102 research outputs found

    Leadership and decision-making practices in public versus private universities in Pakistan

    Get PDF
    The goal of this study is to examine differences in leadership and decision-making practices in public and private universities in Pakistan, with a focus on transformational leadership (TL) and participative decision-making (PDM). We conducted semi-structured interviews with 46 deans and heads of department from two public and two private universities in Pakistan. Our findings indicate that leadership and decision-making practices are different in public and private universities. While differences were observed in all six types of TL-behaviour, the following three approaches emerged to be crucial in both public and private universities: (1) articulating a vision, (2) fostering the acceptance of group goals, and (3) high-performance expectations. In terms of PDM, deans and heads of department in public and private universities adopt a collaborative approach. However, on a practical level this approach is limited to teacher- and student-related matters. Overall, our findings suggest that the leadership and decision-making practices in Pakistani public and private universities are transformational and participative in nature

    Metric-based vs peer-reviewed evaluation of a research output: Lesson learnt from UK’s national research assessment exercise

    Get PDF
    Purpose There is a general inquisition regarding the monetary value of a research output, as a substantial amount of funding in modern academia is essentially awarded to good research presented in the form of journal articles, conferences papers, performances, compositions, exhibitions, books and book chapters etc., which, eventually leads to another question if the value varies across different disciplines. Answers to these questions will not only assist academics and researchers, but will also help higher education institutions (HEIs) make informed decisions in their administrative and research policies. Design and methodology To examine both the questions, we applied the United Kingdom’s recently concluded national research assessment exercise known as the Research Excellence Framework (REF) 2014 as a case study. All the data for this study is sourced from the openly available publications which arose from the digital repositories of REF’s results and HEFCE’s funding allocations. Findings A world leading output earns between £7504 and £14,639 per year within the REF cycle, whereas an internationally excellent output earns between £1876 and £3659, varying according to their area of research. Secondly, an investigation into the impact rating of 25315 journal articles submitted in five areas of research by UK HEIs and their awarded funding revealed a linear relationship between the percentage of quartile-one journal publications and percentage of 4* outputs in Clinical Medicine, Physics and Psychology/Psychiatry/Neuroscience UoAs, and no relationship was found in the Classics and Anthropology/Development Studies UoAs, due to the fact that most publications in the latter two disciplines are not journal articles. Practical implications The findings provide an indication of the monetary value of a research output, from the perspectives of government funding for research, and also what makes a good output, i.e. whether a relationship exists between good quality output and the source of its publication. The findings may also influence future REF submission strategies in HEIs and ascertain that the impact rating of the journals is not necessarily a reflection of the quality of research in every discipline, and this may have a significant influence on the future of scholarly communications in general. Originality According to the author’s knowledge, this is the first time an investigation has estimated the monetary value of a good research output

    Experimental traumatic brain injury

    Get PDF
    Traumatic brain injury, a leading cause of death and disability, is a result of an outside force causing mechanical disruption of brain tissue and delayed pathogenic events which collectively exacerbate the injury. These pathogenic injury processes are poorly understood and accordingly no effective neuroprotective treatment is available so far. Experimental models are essential for further clarification of the highly complex pathology of traumatic brain injury towards the development of novel treatments. Among the rodent models of traumatic brain injury the most commonly used are the weight-drop, the fluid percussion, and the cortical contusion injury models. As the entire spectrum of events that might occur in traumatic brain injury cannot be covered by one single rodent model, the design and choice of a specific model represents a major challenge for neuroscientists. This review summarizes and evaluates the strengths and weaknesses of the currently available rodent models for traumatic brain injury

    Can Non-lytic CD8+T Cells Drive HIV-1 Escape?

    Get PDF
    The CD8+ T cell effector mechanisms that mediate control of HIV-1 and SIV infections remain poorly understood. Recent work suggests that the mechanism may be primarily non-lytic. This is in apparent conflict with the observation that SIV and HIV-1 variants that escape CD8+ T cell surveillance are frequently selected. Whilst it is clear that a variant that has escaped a lytic response can have a fitness advantage compared to the wild-type, it is less obvious that this holds in the face of non-lytic control where both wild-type and variant infected cells would be affected by soluble factors. In particular, the high motility of T cells in lymphoid tissue would be expected to rapidly destroy local effects making selection of escape variants by non-lytic responses unlikely. The observation of frequent HIV-1 and SIV escape poses a number of questions. Most importantly, is the consistent observation of viral escape proof that HIV-1- and SIV-specific CD8+ T cells lyse infected cells or can this also be the result of non-lytic control? Additionally, the rate at which a variant strain escapes a lytic CD8+ T cell response is related to the strength of the response. Is the same relationship true for a non-lytic response? Finally, the potential anti-viral control mediated by non-lytic mechanisms compared to lytic mechanisms is unknown. These questions cannot be addressed with current experimental techniques nor with the standard mathematical models. Instead we have developed a 3D cellular automaton model of HIV-1 which captures spatial and temporal dynamics. The model reproduces in vivo HIV-1 dynamics at the cellular and population level. Using this model we demonstrate that non-lytic effector mechanisms can select for escape variants but that outgrowth of the variant is slower and less frequent than from a lytic response so that non-lytic responses can potentially offer more durable control

    Advances, challenges and future directions for stem cell therapy in amyotrophic lateral sclerosis

    Get PDF
    Amyotrophic lateral sclerosis (ALS) is a rapidly progressive neurodegenerative condition where loss of motor neurons within the brain and spinal cord leads to muscle atrophy, weakness, paralysis and ultimately death within 3–5 years from onset of symptoms. The specific molecular mechanisms underlying the disease pathology are not fully understood and neuroprotective treatment options are minimally effective. In recent years, stem cell transplantation as a new therapy for ALS patients has been extensively investigated, becoming an intense and debated field of study. In several preclinical studies using the SOD1G93A mouse model of ALS, stem cells were demonstrated to be neuroprotective, effectively delayed disease onset and extended survival. Despite substantial improvements in stem cell technology and promising results in preclinical studies, several questions still remain unanswered, such as the identification of the most suitable and beneficial cell source, cell dose, route of delivery and therapeutic mechanisms. This review will cover publications in this field and comprehensively discuss advances, challenges and future direction regarding the therapeutic potential of stem cells in ALS, with a focus on mesenchymal stem cells. In summary, given their high proliferation activity, immunomodulation, multi-differentiation potential, and the capacity to secrete neuroprotective factors, adult mesenchymal stem cells represent a promising candidate for clinical translation. However, technical hurdles such as optimal dose, differentiation state, route of administration, and the underlying potential therapeutic mechanisms still need to be assessed

    Internet of things: where to be is to trust

    Get PDF
    [EN] Networks' creation is getting more and more required, anytime, anywhere. Devices that can participate on these networks can be quite different among them. Sensors, mobiles, home appliances, or other type of devices will have to collaborate to increase and improve the services provided to clients. In the same way, network configuration, security mechanisms establishment, and optimal performance control must be done by them. Some of these devices could have limited resources to work, sometimes even resources restriction not existing, they must work to optimize network traffic. In this article, we center our researching on spontaneous networks. We propose a secure spontaneous ad-hoc network, based on direct peer-to-peer interaction and communities' creation to grant a quick, easy, and secure access to users to surf the Web. Each device will have an identity in the network. Each community will also have an identity and will act as a unity on a world based on Internet connection. Security will be established in the moment they access to the network through the use of the trust chain generated by nodes. Trust is modified by each node on the basis of nodes behaviorLacuesta, R.; Palacios-Navarro, G.; Cetina Englada, C.; Peñalver Herrero, ML.; Lloret, J. (2012). Internet of things: where to be is to trust. EURASIP Journal on Wireless Communications and Networking. (203):1-16. doi:10.1186/1687-1499-2012-203S116203Lipnack J, Stamps J: Virtual Teams: Researching Across Space, Time, and Organizations with Technology. New York: John Wiley and Sons; 1997.Ahuja MK, Carley KN: Network structure in virtual organizations, organization science, Vol. 10, No. 6, Special Issue: Communication Processes for Virtual Organizations, November–December. 1999, 741-757.Mowshowitz A: Virtual organization. Commun ACM 1997, 40(9):30-37. 10.1145/260750.260759Preuß S: CH Cap, Overview of spontaneous networking-evolving concepts and technologies, in Rostocker Informatik-Berichte. Rostock: Fachbereich Informatik der Universit; 2000:113-123.Feeney LM, Ahlgren B, Westerlund A: Spontaneous networking: an application-oriented approach to ad hoc networking. IEEE Commun Mag 2001, 39(6):176-181. 10.1109/35.925687Latvakoski J, Pakkala D, Pääkkönen P: A communication architecture for spontaneous systems. IEEE Wirel Commun 2004, 11(3):36-42. 10.1109/MWC.2004.1308947Mani M, Nguyen A-M, Crespi N: SCOPE: a prototype for spontaneous P2P social networking. Proceedings of 8th IEEE International Conference on Pervasive Computing and Communications Workshops (PERCOM Workshops) 2010, 220-225.Legendre F, de Amorim MD, Fdida S: Implicit merging of overlapping spontaneous networks. Proceedings of Vehicular Technology Conference 2004, 3050-3054.Zarate Silva VH, De Cruz Salgado EI, Ramos Quintana F: AWISPA: an awareness framework for collaborative spontaneous networks. 36th Annual Frontiers in Education Conference 2006, 27-31.Perkins CE, Bhagwat P: Highly dynamic destination sequenced distance-vector routing (DSDV) for mobile computers. Proceedings of the Conference on Communications Architectures, Protocols and Applications (SIGCOMM’94 1994, 234-244.Johnson DB, Maltz DA, Broch J: DSR: The Dynamic Source Routing Protocol for Multihop Wireless Ad Hoc Networks. Boston, MA: Ad Hoc Networking (Addison-Wesley Longman Publishing; 2001.Perkins C, Belding-Royer E, Das S: Ad hoc on-demand distance vector (AODV) routing, RFC 3561. 2003.Park V, Corson MS: IETF MANET Internet Draft “draft-ietf-MANET-tora-spe03.txt”, November 2000. 2012. Accessed March http://tools.ietf.org/html/draft-ietf-manet-tora-spec-03Viana AC, De Amorim MD, Fdida S, de Rezende JF: Self-organization in spontaneous networks: the approach of DHT-based routing protocols. Ad Hoc Networks 2005, 3(5):589-606. 10.1016/j.adhoc.2004.08.006Lacuesta R, Peñalver L: IP addresses configuration in spontaneous networks. In Proceedings of the 9th WSEAS International Conference on Computers. Athens, Greece; 2005:1-6.Alvarez-Hamelin JI, Viana AC, de Amorim M Dias: Architectural considerations for a self-configuring routing scheme for spontaneous networks, Technical Report 1. 2005.Lacuesta R, Peñalver L: Automatic configuration of ad-hoc networks: establishing unique IP link-local addresses. In Proceedings of the International Conference on Emerging Security Information, Systems and Technologies (SECURWARE’07). Valencia, Spain; 2007:157-162.Foulks EF: Social network therapies and society: an overview. Contemp Fam Therapy 1985, 3(4):316-320.IBM: A Smarter Planet. 2012. http://www.ibm.com/smarterplanetMontenegro G, Kushalnagar N, Hui J, Culler D: RFC 4944: Transmission of IPv6 Packets over IEEE 802.15.4 Networks. 2007.Alcaraz C, Najera P, Lopez J, Roman R: Wireless Sensor Networks and the Internet of Things: Do We Need a Complete Integration?, 1st International workshop on the security of The internet of Things (SecIoT). tokyo (Japan); 2010. . Accessed January 2012 1er International Workshop on the Security of The Internet of Things (SecIoT 2010) http://www.nics.uma.es/seciot10/files/pdf/alcaraz_seciot10_paper.pdfFerscha A, Davies N, Schmidt A, Streitz N: Pervasive Socio-Technical Fabric. Procedia Computer Science 2011, 7: 88-91.Hubaux JP, Buttyán L, Capkun S: The quest for security in mobile ad-hoc networks, in Proceedings of the ACM Symposium on Mobile Ad-hoc Networking and Computing. 2001, 146-155.Wang Y, Varadharajan V: Interaction trust evaluation in decentralized environments, e-commerce and web technologies. In Proceedings of 5th International Conference on Electronic Commerce and Web Technologies, vol LNCS 3182. Springer; 2004:144-153.Jimin L, Junbao L, Aiguo A, Zhenpeng L: Two-way trust evaluation based on feedback. in Conference on Logistics Systems and Intelligent Management 2010, 3: 1910-1914.Daskapan S, Nurtanti I, Van den Berg J: Trust algorithms in P2P file sharing networks. Int J Internet Technol Secured Trans 2010, 2(1–2):174-200.Maña A, Koshutanski H, Pérez EJ: A trust negotiation based security framework for service provisioning in load-balancing clusters. Comput Secur 2012, 31(1):4-25. 10.1016/j.cose.2011.11.006Stajano F, Anderson R: The resurrecting duckling security issues for ad-hoc wireless networks. Security Protocols, 7th International Workshop Proceedings, Lecture notes in Computer Science, LNCS 1296 1999, 172-194.Balfanz D, Smetters DK, Stewart P, ChiWong H: Talking to strangers: authentication in ad-hoc wireless networks, in Symposium on Network and Distributed Systems Security (NDSS’02). San Diego, CA; 2002.Capkun S, Hubaux JP, Buttyán L: Mobility helps security in ad-hoc networks. In Proceedings of the 4th ACM international symposium on Mobile ad hoc networking & computing. MD, USA: Annapolis; 2003:46-56.Metzger MJ: Privacy, trust, and disclosure: exploring barriers to electronic commerce. J Comput-Mediat Commun 2004, 9(4). http://jcmc.indiana.edu/vol9/issue4/metzger.html 2004, 9(4)
    corecore