This book argues that the trade-distorting effects of advantages associated with SOEs are more severe from an economic perspective, and the behavior of SOEs after receiving advantages is of more concern, compared to private-owned enterprises (POEs). The premise is that the existence of SOEs per se is not the essential problem; rather, the underlying problems are (i) the disproportionate granting of advantages to SOEs (compared to POEs) and (ii) the behavior of SOEs once they receive advantages. The book offers a systematic analysis focusing on the various advantages granted to SOEs and their subsequent behavior. Its detailed analysis reveals the inadequacy of current WTO rules and is complemented by a number of concrete proposals.
In her previous life, she was born into a noble family and was the precious daughter of the Luo Family. Yet he was framed by his fiancé and his stepmother's daughter, buried in a sea of fire. It was fortunate that he had been reborn into a girl with the same name as her. He had awakened his superpower, and from then on, he would be on his way to revenge ...
This original book presents in-depth research into thirteen successful Chinese private enterprises through interviews with their founder-entrepreneurs. While Chinese economic growth has focused primarily on governmental policies and institutional factors, Leadership of Chinese Private Enterprises proposes that the success of these firms was primarily due to the ‘visible hands’ of these entrepreneurs. The authors present insights into the managerial realities of four separate industries- Financial and insurance, IT and e-commerce, construction and real estate, and consumer goods. Through a critical evaluation of interviews, this book identifies the managerial recipe for entrepreneurial success in competitive and inhospitable environments and offers a model of private firm leadership and leadership principles that guide their strategies and relationships.
This SpringerBrief investigates and reviews the development and various applications of mobile crowd sensing (MCS). With the miniaturization of sensors and the popularity of smart mobile devices, MCS becomes a promising solution to efficiently collect different types of information, such as traffic conditions, air quality, temperature and more, which is covered in this brief. The features, novelty, and applications of MCS are elaborated in detail in this brief. In addition, the basic knowledge about auction theory and incentive mechanism design is introduced. Incentive mechanism design plays a key role in the success of MCS. With an efficient incentive mechanism, it is possible to attract enough mobile users to participate in a MCS system, thus enough high quality sensing data can be collected. Two types of incentive mechanisms with different system models are introduced in this brief. One is the reputation-aware incentive mechanism, and another is the social-aware incentive mechanism. This SpringerBrief covers the significance and the impacts of both reputation and social relationship of smartphone users (SUs) in MCS and presents extensive simulation results to demonstrate the good performance of the proposed incentive mechanisms compared with some existing counterparts. The target audience for this SpringerBrief is researchers and engineers in the area of wireless communication and networking, especially those who are interested in the mobile crowd sensing or incentive mechanism design. Meanwhile, it is also intended as a reference guide for advanced level students in the area of wireless communications and computer networks.
Securing Emerging Wireless Systems: Lower-layer Approaches aims to fill a growing need in the research community for a reference that describes the lower-layer approaches as a foundation towards secure and reliable wireless systems. Whereas most of the references typically address cryptographic attacks by using conventional "network security" approches for securing wireless systems, the proposed book will be differentiated from the rest of the market by its focus on non-cryptographic attacks that cannot easily be addressed by using traditional methods, and further by presenting a collection of defense mechanisms that operate at the lower-layers of the protocol stack and can defend wireless systems before the effects of attacks propagate up to higher-level applications and services. The book will focus on fundamental security problems that involve properties unique to wireless systems, such as the characteristics of radio propagation, or the location of communicating entities, or the properties of the medium access control layer. Specifically, the book provides detection mechanisms and highlights defense strategies that cope with threats to wireless localization infrastructure, attacks on wireless networks that exploit entity identity (i.e. spoofing attacks), jamming and radio interference that can undermine the availability of wireless communications, and privacy threats where an adversary seeks to infer spatial and temporal contextual information surrounding wireless communications. Additionally, the authors explore new paradigms of physical layer security for wireless systems, which can support authentication and confidentiality services by exploiting fading properties unique to wireless communications.
Ultralong carbon nanotubes (CNTs) are ideal building blocks for nanodevices and superstrong fibers. Due to their high-aspect-ratio structure formed from sp2 hybrid C–C bonds, they have extraordinary mechanical, electrical and thermal properties. It is of great importance to synthesize ultralong CNTs with controlled structures as well as optimized properties for their applications. This chapter discusses the synthesis methods, growth mechanisms, structures, electrical and mechanical properties, as well as the applications of ultralong CNTs. We show that the controlled synthesis of ultralong CNTs with certain structures and properties is of fundamental importance for their applications. Finally, we also show that the mechanical properties of ultralong CNTs are near the theoretical value, showing great potential for their applications in superstrong fibers.
This SpringerBrief begins by introducing the concept of smartphone sensing and summarizing the main tasks of applying smartphone sensing in vehicles. Chapter 2 describes the vehicle dynamics sensing model that exploits the raw data of motion sensors (i.e., accelerometer and gyroscope) to give the dynamic of vehicles, including stopping, turning, changing lanes, driving on uneven road, etc. Chapter 3 detects the abnormal driving behaviors based on sensing vehicle dynamics. Specifically, this brief proposes a machine learning-based fine-grained abnormal driving behavior detection and identification system, D3, to perform real-time high-accurate abnormal driving behaviors monitoring using the built-in motion sensors in smartphones. As more vehicles taking part in the transportation system in recent years, driving or taking vehicles have become an inseparable part of our daily life. However, increasing vehicles on the roads bring more traffic issues including crashes and congestions, which make it necessary to sense vehicle dynamics and detect driving behaviors for drivers. For example, sensing lane information of vehicles in real time can be assisted with the navigators to avoid unnecessary detours, and acquiring instant vehicle speed is desirable to many important vehicular applications. Moreover, if the driving behaviors of drivers, like inattentive and drunk driver, can be detected and warned in time, a large part of traffic accidents can be prevented. However, for sensing vehicle dynamics and detecting driving behaviors, traditional approaches are grounded on the built-in infrastructure in vehicles such as infrared sensors and radars, or additional hardware like EEG devices and alcohol sensors, which involves high cost. The authors illustrate that smartphone sensing technology, which involves sensors embedded in smartphones (including the accelerometer, gyroscope, speaker, microphone, etc.), can be applied in sensing vehicle dynamics and driving behaviors. Chapter 4 exploits the feasibility to recognize abnormal driving events of drivers at early stage. Specifically, the authors develop an Early Recognition system, ER, which recognize inattentive driving events at an early stage and alert drivers timely leveraging built-in audio devices on smartphones. An overview of the state-of-the-art research is presented in chapter 5. Finally, the conclusions and future directions are provided in Chapter 6.
This Springer Brief provides a new approach to prevent user spoofing by using the physical properties associated with wireless transmissions to detect the presence of user spoofing. The most common method, applying cryptographic authentication, requires additional management and computational power that cannot be deployed consistently. The authors present the new approach by offering a summary of the recent research and exploring the benefits and potential challenges of this method. This brief discusses the feasibility of launching user spoofing attacks and their impact on the wireless and sensor networks. Readers are equipped to understand several system models. One attack detection model exploits the spatial correlation of received signal strength (RSS) inherited from wireless devices as a foundation. Through experiments in practical environments, the authors evaluate the performance of the spoofing attack detection model. The brief also introduces the DEMOTE system, which exploits the correlation within the RSS trace based on each device’s identity to detect mobile attackers. A final chapter covers future directions of this field. By presenting complex technical information in a concise format, this brief is a valuable resource for researchers, professionals, and advanced-level students focused on wireless network security.
Navigating paradigm changes is a critical element of business leadership: analog to digital; brand to retailer to consumer; reason to emotion; West to East. Anything that illuminates these powershifts is valuable for the fast-moving decision-maker, and in this respect Asian versus Western Management Thinking is a first-rate inquiry into cultural business behaviors. Insular frameworks of thinking and action matter less by the second. I'm an And/And practitioner and my experience of bridging business between East and West, and vice versa, suggests we need to know the human distinctions that matter and the harmonies that will matter even more. Between the covers of this book by Kimio Kase and colleagues, business moves forward.' Kevin Roberts, CEO Worldwide, Saatchi & Saatchi, Lovemarks Company 'Having lived and worked my entire life in various countries around the world, I agree with the authors' premise that Asians and Westerners often approach business problems from different angles. Rather than focusing on differences, I welcome the strength that comes from diversity. As my experience at Renault and Nissan has demonstrated, the richest solutions come when ideas are challenged or questioned by people who have a different perspective. This book illustrates the value of accepting diverging ideas as a fact of life that can be used to enhance the world in which we all live and work.' Carlos Ghosn, Chairman and Chief Executive Officer, Renault-Nissan Alliance 'A most welcome addition to the unbalanced management literature about the 'analytical' West and the 'synthetic' East. For too long the field has been dominated by comparisons of cultural value systems which paradoxically tell us precious little about how habits of mind influence management thinking and practice in different parts of the world over time. At a time when the world's economic centre of gravity is visibly shifting to Asia, this really is a most timely book.' Nigel Holden, Visiting Research Fellow at the Centre for International Business at the University of Leeds, UK
This book argues that the trade-distorting effects of advantages associated with SOEs are more severe from an economic perspective, and the behavior of SOEs after receiving advantages is of more concern, compared to private-owned enterprises (POEs). The premise is that the existence of SOEs per se is not the essential problem; rather, the underlying problems are (i) the disproportionate granting of advantages to SOEs (compared to POEs) and (ii) the behavior of SOEs once they receive advantages. The book offers a systematic analysis focusing on the various advantages granted to SOEs and their subsequent behavior. Its detailed analysis reveals the inadequacy of current WTO rules and is complemented by a number of concrete proposals.
This will help us customize your experience to showcase the most relevant content to your age group
Please select from below
Login
Not registered?
Sign up
Already registered?
Success – Your message will goes here
We'd love to hear from you!
Thank you for visiting our website. Would you like to provide feedback on how we could improve your experience?
This site does not use any third party cookies with one exception — it uses cookies from Google to deliver its services and to analyze traffic.Learn More.