International Business School Suzhou

ADDRESS
International Business School Suzhou (IBSS)
Business Building (BS), South Campus
Xi'an Jiaotong-Liverpool University
8 Chongwen Road Suzhou Dushu Lake Science and Education Innovation District , Suzhou Industrial Park
Suzhou,Jiangsu Province,P. R. China,215123
E-MAIL:

ibss@xjtlu.edu.cn

1. Identifying the influential spreaders in multilayer interactions of online social networks

Author:Al-Garadi, MA;Varathan, KD;Ravana, SD;Ahmed, E;Chang, V

Source:JOURNAL OF INTELLIGENT & FUZZY SYSTEMS,2016,Vol.31

Abstract:Online social networks (OSNs) portray a multi-layer of interactions through which users become a friend, information is propagated, ideas are shared, and interaction is constructed within an OSN. Identifying the most influential spreaders in a network is a significant step towards improving the use of existing resources to speed up the spread of information for application such as viral marketing or hindering the spread of information for application like virus blocking and rumor restraint. Users communications facilitated by OSNs could confront the temporal and spatial limitations of traditional communications in an exceptional way, thereby presenting new layers of social interactions, which coincides and collaborates with current interaction layers to redefine the multiplex OSN. In this paper, the effects of different topological network structure on influential spreaders identification are investigated. The results analysis concluded that improving the accuracy of influential spreaders identification in OSNs is not only by improving identification algorithms but also by developing a network topology that represents the information diffusion well. Moreover, in this paper a topological representation for an OSN is proposed which takes into accounts both multilayers interactions as well as overlaying links as weight. The measurement results are found to be more reliable when the identification algorithms are applied to proposed topological representation compared when these algorithms are applied to single layer representations.
2. An Empirical Research on the Investment Strategy of Stock Market based on Deep Reinforcement Learning model

Author:Li, Yuming ; Ni, Pin ; Chang, Victor

Source:COMPLEXIS 2019 - Proceedings of the 4th International Conference on Complexity, Future Information Systems and Risk,2019,Vol.

Abstract:The stock market plays a major role in the entire financial market. How to obtain effective trading signals in the stock market is a topic that stock market has long been discussing. This paper first reviews the Deep Reinforcement Learning theory and model, validates the validity of the model through empirical data, and compares the benefits of the three classical Deep Reinforcement Learning models. From the perspective of the automated stock market investment transaction decision-making mechanism, Deep Reinforcement Learning model has made a useful reference for the construction of investor automation investment model, the construction of stock market investment strategy, the application of artificial intelligence in the field of financial investment and the improvement of investor strategy yield. © 2019 International Conference on Complexity, Future Information Systems and Risk.
3. Key management and key distribution for secure group communication in mobile and cloud network

Author:Vijayakumar, P;Chang, V;Deborah, LJ;Kshatriya, BSR

Source:FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE,2018,Vol.84

Abstract:With the computing systems becoming more and more pervasive and ubiquitous due to the invention of cloud computing and mobile phone based applications, secure data transmission is the pressing need for a real time perspective of the technologies. Examples of the need for secure key management and distribution environments include secure transmission of health related SMS, telecare medicine provisioning for critical applications such as heart disorders, secure agriculture monitoring, data transmission in surveillance scenarios, secure military networks, etc. In the context of key exchange for secure group communication, the computational complexities need to be addressed in particular due to the advent of resource constrained mobile phones, sensors and other embedded devices. This special issue introduces some of the novel approaches for enabling secure group communication in the contexts related to cloud and mobile computing. (C) 2018 Published by Elsevier B.V.
4. The dual effects of home country institutions on the internationalization of private firms in emerging markets Evidence from China

Author:Li, FR;Ding, D

Source:MULTINATIONAL BUSINESS REVIEW,2017,Vol.25

Abstract:Purpose - This study aims to examine the dual effects of home country institutional forces (i.e. institutional support and institutional constraints) on the internationalization of private firms in emerging markets. By doing so, this study aims to examine the applicability of the two seemingly paradoxical views (i.e. the governmental promotion view and the institutional escapism view) in explaining private firms' internationalization. Further, this study investigates how the effect of the home country institutional environment on firms' internationalization is contingent upon firm characteristics. Design/methodology/approach - A sample of Chinese private firms is used to examine the effect of home country institutions on internationalization. Findings - Empirical findings suggest that both institutional support and institutional constraints promote the internationalization of private firms in emerging markets. Moreover, it is found that firm resources strengthen the effect of government support on internationalization. It is also found that firms' business ties strengthen the effect of institutional constraint on internationalization, whereas firms' political ties weaken the effect of institutional constraints on internationalization. Originality/value - By adopting an integrated and comprehensive investigation of the dual effects of home country institutional environment in emerging markets on internationalization, this study provides evidence to the applicability of the two competing views (i.e. the governmental promotion view and the institutional escapism view) in relation to home country institutional effects on internationalization. In addition, this study examines how institutional effects vary across firms with different resources and social ties, thus extends understandings of the boundary conditions of the two institutional effects.
5. Institutional perspective on emerging industry development: Foreign experiences and policy implications for China

Author:Cao,Xuanwei;Zabe-Brechtel,Christoph

Source:Journal of Science and Technology Policy in China,2011,Vol.2

Abstract:Purpose: The purpose of this paper is to elucidate the dynamic interactions and co-evolution of institutions with the technology and organization fields in emerging industry development. Insights and inspirations from comparison of the triangle relationship among government, market and local community in different institutional contexts could contribute to possible institutional innovation in the context of large-scale institutional transition. In this way, this paper is expected to offer insights to the development of emerging industries in China. Design/methodology/approach: The paper reviews the focal literature focusing on institutional change and the co-evolution of institution, industry and technology. A multi-level conceptual framework is put forward to explain the mechanism for the co-evolution of technology, organization and institution. A multi-case comparison method was applied to compare and disclose the process of co-evolution of institutions, and the technology and organizational fields, as well as varied paths of industry development in different institutional contexts. Findings: Emerging industry development in China is still presenting the character of path dependence to a great extent under traditional institutional arrangement, while the power and possible contribution from broader actors in the local community have been ignored. Driving force for a more innovative institutional transition towards emerging industry development should consider decentralized institutional arrangement and actions at local community instead of "command and control" from central planning. Practical implications: First, the comparison of wind energy industry development in three countries creates possibilities for further analysis and reference for China's emerging industry. Second, the illustration of the triangle relationship among government, market and local community in different countries helps policy makers in China reconsider and redesign an effective institutional framework for balancing the powers among indigenous community, local government and market. Institutional alignment should be listed as an important consideration during the process of the policy design of such an effective institutional framework. Originality/value: The paper presents a model to understand the dynamic co-evolution of the institution, technology and organizational fields. It confirms the role of institution in promoting emerging industry development. Particularly, it offers inspirations for the development of emerging industries in nations facing large-scale institutional transition. © Emerald Group Publishing Limited.
6. HOW THE 1978 FOREIGN DOMESTIC WORKERS LAW INCREASED THE LABOR SUPPLY OF SINGAPOREAN WOMEN

Author:Freire, T

Source:SINGAPORE ECONOMIC REVIEW,2016,Vol.61

Abstract:In 1978, Singapore became the first country to introduce legislation allowing foreign domestic workers to work in the country under special visas. Although Singapore is often cited in the literature as a success story, no studies have quantified the impact of this legislation. In this paper, we use data derived from the Singapore Yearbook of Manpower Statistics between 1974 and 1985 to determine the influence of the 1978 legislation on the labor supply of Singaporean women. We find that the labor supply of women affected by this policy increased by between 3.1%% and 6.2%%.
7. A novel cluster HAR-type model for forecasting realized volatility

Author:Yao, XZ;Izzeldin, M;Li, ZX

Source:INTERNATIONAL JOURNAL OF FORECASTING,2019,Vol.35

Abstract:This paper proposes a cluster HAR-type model that adopts the hierarchical clustering technique to form the cascade of heterogeneous volatility components. In contrast to the conventional HAR-type models, the proposed cluster models are based on the relevant lagged volatilities selected by the cluster group Lasso. Our simulation evidence suggests that the cluster group Lasso dominates other alternatives in terms of variable screening and that the cluster HAR serves as the top performer in forecasting the future realized volatility. The forecasting superiority of the cluster models are also demonstrated in an empirical application where the highest forecasting accuracy tends to be achieved by separating the jumps from the continuous sample path volatility process. (C) 2019 International Institute of Forecasters. Published by Elsevier B.V. All rights reserved.
8. The design and simulation of p-type Si/SiGe Terahertz quantum cascade lasers

Author:Chen, QY;Wu, JJ;Fang, Z;Zhao, CZ

Source:OPTICS AND LASER TECHNOLOGY,2014,Vol.57

Abstract:To prolong upper state lifetime in p-type Si/Si1-xGex Terahertz quantum cascade lasers, a new active region is designed in this work. Using 6 x 6 k . p theory, the eigenvalues and wavefunctions of heavy holes and light holes are firstly calculated in a single SiGe quantum well. The design in the active region of this THz Si/Si1-xGex quantum cascade lasers is then investigated. This work presents a SiGe quantum cascade laser with about 6.84 THz emission in the diagonal transition. The calculations show that about 32 ps of the upper state lifetime and about 9 cm(-1) of optical gain are obtained, which are enhanced when compared to previous designs. (C) 2013 Elsevier Ltd. All rights reserved.
9. Big data analytics for sustainability

Author:Lv, ZH;Iqbal, R;Chang, V

Source:FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE,2018,Vol.86

Abstract:Sustainability is a paradigm for thinking about the future in which environmental, societal and economic considerations are equitable in the pursuit of an improved lifestyle. Most of the economies are developing with breakneck velocities and are becoming epicenters of unsustainable global growth. Immense utilization of natural resources, waste generation and ecological irresponsibility are the reasons for such a dire situation. Big data analytics is clearly on a penetrative path across all arenas that rely on technology. (C) 2018 Published by Elsevier B.V.
10. 2nd International Workshop on Multimedia Privacy and Security

Author:Hallman, RA;Li, SJ;Chang, V

Source:PROCEEDINGS OF THE 2018 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY (CCS'18),2018,Vol.

11. A Q-Learning-Based Approach for Deploying Dynamic Service Function Chains

Author:Sun, J;Huang, GH;Sun, G;Yu, HF;Sangaiah, AK;Chang, V

Source:SYMMETRY-BASEL,2018,Vol.10

Abstract:As the size and service requirements of today's networks gradually increase, large numbers of proprietary devices are deployed, which leads to network complexity, information security crises and makes network service and service provider management increasingly difficult. Network function virtualization (NFV) technology is one solution to this problem. NFV separates network functions from hardware and deploys them as software on a common server. NFV can be used to improve service flexibility and isolate the services provided for each user, thus guaranteeing the security of user data. Therefore, the use of NFV technology includes many problems worth studying. For example, when there is a free choice of network path, one problem is how to choose a service function chain (SFC) that both meets the requirements and offers the service provider maximum profit. Most existing solutions are heuristic algorithms with high time efficiency, or integer linear programming (ILP) algorithms with high accuracy. It's necessary to design an algorithm that symmetrically considers both time efficiency and accuracy. In this paper, we propose the Q-learning Framework Hybrid Module algorithm (QLFHM), which includes reinforcement learning to solve this SFC deployment problem in dynamic networks. The reinforcement learning module in QLFHM is responsible for the output of alternative paths, while the load balancing module in QLFHM is responsible for picking the optimal solution from them. The results of a comparison simulation experiment on a dynamic network topology show that the proposed algorithm can output the approximate optimal solution in a relatively short time while also considering the network load balance. Thus, it achieves the goal of maximizing the benefit to the service provider.
12. Multimedia augmented m-learning Issues, trends and open challenges

Author:Yousafzai, Abdullah ; Chang, Victor ; Gani, Abdullah ; Noor, Rafidah Md

Source:International Journal of Information Management,2016,Vol.36

Abstract:The advancement in mobile technology and the introduction of cloud computing systems enable the use of educational materials on mobile devices for a location- and time-agnostic learning process. These educational materials are delivered in the form of data and compute-intensive multimedia-enabled learning objects. Given these constraints, the desired objective of mobile learning (m-learning) may not be achieved. Accordingly, a number of m-learning systems are being developed by the industry and academia to transform society into a pervasive educational institute. However, no guideline on the technical issues concerning the m-learning environment is available. In this study, we present a taxonomy of such technical issues that can impede the life cycle of multimedia-enabled m-learning applications. The taxonomy is devised based on the issues related to mobile device heterogeneity, network performance, content heterogeneity, content delivery, and user expectation. These issues are discussed, along with their causes and measures, to achieve solutions. Furthermore, we identify several trending areas through which the adaptability and acceptability of multimedia-enabled m-learning platforms can be increased. Finally, we discuss open challenges, such as low complexity encoding, data dependency, measurement and modeling, interoperability, and security as future research directions. © 2016 Elsevier Ltd. All rights reserved.
13. Dynamic capabilities and organizational performance: The mediating role of innovation

Author:Zhou, SS;Zhou, AJ;Feng, JZ;Jiang, SS

Source:JOURNAL OF MANAGEMENT & ORGANIZATION,2019,Vol.25

Abstract:How firms' dynamic capabilities lead to their competitive advantage and improved firm performance has been a core issue and full of debates. In this research, we theorize that dynamic capabilities, which could be defined by three distinct dimensions (sensing capability, integration capability, and reconfiguration capability), facilitate different types of innovation that in turn improve firm performance. Based on a sample of 204 Chinese firms, results from partial least squares structural equation modeling analyses generally support our arguments despite some nuanced differences existing among different dimensions of dynamic capabilities. This study contributes to dynamic capabilities literature by reducing the scarcity of empirical research and by uncovering the mechanisms through which dynamic capabilities influence firm performance.
14. Data analytics and visualization for inspecting cancers and genes

Author:Chang, V

Source:MULTIMEDIA TOOLS AND APPLICATIONS,2018,Vol.77

Abstract:This paper describes our latest research in data analytics and visualization for bioinformatics and healthcare. Each year many patients have suffered cancers. Analytics and visualization can help to simulate the development of malignant tumors and help identify weak spots of tumor for treatment, inspect malignant tumors in general and inspect whether genes have cancerous cells. Related literature, technologies, simulation results with explanation, performance evaluation and comparisons with other work have been discussed in details. We can process training data with a low completion time to achieve simulations of malignant tumors and genes to inspect their status, as well as the querying the output data within seconds. Our malignant tumor and gene simulation can achieve 360 degrees for an inspection of cancerous presence. We conclude that data analytics and visualization can provide effective and efficient healthcare research and also other type of interdisciplinary research.
15. “第二故乡”:“一带一路”格局下的企业战略

Author:李平;杨政银

Source:Business Review,2017,Vol.

Abstract:大时代呼唤大战略,大格局孕育大战略.伫立于实现民族复兴的历史关口,置身于“一带一路”倡议的恢弘实践,中国企业迎来了全新的历史发展机遇,世界舞台正拭目以待中国企业的全新表现,尤其是中国企业如何通过国际化战略实现转型升级.毋庸讳言,中国企业迎来了跨国全球发展的春天.然而,“春天”到来之际也可能出现“倒春寒”,跨国经营的战略转型充满挑战与陷阱,一着不慎就可能万劫不复.中国企业如何顺利“春种”,获得“秋收”?本文为中国企业提供了一个在“一带一路”背景下跨国经营战略转型的管理思想及模式——“第二故乡”战略.希望这一战略模式有助于中国企业全球化经营,有助于“一带一路”倡议从宏伟畅想变成累累果实.
16. Does an institutional factor influence corporate environmental strategy? Looking through the Guanxi lens

Author:Cao, XW;Quazi, A

Source:SUSTAINABILITY ACCOUNTING MANAGEMENT AND POLICY JOURNAL,2017,Vol.8

Abstract:Purpose - This paper aims to illustrate how institutional factors, such as Guanxi (connectedness) mechanism in a transition economy, could impact managerial cognition and their temporal orientation at individual level as well as induced change on corporate environmental strategy (CES). More specifically, this paper explores the micro foundation of corporate strategy change in an attempt to examine how corporate strategic choice and actions evolve with managerial cognition of "Guanxi" with various temporal orientations. Design/methodology/approach - The paper reviews the extant literature focusing on Guanxi and CES with special attention to the temporal orientation in strategy formulation. A conceptual framework is proposed to analyze the underlying mechanism of Guanxi in mediating and shaping CES. A multi-case study with four companies operating in two industry sectors were investigated considering their relative long foothold as well as their different postures and dynamic change of corporate environment strategy in the past decades. Findings - The findings support recent critiques on the likely shift in strategic choice of firms from the traditional Guanxi- based to a rule-based format. The interactions between entrepreneurial cognition and strategic activities toward environmental issues were still influenced by deep relational embeddedness. The findings proved that managerial Guanxi cognition impacts managers' temporal orientation and their strategic choice on CES. Foreign-invested enterprises in the process of localization face the potential risk of emerging backdrop of their CES, i.e. from more active strategy to more reactive strategic posture, whereas local private-owned enterprises show a transformation from reactor to follower and even pioneer in the wave of those entrepreneurs' changing cognition on the role of Guanxi in their businesses. Research limitations/implications - One main limitation of the study is the lacking of quantitative measurement of corporate environment performance. Although the paper used multiple cases to explore the dynamics of Guanxi on impacting CES, only with further development of effective scale measurement to test corporate environment performance can increase the explaining power of the proposed theoretical model in this study. It is important to note that with data of longitudinal measurement of corporate environment performance, it would be more convincing to show the outcome of the temporal lens of Guanxi on CES. However, the lacking availability of qualified disclosed data on indicating corporate environment performance constrains another limitation for the study. Considering the complexity of corporate environment strategy, the focus cases in the paper might still lack powerful and convincing illustration to prove the impact of Guanxi on CES despite the enriched contextual data and description. It is necessary to conduct deeper analysis to exclude the impact of other possible factors on CES to highlight the direct impact of Guanxi on CES. Practical implications - The results of the in-depth analysis and interpretation of the exploration of the cases suggest that Guanxi still seems to dominate managerial thinking process as the norm is deeply rooted in their mind sets. However, Guanxi is no longer considered as a mere reactive cultural norm rather a positive mechanism through which Chinese firms can achieve their sustainable environmental strategic goals as well as economies prosperity in the rapidly competitive business landscape in modern China. Originality/value - Previous research on CES largely neglected the context factors. This paper presents a conceptual model to deepen our understanding of the contextual factor of Guanxi with a temporal perspective and its consequent influence on CES. This helps policy makers as well as strategic management researchers and academics to reconsider the mechanism of adaptation and selection in shaping CES in the event of large scale institutional change.
17. Cross-VM cache-based side channel attacks and proposed prevention mechanisms: A survey

Author:Anwar, S;Inayat, Z;Zolkipli, MF;Zain, JM;Gani, A;Anuar, NB;Khan, MK;Chang, V

Source:JOURNAL OF NETWORK AND COMPUTER APPLICATIONS,2017,Vol.93

Abstract:The state-of-the-art Cloud Computing (CC) has been commercially popular for shared resources of third party applications. A cloud platform enables to share resources among mutually distrusting CC clients and offers cost-effective, on-demand scaling. With the exponential growth of CC environment, vulnerabilities and their corresponding exploitation of the prevailing cloud resources may potentially increase. Although CC provides numerous benefits to the cloud computing tenant. However, features namely resource sharing and Virtual Machine (VM) physical co-residency raising the potential for sensitive information leakages such as Side Channel (SC) attacks. In particular, the physical co-residency feature allows attackers to communicate with another VM on the same physical machine and leak the confidential information due to inadequate logical isolation. Unlike encryption, which protects information from being decoded by unauthorized persons, SC attacks aim to exploit the encryption systems and to hide the occurrence of communication. SC attacks were initially identified as the main threat on multi-level secure systems i.e. OS, database, and networks. More recently, the focus of the researchers has shifted toward SC attacks in CC. Since the last level cache (L2 or L3) is always shared between VM, is the most targeting device for these attacks. Therefore, the aim of this article is to explore cross-VM SC attacks involving the CPU cache and their countermeasures in CC and to compare with the traditional SC attacks and countermeasures. We categorized the SC attacks according to the hardware medium they target and exploit, the ways they access the module and the method they use to extract confidential information. We identified that traditional prevention mechanisms for SC attacks are not appropriate for prevention of cross-VM cache-based SC attacks. We also proposed countermeasures for the prevention of these attacks in order to improve security in CC.
18. THE SUSTAINABLE ORIENTATION OF ENTREPRENEURS INFLUENCES THE FUTURE

Author:曹瑄玮;闫志伟;

Source:China WTO Tribune,2019,Vol.

Abstract:中国企业家在拥抱世界可持续发展的潮流中更加积极、开放地"顺势而为、勇于担当",以可持续导向的价值观引领企业战略创新,共享、创新和增进企业高质量发展。2019年7月22日,全球发布最新的《财富》世界500强排行榜,有129家中国公司上榜,历史上首次超过美国的121家。然而,时至今日,在国际社会上仍然很少看到、听到来自中国有影响力的可持续企业家。
19. The role of big data in smart city

Author:Hashem, IAT;Chang, V;Anuar, NB;Adewole, K;Yaqoob, I;Gani, A;Ahmed, E;Chiroma, H

Source:INTERNATIONAL JOURNAL OF INFORMATION MANAGEMENT,2016,Vol.36

Abstract:The expansion of big data and the evolution of Internet of Things (IoT) technologies have played an important role in the feasibility of smart city initiatives. Big data offer the potential for cities to obtain valuable insights from a large amount of data collected through various sources, and the IoT allows the integration of sensors, radio-frequency identification, and Bluetooth in the real-world environment using highly networked services. The combination of the IoT and big data is an unexplored research area that has brought new and interesting challenges for achieving the goal of future smart cities. These new challenges focus primarily on problems related to business and technology that enable cities to actualize the vision, principles, and requirements of the applications of smart cities by realizing the main smart environment characteristics. In this paper, we describe the state-of-the-art communication technologies and smart based applications used within the context of smart cities. The visions of big data analytics to support smart cities are discussed by focusing on how big data can fundamentally change urban populations at different levels. Moreover, a future business model of big data for smart cities is proposed, and the business and technological research challenges are identified. This study can serve as a benchmark for researchers and industries for the future progress and development of smart cities in the context of big data. (C) 2016 Elsevier Ltd. All rights reserved.
20. Delivery time dynamics in an assemble-to-order inventory and order based production control system

Author:Lin, JY;Naim, MM;Spiegler, VLM

Source:INTERNATIONAL JOURNAL OF PRODUCTION ECONOMICS,2020,Vol.223

Abstract:System dynamics play a critical role in influencing supply chain performance. However, the dynamic property of the assemble-to-order (ATO) system remain unexplored. Based on control theory, the inventory and order based production control system (IOBPCS) family, can be utilized as a base framework for assessing system dynamics. However, the underlying assumption in traditional IOBPCS-based analytical studies is that the system is linear and the delivery time to end customers is negligible or backlog is used as a surrogate indicator. Our aim is to incorporate customer delivery lead-time variance as the third assessment measure alongside capacity availability and inventory variance as part of the so-called 'performance triangle'- capacity at the supplier, the customer order decoupling point (CODP) inventory and the delivery lead-time. Using the 'performance triangle' and adopting non-linear control engineering techniques, we assess the dynamic behaviour of an ATO system in the electronics sector. We benchmark the ATO system dynamics model against the IOBPCS family. We exploit frequency response analysis to ensure a robust system design by considering three measures of the 'performance triangle'. The findings suggest delivery LT variance can be minimised by maintaining the ATO system as a true Push-Pull hybrid state with sufficient CODP stock, although increased operational cost driven by bullwhip and CODP variance need to be considered. However, if the hybrid ATO system 'switches' to the pure Push state, the mean and variance of delivery LT can be significantly increased.
Total 790 results found
Copyright 2006-2020 © Xi'an Jiaotong-Liverpool University 苏ICP备07016150号-1 京公网安备 11010102002019号