Locating and deploying essential goods and equipment in disasters using AI-enabled approaches: A systematic literature review
In: Progress in disaster science, Band 19, S. 100292
ISSN: 2590-0617
29 Ergebnisse
Sortierung:
In: Progress in disaster science, Band 19, S. 100292
ISSN: 2590-0617
Part 1: GIS, GPS, RS and Precision Farming ; International audience ; In the background of the digital agriculture advanced step-by-step, Shanghai government is also accelerating the pace of agricultural informationization. "Precision Agriculture" has become a pointcut of "Digital Shanghai". Building the Operating System of Shanghai Agricultural Economy is a meaningful practice in Shanghai digital agriculture engineering. Its powerful function of spatial data analysis and inquiry provides the support system for the realization of "precision agriculture". It can provide the decision support and the information service for the government.
BASE
Maximizing reader insights into the challenges facing maritime supply chains and container port logistics service providers in Asia, this book highlights their innovative responses to these challenges through real-world case studies. With a focus on mathematical modeling, simulation and heuristics approaches, this book provides academics, engineers, container terminal operators, students in logistics and supply chain management with the latest approaches that can be used to address the planning and scheduling problem in large container terminal yards. This book can be used on a self-contained basis as teaching cases in an undergraduate or specialist class setting, or on techniques applied to maritime container operations for port operations.
In: Jiao yu she hui xue cong shu
In: 教育社会学丛书
Ben shu nei rong bao kuo:ke cheng she hui xue yan jiu gai shu,Dang dai xi fang ke cheng she hui xue yan jiu shu ping,She hui xi tong yu ke cheng,Ke cheng nei rong de she hui xue fen xi,Ke cheng jie gou de she hui xue fen xi,Ke cheng shou shou de she hui xue fen xi,Ke cheng ping jia de she hui xue fen xi,Ke cheng xian dai hua de she hui xue fen xi
In: Studien zum deutschen und europäischen Arbeitsrecht Band 75
In: Studien zum deutschen und europäischen Arbeitsrecht Band 75
In: Nomos eLibrary
In: Arbeits- und Sozialrecht
Das Werk befasst sich durch eine rechtsvergleichende Analyse mit der betriebsbedingten Kündigung in Deutschland und China. Bei der Prüfung der betriebsbedingten Kündigung werden die "Betriebsbedingtheit", das "Ultima-Ratio-Prinzip" und die "Sozialauswahl" erläutert. Anhand der funktionellen Betrachtungsweise mit dem vergleichbaren Rechtsinstitut im deutschen Recht zeigt das Werk die Schwächen der "betriebsbedingten" Kündigung im chinesischen Recht und entsprechende Verbesserungsmöglichkeiten auf. Dabei werden die Modelle im Hinblick auf die Verhinderung und Lösung sozialer Konflikte analysiert. Außerdem leistet das Werk für die deutsche Rechtswissenschaft einen Beitrag, indem sie wie eine Einführung ins chinesische Kündigungsrecht fungiert, auf dass man daraus Anregungen für die deutsche Rechtspolitik und Gesetzgebung gewinnen kann ("fünfte Auslegungsmethode").
In: International journal of educational technology in higher education, Band 21, Heft 1
ISSN: 2365-9440
AbstractPeer feedback literacy is becoming increasingly important in higher education as peer feedback has substantially grown as a pedagogical approach. However, quality of produced feedback, a key behavioral aspect of peer feedback literacy, lacks a systematic and evidence-based conceptualization to guide research, instruction, and system design. We introduce a novel framework involving six conceptual dimensions of peer feedback quality that can be measured and supported in online peer feedback contexts: reviewing process, rating accuracy, feedback amount, perceived comment quality, actual comment quality, and feedback content. We then test the underlying dimensionality of student competencies through correlational analysis, Multidimensional Scaling, and cluster analysis, using data from 844 students engaged in online peer feedback in a university-level course. The separability of the conceptual dimensions is largely supported in the cluster analysis. However, the cluster analysis also suggests restructuring perceived and actual comment quality in terms of initial impact and ultimate impact. The Multi-Dimensional Scaling suggests the dimensions of peer feedback can be conceptualized in terms of relative emphasis on expertise vs. effort and on overall review quality vs. individual comment quality. The findings provide a new road map for meta-analyses, empirical studies, and system design work focused on peer feedback literacy.
In: Social behavior and personality: an international journal, Band 50, Heft 12, S. 1-9
ISSN: 1179-6391
Research indicates psychological capital (PsyCap) plays a crucial role in the workplace; however, in an educational context, its effect is yet to be established. In this study we explored the role of well-being, comprising the domains of positive emotion, engagement, relationships,
meaning, and achievement, in mediating the relationship between PsyCap and the classroom management of teachers of English as a foreign language (EFL). Participants were 486 Chinese EFL teachers employed at 19 universities in Zhejiang Province. The results of structural equation modeling demonstrated
that the well-being of EFL teachers was significant in mediating the relationship between their PsyCap and classroom management. The findings from the study imply great importance of well-being in EFL classroom management and we have provided recommendations for future research in this area.
In: Decision analysis: a journal of the Institute for Operations Research and the Management Sciences, INFORMS, Band 19, Heft 2, S. 99-122
ISSN: 1545-8504
Information resources have been shared to promote the business operations of firms. However, the connection of business information sharing interfaces between firms has increased the attack surface and created opportunities for the hacker. We examine the benefits and risks of business information sharing for firms who exert security efforts against a strategic hacker that launches attacks subjectively. We show that two kinds of security efforts, security investment and security knowledge sharing, act as strategic substitutes when the business-sharing degree is low and act as strategic complements otherwise. Besides, the strategic hacker is not always aggressive, who will give up launching attack activities when the business-sharing degree is relatively low. Moreover, as a specific characteristic in the security domain, the risk interdependency first enhances and then suppresses both firms' security investments and the hacker's attack effort, which causes a free-riding problem for two firms. Then, two coordination mechanisms, an investment-based mechanism and liability-based mechanism, are proposed to help firms coordinate their strategies to reach socially optimal security levels. Last, we extend the main model to three cases to make our model more general. This paper provides the first evidence to assess the security risks exacerbated by business information sharing while considering a strategic hacker. Some management insights to managers for making security decisions are provided.
In: Socio-economic planning sciences: the international journal of public sector decision-making, Band 80, S. 101073
ISSN: 0038-0121
In: Decision analysis: a journal of the Institute for Operations Research and the Management Sciences, INFORMS, Band 17, Heft 3, S. 235-259
ISSN: 1545-8504
Nowadays, firms tend to outsource security operations to professional managed security service providers (MSSPs) as a result of the sophistication of strategic hackers. Thus, how an MSSP makes security decisions according to a strategic hacker's action is worth researching. Constructing a contract theory model, this paper examines the interaction between an MSSP and a strategic hacker based on both parties' characteristics. We find that the hacker will give up less valuable information assets, and thus not all information assets are worth protecting for the MSSP. For both parties, their optimal efforts do not necessarily increase with their respective efficiency, and the firm's reputation loss has an opposite effect on its respective efforts. Moreover, we distinguish two types of security externalities including MSSP-side externality and hacker-side externality, and we find that the two types of security externalities have different effects on both parties' optimal efforts and expected payoffs. We also find that as a result of the trade-off between the integration effect of the MSSP and the effect of MSSP-side externality, firms are still willing to outsource their security operations to the MSSP even when an MSSP devotes fewer security efforts than those of firms that manage security in-house. Last, we extend our base model from two aspects to generalize the main results.
In: Materials and design, Band 108, S. 298-307
ISSN: 1873-4197
In: Group decision and negotiation
ISSN: 1572-9907
In: Journal of consumer protection and food safety: Journal für Verbraucherschutz und Lebensmittelsicherheit : JVL, Band 19, Heft 1, S. 89-97
ISSN: 1661-5867
In: Defence Technology, Band 11, Heft 3, S. 220-228
ISSN: 2214-9147