing challenges in this manual tendering system. To overcome this problem and to bring reality to the “Digital Bangladesh” slogan, the Government of Bangladesh introduced the e-Procurement system under the e-GP (Electronic Government Procurement) guideline 2011. After the inception of e-procurement, there is no e-procurement assessment model to improve the e-GP system. The purpose of this research is to develop a conceptual framework and to design an e-procurement assessment model. With this view, we have considered one of the biggest entity Roads and Highways Department (RHD) of the Government of Bangladesh, for field study. Mixed methods along with FGD (Focus Group Discussion), KII (Key Informant Interview), and survey questionnaires are used to collect data from RHD, and then Statistical Package for Social Science (SPSS) software is used for regression analysis and hypothesis testing to develop the e-Procurement assessment model. The novel contribution of the study lies in the test of the hypothesis that focuses on developing the conceptual model of the e-procurement assessment system in Bangladesh. Findings of the study are essential for all Procurement Entity (PE) and suppliers <i>i.e. </i> contractors of RHD who are engaged in the construction of the infrastructure project development project.展开更多
The risks of the current identity system represented by Domain Name System(DNS)and Object Identifier(OID)are studied.According to the characteristics of the industrial Internet Identity(Ⅲ)system,four open ecosystem p...The risks of the current identity system represented by Domain Name System(DNS)and Object Identifier(OID)are studied.According to the characteristics of the industrial Internet Identity(Ⅲ)system,four open ecosystem planes are divided,and a corresponding risk analysis view is established to analyze risks for various planes.This paper uses Isaiah Berlin’s definition of liberty to more generally express the concept of security as positive rights and negative rights.In the risk analysis view,the target system is modeled from four dimensions:stakeholders,framework,architecture,and capability delivery.At last,three defensive lines are proposed to establish the identity credit system.展开更多
The Call of the Wild is one of the representative works of the American writer Jack London.It was published in 1903.Once appearance,it quickly achieved great success for its beautiful language and multiple levels of t...The Call of the Wild is one of the representative works of the American writer Jack London.It was published in 1903.Once appearance,it quickly achieved great success for its beautiful language and multiple levels of the theme.Based on the industrialised and capitalistic society in American history,this novel vividly reproduces the Gold Rush in Klondike.The main plot describes a process of how a domesticated dog degenerated into a wild one and went back to nature.The hero Buck is endowed with human senses and characteristics,for London tried to use animal characters to illustrate moral precepts and exhibit human behaviours.The thesis intends to demonstrate the fascination of this great novel on one hand and on the other hand, to disclose the cruelty of the social reality at that time,in hope of providing a profound comprehension for the readers.展开更多
Casino games can be classified in two main categories, i.e. skill games and gambling. Notably, the former refers to games whose outcome is affected by the strategies of players, the latter to those games whose outcome...Casino games can be classified in two main categories, i.e. skill games and gambling. Notably, the former refers to games whose outcome is affected by the strategies of players, the latter to those games whose outcome is completely random. For instance, lotteries are easily recognized as pure gambling, while some variants of Poker (e.g. Texas Hold’em) are usually considered as skill games. In both cases, the theory of probability constitutes the mathematical framework for studying their dynamics, despite their classification. Here, it is worth to consider that when games entail the competition between many players, the structure of interactions can acquire a relevant role. For instance, some games as Bingo are not characterized by this kind of interactions, while other games as Poker, show a network structure, i.e. players interact each other and have the opportunity to share or exchange information. In this paper, we analyze the dynamics of a population composed of two species, i.e. strong and weak agents. The former represents expert players, while the latter beginners, i.e. non-expert ones. Here, pair-wise interactions are based on a very simple game, whose outcome is affected by the nature of the involved agents. In doing so, expert agents have a higher probability to succeed when playing with weak agents, while the success probability is equal when two agents of the same kind face each other. Numerical simulations are performed considering a population arranged in different topologies like regular graphs and in scale-free networks. This choice allows to model dynamics that we might observe on online game platforms. Further aspects as the adaptability of agents are taken into account, e.g. the possibility to improve (i.e. to becomean expert). Results show that complex topologies represent a strong opportunity for experts and a risk for both kinds of agents.展开更多
The gap between SDA(Spatial Data Analysis)and GIS(Geographical Information Systems )existed for a long time.Presently this problem still remains in spite of a lot of theore tical and practical studies which tr y to fi...The gap between SDA(Spatial Data Analysis)and GIS(Geographical Information Systems )existed for a long time.Presently this problem still remains in spite of a lot of theore tical and practical studies which tr y to find the solu-tion for it.The research background and current situation about how to in tegrate SDA and GIS are introduced at first.The main idea of this article is to make su re what is the best scheme to bridge th e gap between SDA and GIS and how to design it.There are a lot of factors to influ ence the standards to assess such a sc heme,for instance,the attitude of users and GIS developers,the framework and related functions of current available GI S software in the market and so on.But the two most important ones of them are effic iency and flexibility of the scheme i tself.Efficiency can be measured by the conve-nient extent and temporal length when it is used for carrying out SDA.Flex ibility means users can define their own SDA methods.The best integration schem e should satisfy the two standards at the same time.A group of functions,which can be combined to implement any SDA meth od,are defined in order to design such an integration scheme.The functio ns are divided into five classes according to their properties.展开更多
Multiple failure modes tend to be identified in the reliability analysis of a redundant truss structure.This identification process involves updating the model for identifying the next potential failure members.Herein...Multiple failure modes tend to be identified in the reliability analysis of a redundant truss structure.This identification process involves updating the model for identifying the next potential failure members.Herein we intend to update the finite element model automatically in the identification process of failure modes and further perform the system reliability analysis efficiently.This study presents a framework that is implemented through the joint simulation of MATLAB and APDL and consists of three parts:reliability index of a single member,identification of dominant failure modes,and system-level reliability analysis for system reliability analysis of truss structures.Firstly,RSM(response surface method)combines with a constrained optimization model to calculate the reliability indices ofmembers.Then theβ-unzipping method is adopted to identify the dominant failuremodes,and the system function in MATLAB,as well as the EKILL command in APDL,is used to facilitate the automatic update of the finite element model and realize load-redistribution.Besides,the differential equivalence recursion algorithmis performed to approximate the reliability indices of failuremodes efficiently and accurately.Eventually,the PNET(probabilistic network evaluation technique)is used to calculate the joint failure probability as well as the system reliability index.Two illustrative examples demonstrate the accuracy and efficiency of the proposed system reliability analysis framework through comparison with corresponding references.展开更多
基金This work is the result of commissioned research project supported by the Affiliated Institute of ETRI(2022-086)received by Junho AhnThis research was supported by the National Research Foundation of Korea(NRF)Basic Science Research Program funded by the Ministry of Education(No.2020R1A6A1A03040583)this work was supported by Korea Institute for Advancement of Technology(KIAT)Grant funded by the Korea government(MOTIE)(P0008691,HRD Program for Industrial Innovation).
文摘This research aims to propose a practical framework designed for the automatic analysis of a product’s comprehensive functionality and security vulnerabilities,generating applicable guidelines based on real-world software.The existing analysis of software security vulnerabilities often focuses on specific features or modules.This partial and arbitrary analysis of the security vulnerabilities makes it challenging to comprehend the overall security vulnerabilities of the software.The key novelty lies in overcoming the constraints of partial approaches.The proposed framework utilizes data from various sources to create a comprehensive functionality profile,facilitating the derivation of real-world security guidelines.Security guidelines are dynamically generated by associating functional security vulnerabilities with the latest Common Vulnerabilities and Exposure(CVE)and Common Vulnerability Scoring System(CVSS)scores,resulting in automated guidelines tailored to each product.These guidelines are not only practical but also applicable in real-world software,allowing for prioritized security responses.The proposed framework is applied to virtual private network(VPN)software,wherein a validated Level 2 data flow diagram is generated using the Spoofing,Tampering,Repudiation,Information Disclosure,Denial of Service,and Elevation of privilege(STRIDE)technique with references to various papers and examples from related software.The analysis resulted in the identification of a total of 121 vulnerabilities.The successful implementation and validation demonstrate the framework’s efficacy in generating customized guidelines for entire systems,subsystems,and selected modules.
基金Supported by the Project of Ministry of Education and Finance(No.200512)the Project of the State Key Laboratory of ocean engineering(GKZD010053-10)
文摘A new multi-level analysis method of introducing the super-element modeling method, derived from the multi-level analysis method first proposed by O. F. Hughes, has been proposed in this paper to solve the problem of high time cost in adopting a rational-based optimal design method for ship structural design. Furthermore,the method was verified by its effective application in optimization of the mid-ship section of a container ship. A full 3-D FEM model of a ship,suffering static and quasi-static loads, was used as the analyzing object for evaluating the structural performance of the mid-ship module, including static strength and buckling performance. Research results reveal that this new method could substantially reduce the computational cost of the rational-based optimization problem without decreasing its accuracy, which increases the feasibility and economic efficiency of using a rational-based optimal design method in ship structural design.
基金the Guangzhou University Postgraduate Training Program for Innovation“Ecological discourse analysis of news reports on marine life conservation in China Daily(2020-2024)from the perspective of attitudinal resources”(Code:JCCX2024-041).
文摘Low-carbon living represents both a new lifestyle and an environmental responsibility vital for sustainable development,positioning it as a central theme in environmental public service advertisements(PSAs).This research employs a multimodal discourse analysis approach to examining eight public service posters advocating low-carbon living from Xinhua News Agency,primarily utilizing the visual grammar framework established by Kress and Van Leeuwen.The study explores these posters through three key perspectives:representational meaning,interactive meaning,and compositional meaning.By analyzing the interplay between visual and linguistic modalities,this research contributes to the overall understanding of public service posters and supports the promotion of China’s low-carbon development initiatives.
基金The research has gained the stake of Middleware Software Division of Software Group of F ujitsu L imitedJapanThe Project T
文摘We discuss the evolution of object oriented software development process based on software pattern. For developing mature software framework and component, we advocate to elicit and incorporate software patterns for ensuing quality and reusability of software frameworks. On the analysis base of requirement specification for business application domain, we present analysis method and basic role model of software framework. We also elicit analysis pattern of framework architecture, and design basic role classes and their structure.
基金This project supported by the National High-Tech Research and Development Plan (863-804-3)
文摘An idea is presented about the development of a data processing and analysis system for ICF experiments, which is based on an object oriented framework. The design and preliminary implementation of the data processing and analysis framework based on the ROOT system have been completed. Software for unfolding soft X-ray spectra has been developed to test the functions of this framework.
文摘This paper explores the contribution of teamwork skills in serious adverse events, using the TeamSTEPPS<sup>®</sup> framework. Adverse events are the undesirable events that are not due to the natural course of a disease;they are considered serious when they prolong a hospital stay, lead to a physical disability or to death. Failures in teamwork, particularly with interprofessional teams, can lead to potential risks to patient safety. Using a dataset of de-identified reports of serious adverse events in 2016 in a tertiary teaching hospital, we explored the contribution of teamwork skills according to the TeamSTEPPS<sup>®</sup> framework to these adverse events. We found that 61% of the 41 analyzed events involved failures in teamwork skills, with 80% of these involving communication, 52% in situation monitoring and team structure, 44% in mutual support and 40% in leadership. Sixty-four percent of the events involved more than one teamwork component. Our findings emphasize the need to improve teamwork training in healthcare, focusing not only on communication, but also on other teamwork skills as they often contribute together in adverse events. Future analyses of serious adverse events should include a focus on teamwork competencies, to guide the development of future quality and safety training programs.
文摘The increasing use of digital video everyday in a multitude of electronic devices, including mobile phones, tablets and laptops, poses the need for quick development of cross-platform video software. However current approaches to this direction usually require a long learning curve, and their development lacks standardization. This results in software components that are difficult to reuse, and hard to maintain or extend. In order to overcome such issues, we propose a novel object-oriented framework for efficient development of software systems for video analysis. It consists of a set of four abstract components, suitable for the implementation of independent plug-in modules for video acquisition, preprocessing, analysis and output handling. The extensibility of each module can be facilitated by sub-modules specifying additional functionalities. This architecture enables quick responses to changes and re-configurability;thus conforming to the requirements of agile software development practices. Considering the need for platform independency, the proposed Java Video Analysis (JVA) framework is implemented in Java. It is publicly available through the web as open-access software, supported by a growing collection of implemented modules. Its efficiency is empirically validated for the development of a representative video analysis system.
文摘The importance of the project selection phase in any six sigma initiative cannot be emphasized enough. The successfulness of the six sigma initiative is affected by successful project selection. Recently, Data Envelopment Analysis (DEA) has been proposed as a six sigma project selection tool. However, there exist a number of different DEA formulations which may affect the selection process and the wining project being selected. This work initially applies nine different DEA formulations to several case studies and concludes that different DEA formulations select different wining projects. Also in this work, a Multi-DEA Unified Scoring Framework is proposed to overcome this problem. This framework is applied to several case studies and proved to successfully select the six sigma project with the best performance. The framework is also successful in filtering out some of the projects that have “selective” excellent performance, i.e. projects with excellent performance in some of the DEA formulations and worse performance in others. It is also successful in selecting stable projects;these are projects that perform well in the majority of the DEA formulations, even if it has not been selected as a wining project by any of the DEA formulations.
文摘Massive rural-to-urban migration in China is consequential for political trust: rural-to-urban migrants have been found to hold lower levels of trust in local government than their rural peers who choose to stay in the countryside (mean 4.92 and 6.34 out of 10, respectively, p < 0.001). This article explores why migrants have a certain level of political trust in their county-level government. Using data of rural-to-urban migrants from the China Family Panel Survey, this study performs a hierarchical linear modeling (HLM) to unpack the multi-level explanatory factors of rural-to-urban migrants’ political trust. Findings show that the individual-level socio-economic characteristics and perceptions of government performance (Level-1), the neighborhood-level characteristics-the physical and social status and environment of neighborhoods (Level-2), and the objective macroeconomic performance of county-level government (Level-3), work together to explain migrants’ trust levels. These results suggest that considering the effects of neighborhood-level factors on rural-to-urban migrants’ political trust merits policy and public management attention in rapidly urbanizing countries.
文摘The economic regionalization practice led by China local governments has gradually evolved into chaos. Local governments compete to declare for higher-leveled and large-scaled economic regions to obtain more economic resources and policy support in the way of policy game. The author argues that the regionalization chaos is attributed to the reason that the present theoretical support for economic regionalization overemphasizes the economic growth brought about by the economic regionalization but ignores the effect of transaction cost, which leads to constraint loss on the economic regionalization theory analysis framework. Then, the introduction of economic regionalization analysis framework based on the conflicts between scale expansion and transaction costs would establish equilibrium conditions to set up a moderate scale development for economic regions. The author hopes that the acceptance of this framework into the economic regionalization decision-making system would give guidance for making more appropriate regionalization decisions.
文摘This paper takes the financial statements of MI from 2017to 2019,and uses Harvard analysis framework to analyse the financial situation of MI.The analysis content mainly includes enterprise macro environment,industry competitive analysis and financial ratio analysis.This paper tried to understand the current situation and development prospect of MI.Based on the analysis of MI’s financial situation under the framework of Harvard,we summarized the existing problems and put forward suggestions.
文摘The Critical Discourse Analysis(CDA)is an interdisciplinary tool in various conditions,which aims to provide a better understanding of sociocultural aspects of texts and accounts of the production of internal structure,and overall organization of texts as well as to provide a critical dimension in its theoretical and descriptive accounts of texts.Since June last year,HK protests or HK violence have been frequently reported by worldwide media.In this paper,the author aims to find out how the HK protesters and the Mainland media describe the same event based on the three-dimensional framework of CDA.At last,the author concludes that the mainland media generally describe the event as violence and riot while the HK protesters define themselves as warriors striving for more freedom,justice and democracy.Besides,on this event,the Mainland media mainly accuses some western countries of interference into HK affairs,which is undoubtedly of China’s internal affairs,and the media give full support to the HK police in safeguarding the peace and stability of Hong Kong.But from the perspective of HK protesters,they firmly believe that they are using their actions to protect all the people of HK,and they are defending their values such as freedom,democracy and justice.These are two totally different systems of language,and the author also gives its potential reasons in the paper so as to offer some viewpoints in this aspect in combination with the CDA theory.
文摘The“burden reduction”policy aims to reduce the workload of primary and secondary school teachers to alleviate their burdens.While it has improved the quality of teachers,implementation challenges still exist.This study utilizes rational choice institutionalism and Ostrom’s institutional analysis and development framework to examine the policy.By considering the preferences of the Ministry of Education,local governments,schools,and teachers,it explores interactions and outcomes,identifies challenges,and provides policy suggestions.
基金supported by National Key Basic Research and Development Plan (973 Plan) of China (No. 2007CB310900)National Natural Science Foundation of China (No. 90612018, 90715030 and 60970008)
文摘This paper is a continuation of our last paper [1] which describes the theory of Virt-BLP model. Based on Virt-BLP model,this paper implements a mandatory access control(MAC) framework applicable to multi-level security(MLS) in Xen. The Virt-BLP model is the theoretical basis of this MAC framework,and this MAC framework is the implementation of Virt-BLP model. Our last paper focuses on Virt-BLP model,while this paper concentrates on the design and implementation of MAC framework. For there is no MAC framework applicable to MLS in virtual machine system at present,our MAC framework fills the blank by applying Virt-BLP model to Xen,which is better than current researches to guarantee the security of communication between virtual machines(VMs) . The experimental results show that our MAC framework is effective to manage the communication between VMs.
文摘The public procurement system in Bangladesh has been running by traditional manual process under the flagship of Public Procurement Act (PPA 2006) and Public Procurement Rules (PPR 2008). Public procurement agencies have been facing challenges in this manual tendering system. To overcome this problem and to bring reality to the “Digital Bangladesh” slogan, the Government of Bangladesh introduced the e-Procurement system under the e-GP (Electronic Government Procurement) guideline 2011. After the inception of e-procurement, there is no e-procurement assessment model to improve the e-GP system. The purpose of this research is to develop a conceptual framework and to design an e-procurement assessment model. With this view, we have considered one of the biggest entity Roads and Highways Department (RHD) of the Government of Bangladesh, for field study. Mixed methods along with FGD (Focus Group Discussion), KII (Key Informant Interview), and survey questionnaires are used to collect data from RHD, and then Statistical Package for Social Science (SPSS) software is used for regression analysis and hypothesis testing to develop the e-Procurement assessment model. The novel contribution of the study lies in the test of the hypothesis that focuses on developing the conceptual model of the e-procurement assessment system in Bangladesh. Findings of the study are essential for all Procurement Entity (PE) and suppliers <i>i.e. </i> contractors of RHD who are engaged in the construction of the infrastructure project development project.
文摘The risks of the current identity system represented by Domain Name System(DNS)and Object Identifier(OID)are studied.According to the characteristics of the industrial Internet Identity(Ⅲ)system,four open ecosystem planes are divided,and a corresponding risk analysis view is established to analyze risks for various planes.This paper uses Isaiah Berlin’s definition of liberty to more generally express the concept of security as positive rights and negative rights.In the risk analysis view,the target system is modeled from four dimensions:stakeholders,framework,architecture,and capability delivery.At last,three defensive lines are proposed to establish the identity credit system.
文摘The Call of the Wild is one of the representative works of the American writer Jack London.It was published in 1903.Once appearance,it quickly achieved great success for its beautiful language and multiple levels of the theme.Based on the industrialised and capitalistic society in American history,this novel vividly reproduces the Gold Rush in Klondike.The main plot describes a process of how a domesticated dog degenerated into a wild one and went back to nature.The hero Buck is endowed with human senses and characteristics,for London tried to use animal characters to illustrate moral precepts and exhibit human behaviours.The thesis intends to demonstrate the fascination of this great novel on one hand and on the other hand, to disclose the cruelty of the social reality at that time,in hope of providing a profound comprehension for the readers.
文摘Casino games can be classified in two main categories, i.e. skill games and gambling. Notably, the former refers to games whose outcome is affected by the strategies of players, the latter to those games whose outcome is completely random. For instance, lotteries are easily recognized as pure gambling, while some variants of Poker (e.g. Texas Hold’em) are usually considered as skill games. In both cases, the theory of probability constitutes the mathematical framework for studying their dynamics, despite their classification. Here, it is worth to consider that when games entail the competition between many players, the structure of interactions can acquire a relevant role. For instance, some games as Bingo are not characterized by this kind of interactions, while other games as Poker, show a network structure, i.e. players interact each other and have the opportunity to share or exchange information. In this paper, we analyze the dynamics of a population composed of two species, i.e. strong and weak agents. The former represents expert players, while the latter beginners, i.e. non-expert ones. Here, pair-wise interactions are based on a very simple game, whose outcome is affected by the nature of the involved agents. In doing so, expert agents have a higher probability to succeed when playing with weak agents, while the success probability is equal when two agents of the same kind face each other. Numerical simulations are performed considering a population arranged in different topologies like regular graphs and in scale-free networks. This choice allows to model dynamics that we might observe on online game platforms. Further aspects as the adaptability of agents are taken into account, e.g. the possibility to improve (i.e. to becomean expert). Results show that complex topologies represent a strong opportunity for experts and a risk for both kinds of agents.
文摘The gap between SDA(Spatial Data Analysis)and GIS(Geographical Information Systems )existed for a long time.Presently this problem still remains in spite of a lot of theore tical and practical studies which tr y to find the solu-tion for it.The research background and current situation about how to in tegrate SDA and GIS are introduced at first.The main idea of this article is to make su re what is the best scheme to bridge th e gap between SDA and GIS and how to design it.There are a lot of factors to influ ence the standards to assess such a sc heme,for instance,the attitude of users and GIS developers,the framework and related functions of current available GI S software in the market and so on.But the two most important ones of them are effic iency and flexibility of the scheme i tself.Efficiency can be measured by the conve-nient extent and temporal length when it is used for carrying out SDA.Flex ibility means users can define their own SDA methods.The best integration schem e should satisfy the two standards at the same time.A group of functions,which can be combined to implement any SDA meth od,are defined in order to design such an integration scheme.The functio ns are divided into five classes according to their properties.
基金support from the National Key R&D Program of China(Grant Nos.2021YFB2600605,2021YFB2600600)the Overseas Scholar Program in the Hebei Province(C20190514)+1 种基金from the State Key Laboratory of Mechanical Behavior and System Safety of Traffic Engineering Structures Project(ZZ2020-20)from the Youth Foundation of Hebei Science and Technology Research Project(QN2018108).
文摘Multiple failure modes tend to be identified in the reliability analysis of a redundant truss structure.This identification process involves updating the model for identifying the next potential failure members.Herein we intend to update the finite element model automatically in the identification process of failure modes and further perform the system reliability analysis efficiently.This study presents a framework that is implemented through the joint simulation of MATLAB and APDL and consists of three parts:reliability index of a single member,identification of dominant failure modes,and system-level reliability analysis for system reliability analysis of truss structures.Firstly,RSM(response surface method)combines with a constrained optimization model to calculate the reliability indices ofmembers.Then theβ-unzipping method is adopted to identify the dominant failuremodes,and the system function in MATLAB,as well as the EKILL command in APDL,is used to facilitate the automatic update of the finite element model and realize load-redistribution.Besides,the differential equivalence recursion algorithmis performed to approximate the reliability indices of failuremodes efficiently and accurately.Eventually,the PNET(probabilistic network evaluation technique)is used to calculate the joint failure probability as well as the system reliability index.Two illustrative examples demonstrate the accuracy and efficiency of the proposed system reliability analysis framework through comparison with corresponding references.