16,617 research outputs found

    Got Technology? The Impact of Computers and Cell-phones on Productivity in a Difficult Business Climate: Evidence from Firms with Female Owners in Kenya

    Get PDF
    Firms in Kenya rely on technologies such as computers, cell-phones, and generators to overcome constraints associated with regulations, infrastructure, security, workforce, corruption, and finance. This study shows that such reliance has significant positive impacts on productivity as measured by value-added per worker, especially for firms with female principal owners. The exogenous component of technology ownership is isolated by using information on the regional presence of missionary schools from Kenya’s colonial past, as well as geographical indicators such as rainfall, changes in forest cover, and average regional elevation. Results indicate that for firms with female owners, technology adoption improves value-added per worker by about 49 percentage points. It is also statistically evident that for such firms, the ownership of technologies such as computers, cell-phones, and generators succeeds in mitigating the costs of business obstacles. For male-owned firms, such patterns are absent.Technology, Computers, Cell-phones, Business Obstacles, Kenya, Firms, Female Owners

    Obstacles to Business, Technology Use, and Firms with Female Principal Owners in Kenya

    Get PDF
    Data on 778 establishments indicates that firms in Kenya rely on technologies such as computers, generators, and cell-phones to conduct operations when regulations, infrastructure, security, workforce, corruption, and finance pose significant hurdles in the business environment. Obstacles related to regulations, security, and workforce, increase the probability of technology ownership, whereas obstacles related to infrastructure in particular, reduces the probability that firms own technology. Results indicate that while all firms rely on technology in the face of regulatory and other obstacles, those with female principal owners experience net effects that are statistically distinct from those experienced by their counterparts. A gender-of-owner disaggregated Oaxaca-Blinder type decomposition of differences in technology ownership indicates that up to 18% of the total gap is unexplained by differences in measurable characteristics between firms that are female-owned and those that are not, suggesting that female-owned firms may own technology to a higher level than is warranted by their observed covariates.Obstacles to Business, Technology, Kenya, Firms, Female Owners

    Electrical power grid network optimisation by evolutionary computing

    Get PDF
    A major factor in the consideration of an electrical power network of the scale of a national grid is the calculation of power flow and in particular, optimal power flow. This paper considers such a network, in which distributed generation is used, and examines how the network can be optimized, in terms of transmission line capacity, in order to obtain optimal or at least high-performing configurations, using multi-objective optimisation by evolutionary computing methods

    On the design of state-of-the-art pseudorandom number generators by means of genetic programming

    Get PDF
    Congress on Evolutionary Computation. Portland, EEUU, 19-23 June 2004The design of pseudorandom number generators by means of evolutionary computation is a classical problem. Today, it has been mostly and better accomplished by means of cellular automata and not many proposals, inside or outside this paradigm could claim to be both robust (passing all the statistical tests, including the most demanding ones) and fast, as is the case of the proposal we present here. Furthermore, for obtaining these generators, we use a radical approach, where our fitness function is not at all based in any measure of randomness, as is frequently the case in the literature, but of nonlinearity. Efficiency is assured by using only very efficient operators (both in hardware and software) and by limiting the number of terminals in the genetic programming implementation

    Concepts for design of an energy management system incorporating dispersed storage and generation

    Get PDF
    New forms of generation based on renewable resources must be managed as part of existing power systems in order to be utilized with maximum effectiveness. Many of these generators are by their very nature dispersed or small, so that they will be connected to the distribution part of the power system. This situation poses new questions of control and protection, and the intermittent nature of some of the energy sources poses problems of scheduling and dispatch. Under the assumption that the general objectives of energy management will remain unchanged, the impact of dispersed storage and generation on some of the specific functions of power system control and its hardware are discussed

    ANCHOR: logically-centralized security for Software-Defined Networks

    Get PDF
    While the centralization of SDN brought advantages such as a faster pace of innovation, it also disrupted some of the natural defenses of traditional architectures against different threats. The literature on SDN has mostly been concerned with the functional side, despite some specific works concerning non-functional properties like 'security' or 'dependability'. Though addressing the latter in an ad-hoc, piecemeal way, may work, it will most likely lead to efficiency and effectiveness problems. We claim that the enforcement of non-functional properties as a pillar of SDN robustness calls for a systemic approach. As a general concept, we propose ANCHOR, a subsystem architecture that promotes the logical centralization of non-functional properties. To show the effectiveness of the concept, we focus on 'security' in this paper: we identify the current security gaps in SDNs and we populate the architecture middleware with the appropriate security mechanisms, in a global and consistent manner. Essential security mechanisms provided by anchor include reliable entropy and resilient pseudo-random generators, and protocols for secure registration and association of SDN devices. We claim and justify in the paper that centralizing such mechanisms is key for their effectiveness, by allowing us to: define and enforce global policies for those properties; reduce the complexity of controllers and forwarding devices; ensure higher levels of robustness for critical services; foster interoperability of the non-functional property enforcement mechanisms; and promote the security and resilience of the architecture itself. We discuss design and implementation aspects, and we prove and evaluate our algorithms and mechanisms, including the formalisation of the main protocols and the verification of their core security properties using the Tamarin prover.Comment: 42 pages, 4 figures, 3 tables, 5 algorithms, 139 reference
    • 

    corecore