560 research outputs found

    Uncertainty principle versus clinical equipoise in clinical trials in sub –Saharan Africa: are they really tenable?

    Get PDF
    The argument for ‘evidence based medical practice' is compelling and the ideal protocol of randomized controlled studies to obtain higher level evidence is equally sound. However, some peculiarities of African countries make the conduct of standard control trials difficult and raise some serious ethical questions over claims of good trial practices. It may be difficult to apply the uncertainty principle or clinical equipoise as moral underpins for randomization in clinical trials in Africa. A ‘social contract' argument may be a useful alternative. Keywords: Clinical trials, Sub Saharan Africa Annals of African Medicine Vol.2(2) 2003: 99-10

    THE ROLE OF GOLD PRICES, EXCHANGE RATE AND INTEREST RATE ON THE CONTINUITY OF INFLATION IN PAKISTAN

    Get PDF
    In this paper we investigated the role of gold prices, interestrate and exchange rate against inflation in Pakistan both in the longand the short run, utilizing time series data over the period of 1975-2013 under the Johansen co-integration and vector error correctionspecifications. The results suggest that gold prices and interest rateare significantly positively related with inflation in the long run inthe case of Pakistan, indicating that a rise in gold prices and interestwill result in increase in inflation in Pakistan. Whereas exchangerate is found to be insignificant to impact inflation over the length ofthis study. However exchange rate is found to have significantly andnegatively associated with inflation in the short run. That means thatappreciation in rupee (PKR) will result in decrease in inflation andvice versa

    The Mediating Roles Of Ethical Practices In The Relationship Quality And Cost Performance Of Multifarious Infrastructure Projects In Northern Region Of Nigeria

    Get PDF
    The construction industry has been associated with deteriorated and adversarial working relationship among supply chain partners. This has been reported to affect the industry performance in terms of cost. In other word, projects attained significant cost performance through working relationships of the supply chain (SC) partners in construction. This study aimed at developing a model for the mediation role of ethical practice on a relationship between relationships quality (RQ) and cost performance of Multifarious Infrastructure Projects (MIPs) in Nigeria. Four main attributes of RQ were identified from extent literature as trust, commitment, teamwork and performance satisfaction (PS). The study introduced ethical practice as a mediating construct with two-dimensional measure as pre-contract ethical practice (PreCEP) and post-contract ethical practice (PoCEP) to mediate the relationship between RQ as the independent variable (IV) and cost performance (CP) as the dependent variable (DV). Using purposive non-probability sampling technique, 289 valid quantitative sample data were collected. The study focused on key informants such as directors and managers within several organizations involved on multifarious infrastructure projects (MIPs) in Nigeria

    A pragmatic approach toward securing inter-domain routing

    Get PDF
    Internet security poses complex challenges at different levels, where even the basic requirement of availability of Internet connectivity becomes a conundrum sometimes. Recent Internet service disruption events have made the vulnerability of the Internet apparent, and exposed the current limitations of Internet security measures as well. Usually, the main cause of such incidents, even in the presence of the security measures proposed so far, is the unintended or intended exploitation of the loop holes in the protocols that govern the Internet. In this thesis, we focus on the security of two different protocols that were conceived with little or no security mechanisms but play a key role both in the present and the future of the Internet, namely the Border Gateway Protocol (BGP) and the Locator Identifier Separation Protocol (LISP). The BGP protocol, being the de-facto inter-domain routing protocol in the Internet, plays a crucial role in current communications. Due to lack of any intrinsic security mechanism, it is prone to a number of vulnerabilities that can result in partial paralysis of the Internet. In light of this, numerous security strategies were proposed but none of them were pragmatic enough to be widely accepted and only minor security tweaks have found the pathway to be adopted. Even the recent IETF Secure Inter-Domain Routing (SIDR) Working Group (WG) efforts including, the Resource Public Key Infrastructure (RPKI), Route Origin authorizations (ROAs), and BGP Security (BGPSEC) do not address the policy related security issues, such as Route Leaks (RL). Route leaks occur due to violation of the export routing policies among the Autonomous Systems (ASes). Route leaks not only have the potential to cause large scale Internet service disruptions but can result in traffic hijacking as well. In this part of the thesis, we examine the route leak problem and propose pragmatic security methodologies which a) require no changes to the BGP protocol, b) are neither dependent on third party information nor on third party security infrastructure, and c) are self-beneficial regardless of their adoption by other players. Our main contributions in this part of the thesis include a) a theoretical framework, which, under realistic assumptions, enables a domain to autonomously determine if a particular received route advertisement corresponds to a route leak, and b) three incremental detection techniques, namely Cross-Path (CP), Benign Fool Back (BFB), and Reverse Benign Fool Back (R-BFB). Our strength resides in the fact that these detection techniques solely require the analytical usage of in-house control-plane, data-plane and direct neighbor relationships information. We evaluate the performance of the three proposed route leak detection techniques both through real-time experiments as well as using simulations at large scale. Our results show that the proposed detection techniques achieve high success rates for countering route leaks in different scenarios. The motivation behind LISP protocol has shifted over time from solving routing scalability issues in the core Internet to a set of vital use cases for which LISP stands as a technology enabler. The IETF's LISP WG has recently started to work toward securing LISP, but the protocol still lacks end-to-end mechanisms for securing the overall registration process on the mapping system ensuring RLOC authorization and EID authorization. As a result LISP is unprotected against different attacks, such as RLOC spoofing, which can cripple even its basic functionality. For that purpose, in this part of the thesis we address the above mentioned issues and propose practical solutions that counter them. Our solutions take advantage of the low technological inertia of the LISP protocol. The changes proposed for the LISP protocol and the utilization of existing security infrastructure in our solutions enable resource authorizations and lay the foundation for the needed end-to-end security

    TRANSMUTED KUMARASWAMY DISTRIBUTION

    Get PDF
    The Kumaraswamy distribution is the most widely applied statistical distribution in hydrological problems and many natural phenomena. We propose a generalization of the Kumaraswamy distribution referred to as the transmuted Kumaraswamy () distribution. The new transmuted distribution is developed using the quadratic rank transmutation map studied by Shaw et al. (2009). A comprehensive account of the mathematical properties of the new distribution is provided. Explicit expressions are derived for the moments, moment generating function, entropy, mean deviation, Bonferroni and Lorenz curves, and formulated moments for order statistics. The distribution parameters are estimated by using the method of maximum likelihood. Monte Carlo simulation is performed in order to investigate the performance of MLEs. The flood data and HIV/ AIDS data applications illustrate the usefulness of the proposed model
    corecore