58 research outputs found

    Collaborative HRM, climate for cooperation, and employee intra-organizational social ties in high-technology firms in China: A cross-level analysis

    Get PDF
    Individual social ties have been an important source of competitive advantages for hightech firms in the knowledge economy. However, the existing cross-level studies have mainly investigated the impact of HRM systems on traditional individual attitudinal or behavioral outcomes, and few studies have examined the effect of SHRM on individual social ties. Based on the data collected from 363 knowledge employees working in 64 high-tech firms in China, we examine the cross-level relationships among collaborative HRM practices, climate for cooperation and employee intra-organizational social ties. The hierarchical linear model results show that organizational-level collaborative HRM practices have significant positive effects on the number and strength of individual-level intra-organizational social ties, and the climate for cooperation mediates the positive cross-level relationship between collaborative HRM and individual intra-organizational social ties. This study makes three contributions to the literature. First, with a cross-level model, this study helps us better understand how collaborative HRM acts as an approach to manage individuals’ social capital formation. Second, this study makes contribution to the social network literature by showing how organizational contextual factors (HRM practices and organizational climate) affect employee individual social ties. Third, based on the AMO model, this paper developed a more clear construct and a three-dimension measurement of the collaborative HRM

    Faulty node repair and dynamically spawned black hole search

    Get PDF
    New threats to networks are constantly arising. This justifies protecting network assets and mitigating the risk associated with attacks. In a distributed environment, researchers aim, in particular, at eliminating faulty network entities. More specifically, much research has been conducted on locating a single static black hole, which is defined as a network site whose existence is known a priori and that disposes of any incoming data without leaving any trace of this occurrence. However, the prevalence of faulty nodes requires an algorithm able to (a) identify faulty nodes that can be repaired without human intervention and (b) locate black holes, which are taken to be faulty nodes whose repair does require human intervention. In this paper, we consider a specific attack model that involves multiple faulty nodes that can be repaired by mobile software agents, as well as a virus v that can infect a previously repaired faulty node and turn it into a black hole. We refer to the task of repairing multiple faulty nodes and pointing out the location of the black hole as the Faulty Node Repair and Dynamically Spawned Black Hole Search. Wefirst analyze the attack model we put forth. We then explain (a) how to identify whether a node is either (1) a normal node or (2) a repairable faulty node or (3) the black hole that has been infected by virus v during the search/repair process and, (b) how to perform the correct relevant actions. These two steps constitute a complex task, which, we explain, significantly differs from the traditional Black Hole Search. We continue by proposing an algorithm to solve this problem in an

    En multifunktions Walker för att bistå äldre Mobility

    No full text
      The walker is regarded as a promising solution to provide additional support to maintain balance or stability while walking for elderly people. Significant assistance in improving mobility technology have been observed from literature review. However, the walkers available in the market is possible to optimize in design and include additional functionality, including getting out of the seat at home with caregiver aid, emergency care aided system. Considering falling down is a public healthcare problem, we designed the emergency aided system to rescue them [1].   In this paper, we proposed a multiple function elderly mobility and emergency aid system, was developed and modelled by Inventor 2015, and finite element analysis. Simulation was then created to get the value of safety factor, and make comparison base on the results from structural calculation. Finally, the application of few features of the improved walker was illustrated

    Indoor Air Quality in Tujia Dwellings in Hunan, China: Field Tests, Numerical Simulations, and Mitigation Strategies

    No full text
    Air pollution is a major health hazard. The traditional habits and unique ethnic fire culture in Hunan Tujia region result in the long-term exposure of residents, especially elderly people, to pollutants. In this study, we conducted field monitoring and assessment of indoor pollutants in the residential houses of Hunan Tujia families and subsequently visualised and simulated fire pollutants in representative residential houses by using fire-dynamic-simulator software. Pollutant-control strategies, using passive smoke collectors and resizing windows, were proposed and simulated for validation. The results revealed that passive smoke collectors reduced the pollutant concentration in the hall house by 43.96%. Furthermore, the optimal window size was 1500 mm × 1500 mm, and the most reasonable windowsill height of the firepit was 1800 mm. The results of the study can be used to improve the indoor air quality of Tujia dwellings and mitigate the adverse health effects of exposure to indoor air pollution without restricting ethnic beliefs and traditional customs

    The Ancient Town Residential Environment of the Elderly in Xiangxi Tujia: Survey, Questions, and Recommendations

    No full text
    This study uses behavioral observation, interviews, and questionnaire research to investigate the residential environment. It also evaluates the elderly in four representative ancient towns of Xiangxi, namely, Liye Ancient Town, Furong Ancient Town, Liexi Ancient Town, and Xichehe Ancient Town. It includes indoor air (CO2, PM2.5, PM10) and light intensity monitoring for the residential environment. The results showed that the elderly had a significant sense of frustration and loneliness. Of the elderyly, 70% believed the current living environment had an impact on healthy living, and 45% believed the safety and convenience of the living environment should be improved. More than 80% of the elderly were dissatisfied with their indoor acoustic environment, and more than 70% were dissatisfied with their home transportation. More than 85% of the elderly considered traditional wooden components and spaces to be the source of cultural identity. Furthermore, the average indoor PM2.5 concentration during the fire pit fire was 350–600 µg/m3, about 4.7–8 times the Chinese standard value. The average concentration of PM10 in all rooms was more than 400 µg/m3, approximately three times the Chinese standard value. Also, targeted environmental improvement strategies were proposed. The study results provided actual information to develop a systematic approach and a targeted design based on the needs to improve the residential environment of the elderly in ancient cities

    Repairing faulty nodes and locating a dynamically spawned black hole search using tokens

    No full text
    In a distributed cloud, it is crucial to detect and eliminate faulty network entities in order to protect network assets and mitigate the risks associated with constantly arising attacks. Much research has been conducted on locating a single static black hole, which is defined as a network site whose existence is known a priori and that disposes of any incoming data without leaving any trace of this occurrence. In this paper, we introduce a specific attack model that involves multiple faulty nodes that can be repaired by mobile software agents, as well as what we call a gray virus that can infect a previously repaired faulty node and turn it into a black hole. The Faulty Node Repair and Dynamically Spawned Black Hole Search (FNR-DSBHS) problem that proceeds from this model is much more complex and realistic than the traditional Black Hole Search problem. We first explain why existing algorithms addressing the latter do not work under this new attack model. We then distinguish between a one-stop gray virus that, after infecting a faulty node that has been repaired, can no longer travel to other nodes; and a multi-stop gray virus. We observe that, in an asynchronous network, a solution to the FNR-DSBHS problem is possible only when dealing with a single one-stop gray virus. In that specific context, we present a solution for an asynchronous ring network using a token model, that is, a ring in which a constant number of tokens is the only means of communication between the team of agents. We claim that, in such a ring, b + 9 agents can repair all faulty nodes as well as locate the black hole that is infected by this single one-stop gray virus. We prove the correctness of the proposed solution and analyze its complexity in terms of number of mobile agents used and total number of moves performed by these agents. We show that in the worst case, within O(kn2) moves, b + 9 agents suffice to repair b faulty nodes and report the location of the black hole that is infected, at any arbitrary point in time, by the one-stop gray virus

    Synthesis of Mo-doped ultrathin BiVO 4

    No full text

    Caulis Sargentodoxae Prescription Plays a Therapeutic Role with Decreased Inflammatory Cytokines in Peritoneal Fluid in the Rat Endometriosis Model

    No full text
    Caulis Sargentodoxae prescription has been confirmed by the gynecological clinical observation to be effective in the treatment of endometriosis (EMs), and inflammatory cytokines were involved in EMs. In this paper, animal experiments were designed to explain anti-inflammatory mechanisms of Caulis Sargentodoxae prescription on endometriosis. The EMs model was established by autoplastic transplantation, and rats were randomly divided into seven groups: normal control group, model group, ovariectomized group, gestrinone (Western medicine) group, Caulis Sargentodoxae prescription (Chinese medicine) group, celecoxib (inhibitor) group, and combination (Chinese medicine + inhibitor) group. After oral administration for 21 days, the growth inhibitory rates of the ectopic endometria in treatment groups were evaluated, and the levels of inflammatory cytokines in the serum and peritoneal fluid were determined by ELISA, as well as the expression of prostaglandin endoperoxide synthase 2 (PTGS2) in the ectopic endometrial tissues was detected by real-time polymerase chain reaction, immunohistochemistry, and western blotting. The growth inhibitory rates of the ectopic endometria were significantly higher in the Caulis Sargentodoxae prescription group and gestrinone group, in comparison with the model group p<0.05. In the Caulis Sargentodoxae prescription group, the levels of inflammatory cytokines including IL-1, IL-2, IL-6, TNF-α, and PGE2 were all reduced in the serum and peritoneal fluid p<0.05. In addition, the specific expression of PTGS2 in the ectopic endometrial tissues significantly decreased in the Caulis Sargentodoxae prescription group and PTGS2 inhibitor celecoxib group both at mRNA and protein levels, but in the steroid hormone drug gestrinone group not at the mRNA level. So, Caulis Sargentodoxae prescription has a reliable therapeutic effect on the EMs by its comprehensive anti-inflammatory roles, possibly in a way different from gestrinone

    Modeling of Mutual Inductance Between Two Misalignment Planar Coils in Wireless Power Transfer

    No full text
    • …
    corecore