16,617 research outputs found
Got Technology? The Impact of Computers and Cell-phones on Productivity in a Difficult Business Climate: Evidence from Firms with Female Owners in Kenya
Firms in Kenya rely on technologies such as computers, cell-phones, and generators to overcome constraints associated with regulations, infrastructure, security, workforce, corruption, and finance. This study shows that such reliance has significant positive impacts on productivity as measured by value-added per worker, especially for firms with female principal owners. The exogenous component of technology ownership is isolated by using information on the regional presence of missionary schools from Kenyaâs colonial past, as well as geographical indicators such as rainfall, changes in forest cover, and average regional elevation. Results indicate that for firms with female owners, technology adoption improves value-added per worker by about 49 percentage points. It is also statistically evident that for such firms, the ownership of technologies such as computers, cell-phones, and generators succeeds in mitigating the costs of business obstacles. For male-owned firms, such patterns are absent.Technology, Computers, Cell-phones, Business Obstacles, Kenya, Firms, Female Owners
Obstacles to Business, Technology Use, and Firms with Female Principal Owners in Kenya
Data on 778 establishments indicates that firms in Kenya rely on technologies such as computers, generators, and cell-phones to conduct operations when regulations, infrastructure, security, workforce, corruption, and finance pose significant hurdles in the business environment. Obstacles related to regulations, security, and workforce, increase the probability of technology ownership, whereas obstacles related to infrastructure in particular, reduces the probability that firms own technology. Results indicate that while all firms rely on technology in the face of regulatory and other obstacles, those with female principal owners experience net effects that are statistically distinct from those experienced by their counterparts. A gender-of-owner disaggregated Oaxaca-Blinder type decomposition of differences in technology ownership indicates that up to 18% of the total gap is unexplained by differences in measurable characteristics between firms that are female-owned and those that are not, suggesting that female-owned firms may own technology to a higher level than is warranted by their observed covariates.Obstacles to Business, Technology, Kenya, Firms, Female Owners
Electrical power grid network optimisation by evolutionary computing
A major factor in the consideration of an electrical power network of the scale of a national grid is the calculation of power flow and in particular, optimal power flow. This paper considers such a network, in which distributed generation is used, and examines how the network can be optimized, in terms of transmission line capacity, in order to obtain optimal or at least high-performing configurations, using multi-objective optimisation by evolutionary computing methods
On the design of state-of-the-art pseudorandom number generators by means of genetic programming
Congress on Evolutionary Computation. Portland, EEUU, 19-23 June 2004The design of pseudorandom number generators by means of evolutionary computation is a classical problem. Today, it has been mostly and better accomplished by means of cellular automata and not many proposals, inside or outside this paradigm could claim to be both robust (passing all the statistical tests, including the most demanding ones) and fast, as is the case of the proposal we present here. Furthermore, for obtaining these generators, we use a radical approach, where our fitness function is not at all based in any measure of randomness, as is frequently the case in the literature, but of nonlinearity. Efficiency is assured by using only very efficient operators (both in hardware and software) and by limiting the number of terminals in the genetic programming implementation
Concepts for design of an energy management system incorporating dispersed storage and generation
New forms of generation based on renewable resources must be managed as part of existing power systems in order to be utilized with maximum effectiveness. Many of these generators are by their very nature dispersed or small, so that they will be connected to the distribution part of the power system. This situation poses new questions of control and protection, and the intermittent nature of some of the energy sources poses problems of scheduling and dispatch. Under the assumption that the general objectives of energy management will remain unchanged, the impact of dispersed storage and generation on some of the specific functions of power system control and its hardware are discussed
ANCHOR: logically-centralized security for Software-Defined Networks
While the centralization of SDN brought advantages such as a faster pace of
innovation, it also disrupted some of the natural defenses of traditional
architectures against different threats. The literature on SDN has mostly been
concerned with the functional side, despite some specific works concerning
non-functional properties like 'security' or 'dependability'. Though addressing
the latter in an ad-hoc, piecemeal way, may work, it will most likely lead to
efficiency and effectiveness problems. We claim that the enforcement of
non-functional properties as a pillar of SDN robustness calls for a systemic
approach. As a general concept, we propose ANCHOR, a subsystem architecture
that promotes the logical centralization of non-functional properties. To show
the effectiveness of the concept, we focus on 'security' in this paper: we
identify the current security gaps in SDNs and we populate the architecture
middleware with the appropriate security mechanisms, in a global and consistent
manner. Essential security mechanisms provided by anchor include reliable
entropy and resilient pseudo-random generators, and protocols for secure
registration and association of SDN devices. We claim and justify in the paper
that centralizing such mechanisms is key for their effectiveness, by allowing
us to: define and enforce global policies for those properties; reduce the
complexity of controllers and forwarding devices; ensure higher levels of
robustness for critical services; foster interoperability of the non-functional
property enforcement mechanisms; and promote the security and resilience of the
architecture itself. We discuss design and implementation aspects, and we prove
and evaluate our algorithms and mechanisms, including the formalisation of the
main protocols and the verification of their core security properties using the
Tamarin prover.Comment: 42 pages, 4 figures, 3 tables, 5 algorithms, 139 reference
- âŠ