41,731 research outputs found

    Resourceful leadership: how directors of children’s services improve outcomes in early intervention and prevention: summary report

    Get PDF
    This targeted report has been published alongside a longer report, "Resourceful leadership: how directors of children’s services improve outcomes for children.

    Transmission losses cost allocation in restructed electricity market environment

    Get PDF
    During these recent decades, the restructuring system of electricity market has been taken places around the whole world. Due to the restructuring (deregulation), the electrical power system has been divided into three separates categories according to the function. First stage of power system is the generation companies (GENCOs), followed by transmission companies (TRANSCOs) and distribution companies (DISCOs). The competitive environment will be handling by a non-profit entity, independent system operator (ISO) that functioning as the system securities that have to make sure that the power system continues to operate in a stable and economical manner. However, restructuring system can give effect during the energy transmission. One of the transmission issues is regarding the power losses. To overcome the losses, generators must generate more power. The issue regarding the transmission losses in deregulated system is how to allocate it to the user and charge them in fair ways as in for instance the pool trading model, it is hard to trace the power contribution and losses of each user in transmission line. In addition, the users didn’t want to pay the losses, it means that the ISO have to responsible for the losses and it will be unfair to put the responsible to ISO alone. Therefore, in this project, the allocation of transmission losses and loss cost methods which are the pro-rata and proportional sharing method will be investigated. Comparison between those methods will be done in order to identify which types of method that reflect an efficient and fair way to distribute the cost of the transmission losses to the user. These chosen methods will be tested on IEEE bus system

    Internet of things security implementation using blockchain for wireless technology

    Get PDF
    Blockchain is a new security system which group many data into a block or so called classifying the data into a block. The block can have many types and each of them content data and security code. By using a decentralize mechanism, one security code protect all the data. That could happen at the server. In this research, a network of wireless sensor technology is proposed. The transmission of sensor data is via the Internet of things (Internet of Thing) technology. As many data transmitted, they have to classified and group them into a block. All the blocks are then send to the central processing unit, like a microcontroller. The block of data is then processed, identified and encrypted before send over the internet network. At the receiver, a GUI or Apps is developed to open and view the data. The Apps or GUI have an encrypted data or security code. User must key in the password before they can view the data. The password used by the end user at the Apps or GUI must be equivalent to the one encrypted at the sensor nodes. This is to satisfy the decentralized concept used in the Blockchain. To demonstrate the Blockchain technology applied to the wireless sensor network, a MATLAB Simulink function is used. The expected results should show a number of block of data in cryptography manner and chain together. The two set of data. Both have the data encrypted using hash. The black dots indicate the data has been encrypted whereas the white dot indicate indicates the data is not encrypted. The half white and half black indicates the data is in progress of encrypted. All this data should arrange in cryptography order and chain together in a vertical line. A protocol called block and chain group the data into the block and then chain then. The data appears in the blocks and send over the network. As seen in the simulation results, the yellow color represents the user data. This data has a default amplitude as 1 or 5. The data is chained and blocked to produce the Blockchain waveform Keywords: Blockchain, Internet of things, Wireless Sensor Network and MATLAB Simulin

    In search of ‘lost’ knowledge and outsourced expertise in flood risk management

    Get PDF
    This paper examines the parallel discourses of ‘lost’ local flood expertise and the growing use of commercial consultancies to outsource aspects of flood risk work. We critically examine the various claims and counter-claims about lost, local and external expertise in flood management, focusing on the aftermath of the 2007 floods in East Yorkshire, England. Drawing on interviews with consultants, drainage engineers and others, we caution against claims that privilege ‘local’ floods knowledge as ‘good’ and expert knowledge as somehow suspect. This paper urges carefulness in interpreting claims about local knowledge, arguing that it is important always to think instead of hybrid knowledge formations. We conclude by arguing that experiments in the co-production of flood risk knowledge need to be seen as part of a spectrum of ways for producing shared knowledge

    The Global Networked Value Circle: A new model for best-in-class manufacturing

    Get PDF
    As companies face deflation, slowing production and declining prices, they will need to assess their entire value chain as they look for ways to keep costs low and improve efficiencies while continuing to innovate. To help address this challenge, this report reflects fresh research undertaken by Capgemini in collaboration with the University of Edinburgh into the ?Best-in-Class Global Manufacturing Value Chain?

    Systematizing Genome Privacy Research: A Privacy-Enhancing Technologies Perspective

    Full text link
    Rapid advances in human genomics are enabling researchers to gain a better understanding of the role of the genome in our health and well-being, stimulating hope for more effective and cost efficient healthcare. However, this also prompts a number of security and privacy concerns stemming from the distinctive characteristics of genomic data. To address them, a new research community has emerged and produced a large number of publications and initiatives. In this paper, we rely on a structured methodology to contextualize and provide a critical analysis of the current knowledge on privacy-enhancing technologies used for testing, storing, and sharing genomic data, using a representative sample of the work published in the past decade. We identify and discuss limitations, technical challenges, and issues faced by the community, focusing in particular on those that are inherently tied to the nature of the problem and are harder for the community alone to address. Finally, we report on the importance and difficulty of the identified challenges based on an online survey of genome data privacy expertsComment: To appear in the Proceedings on Privacy Enhancing Technologies (PoPETs), Vol. 2019, Issue

    Outsourcing Back Office Services in Small Nonprofits: Pitfalls and Possibilities

    Get PDF
    Presents findings on small nonprofits' administrative, finance, and other office support needs; reasons and conditions for outsourcing as well as barriers; methods for evaluating options; and guiding principles. Examines three business models
    • …
    corecore