Search results for: IoT private network
6401 Experimental Networks Synchronization of Chua’s Circuit in Different Topologies
Authors: Manuel Meranza-Castillon, Rolando Diaz-Castillo, Adrian Arellano-Delgado, Cesar Cruz-Hernandez, Rosa Martha Lopez-Gutierrez
Abstract:
In this work, we deal with experimental network synchronization of chaotic nodes with different topologies. Our approach is based on complex system theory, and we use a master-slave configuration to couple the nodes in the networks. In particular, we design and implement electronically complex dynamical networks composed by nine coupled chaotic Chua’s circuits with topologies: in nearest-neighbor, small-world, open ring, star, and global. Also, network synchronization is evaluated according to a particular coupling strength for each topology. This study is important by the possible applications to private transmission of information in a chaotic communication network of multiple users.Keywords: complex networks, Chua's circuit, experimental synchronization, multiple users
Procedia PDF Downloads 3536400 Legal and Contractual Framework for Private Experiments in Space
Authors: Linda Ana-Maria Ungureanu
Abstract:
As space exploration opens to new actors, we are faced with the interesting question of regulating more complex structures that enable private experiments. From intellectual property implications to private and public law, there is a multitude of factors and legal structures that need to be taken into consideration when opening space, and these structures need to be harmonized with the International Space Treaties governing space exploration. In this sense, this article presents an overview of the legal and contractual framework applicable to private experiments conducted in space and/or in relation to off-world environments. Additionally, the article analyses the manner in which national space agencies regulate agreements concluded with private actors and research institutions. Finally, the article sets a series of de lege ferenda proposals for the regulation of general research and development rules and intellectual property matters that are connected to experiments and research conducted in space and/or concerning off-world environments.Keywords: private space, intellectual property, contracts, ESA guidelines, EU legislation, Intellectual property law, international IP treaties
Procedia PDF Downloads 1136399 The Sectoral Differences in the Use of Construction Incentive
Authors: Qiuwen Ma, Sai On Cheung
Abstract:
Incentive contracting has been developed to push the agent team for extra effort. Generally, there are three types of incentive arrangement, namely incentive/penalty for super performance/underperformance, risk/reward sharing and future business opportunities. It is found that there are significant differences in the use of incentive arrangement in private and public projects. In Hong Kong, very few public projects have used future business as incentivizer whereas private developers often signal repeated business coupled with heavy penalty. This study was conducted to identify various attributes affecting the use of I/D in both private and public engineering sectors of Hong Kong. The diverging preferences were unveiled with reference to a literature review and semi-structured interviews with industry experts. The findings reveal the public/private sectors would consider the implementation issues regarding the various performance targets. The most deterministic factor for the public sector is about accountability. The private sector is in general skeptical about the need to provide extra for the contractors for what they have already contracted to perform.Keywords: construction incentive, public/private projects, semi-structured interview, hong kong
Procedia PDF Downloads 1096398 Enhancing the Network Security with Gray Code
Authors: Thomas Adi Purnomo Sidhi
Abstract:
Nowadays, network is an essential need in almost every part of human daily activities. People now can seamlessly connect to others through the Internet. With advanced technology, our personal data now can be more easily accessed. One of many components we are concerned for delivering the best network is a security issue. This paper is proposing a method that provides more options for security. This research aims to improve network security by focusing on the physical layer which is the first layer of the OSI model. The layer consists of the basic networking hardware transmission technologies of a network. With the use of observation method, the research produces a schematic design for enhancing the network security through the gray code converter.Keywords: network, network security, grey code, physical layer
Procedia PDF Downloads 5086397 Network Functions Virtualization-Based Virtual Routing Function Deployment under Network Delay Constraints
Authors: Kenichiro Hida, Shin-Ichi Kuribayashi
Abstract:
NFV-based network implements a variety of network functions with software on general-purpose servers, and this allows the network operator to select any capabilities and locations of network functions without any physical constraints. In this paper, we evaluate the influence of the maximum tolerable network delay on the virtual routing function deployment guidelines which the authors proposed previously. Our evaluation results have revealed the following: (1) the more the maximum tolerable network delay condition becomes severe, the more the number of areas where the route selection function is installed increases and the total network cost increases, (2) the higher the routing function cost relative to the circuit bandwidth cost, the increase ratio of total network cost becomes larger according to the maximum tolerable network delay condition.Keywords: NFV (Network Functions Virtualization), resource allocation, virtual routing function, minimum total network cost
Procedia PDF Downloads 2506396 Forest Policy and Its Implications on Private Forestry Development: A Case Study in Rautahat District, Nepal
Authors: Dammar Bahadur Adhikari
Abstract:
Community forestry in Nepal has got disproportionately high level of support from government and other actors in forestry sector. Even though master plan for forestry sector (1989) has highlighted community and private forestry as one component, the government policies and other intervention deliberately left out private forestry in its structure and programs. The study aimed at providing the pathway for formulating appropriate policies to address need of different kind of forest management regimes in Rautahat district, Nepal. The key areas the research focused were assessment of current status of private forestry, community forest users' understanding on private forestry; criteria for choosing species of private forestry and factors affecting establishment of private forestry in the area. Qualitative and quantitative data were collected employing questionnaire survey, rapid forest assessment and key informant interview. The study found out that forest policies are imposed due to intense pressure of exogenous forces than due to endogenous demand. Most of the local people opine that their traditional knowledge and skills are not sufficient for private forestry and hence need training on the matter. Likewise, local use, market value and rotation dictate the choice of species for plantation in private forests. Currently district forest office is the only government institution working in the area of private forestry all other governmental and non-governmental organizations have condoned. private forestry. Similarly, only permanent settlers in the area are found to establish private forests other forest users such as migrants and forest encroachers follow opportunistic behavior to meet their forest product need from community and national forests. In this regard, the study recommends taking appropriate step to support other forest management system including private forestry provide community forestry the benefits of competition as suggested by Darwin in 18th century, one and half century back and to help alleviate poverty by channelizing benefits to household level.Keywords: community forest, forest management, poverty, private forest, users’ group
Procedia PDF Downloads 3426395 The Quality Assurance on the Standard of Private Schools in Bangkok
Authors: Autjira Songjan, Poramatdha Chutimant
Abstract:
This research is intended to study the operational quality assurance of private schools in Bangkok according to the opinions of administrators and teachers. Second is comparing the opinions of administrators and teachers about operating quality assurance process by gender, job and work experience. The sample include administrators and teachers of private schools in the Education School in Bangkok by using a proportion random technic. The questionnaire are used as query operations quality assurance to collect the data of private schools, the statistics that are used to analyze the data using the percentage, mean, standard deviation and Test the difference value and test of variance. The research found that the administrators and teachers have different sex, positions and duties have the different opinions about quality assurance in different statistically insignificant level 0.05 in the elements of performance management and the quality of the service that provided to students in the school.Keywords: educational quality assurance, performance management, private schools in Bangkok, quality of the service
Procedia PDF Downloads 2346394 School Choice and Institutional or Familial Habitus: Reciprocity in Parents-School Relationships
Authors: Fatemeh Yazdani
Abstract:
This paper explores the student intake policies in high-performing private schools in Iran by studying both sides involved in the school choice processes, parents and the school leaders. It is based on in-depth interviews with 27 parents and private schools’ staff and principals supplemented by ethnographic observation in two private schools in Tehran. From the Bourdieusian point of view, this paper argues that the school leadership engineers the composition of private schools’ students via different gatekeeping strategies, and these strategies represent and reconstruct the school’s institutional habitus. It further explores the ways that parents who look for quality education among non-state education providers deal with the school's institutional habitus based on their familial habitus and possessed economic, social, and cultural capital. The conclusion highlights that investigating school choice as a reciprocal process between family and school leadership can shed more light on the ways that an exclusive environment has been created in some high-performing private schools for certain class strata maintaining a distance that needs to be kept from ‘others.’ In a broader sense, this paper engages into an exploration of social inequality reproduction through private education.Keywords: institutional habitus, private education, school choice, social inequality, student intake
Procedia PDF Downloads 1116393 Real Time Traffic Performance Study over MPLS VPNs with DiffServ
Authors: Naveed Ghani
Abstract:
With the arrival of higher speed communication links and mature application running over the internet, the requirement for reliable, efficient and robust network designs rising day by day. Multi-Protocol Label Switching technology (MPLS) Virtual Private Networks (VPNs) have committed to provide optimal network services. They are gaining popularity in industry day by day. Enterprise customers are moving to service providers that offer MPLS VPNs. The main reason for this shifting is the capability of MPLS VPN to provide built in security features and any-to-any connectivity. MPLS VPNs improved the network performance due to fast label switching as compare to traditional IP Forwarding but traffic classification and policing was still required on per hop basis to enhance the performance of real time traffic which is delay sensitive (particularly voice and video). QoS (Quality of service) is the most important factor to prioritize enterprise networks’ real time traffic such as voice and video. This thesis is focused on the study of QoS parameters (e.g. delay, jitter and MOS (Mean Opinion Score)) for the real time traffic over MPLS VPNs. DiffServ (Differentiated Services) QoS model will be used over MPLS VPN network to get end-to-end service quality.Keywords: network, MPLS, VPN, DiffServ, MPLS VPN, DiffServ QoS, QoS Model, GNS2
Procedia PDF Downloads 4296392 Examining Private Law's Role in Promoting Human Rights: Prospects, Obstacles, and Safeguarding Challenges
Authors: Laura Cami Vorpsi
Abstract:
This research paper examines the potential of private law as a means to promote and safeguard human rights while also addressing the associated challenges and limitations of adopting such an approach. Historically, private law mechanisms, namely contract law, tort law, and property law, have been employed to govern and oversee private relationships and transactions. Nevertheless, it is increasingly acknowledged that private law can also assume a significant role in safeguarding and advancing human rights, particularly in circumstances where the safeguards provided by public law are insufficient or inaccessible. This study assesses the benefits associated with the utilization of private law as a complementary measure to public law safeguards. These advantages encompass enhanced efficacy and efficiency of remedies, as well as the capacity to customize solutions to suit the unique requirements and circumstances of individuals. Nevertheless, the present study also considers the constraints associated with private law mechanisms, such as the financial and procedural intricacies of legal proceedings, the possibility of imbalanced negotiation power, and the potential to worsen pre-existing disparities and systemic inequities. The paper posits that the adoption of a private law-based approach to human rights necessitates a meticulous design and implementation process in order to mitigate potential risks and optimize the advantages. In conclusion, this study examines the ramifications of these discoveries on policy and practice, highlighting the necessity for heightened awareness and education regarding the capacity of private law to advance and safeguard human rights. Additionally, it underscores the significance of establishing efficient and easily accessible mechanisms for upholding human rights within the private domain. The paper concludes by providing recommendations for future research in this domain, specifically emphasizing the necessity for additional empirical investigations to assess the efficacy and consequences of private law-oriented strategies in safeguarding human rights.Keywords: private law, human rights, promoting, protecting, access to justice
Procedia PDF Downloads 836391 A Study of Adult Lifelong Learning Consulting and Service System in Taiwan
Authors: Wan Jen Chang
Abstract:
Back ground: Taiwan's current adult lifelong learning services have expanded from vocational training to universal lifelong learning. However, both the professional knowledge training of learning guidance and consulting services and the provision of adult online learning consulting service systems still need to be established. Purpose: The purposes of this study are as follows: 1. Analyze the professional training mechanism for cultivating adult lifelong learning consultation and coaching; 2. Explore the feasibility of constructing a system that uses network technology to provide adult learning consultation services. Research design: This study conducts a literature analysis of counseling and coaching policy reports on lifelong learning in European countries and the United States. There are two focus discussions were conducted with 15 lifelong learning scholars, experts and practitioners as research subjects. The following two topics were discussed and suggested: 1. The current situation, needs and professional ability training mechanism of "Adult Lifelong Learning Consulting and Services"; 2. Strategies for establishing an "Adult Lifelong Learning Consulting and Service internet System". Conclusion: 1.Based on adult lifelong learning consulting and service needs, plan a professional knowledge training and certification system.2.Adult lifelong learning consulting and service professional knowledge and skills training should include the use of network technology to provide consulting service skills.3.To establish an adult lifelong learning consultation and service system, the Ministry of Education should promulgate policies and measures at the central level and entrust local governments or private organizations to implement them.4.The adult lifelong learning consulting and service system can combine the national qualifications framework, private sector and NPO to expand learning consulting service partners.Keywords: adult lifelong learning, profesional knowledge, consulting and service, network system
Procedia PDF Downloads 706390 GPRS Based Automatic Metering System
Authors: Constant Akama, Frank Kulor, Frederick Agyemang
Abstract:
All over the world, due to increasing population, electric power distribution companies are looking for more efficient ways of reading electricity meters. In Ghana, the prepaid metering system was introduced in 2007 to replace the manual system of reading which was fraught with inefficiencies. However, the prepaid system in Ghana is not capable of integration with online systems such as e-commerce platforms and remote monitoring systems. In this paper, we present a design framework for an automatic metering system that can be integrated with e-commerce platforms and remote monitoring systems. The meter was designed using ADE 7755 which reads the energy consumption and the reading is processed by a microcontroller connected to Sim900 General Packet Radio Service module containing a GSM chip provisioned with an Access Point Name. The system also has a billing server and a management server located at the premises of the utility company which communicate with the meter over a Virtual Private Network and GPRS. With this system, customers can buy credit online and the credit will be transferred securely to the meter. Also, when a fault is reported, the utility company can log into the meter remotely through the management server to troubleshoot the problem.Keywords: access point name, general packet radio service, GSM, virtual private network
Procedia PDF Downloads 3046389 Empirical Study on the Organizational Role Stress and its Effect on Private and Government Sector Employees
Authors: Rashmi Shahu
Abstract:
This is a comparative study of the Organizational Role Stress among the private and government sector employees. There was no known similar kind of Organizational Role Stress study in the field area i.e. Nagpur city. Hence, in order to understand the ORS level pertaining to the government and private sector employees in various offices it was taken as the subject for this study. The Method used for this study was the incidental sampling method. The Organizational Role Scale containing 50 statements related to the ten different ORS areas was used for observations. All 60 participants were tested. The results of the study show that there was a significant difference in only one area of ORS i.e. Personal Inadequacy for the participants. The employees from the private sector showed higher Personal Inadequacy than the government employees. Rest of the ORS areas showed no significant difference meaning that the employees were well adjusted in the respective areas.Keywords: organozational role stress, private sector, government sector, personal inadequacy
Procedia PDF Downloads 3666388 Survivable IP over WDM Network Design Based on 1 ⊕ 1 Network Coding
Authors: Nihed Bahria El Asghar, Imen Jouili, Mounir Frikha
Abstract:
Inter-datacenter transport network is very bandwidth and delay demanding. The data transferred over such a network is also highly QoS-exigent mostly because a huge volume of data should be transported transparently with regard to the application user. To avoid the data transfer failure, a backup path should be reserved. No re-routing delay should be observed. A dedicated 1+1 protection is however not applicable in inter-datacenter transport network because of the huge spare capacity. In this context, we propose a survivable virtual network with minimal backup based on network coding (1 ⊕ 1) and solve it using a modified Dijkstra-based heuristic.Keywords: network coding, dedicated protection, spare capacity, inter-datacenters transport network
Procedia PDF Downloads 4506387 Transit Network Design Problem Issues and Challenges
Authors: Mahmoud Owais
Abstract:
Public Transit (P.T) is very important means to reduce traffic congestion, to improve urban environmental conditions and consequently affects people social lives. Planning, designing and management of P.T are the key issues for offering a competitive mode that can compete with the private transportation. These transportation planning, designing and management issues are addressed in the Transit Network Design Problem (TNDP). It deals with a complete hierarchy of decision making process. It includes strategic, tactical and operational decisions. The main body of TNDP is two stages, namely; route design stage and frequency setting. The TNDP is extensively studied in the last five decades; however the research gate is still widely open due to its many practical and modeling challenges. In this paper, a comprehensive background is given to illustrate the issues and challenges related to the TNDP to help in directing the incoming researches towards the untouched areas of the problem.Keywords: frequency setting, network design, transit planning, urban planning
Procedia PDF Downloads 3886386 Performance Evaluation of Routing Protocols for Video Conference over MPLS VPN Network
Authors: Abdullah Al Mamun, Tarek R. Sheltami
Abstract:
Video conferencing is a highly demanding facility now a days in order to its real time characteristics, but faster communication is the prior requirement of this technology. Multi Protocol Label Switching (MPLS) IP Virtual Private Network (VPN) address this problem and it is able to make a communication faster than others techniques. However, this paper studies the performance comparison of video traffic between two routing protocols namely the Enhanced Interior Gateway Protocol(EIGRP) and Open Shortest Path First (OSPF). The combination of traditional routing and MPLS improve the forwarding mechanism, scalability and overall network performance. We will use GNS3 and OPNET Modeler 14.5 to simulate many different scenarios and metrics such as delay, jitter and mean opinion score (MOS) value are measured. The simulation result will show that OSPF and BGP-MPLS VPN offers best performance for video conferencing application.Keywords: OSPF, BGP, EIGRP, MPLS, Video conference, Provider router, edge router, layer3 VPN
Procedia PDF Downloads 3326385 The Risk and Prevention of Peer-To-Peer Network Lending in China
Authors: Zhizhong Yuan, Lili Wang, Chenya Zheng, Wuqi Yang
Abstract:
How to encourage and support peer-to-peer (P2P) network lending, and effectively monitor the risk of P2P network lending, has become the focus of the Chinese government departments, industrialists, experts and scholars in recent years. The reason is that this convenient online micro-credit service brings a series of credit risks and other issues. Avoiding the risks brought by the P2P network lending model, it can better play a benign role and help China's small and medium-sized private enterprises with vigorous development to solve the capital needs; otherwise, it will bring confusion to the normal financial order. As a form of financial services, P2P network lending has injected new blood into China's non-government finance in the past ten years, and has found a way out for idle funds and made up for the shortage of traditional financial services in China. However, it lacks feasible measures in credit evaluation and government supervision. This paper collects a large amount of data about P2P network lending of China. The data collection comes from the official media of the Chinese government, the public achievements of existing researchers and the analysis and collation of correlation data by the authors. The research content of this paper includes literature review; the current situation of China's P2P network lending development; the risk analysis of P2P network lending in China; the risk prevention strategy of P2P network lending in China. The focus of this paper is to try to find a specific program to strengthen supervision and avoid risks from the perspective of government regulators, operators of P2P network lending platform, investors and users of funds. These main measures include: China needs to develop self-discipline organization of P2P network lending industry and formulate self-discipline norms as soon as possible; establish a regular information disclosure system of P2P network lending platform; establish censorship of credit rating of borrowers; rectify the P2P network lending platform in compliance through the implementation of bank deposition. The results and solutions will benefit all the P2P network lending platforms, creditors, debtors, bankers, independent auditors and government agencies of China and other countries.Keywords: peer-to-peer(P2P), regulation, risk prevention, supervision
Procedia PDF Downloads 1706384 Alternative Key Exchange Algorithm Based on Elliptic Curve Digital Signature Algorithm Certificate and Usage in Applications
Authors: A. Andreasyan, C. Connors
Abstract:
The Elliptic Curve Digital Signature algorithm-based X509v3 certificates are becoming more popular due to their short public and private key sizes. Moreover, these certificates can be stored in Internet of Things (IoT) devices, with limited resources, using less memory and transmitted in network security protocols, such as Internet Key Exchange (IKE), Transport Layer Security (TLS) and Secure Shell (SSH) with less bandwidth. The proposed method gives another advantage, in that it increases the performance of the above-mentioned protocols in terms of key exchange by saving one scalar multiplication operation.Keywords: cryptography, elliptic curve digital signature algorithm, key exchange, network security protocol
Procedia PDF Downloads 1536383 Impacts of Social Support on Perceived Level of Stress and Self-Esteem among Students of Private Universities of Karachi-Pakistan
Authors: Sheeba Farhan
Abstract:
This study is conducted to explore the predictive relationship of perceived stress and self-esteem with social support of students and to explore the factors, which contribute to develop or enhance the level of stress in students of private universities in Karachi-Pakistan. After literature review following hypotheses were formulated; 1)social support would predict perceived stress of students of business administration of private organizations of Higher education, 2) social support would predict the self-esteem of students of private organizations of Higher education, 3) there will be a relationship of perceived stress and self-esteem of students of private organizations of Higher education, 4) there will be a relationship of self esteem and social support of students of private organizations of Higher education. Sample of the study is comprise of 100 students of private organizations of Higher education in Karachi- Pakistan (i.e. males= 50 & females= 50). The age range of participants is 18-26 years. The measures, used in the study are: Demographic information form, a semi structured interview form, Rosenberg self esteem scale (Rosenberg, 1965) and perceived stress scale (Cohen, Kamarck, and Mermelstein, 1983) and multidimensional scale of perceived social support (Zimet, 1988) Descriptive statistics is used for getting a better statistical view of characteristics of sample. Regression analysis is used to explore the predictive relationship of study related stress and self esteem with academic achievement of students of private organizations of Higher education. Percentages and ratios were calculated to explore the level of perceived stress with respect to Socio-demographic characteristics in students of private organizations of Higher education. Finding shows that social support is significantly associated with the higher level of self-esteem among students of graduation but insignificantly associated with stress that has been experienced by them. These results are correlated with a wide variety of studies in which social support has proposed to be a predictor of well being for the students.Keywords: private universities of Karachi-Pakistan, Self-esteem, social support, stress
Procedia PDF Downloads 2976382 Study on Energy Performance Comparison of Information Centric Network Based on Difference of Network Architecture
Authors: Takumi Shindo, Koji Okamura
Abstract:
The first generation of the wide area network was circuit centric network. How the optimal circuit can be signed was the most important issue to get the best performance. This architecture had succeeded for line based telephone system. The second generation was host centric network and Internet based on this architecture has very succeeded world widely. And Internet became as new social infrastructure. Currently the architecture of the network is based on the location of the information. This future network is called Information centric network (ICN). The information-centric network (ICN) has being researched by many projects and different architectures for implementation of ICN have been proposed. The goal of this study is to compare performances of those ICN architectures. In this paper, the authors propose general ICN model which can represent two typical ICN architectures and compare communication performances using request routing. Finally, simulation results are shown. Also, we assume that this network architecture should be adapt to energy on-demand routing.Keywords: ICN, information centric network, CCN, energy
Procedia PDF Downloads 3426381 Price Compensation Mechanism with Unmet Demand for Public-Private Partnership Projects
Abstract:
Public-private partnership (PPP), as an innovative way to provide infrastructures by the private sector, is being widely used throughout the world. Compared with the traditional mode, PPP emerges largely for merits of relieving public budget constraint and improving infrastructure supply efficiency by involving private funds. However, PPP projects are characterized by large scale, high investment, long payback period, and long concession period. These characteristics make PPP projects full of risks. One of the most important risks faced by the private sector is demand risk because many factors affect the real demand. If the real demand is far lower than the forecasting demand, the private sector will be got into big trouble because operating revenue is the main means for the private sector to recoup the investment and obtain profit. Therefore, it is important to study how the government compensates the private sector when the demand risk occurs in order to achieve Pareto-improvement. This research focuses on price compensation mechanism, an ex-post compensation mechanism, and analyzes, by mathematical modeling, the impact of price compensation mechanism on payoff of the private sector and consumer surplus for PPP toll road projects. This research first investigates whether or not price compensation mechanisms can obtain Pareto-improvement and, if so, then explores boundary conditions for this mechanism. The research results show that price compensation mechanism can realize Pareto-improvement under certain conditions. Especially, to make the price compensation mechanism accomplish Pareto-improvement, renegotiation costs of the government and the private sector should be lower than a certain threshold which is determined by marginal operating cost and distortionary cost of the tax. In addition, the compensation percentage should match with the price cut of the private investor when demand drops. This research aims to provide theoretical support for the government when determining compensation scope under the price compensation mechanism. Moreover, some policy implications can also be drawn from the analysis for better risk-sharing and sustainability of PPP projects.Keywords: infrastructure, price compensation mechanism, public-private partnership, renegotiation
Procedia PDF Downloads 1836380 Evaluation Synthesis of Private Sector Engagement in International Development
Authors: Valerie Habbel, Magdalena Orth, Johanna Richter, Steffen Schimko
Abstract:
Cooperation between development actors and the private sector is becoming increasingly important, as it is expected to mobilize additional resources to achieve the Sustainable Development Goals (SDGs), among other things. However, whether the goals of cooperation are achieved has so far only been explored in evaluations and studies of individual projects and instruments. The evaluation synthesis attempts to close this gap by systematically analyzing existing evidence (evaluations and academic studies) from national and international development cooperation on private sector engagement. Overall, the evaluations and studies considered report mainly positive effects on investors and donors, intermediaries, partner countries, and target groups. However, various analyses, including on the quality of the evaluations, point to a positive bias in the results. The evaluation synthesis makes recommendations on the definition of indicators, the measurement and evaluation of impacts and additionality, knowledge management, and the consideration of transaction costs in cooperation with private actors.Keywords: evaluation synthesis, private sector engagement, international development, sustainable development
Procedia PDF Downloads 2176379 Network Governance and Renewable Energy Transition in Sub-Saharan Africa: Contextual Evidence from Ghana
Authors: Kyere Francis, Sun Dongying, Asante Dennis, Nkrumah Nana Kwame Edmund, Naana Yaa Gyamea Kumah
Abstract:
With a focus on renewable energy to achieve low-carbon transition objectives, there is a greater demand for effective collaborative strategies for planning, strategic decision mechanisms, and long-term policy designs to steer the transitions. Government agencies, NGOs, the private sector, and individual citizens play an important role in sustainable energy production. In Ghana, however, such collaboration is fragile in the fight against climate change. This current study seeks to re-examine the position or potential of network governance in Ghana's renewable energy transition. The study adopted a qualitative approach and employed semi-structured interviews for data gathering. To explore network governance and low carbon transitions in Ghana, we examine key themes such as political environment and impact, actor cooperation and stakeholder interactions, financing and the transition, market design and renewable energy integration, existing regulation and policy gaps for renewable energy transition, clean cooking accessibility, and affordability. The findings reveal the following; Lack of comprehensive consultations with relevant stakeholders leads to lower acceptance of the policy model and sometimes lack of policy awareness. Again, the unavailability and affordability of renewable energy technologies and access to credit facilities is a significant hurdle to long-term renewable transition. Ghana's renewable energy transitions require strong networking and interaction among the public, private, and non-governmental organizations. The study participants believe that the involvement of relevant energy experts and stakeholders devoid of any political biases is instrumental in accelerating renewable energy transitions, as emphasized in the proposed framework. The study recommends that the national renewable energy transition plan be evident to all stakeholders and political administrators. Such policy may encourage renewable energy investment through stable and fixed lending rates by the financial institutions and build a network with international organizations and corporations. These findings could serve as valuable information for the transition-based energy process, primarily aiming to govern sustainability changes through network governance.Keywords: actors, development, sustainable energy, network governance, renewable energy transition
Procedia PDF Downloads 946378 A Comparative Study of Public and Private School Adolescent Girls on the Issues of Menstrual Hygiene and the Management Issues
Authors: Ashok Pandey, Rajan Adhikari
Abstract:
Introduction: Menstruation is part of the female reproductive cycle that starts when girls become sexually mature at the time of puberty. It is a phenomenon unique to the females. During a menstrual period, a woman bleeds from her uterus via the vagina. For decades, in many countries, academic school ‘type,’ private or public, as a predictor of or factor in future academic success has been researched and debated. MATERIAL AND METHODS: The comparative study was carried out with adolescent girls studying in both public and private schools of Kathmandu valley. A total of 100 girls participated in the survey, and out of them 21 participated in the FGD and 5 in the in- depth interview. Quantitative data from the survey was analyzed using SPSS 16.0 software. Informed verbal consent with the respective head of school and the respondents were taken before data collection. Results:The age of the respondents ranges from 11 to 18 years, with mean age of menarche being 12.37 years in both school adolescent girls. 70 percent of the public school adolescent girls and 72 percent of the private school adolescent girls are feeling upset and tension during menarche. There is a statistically significant difference on take rest during the period and good hygienic practice during menstruation of public/private school, at α=0. 05 level of significance. There is a statistically significant difference on overall score of practice during menstruation between public and private adolescent girls. Conclusion: Private schools children are more knowledgeable and maintain hygiene as compere to public school even though, it can be said that among the adolescent school girls both in public and private school, menstrual knowledge and perceptions are poor and practices often not optimal for proper hygiene. Often ignored issues of privacy affect the hygienic practices and daily lives.Keywords: Comparison, Menstruation, Private school, Public School
Procedia PDF Downloads 4496377 Evaluating the Quality of Private University Websites in Malaysia
Authors: Rubijesmin Abdul Latif
Abstract:
This paper focuses on evaluating what are quality components of university websites in Malaysia especially the private universities. It is believed that with websites that prioritize quality, the websites will serve its intended users satisfactory. From the compiled analysis of other studies, quality components were identified and tested among 30 randomly selected respondents. Four Malaysia private university websites were compared and the highlights were better understanding of what users want for a quality university website.Keywords: website evaluation, criteria, quality, usability, user experience, university website
Procedia PDF Downloads 3766376 Factors Affecting the Success of Private Higher Education Businesses in Malaysia
Authors: Nasir Khalid
Abstract:
In Malaysia, higher education is big business. There are many companies that are willing if not already to invest heavily in higher education for students that aspire to pursue their degree in diploma, undergraduate as well as graduate studies. These companies sometimes even have a joint venture twinning program with other already established universities in and across Europe, Australia, the United States, and Canada. Some of these investments have been successful whereas others find themselves limited by the obstacle of receiving new students. Recently, the Malaysian Ministry of Higher Education has stopped issuing licenses to set up private institutions of higher education. This paper will thus examine the factors affecting the success of private higher education businesses in Malaysia. The samples will consist of thirty private institutions [N=30]. Among the factors that will be mentioned in the literature are academic programs, student quality and achievement, student employability, alumni satisfaction, student enrolment, institutional environment, lecturer-quality and effectiveness of supporting staff. A questionnaire was developed and analyzed using statistical analysis. The result of this study found that the top three factors affecting the success of private higher education businesses in Malaysia are student enrolment, institutional environment and the academic programs offered.Keywords: higher education business, successful business factors, private institutions, business in Malaysia
Procedia PDF Downloads 3196375 Barriers to Job Localization Policy in Private Sector: Case Study from Oman
Authors: Yahya Al Nahdi
Abstract:
Even though efforts to increase the participation of nationals in the workforce have been in place for more than a decade in the Sultanate of Oman, the results are not impressive. Citizens’ workforce participation – it is argued in the literature – is hindered by institutional, as well as attitudinal concerns. The purpose of this study was to determine barriers to Omanization (employment of Omani nationals) in the private sector as perceived by the senior managers in government and private sector. Data were collected predominantly through in-depth, semi-structured interviews with managers who directly deal with Omanization policies from both the public and private sector. Results from the data analysis have shown that the majority of participants acknowledged a work preference in the movement (public sector). The private sector employees' compensation and benefits package was perceived to be less attractive than that offered in the government (public sector). The negative perceptions (stereotypes) shared by expatriates regarding work attitudes and competencies of citizens in the local labour market was also overwhelmingly perceived as a major hindrance. Furthermore, institutional issues such as, ineffectiveness of rules and regulation regarding Omanization, inappropriate quota system and lack of public awareness towards private sector’s jobs, are also perceived problematic to successful Omanization. Finally, results from the data analysis were used in recommending strategies for potential consideration in the pursuit of a successful Omanization programme.Keywords: localization, job security, labour force structure, Omanization, private sector, public sector
Procedia PDF Downloads 4016374 Survey on Securing the Optimized Link State Routing (OLSR) Protocol in Mobile Ad-hoc Network
Authors: Kimaya Subhash Gaikwad, S. B. Waykar
Abstract:
The mobile ad-hoc network (MANET) is collection of various types of nodes. In MANET various protocols are used for communication. In OLSR protocol, a node is selected as multipoint relay (MPR) node which broadcast the messages. As the MANET is open kind of network any malicious node can easily enter into the network and affect the performance of the network. The performance of network mainly depends on the components which are taking part into the communication. If the proper nodes are not selected for the communication then the probability of network being attacked is more. Therefore, it is important to select the more reliable and secure components in the network. MANET does not have any filtering so that only selected nodes can be used for communication. The openness of the MANET makes it easier to attack the communication. The most of the attack are on the Quality of service (QoS) of the network. This paper gives the overview of the various attacks that are possible on OLSR protocol and some solutions. The papers focus mainly on the OLSR protocol.Keywords: communication, MANET, OLSR, QoS
Procedia PDF Downloads 4526373 A Social Network Analysis of the Palestinian Feminist Network Tal3at
Authors: Maath M. Musleh
Abstract:
This research aims to study recent trends in the Palestinian feminist movement through the case study of Tal3at. The study uses social network analysis as its primary method to analyze Twitter data. It attempts to interpret results through the lens of network theories and Parson’s AGIL paradigm. The study reveals major structural weaknesses in the Tal3at network. Our findings suggest that the movement will decline soon as sentiments of alienation amongst Palestinian women increases. These findings were validated by a couple of central actors in the network. This study contributes an SNA approach to the understanding of the understudied Palestinian feminism.Keywords: feminism, Palestine, social network analysis, Tal3at
Procedia PDF Downloads 2686372 Design a Network for Implementation a Hospital Information System
Authors: Abdulqader Rasool Feqi Mohammed, Ergun Erçelebi̇
Abstract:
A large number of hospitals from developed countries are adopting hospital information system to bring efficiency in hospital information system. The purpose of this project is to research on new network security techniques in order to enhance the current network security structure of save a hospital information system (HIS). This is very important because, it will avoid the system from suffering any attack. Security architecture was optimized but there are need to keep researching on best means to protect the network from future attacks. In this final project research, security techniques were uncovered to produce best network security results when implemented in an integrated framework.Keywords: hospital information system, HIS, network security techniques, internet protocol, IP, network
Procedia PDF Downloads 444