Search results for: institutional network
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 5668

Search results for: institutional network

5578 Modelling the Education Supply Chain with Network Data Envelopment Analysis

Authors: Sourour Ramzi, Claudia Sarrico

Abstract:

Little has been done on network DEA in education, and nobody has attempted to model the whole education supply chain using network DEA. As such the contribution of the present paper is to propose a model for measuring the efficiency of education supply chains using network DEA. First, we use a general survey of data envelopment analysis (DEA) to establish the emergent themes for research in DEA, and focus on the theme of Network DEA. Second, we use a survey on two-stage DEA models, and Network DEA to write a state of the art on Network DEA, particularly applied to supply chain management. Third, we use a survey on DEA applications to establish the most influential papers on DEA education applications, in order to establish the state of the art on applications of DEA in education, in general, and applications of DEA to education using network DEA, in particular. Finally, we propose a model for measuring the performance of education supply chains of different education systems (countries or states within a country, for instance). We then use this model on some empirical data.

Keywords: supply chain, education, data envelopment analysis, network DEA

Procedia PDF Downloads 346
5577 Open Minds but Closed Access: Why Are There so Few Gold Open Access LIS Journals And Why Are so Many Librarians Unwilling to Unlock Their Scholarship?

Authors: Sarah Baker, Jayati Chaudhuri

Abstract:

Librarians have embraced the open access movement in all disciplines but their own. They are strong advocates on college campuses and curate institutional repositories, yet there are surprisingly few open access LIS journals. Presenters evaluated the open access availability of library and information science literature. After analyzing the top 100 library science journals (the top 50 journals from Scimago and JCR) and finding very few gold open access journals, they then investigated the availability of open access articles from the top 10 closed access journals. Presenters would like to generate a conversation on what type of proactive approach librarians can take to increase open access to literature within our discipline. Librarians like their colleagues in other disciplines are not motivated to submit their articles to their institutional repositories. Presenters have found a similar reluctance from their fellow colleagues regarding open access initiatives on campus. Presenters will describe Open Access Week activities as part of a campus-wide initiative and share some faculty comments, concerns, and misconceptions that came up as a part of this dialog. Presenters will discuss their personal experiences providing access to faculty publications through the California State University Los Angeles institutional repository.

Keywords: faculty scholarship, institutional repositories, library and information science journals, open access

Procedia PDF Downloads 308
5576 Orphan Node Inclusion Protocol for Wireless Sensor Network

Authors: Sandeep Singh Waraich

Abstract:

Wireless sensor network (WSN ) consists of a large number of sensor nodes. The disparity in their energy consumption usually lead to the loss of equilibrium in wireless sensor network which may further results in an energy hole problem in wireless network. In this paper, we have considered the inclusion of orphan nodes which usually remain unutilized as intermediate nodes in multi-hop routing. The Orphan Node Inclusion (ONI) Protocol lets the cluster member to bring the orphan nodes into their clusters, thereby saving important resources and increasing network lifetime in critical applications of WSN.

Keywords: wireless sensor network, orphan node, clustering, ONI protocol

Procedia PDF Downloads 390
5575 School Choice and Institutional or Familial Habitus: Reciprocity in Parents-School Relationships

Authors: Fatemeh Yazdani

Abstract:

This paper explores the student intake policies in high-performing private schools in Iran by studying both sides involved in the school choice processes, parents and the school leaders. It is based on in-depth interviews with 27 parents and private schools’ staff and principals supplemented by ethnographic observation in two private schools in Tehran. From the Bourdieusian point of view, this paper argues that the school leadership engineers the composition of private schools’ students via different gatekeeping strategies, and these strategies represent and reconstruct the school’s institutional habitus. It further explores the ways that parents who look for quality education among non-state education providers deal with the school's institutional habitus based on their familial habitus and possessed economic, social, and cultural capital. The conclusion highlights that investigating school choice as a reciprocal process between family and school leadership can shed more light on the ways that an exclusive environment has been created in some high-performing private schools for certain class strata maintaining a distance that needs to be kept from ‘others.’ In a broader sense, this paper engages into an exploration of social inequality reproduction through private education.

Keywords: institutional habitus, private education, school choice, social inequality, student intake

Procedia PDF Downloads 87
5574 Punishment on top of Punishment - Impact of Inmate Misconduct

Authors: Nazirah Hassan, Andrew Kendrick

Abstract:

Punishment inside the penal institution has always been practiced in order to maintain discipline and keep order. Nonetheless, criminologists have long debated that the enforcement of discipline by punishing inmates is often ineffective and has a detrimental impact on inmates’ conduct. This paper uses data from a sample of 289 incarcerated young offenders to investigate the prevalence of institutional misconduct. It explores punitive cultural practices inside institutions and how this culture affects the inmates’ conduct during confinement. The project focused on male and female young offenders aged 12 to 21 years old, in eight juvenile justice institutions. The research collected quantitative and qualitative data using a mixed-method approach. All participants completed the Direct and Indirect Prisoner behavior Checklist-Scaled Version Revised (DIPC-SCALED-R). In addition, exploratory interviews were carried out with sixteen inmates and eight institutional staff. Results of the questionnaire survey show that almost half of the inmates reported a higher level of involvement in perpetration. It demonstrates a remarkable convergence of direct, rather than indirect, perpetration. Also, inmates reported a higher level of tobacco used and behavior associated with negative attitudes towards staff and institutional rules. In addition to this, the qualitative data suggests that the punitive culture encourages the onset of misconduct by increasing the stressful and oppressive conditions within the institution. In general, physical exercise and locking up inmates are two forms of punishment that were ubiquitous throughout the institutions. Interestingly, physical exercise is not only enforced by institutional staff but also inmates. These findings are discussed in terms of existing literature and their practical implications are considered.

Keywords: institutional punishment, incarcerated young offenders, punitive culture, institutional misconduct

Procedia PDF Downloads 221
5573 Evolution of Relations among Multiple Institutional Logics: A Case Study from a Higher Education Institution

Authors: Ye Jiang

Abstract:

To examine how the relationships among multiple institutional logics vary over time and the factors that may impact this process, we conducted a 15-year in-depth longitudinal case study of a Higher Education Institution to examine its exploration in college student management. By employing constructive grounded theory, we developed a four-stage process model comprising separation, formalization, selective bridging, and embeddedness that showed how two contradictory logics become complementary, and finally become a new hybridized logic. We argue that selective bridging is an important step in changing inter-logic relations. We also found that ambidextrous leadership and situational sensemaking are two key factors that drive this process. Our contribution to the literature is threefold. First, we enhance the literature on the changing relationships among multiple institutional logics and our findings advance the understanding of relationships between multiple logics through a dynamic view. While most studies have tended to assume that the relationship among logics is static and persistently in a contentious state, we contend that the relationships among multiple institutional logics can change over time. Competitive logics can become complementary, and a new hybridized logic can emerge therefrom. The four-stage logic hybridization process model offers insights on the logic hybridization process, which is underexplored in the literature. Second, our research reveals that selective bridging is important in making conflicting logics compatible, and thus constitutes a key step in creating new hybridized logic dynamics. Our findings suggest that the relations between multiple logics are manageable and can thus be manipulated for organizational innovation. Finally, the factors influencing the variations in inter-logic relations enrich the understanding of the antecedents of these dynamics.

Keywords: institutional theory, institutional logics, ambidextrous leadership, situational sensemaking

Procedia PDF Downloads 115
5572 Simulation Analysis of Optical Add Drop Multiplexer in a Ring Network

Authors: Surinder Singh, Meenakshi

Abstract:

In this paper MZI-FBG based optical add drop multiplexer is designed and its performance is analyzed in the ring network. In the ring network nodes are composed of optical add drop multiplexer, transmitter and receiver. OADM is used to add or drop any frequency at intermediate nodes without affecting other channels. In this paper the performance of the ring network is carried out by varying various kinds of fiber with or without amplifiers.

Keywords: OADM, ring network, MZI-FBG, transmitter

Procedia PDF Downloads 545
5571 A Tutorial on Network Security: Attacks and Controls

Authors: Belbahi Ahlam

Abstract:

With the phenomenal growth in the Internet, network security has become an integral part of computer and information security. In order to come up with measures that make networks more secure, it is important to learn about the vulnerabilities that could exist in a computer network and then have an understanding of the typical attacks that have been carried out in such networks. The first half of this paper will expose the readers to the classical network attacks that have exploited the typical vulnerabilities of computer networks in the past and solutions that have been adopted since then to prevent or reduce the chances of some of these attacks. The second half of the paper will expose the readers to the different network security controls including the network architecture, protocols, standards and software/ hardware tools that have been adopted in modern day computer networks.

Keywords: network security, attacks and controls, computer and information, solutions

Procedia PDF Downloads 423
5570 End-to-End Control and Management of Multi-AS Virtual Service Networks Using SDN and Autonomic Computing Architecture

Authors: Yong Xue, Daniel A. Menascé

Abstract:

Automated and end-to-end network resource management and provisioning for virtual service networks in a multiple autonomous systems (a.k.a multi-AS) environment is a challenging and open problem. This paper proposes a novel, scalable and interoperable high-level architecture that incorporates a number of emerging enabling technologies including Software Defined Network (SDN), Network Function Virtualization (NFV), Service Oriented Architecture (SOA), and Autonomic Computing. The proposed architecture can be used to not only automate network resource management and provisioning for virtual service networks across multiple autonomous substrate networks, but also provide an adaptive capability for achieving optimal network resource management and maintaining network-level end-to-end network performance as well. The paper argues that this SDN and autonomic computing based architecture lays a solid foundation that can facilitate the development of the future Internet based on the pluralistic paradigm.

Keywords: virtual network, software defined network, virtual service network, adaptive resource management, SOA, multi-AS, inter-domain

Procedia PDF Downloads 500
5569 An Analysis of Institutional Environments on Corporate Social Responsibility Practices in Nigerian Renewable Energy Firms

Authors: Bolanle Deborah Motilewa, E. K. Rowland Worlu, Gbenga Mayowa Agboola, Ayodele Maxwell Olokundun

Abstract:

Several studies have proposed a one-size fit all approach to Corporate Social Responsibility (CSR) practices, such that CSR as it applies to developed countries is adapted to developing countries, ignoring the differing institutional environments (such as the regulative, economic, social and political environments), which affects the profitability and practices of businesses operating in them. CSR as it applies to filling institutional gaps in developing countries, was categorized into four themes: environmental protection, product and service innovation, social innovation and local cluster development. Based on the four themes, the study employed a qualitative research approach through the use of interviews and review of available publications to study the influence of institutional environments on CSR practices engaged in by three renewable energy firms operating in Nigeria. Over the course of three 60-minutes sessions with the top management and selected workers of the firms, four propositions were made: regulatory environment influences environmental protection practice of Nigerian renewable firms, economic environment influences product and service innovation practice of Nigerian renewable energy firms, the social environment impacts on social innovation in Nigerian renewable energy firms, and political environment affects local cluster development practice of Nigerian renewable energy firms. It was also observed that beyond institutional environments, the international exposure of an organization’s managers reflected in their approach to CSR. This finding on the influence of international exposure on CSR practices creates an area for further study. Insights from this paper are set to help policy makers in developing countries, CSR managers, and future researchers.

Keywords: corporate social responsibility, renewable energy firms, institutional environment, social entrepreneurship

Procedia PDF Downloads 260
5568 Neither ‘Institutional’ nor ‘Remedial’: Court-Ordered Trusts in English and Canadian Private Law

Authors: Adam Reilly

Abstract:

The major claim of this paper is that both the English and Canadian branches of the common law have been ill-served by the 'institutional'/'remedial' taxonomy of constructive trusts; what shall be termed the 'orthodox taxonomy'.  The orthodox taxonomy is found both within the case law and the attendant academic commentary.  In truth, the orthodox taxonomy is especially dangerous because it contains a kernel of truth together with a misconception; the interplay of both has caused more harm than the misconception alone would have managed.  The kernel of truth is that some trusts arise automatically when the necessary facts occur ('institutional') and other trusts arise only by way of court order ('remedial').  The misconception is that these two labels represent an exhaustive nomenclature of two distinct 'kinds' of constructive trust such that any particular constructive trust must necessarily be 'institutional' if it is not 'remedial' and vice versa.  The central difficulty is that our understanding of 'remedial' trusts is relatively poor, with the result that anyone using the orthodox taxonomy shall be led astray in one of three ways: (i) by rejecting it wholesale; (ii) by adopting one ‘type’ of trust to the exclusion of the other (as in English law); or (iii) by applying it as an analytical device with sub-optimal results which are difficult to defend.  This paper shall seek to resolve these difficulties by clarifying the criteria for identifying and distinguishing true 'remedial' constructive trusts.  It shall then provide some working examples of how English and Canadian private law at present misunderstand constructive trusts and how that misunderstanding might be resolved once we distinguish the orthodox taxonomy's kernel of truth from the misconception outlined above.

Keywords: comparative law, constructive trusts, equitable remedies, remedial constructive trusts

Procedia PDF Downloads 118
5567 Increasing Abundance of Jellyfish in the Shorelines of Bangladesh: Analyzing the Policy Framework for Facing the Challenges

Authors: Md Mizanur Rahman, M. Aslam Alam, Muhammad Abu Yusuf

Abstract:

The abundance of Jellyfish across the coasts of the Bay of Bengal is increasing sharply due to marine pollution, increased sea acidification and climate change. Jellyfish draws our attention to address the local and global stressors. This also indicates that something wrong is happening in this bay behind the scenes. This study aimed to investigate how the policy framework governing the sea can be reformed. To do so, this study evaluated the existing policy, regulatory and institutional framework. Empirical data were collected from the middle coastal zone of Bangladesh. The secondary literature on policy, legal documents, and institutional arrangements were reviewed. The causes of poor coordination among different public sectors and non-compliance of laws were identified. The key findings show that despite the existing of Department of Environment, poor coordination with other departments, and lack of logistics and technical staffs have resulted in severe marine pollution and degradation of coastal and marine living resources. The existing policies had no monitoring and evaluation mechanisms. Non-compliance of the existing laws has been fueling the problems. This study provides an integrated policy and a guideline for updating the legal and institutional mechanism to manage coastal and marine living resources sustainably in Bangladesh to achieve Sustainable Development Goal 14.

Keywords: legal, institutional, framework, jellyfish

Procedia PDF Downloads 97
5566 Implementation of an Associative Memory Using a Restricted Hopfield Network

Authors: Tet H. Yeap

Abstract:

An analog restricted Hopfield Network is presented in this paper. It consists of two layers of nodes, visible and hidden nodes, connected by directional weighted paths forming a bipartite graph with no intralayer connection. An energy or Lyapunov function was derived to show that the proposed network will converge to stable states. By introducing hidden nodes, the proposed network can be trained to store patterns and has increased memory capacity. Training to be an associative memory, simulation results show that the associative memory performs better than a classical Hopfield network by being able to perform better memory recall when the input is noisy.

Keywords: restricted Hopfield network, Lyapunov function, simultaneous perturbation stochastic approximation

Procedia PDF Downloads 104
5565 Alignment in Earnings Management Research: Italy Looking towards US

Authors: Giulia Leoni, Cristina Florio

Abstract:

The paper aims to investigate the factors driving the increasing alignment of Italian earnings management (EM) research to US research on the same field. After characterizing the progressive similarity of Italian EM research with respect to US one by means of an historical comparison, the paper relies on a subsequent secondary source analysis to detect the possible causes of said alignment. Once identified that the alignment increased along three subsequent periods, the paper analyses and discusses this incremental similarity according to new institutional sociology (NIS) and highlights the presence of different combination of isomorphic pressures that help explaining this incremental similarity. The paper contributes to the institutional literature by providing evidence of isomorphism in academic research; it also contributes to accounting research by indicating the forces that are able to drive change and development in accounting research at national and international level. The paper also enlarges the explanatory value of NIS in alternative contexts, like academic accounting research.

Keywords: accounting research, earnings management, international comparison, Italy, new institutional sociology, US

Procedia PDF Downloads 553
5564 Designing Directed Network with Optimal Controllability

Authors: Liang Bai, Yandong Xiao, Haorang Wang, Songyang Lao

Abstract:

The directedness of links is crucial to determine the controllability in complex networks. Even the edge directions can determine the controllability of complex networks. Obviously, for a given network, we wish to design its edge directions that make this network approach the optimal controllability. In this work, we firstly introduce two methods to enhance network by assigning edge directions. However, these two methods could not completely mitigate the negative effects of inaccessibility and dilations. Thus, to approach the optimal network controllability, the edge directions must mitigate the negative effects of inaccessibility and dilations as much as possible. Finally, we propose the edge direction for optimal controllability. The optimal method has been found to be successfully useful on real-world and synthetic networks.

Keywords: complex network, dynamics, network control, optimization

Procedia PDF Downloads 146
5563 System Survivability in Networks

Authors: Asma Ben Yaghlane, Mohamed Naceur Azaiez

Abstract:

We consider the problem of attacks on networks. We define the concept of system survivability in networks in the presence of intelligent threats. Our setting of the problem assumes a flow to be sent from one source node to a destination node. The attacker attempts to disable the network by preventing the flow to reach its destination while the defender attempts to identify the best path-set to use to maximize the chance of arrival of the flow to the destination node. Our concept is shown to be different from the classical concept of network reliability. We distinguish two types of network survivability related to the defender and to the attacker of the network, respectively. We prove that the defender-based-network survivability plays the role of a lower bound while the attacker-based-network survivability plays the role of an upper bound of network reliability. We also prove that both concepts almost never agree nor coincide with network reliability. Moreover, we use the shortest-path problem to determine the defender-based-network survivability and the min-cut problem to determine the attacker-based-network survivability. We extend the problem to a variety of models including the minimum-spanning-tree problem and the multiple source-/destination-network problems.

Keywords: defense/attack strategies, information, networks, reliability, survivability

Procedia PDF Downloads 358
5562 Multimodal Convolutional Neural Network for Musical Instrument Recognition

Authors: Yagya Raj Pandeya, Joonwhoan Lee

Abstract:

The dynamic behavior of music and video makes it difficult to evaluate musical instrument playing in a video by computer system. Any television or film video clip with music information are rich sources for analyzing musical instruments using modern machine learning technologies. In this research, we integrate the audio and video information sources using convolutional neural network (CNN) and pass network learned features through recurrent neural network (RNN) to preserve the dynamic behaviors of audio and video. We use different pre-trained CNN for music and video feature extraction and then fine tune each model. The music network use 2D convolutional network and video network use 3D convolution (C3D). Finally, we concatenate each music and video feature by preserving the time varying features. The long short term memory (LSTM) network is used for long-term dynamic feature characterization and then use late fusion with generalized mean. The proposed network performs better performance to recognize the musical instrument using audio-video multimodal neural network.

Keywords: multimodal, 3D convolution, music-video feature extraction, generalized mean

Procedia PDF Downloads 191
5561 Design of Distribution Network for Gas Cylinders in Jordan

Authors: Hazem J. Smadi

Abstract:

Performance of a supply chain is directly related to a distribution network that entails the location of storing materials or products and how products are delivered to the end customer through different stages in the supply chain. This study analyses the current distribution network used for delivering gas cylinders to end customer in Jordan. Evaluation of current distribution has been conducted across customer service components. A modification on the current distribution network in terms of central warehousing in each city in the country improves the response time and customer experience. 

Keywords: distribution network, gas cylinder, Jordan, supply chain

Procedia PDF Downloads 436
5560 Developing and Enacting a Model for Institutional Implementation of the Humanizing Pedagogy: Case Study of Nelson Mandela University

Authors: Mukhtar Raban

Abstract:

As part of Nelson Mandela University’s journey of repositioning its learning and teaching agenda, the university adopted and foregrounded a humanizing pedagogy-aligning with institutional goals of critically transforming the academic project. The university established the Humanizing Pedagogy Praxis and Research Niche (HPPRN) as a centralized hub for coordinating institutional work exploring and advancing humanizing pedagogies and tasked the unit with developing and enacting a model for humanizing pedagogy exploration. This investigation endeavored to report on the development and enactment of a model that sought to institutionalize a humanizing pedagogy at a South African university. Having followed a qualitative approach, the investigation presents the case study of Nelson Mandela University’s HPPRN and the model it subsequently established and enacted for the advancement towards a more common institutional understanding, interpretation and application of the humanizing pedagogy. The study adopted an interpretive lens for analysis, complementing the qualitative approach of the investigation. The primary challenge that confronted the HPPRN was the development of a ‘living model’ that had to complement existing institutional initiatives while accommodating a renewed spirit of critical reflection, innovation and research of continued and new humanizing pedagogical exploration and applications. The study found that the explicit consideration of tenets of humanizing and critical pedagogies in underpinning and framing the HPPRN Model contributed to the sense of ‘lived’ humanizing pedagogy experiences during enactment. The multi-leveled inclusion of critical reflection in the development and enactment stages was found to further the processes of praxis employed at the university, which is integral to the advancement of humanizing and critical pedagogies. The development and implementation of a model that seeks to institutionalize the humanizing pedagogy at a university rely not only on sound theoretical conceptualization but also on the ‘richness of becoming more human’ explicitly expressed and encountered in praxes and application.

Keywords: humanizing pedagogy, critical pedagogy, institutional implementation, praxis

Procedia PDF Downloads 138
5559 A Survey of Novel Opportunistic Routing Protocols in Mobile Ad Hoc Networks

Authors: R. Poonkuzhali, M. Y. Sanavullah, M. R. Gurupriya

Abstract:

Opportunistic routing is used, where the network has the features like dynamic topology changes and intermittent network connectivity. In Delay Tolerant network or Disruption tolerant network opportunistic forwarding technique is widely used. The key idea of opportunistic routing is selecting forwarding nodes to forward data and coordination among these nodes to avoid duplicate transmissions. This paper gives the analysis of pros and cons of various opportunistic routing techniques used in MANET.

Keywords: ETX, opportunistic routing, PSR, throughput

Procedia PDF Downloads 469
5558 Financial Development, Institutional Quality and Environmental Conditions in the Middle East and North Africa Region: Evidence From Oil- And Non-oil-Producing Countries

Authors: Jamel Boukhatem, Semia Rachid, Marmar Nasr

Abstract:

Considering the differences between oil- and non-oil-producing countries, this paper aims to evaluate the impact of financial development (FD) and institutional quality (IQ) on CO2 emissions in 15 MENA (Middle East and North Africa) countries over the period 1996-2018 using the Panel ARDL approach. We found evidence to support an unconditional long run effect of FD on environmental conditions (EC), with quite significant differences between the two groups of countries. While FD leads to environmental degradation (ED) in non-oil-producing countries, it helps protect the environment in oil-producing ones. Regarding the effects of IQ on EC, they are not significant in both short- and long run for non-oil-producing countries, but they are significant for oil-producing ones only in the long run. In the short run, IQ indicators haven’t significant effects on EC for the two groups of countries.

Keywords: financial development, institutional quality, environmental conditions, Panel ARDL

Procedia PDF Downloads 55
5557 Software-Defined Networks in Utility Power Networks

Authors: Ava Salmanpour, Hanieh Saeedi, Payam Rouhi, Elahe Hamzeil, Shima Alimohammadi, Siamak Hossein Khalaj, Mohammad Asadian

Abstract:

Software-defined network (SDN) is a network architecture designed to control network using software application in a central manner. This ability enables remote control of the whole network regardless of the network technology. In fact, in this architecture network intelligence is separated from physical infrastructure, it means that required network components can be implemented virtually using software applications. Today, power networks are characterized by a high range of complexity with a large number of intelligent devices, processing both huge amounts of data and important information. Therefore, reliable and secure communication networks are required. SDNs are the best choice to meet this issue. In this paper, SDN networks capabilities and characteristics will be reviewed and different basic controllers will be compared. The importance of using SDNs to escalate efficiency and reliability in utility power networks is going to be discussed and the comparison between the SDN-based power networks and traditional networks will be explained.

Keywords: software-defined network, SDNs, utility network, open flow, communication, gas and electricity, controller

Procedia PDF Downloads 83
5556 US Foreign Aids and Its Institutional and Non-Institutional Impacts in the Middle East, Africa, Southeast Asia, and Latin America (2000 - 2020)

Authors: Mahdi Fakheri, Mohammad Mohsen Mahdizadeh Naeini

Abstract:

This paper addresses an understudied aspect of U.S. foreign aids between the years 2000 and 2020. Despite a growing body of literature on the impacts of U.S. aids, the question about how the United States uses its foreign aids to change developing countries has remained unanswered. As foreign aid is a tool of the United States' foreign policy, answering this very question can reveal the future that the U.S. prefers for developing countries and that secures its national interest. This paper will explore USAID's official dataset, which includes the data of foreign aids to the Middle East, Africa, Latin America, and Southeast Asia from 2000 to 2020. Through an empirical analysis, this paper argues that the focus of U.S. foreign aid is evenly divided between institutional and non-institutional (i.e., slight enhancement of status quo) changes. The former is induced by training and education, funding the initiatives and projects, making capacity and increasing the efficiency of human, operational, and management sectors, and enhancing the living condition of the people. Moreover, it will be demonstrated that the political, military, cultural, economic, and judicial are some of the institutions that the U.S. has planned to change in the aforementioned period and regions.

Keywords: USAID, foreign aid, development, developing countries, Middle East, Africa, Southeast Asia, Latin America

Procedia PDF Downloads 164
5555 Decision-Making in Higher Education: Case Studies Demonstrating the Value of Institutional Effectiveness Tools

Authors: Carolinda Douglass

Abstract:

Institutional Effectiveness (IE) is the purposeful integration of functions that foster student success and support institutional performance. IE is growing rapidly within higher education as it is increasingly viewed by higher education administrators as a beneficial approach for promoting data-informed decision-making in campus-wide strategic planning and execution of strategic initiatives. Specific IE tools, including, but not limited to, project management; impactful collaboration and communication; commitment to continuous quality improvement; and accountability through rigorous evaluation; are gaining momentum under the auspices of IE. This research utilizes a case study approach to examine the use of these IE tools, highlight successes of this use, and identify areas for improvement in the implementation of IE tools within higher education. The research includes three case studies: (1) improving upon academic program review processes including the assessment of student learning outcomes as a core component of program quality; (2) revising an institutional vision, mission, and core values; and (3) successfully navigating an institution-wide re-accreditation process. Several methods of data collection are embedded within the case studies, including surveys, focus groups, interviews, and document analyses. Subjects of these methods include higher education administrators, faculty, and staff. Key findings from the research include areas of success and areas for improvement in the use of IE tools associated with specific case studies as well as aggregated results across case studies. For example, the use of case management proved useful in all of the case studies, while rigorous evaluation did not uniformly provide the value-added that was expected by higher education decision-makers. The use of multiple IE tools was shown to be consistently useful in decision-making when applied with appropriate awareness of and sensitivity to core institutional culture (for example, institutional mission, local environments and communities, disciplinary distinctions, and labor relations). As IE gains a stronger foothold in higher education, leaders in higher education can make judicious use of IE tools to promote better decision-making and secure improved outcomes of strategic planning and the execution of strategic initiatives.

Keywords: accreditation, data-informed decision-making, higher education management, institutional effectiveness tools, institutional mission, program review, strategic planning

Procedia PDF Downloads 92
5554 Competition in Kenya: The Legal and Institutional Framework and an Appraisal of Key Market Players

Authors: Edwin Njoroge Kimani, Alan M. Munyao

Abstract:

Despite Kenya’s status as a regional economic powerhouse, it struggles with economic shocks that expose the consumers. This, however, seems not to affect major cooperates such as those in the telecommunication and energy sectors. Through their operations, they have not only been able to fluctuate prices at will but also they have been accused of curtailing their rivals from penetrating the market. This study, through literature review of the legal and institutional framework, reports and publications interrogates the law and uncovers the following; i) failings of the legal framework to define market dominance and abuse of such positions, ii) the participation of the state, iii) the inertia of the government to prosecute corporations that abuse their market dominance, iv) the role of the state as a market player and as a regulator through the Competition Authority of Kenya. This study concludes that the market distortion is as a result of weak legal and institutional framework as well as conflict of interest by the government. Not much has been researched in the field of competition law the greater East Africa. This research is intended to form part of the growing research in the field and inform legal reform.

Keywords: competition law, economic power, dominance, Kenya

Procedia PDF Downloads 186
5553 Data Clustering in Wireless Sensor Network Implemented on Self-Organization Feature Map (SOFM) Neural Network

Authors: Krishan Kumar, Mohit Mittal, Pramod Kumar

Abstract:

Wireless sensor network is one of the most promising communication networks for monitoring remote environmental areas. In this network, all the sensor nodes are communicated with each other via radio signals. The sensor nodes have capability of sensing, data storage and processing. The sensor nodes collect the information through neighboring nodes to particular node. The data collection and processing is done by data aggregation techniques. For the data aggregation in sensor network, clustering technique is implemented in the sensor network by implementing self-organizing feature map (SOFM) neural network. Some of the sensor nodes are selected as cluster head nodes. The information aggregated to cluster head nodes from non-cluster head nodes and then this information is transferred to base station (or sink nodes). The aim of this paper is to manage the huge amount of data with the help of SOM neural network. Clustered data is selected to transfer to base station instead of whole information aggregated at cluster head nodes. This reduces the battery consumption over the huge data management. The network lifetime is enhanced at a greater extent.

Keywords: artificial neural network, data clustering, self organization feature map, wireless sensor network

Procedia PDF Downloads 487
5552 Design and Implementation of a Cross-Network Security Management System

Authors: Zhiyong Shan, Preethi Santhanam, Vinod Namboodiri, Rajiv Bagai

Abstract:

In recent years, the emerging network worms and attacks have distributive characteristics, which can spread globally in a very short time. Security management crossing networks to co-defense network-wide attacks and improve the efficiency of security administration is urgently needed. We propose a hierarchical distributed network security management system (HD-NSMS), which can integrate security management across multiple networks. First, we describe the system in macrostructure and microstructure; then discuss three key problems when building HD-NSMS: device model, alert mechanism, and emergency response mechanism; lastly, we describe the implementation of HD-NSMS. The paper is valuable for implementing NSMS in that it derives from a practical network security management system (NSMS).

Keywords: network security management, device organization, emergency response, cross-network

Procedia PDF Downloads 136
5551 Generalization of Clustering Coefficient on Lattice Networks Applied to Criminal Networks

Authors: Christian H. Sanabria-Montaña, Rodrigo Huerta-Quintanilla

Abstract:

A lattice network is a special type of network in which all nodes have the same number of links, and its boundary conditions are periodic. The most basic lattice network is the ring, a one-dimensional network with periodic border conditions. In contrast, the Cartesian product of d rings forms a d-dimensional lattice network. An analytical expression currently exists for the clustering coefficient in this type of network, but the theoretical value is valid only up to certain connectivity value; in other words, the analytical expression is incomplete. Here we obtain analytically the clustering coefficient expression in d-dimensional lattice networks for any link density. Our analytical results show that the clustering coefficient for a lattice network with density of links that tend to 1, leads to the value of the clustering coefficient of a fully connected network. We developed a model on criminology in which the generalized clustering coefficient expression is applied. The model states that delinquents learn the know-how of crime business by sharing knowledge, directly or indirectly, with their friends of the gang. This generalization shed light on the network properties, which is important to develop new models in different fields where network structure plays an important role in the system dynamic, such as criminology, evolutionary game theory, econophysics, among others.

Keywords: clustering coefficient, criminology, generalized, regular network d-dimensional

Procedia PDF Downloads 380
5550 Retaining Users in a Commercially-Supported Social Network

Authors: Sasiphan Nitayaprapha

Abstract:

A commercially-supported social network has become an emerging channel for an organization to communicate with and provide services to customers. The success of the commercially-supported social network depends on the ability of the organization to keep the customers in participating in the network. Drawing from the theories of information adoption, information systems continuance, and web usability, the author develops a model to explore how a commercially-supported social network can encourage customers to continue participating and using the information in the network. The theoretical model will be proved through an online survey of customers using the commercially-supported social networking sites of several high technology companies operating in the same sector. The result will be compared with previous studies to learn about the explanatory power of the research model, and to identify the main factors determining users’ intention to continue using a commercially-supported social network. Theoretical and practical implications, and limitations are discussed.

Keywords: social network, information adoption, information systems continuance, web usability, user satisfaction

Procedia PDF Downloads 291
5549 Study of Relation between Corporate Governance Mechanism and Investment Decisions Made by Companies Listed in Tehran Stock Exchange- IRAN

Authors: Roohollah Jamshidpour, Elaheh Ahmadi, Farhad Shah Veisi

Abstract:

Present research seeks to answer this question: Is there any relationship between corporate governance mechanisms and decision on corporate investments? Percentages of institutional, board of director’s, and stockholder’s ownership are among internal mechanisms of corporate governance relationship of which with investment-based decisions are studied by this research. Information on 103 companies during 1388 (2009)- 1393 (2014). Initially, research variables are identified; next, Rah Avard-e Novin software is used to gather Information. SPSS software is employed to test hypotheses with respect to descriptive and inferential statistics like correlation analysis. Research results show that percentage of institutional stockholders’ ownership has a significant direct relationship with investment decisions. For other cases, no significant relationship is observed between corporate governance mechanisms and investment decisions.

Keywords: corporate governance, company size, free floating stock, institutional investors, major shareholders

Procedia PDF Downloads 263