BackgroundThe Chinese government implemented a lockdown to contain the coronavirus disease 2019 pandemic during the Chinese Lunar New Year when people have the tradition to visit families and friends. Previous research suggested that heuristic processing increased risky behavioral willingness and that people’s tendency to use heuristic processing varied across different adulthood stages. This study thus investigated the relationships among age, heuristic processing of COVID-19-related information, and the willingness to have social gatherings during the lockdown.MethodsA sample of 1,651 participants was recruited (...) from an online crowdsourcing platform between January 31 and February 04 in 2020, with a mean age of 30.69, 47.9% being women. Participants completed an online questionnaire about heuristic processing of COVID-19-related information, willingness to engage in social gatherings during the lockdown, age, and other demographic information.ResultsAge was found to have a U-shaped curvilinear relationship with heuristic processing, and heuristic processing was positively correlated with the willingness to have social gatherings. Further analyses showed that heuristic processing curvilinearly mediated the relationship between age and the willingness to have social gatherings.ConclusionCompared with young adults, emerging and older adults are more likely to engage in heuristic processing, which in turn, increases the willingness to have social gatherings. Heuristic processing serves as an underlying mechanism to explain the relationship between age and risky behavioral willingness. (shrink)
The study aims to help characterize the sort of structures about which people can acquire unconscious knowledge. It is already well established that people can implicitly learn n-grams and also repetition patterns. We explore the acquisition of unconscious structural knowledge of symmetry. Chinese Tang poetry uses a specific sort of mirror symmetry, an inversion rule with respect to the tones of characters in successive lines of verse. We show, using artificial poetry to control both n-gram structure and repetition patterns, that (...) people can implicitly learn to discriminate inversions from non-inversions, presenting a challenge to existing models of implicit learning. (shrink)
Western buying companies impose Supplier Codes of Conduct (SCC) on their suppliers in developing countries; however, many suppliers cannot fully comply with SCC and some of them even cheat in SCC. In this research, we link contract characteristics - price pressure, production complexity, contract duration - to the likelihood of supplier's commitment to SCC through a mediating process: how the buying companies govern their suppliers. Our structural equation model analysis shows that the hierarchy/relational norms governance is a perfect mediator of (...) contract characteristics' effects on the likelihood of supplier's commitment; the market governance, an insignificant one. The managerial implications are provided for successfully implementing SCC in global supply chains. (shrink)
As an imitation of the biological nervous systems, neural networks, which have been characterized as powerful learning tools, are employed in a wide range of applications, such as control of complex nonlinear systems, optimization, system identification, and patterns recognition. This article aims to bring a brief review of the state-of-the-art NNs for the complex nonlinear systems by summarizing recent progress of NNs in both theory and practical applications. Specifically, this survey also reviews a number of NN based robot control algorithms, (...) including NN based manipulator control, NN based human-robot interaction, and NN based cognitive control. (shrink)
This essay is an attempt to sketch out two contrasting notions of freedom in the Zhuangzi and the Xunzi . I argue that to understand the classical Chinese formulations of freedom we should look at the concept of hua 化 (transformation or to transform). It is a kind of freedom that highlights the moral and/or spiritual transformation of the self and its entailments on the connection between the self and various domains of relationality. The Zhuangzian hua is the transformation of (...) the self in such a way that the self becomes supremely attuned to the complexity of the world and can thus navigate various domains of relationality with extraordinary grace, ease, and efficacy. The Xunzian hua is the transformation of the self so that the self can extend its relationality to include the entire world and transform it from a raw and uncouth world to a civilized one through ritual practices. (shrink)
University spin-outs, creating businesses from university intellectual property, are a relatively common phenomena. As a knowledge transfer channel, the spin-out business model is attracting extensive attention. In this paper, the impacts of six equities on the acquisition of USOs, including founders, university, banks, business angels, venture capitals, and other equity, are comprehensively analyzed based on theoretical and empirical studies. Firstly, the average distribution of spin-out equity at formation is calculated based on the sample data of 350 UK USOs. According to (...) this distribution, a radial basis function neural network model is employed to forecast the effects of each equity on the acquisition. To improve the classification accuracy, the novel set-membership method is adopted in the training process of the RBF NN. Furthermore, a simulation test is carried out to measure the effects of six equities on the acquisition of USOs. The simulation results show that the increase of university’s equity has a negative effect on the acquisition of USOs, whereas the increase of remaining five equities has positive effects. Finally, three suggestions are provided to promote the development and growth of USOs. (shrink)
The recent rapid development of information technology, such as sensing technology, communications technology, and database, allows us to use simulation experiments for analyzing serious accidents caused by hazardous chemicals. Due to the toxicity and diffusion of hazardous chemicals, these accidents often lead to not only severe consequences and economic losses, but also traffic jams at the same time. Emergency evacuation after hazardous chemical accidents is an effective means to reduce the loss of life and property and to smoothly resume the (...) transport network as soon as possible. This paper considers the dynamic changes of the hazardous chemicals’ concentration after their leakage and simulates the diffusion process. Based on the characteristics of emergency evacuation of hazardous chemical accidents, we build a mixed-integer programming model and design a heuristic algorithm using network optimization and diffusion simulation. We then verify the validity and feasibility of the algorithm using Jinan, China, as a computational example. In the end, we compare the results from different scenarios to explore the key factors affecting the effectiveness of the evacuation process. (shrink)
This study explores the dark side of leadership, treats creative self-efficacy as a mediator, and frames supervisor bullying and employee creativity in the context of social cognition and social comparison. We theorize that with a high social comparison orientation, the combination of high supervisory abuse toward themselves and low supervisory abuse toward other team members leads to a double whammy effect: When employees are “singled out” for abuse, these victims suffer from not only low creative self-efficacy due to supervisory abuse (...) but also low supervisory creativity ratings. Results based on our two-wave data collected from multiple sources—253 employees and their 77 immediate supervisors—support our theory. The significant three-way interaction effect reveals that when social comparison orientation is high and peer abusive supervision is low, own abusive supervision creates the strongest negative impact on creative self-efficacy, which is significantly related to supervisory low creativity rating. Our discoveries of egregious bullying offer provocative theoretical, empirical, and practical implications to the fields of leadership, abusive supervision, creativity, and business ethics. (shrink)
Can firms overcome credit constraints with a corporate culture of high integrity? We empirically address this question by studying their investment–cash flow sensitivities. We identify firms with a culture of integrity through textual analysis of public documents in a sample of Chinese listed firms and also through corporate culture statements. Our results show that firms with an integrity-focused culture have lower investment–cash flow sensitivity, even after we address endogeneity concerns. However, we also find that for the culture to reduce the (...) investment–cash flow sensitivity, external stakeholders must be able to verify this culture through a low information asymmetry environment. Overall, our findings show that a corporate culture of high integrity can mitigate a firm’s external transaction costs. (shrink)
Business moral values are defined as the personal moral values held by individuals who are engaged in business interactions. Direct supervisors may play an important role in shaping the business moral values of their subordinates. Using 264 supervisor— subordinate dyadic data from Taiwanese organizations, the study investigated the relationships among supervisor business moral values, subordinate business moral values, subordinate organizational commitment, job performance, and attendance. The results indicated that supervisor business moral values were positively associated with subordinate business moral values, (...) and that the latter mediated the relationship between the former and subordinate outcomes. Implications for business moral values research are discussed. (shrink)
Are there Buddhist conceptions of the unconscious? If so, are they more Freudian, Jungian, or something else? If not, can Buddhist conceptions be reconciled with the Freudian, Jungian, or other models? These are some of the questions that have motivated modern scholarship to approach ālayavijñāna, the storehouse consciousness, formulated in Yogācāra Buddhism as a subliminal reservoir of tendencies, habits, and future possibilities. -/- Tao Jiang argues convincingly that such questions are inherently problematic because they frame their interpretations of the (...) Buddhist notion largely in terms of responses to modern psychology. He proposes that, if we are to understand ālayavijñāna properly and compare it with the unconscious responsibly, we need to change the way the questions are posed so that ālayavijñāna and the unconscious can first be understood within their own contexts and then recontextualized within a dialogical setting. In so doing, certain paradigmatic assumptions embedded in the original frameworks of Buddhist and modern psychological theories are exposed. Jiang brings together Xuan Zang’s ālayavijñāna and Freud’s and Jung’s unconscious to focus on what the differences are in the thematic concerns of the three theories, why such differences exist in terms of their objectives, and how their methods of theorization contribute to these differences. -/- Contexts and Dialogue puts forth a fascinating, erudite, and carefully argued presentation of the subliminal mind. It proposes a new paradigm in comparative philosophy that examines the what, why, and how in navigating the similarities and differences of philosophical systems through contextualization and recontextualization. (shrink)
Adaptation to climate change impacts is a key research topic in business ethics that poses substantial implications on the good lives of human beings. The commercial port sector is a highly relevant study focus with its pivotal roles in supply chains and international trade. Hence, it is important to investigate whether the port planning system and practice is appropriate in tackling climate change impacts. But beforehand, we must thoroughly understand the attitude and behaviors of port planners and operators on ports’ (...) climate adaptation planning. Through a survey towards 21 ports in Canada, the paper investigates the attitude and behaviors of port planners and operators on ports’ climate adaptation planning. Towards the end, we propose a new approach so as to enable port stakeholders to carry out climate adaptation planning effectively. The paper offers important insight to researchers to investigate the ways in developing effective climate adaptation plans and practice for ports and other business sectors. (shrink)
This paper discusses some paradoxical propositions in Chinese tradition, especially the School of Names. It not only explains what Chinese philosophers mean by these propositions and why there are such paradoxes in Chinese philosophy, but also makes an attempt to formulate these paradoxical propositions in the language of symbolic logic. Meanwhile, the paper makes a comparison between Chinese views about contradiction and Aristotle?s law ot non?contradiction and explores the relation between them. It comes to the conclusion that once the difference (...) between Chinese concept of contraries and Aristotle?s is made clear, inconsistency between Chinese paradoxial propositions and Aristotle?s. law of non-contradiction disappears. (shrink)
The Triassic Yanchang Formation lacustrine shale is a source of conventional oil accumulation in the Ordos Basin, China. The Yanchang Formation, a hybrid system of organic-rich shale, interbedded silty shale, and siltstone, is believed to be a potential unconventional oil and gas play. Our crossdisciplinary investigation of the storage space included the outcrop description, core observation, thin sections, and scanning electron microscope pore imaging. We evaluated the results from these techniques to reveal that the storage space within the Yanchang Formation (...) shales included primary intergranular pores, secondary generated pores, tectonic fractures, and bedding-parallel fractures. We conducted adsorption experiments, combined with burial and thermal history, in which the primary migration process can be divided into three stages. In the Early Jurassic, organic matter did not reach the oil generation threshold. From the Late Jurassic to the Early Cretaceous, organic matter entered the oil generation window, and gas was generated and stored as adsorbed gas, dissolved gas, and free gas. From the Middle to Late Cretaceous, the storage of shale gas was dynamically transformed by tectonic uplift. Variations in chemical and carbon isotopic compositions from canister-core desorption were directly related to the gas supply in shales. An abrupt decrease in gas dryness and positive [Formula: see text] values indicated the depletion of gas supply drainage. Our ultimate recovery factor reached 70%. (shrink)
Shale heterogeneity is important for micro- to macroscale-quality reservoir prediction. We evaluated the multiscale heterogeneity in shale based on thin-section observation, field emission scanning electron microscope observation, low-pressure [Formula: see text] adsorption analysis, mercury intrusion porosimetry, organic carbon analysis, and bulk chemical analysis by X-ray powder diffraction. We evaluated the results in which the heterogeneity of minerals and organic matter in shale was shown by disorderly and unsystematically distributed mineral grains, lamina, and rapid lithology at multiple scales. The random arrangement (...) of minerals, seasonal climate changes, large changes of sedimentary environment, and the provenance supply was considered to be the origin of the heterogeneity from the micro- to the macroscale in shale. In addition, a multiscale heterogeneity distribution model of marine shale in southeastern Sichuan basin was established, which can be used to predict shale gas distribution from the micro- to the macroscale. (shrink)
Spiking neural P systems are a class of computation models inspired by the biological neural systems, where spikes and spiking rules are in neurons. In this work, we propose a variant of spiking neural P systems, called spiking neural P systems with polarizations and rules on synapses, where spiking rules are placed on synapses and neurons are associated with polarizations used to control the application of such spiking rules. The computation power of PSNRS P systems is investigated. It is proven (...) that PSNRS P systems are Turing universal, both as number generating and accepting devices. Furthermore, a universal PSNRS P system with 151 neurons for computing any Turing computable functions is given. Compared with the case of SN P systems with polarizations but without spiking rules in neurons, less number of neurons are used to construct a universal PSNRS P system. (shrink)
Isaiah Berlin is known for articulating two competing notions of freedom operative within the modern Western political philosophy, negative and positive. He provides a powerful defense of modern liberal tradition that elevates negative freedom in its attempt to preserve personal space for one's actions and choices while regarding positive freedom as suppressive due to its potentially collective orientation. This article uses Berlin as an interlocutor to challenge Zhuangzi, known for his portrayal of spiritual freedom in the Chinese tradition, prodding modern (...) Zhuangzians to bring the Zhuangzian spiritual freedom into the sociopolitical arena by reimagining new possibilities about politics. (shrink)
Real-world multiobjective optimization problems are characterized by multiple types of decision variables. In this paper, we address weapon selection and planning problems, which include decision variables of weapon-type selection and weapon amount determination. Large solution space and discontinuous, nonconvex Pareto front increase the difficulty of problem solving. This paper solves the addressed problem by means of a multiobjective evolutionary algorithm based on decomposition. Two mechanisms are designed for the complex combinatorial characteristic of WSPPs. The first is that the neighborhood of (...) each individual is divided as selection and replacement neighborhoods. The second is that the neighborhood size is changing during the evolution by introducing a distance parameter to constrain the search scope of each subproblem. The proposed algorithm is termed as MOEA/D with distance-based divided neighborhoods which can overcome possible drawbacks of original MOEA/D with weighted sum approach for complex combinatorial problems. Benchmark instances are generated to verify the proposed approach. Experimental results suggest the effectiveness of the proposed algorithm. (shrink)