7,722 research outputs found
Developmental Evaluation in Practice: Lessons from Evaluating a Market-Based Employment Initiative
Developmental evaluation (DE) has emerged as an approach that is well suited to evaluating innovative early-stage or market-based initiatives that address complex social issues. However, because DE theory and practice are still evolving, there are relatively few examples of its implementation on the ground. This paper reviews the practical experience of a monitoring and evaluation (M&E) team in conducting a developmental evaluation of a Rockefeller Foundation initiative in the field of digital employment for young people, and offers observations and advice on applying developmental evaluation in practice.Through its work with The Rockefeller Foundation's team and its grantees, the M&E team drew lessons relating to context, intentional learning, tools and processes, trust and communication, and adaption associated with developmental evaluation. It was found that success depends on commissioning a highly qualified DE team with interpersonal and communication skills and, whenever possible, some sectoral knowledge. The paper also offers responses to three major criticisms frequently leveled against developmental evaluation, namely that it displaces other types of evaluations, is too focused on "soft" methods and indicators, and downplays accountability.Through its reporting of lessons learned and its response to the challenges and shortcomings of developmental evaluation, the M&E team makes the case for including developmental evaluation as a tool for the evaluation toolbox, recommending that it be employed across a wide range of geographies and sectors. With its recommendation, it calls for future undertakings to experiment with new combinations of methods within the DE framework to strengthen its causal, quantitative, and accountability dimensions
Assessing Market-Based Solutions: Lessons from Evaluating a Youth Employment Initiative
Over the last few years, The Rockefeller Foundation – working with other funders, industry associations, governments and networks – has supported a portfolio of grantees to test a range of models for training, employing, and supporting low-income youth to carry out digital work. The Foundation funded an evaluation for its work in digital employment and the experience from the initial phase - which focused on impact sourcingprovided instrumental lessons on how one might think about assessing youth digital employment programs that embed market-based approaches
Three Dimensional Loop Quantum Gravity: Particles and the Quantum Double
It is well known that the quantum double structure plays an important role in
three dimensional quantum gravity coupled to matter field. In this paper, we
show how this algebraic structure emerges in the context of three dimensional
Riemannian loop quantum gravity (LQG) coupled to a finite number of massive
spinless point particles. In LQG, physical states are usually constructed from
the notion of SU(2) cylindrical functions on a Riemann surface and the
Hilbert structure is defined by the Ashtekar-Lewandowski measure. In the case
where is the sphere , we show that the physical Hilbert space is
in fact isomorphic to a tensor product of simple unitary representations of the
Drinfeld double DSU(2): the masses of the particles label the simple
representations, the physical states are tensor products of vectors of simple
representations and the physical scalar product is given by intertwining
coefficients between simple representations. This result is generalized to the
case of any Riemann surface .Comment: 36 pages, published in Jour. Math. Physic
Continuous saline bladder irrigation for two hours following transurethral resection of bladder tumors in patients with non-muscle invasive bladder cancer does not prevent recurrence or progression compared with intravesical Mitomycin-C.
BackgroundIntravesical Mitomycin-C (MMC) following transurethral resection of bladder tumor (TURBT), while efficacious, is associated with side effects and poor utilization. Continuous saline bladder irrigation (CSBI) has been examined as an alternative. In this study we sought to compare the rates of recurrence and/or progression in patients with NMIBC who were treated with either MMC or CSBI after TURBT.MethodsWe retrospectively reviewed records of patients with NMIBC at our institution in 2012-2015. Perioperative use of MMC (40 mg in 20 mL), CSBI (two hours), or neither were recorded. Primary outcome was time to recurrence or progression. Descriptive statistics, chi-squared analysis, Kaplan-Meier survival analysis, and Cox multivariable regression analyses were performed.Results205 patients met inclusion criteria. Forty-five (22.0%) patients received CSBI, 71 (34.6%) received MMC, and 89 (43.4%) received no perioperative therapy. On survival analysis, MMC was associated with improved DFS compared with CSBI (p = 0.001) and no treatment (p = 0.0009). On multivariable analysis, high risk disease was associated with increased risk of recurrence or progression (HR 2.77, 95% CI: 1.28-6.01), whereas adjuvant therapy (HR 0.35, 95% CI: 0.20-0.59) and MMC (HR 0.43, 95% CI: 0.25-0.75) were associated with decreased risk.ConclusionsPostoperative MMC was associated with improved DFS compared with CSBI and no treatment. The DFS benefit seen with CSBI in other studies may be limited to patients receiving prolonged irrigation. New intravesical agents being evaluated may consider saline as a control given our data demonstrating that short-term CSBI is not superior to TURBT alone
Assessment of risks in conditions of provision of security of economic activities of organizations
The study of the evolution of the economic security of the business entity has shown that at the present stage of economic development it is important to consider the factors of influence on economic security, in particular: the effectiveness of management, personnel and financial safety, a strategic approach to the functioning of the communication system of protection, taking into account the evolution of security and active search for innovative modern domains of development of industrial organizations and increase of the responsibility of performers for the consequences of their work. This allows to reduce the risk of loss of economic safety of the business entity. It was argued that innovative conceptualization of risk as a probable threat of losses lies within the scope of activity of managers of various units and has features of probable economic and objective-subjective nature, as well as a wide range of variability of the impact on the issues of economic safety and is conditioned by the dynamic development of important societal significant economic processes at the global and national levels, which ultimately contributes to enhancement of the organization’s competitive advantages
AeGAN: Time-Frequency Speech Denoising via Generative Adversarial Networks
Automatic speech recognition (ASR) systems are of vital importance nowadays
in commonplace tasks such as speech-to-text processing and language
translation. This created the need for an ASR system that can operate in
realistic crowded environments. Thus, speech enhancement is a valuable building
block in ASR systems and other applications such as hearing aids, smartphones
and teleconferencing systems. In this paper, a generative adversarial network
(GAN) based framework is investigated for the task of speech enhancement, more
specifically speech denoising of audio tracks. A new architecture based on
CasNet generator and an additional feature-based loss are incorporated to get
realistically denoised speech phonetics. Finally, the proposed framework is
shown to outperform other learning and traditional model-based speech
enhancement approaches.Comment: 5 pages, 4 figures and 2 Tables. Accepted in EUSIPCO 202
Self-learning Kinetic Monte-Carlo method: application to Cu(111)
We present a novel way of performing kinetic Monte Carlo simulations which
does not require an {\it a priori} list of diffusion processes and their
associated energetics and reaction rates.
Rather, at any time during the simulation, energetics for all possible
(single or multi-atom) processes, within a specific interaction range, are
either computed accurately using a saddle point search procedure, or retrieved
from a database in which previously encountered processes are stored. This
self-learning procedure enhances the speed of the simulations along with a
substantial gain in reliability because of the inclusion of many-particle
processes.
Accompanying results from the application of the method to the case of
two-dimensional Cu adatom-cluster diffusion and coalescence on Cu(111) with
detailed statistics of involved atomistic processes and contributing diffusion
coefficients attest to the suitability of the method for the purpose.Comment: 18 pages, 9 figure
A comparative experimental design and performance analysis of Snort-based Intrusion Detection System in practical computer networks
As one of the most reliable technologies, network intrusion detection system (NIDS) allows the monitoring of incoming and outgoing traffic to identify unauthorised usage and mishandling of attackers in computer network systems. To this extent, this paper investigates the experimental performance of Snort-based NIDS (S-NIDS) in a practical network with the latest technology in various network scenarios including high data speed and/or heavy traffic and/or large packet size. An effective testbed is designed based on Snort using different muti-core processors, e.g., i5 and i7, with different operating systems, e.g., Windows 7, Windows Server and Linux. Furthermore, considering an enterprise network consisting of multiple virtual local area networks (VLANs), a centralised parallel S-NIDS (CPS-NIDS) is proposed with the support of a centralised database server to deal with high data speed and heavy traffic. Experimental evaluation is carried out for each network configuration to evaluate the performance of the S-NIDS in different network scenarios as well as validating the effectiveness of the proposed CPS-NIDS. In particular, by analysing packet analysis efficiency, an improved performance of up to 10% is shown to be achieved with Linux over other operating systems, while up to 8% of improved performance can be achieved with i7 over i5 processors
- …