156 resultados para Ward hierarchical scheme


Relevância:

20.00% 20.00%

Publicador:

Resumo:

The likelihood of smallholder farmers not participating in agroforestry agri-environmental schemes and payments for ecosystem services (PES) may be due to limited farmland endowment and formal credit constraints. These deficits may lead to an ‘exclusive club’ of successful farmers, which are not necessarily poor, enjoying the benefits of agri-environmental schemes and PES although agrienvironmental schemes and PES have been devised as a means of fostering rural sustainable development and improving the livelihood of poor smallholder farmers. Smallholder farmers in parts of rural Kenya continue to enroll in ‘The International Small Group Tree Planting Programme’ (TIST), an agri-environmental scheme, promoting agroforestry, carbon sequestration and conservation agriculture (CA). The question remains if these farmers are really poor? This study examines factors that determine the participation of smallholder farmers in TIST in parts of rural Kenya. We use survey data compiled in 2013 on 210 randomly selected smallholder farmers from Embu, Meru and Nanyuki communities; the sample consists of TIST and non-TIST members. A random utility model and logit regression were used to test a set of non-monetary and monetary factors that influence participation in the TIST. The utility function is conceptualized to give non-monetary factors, particularly the common medium of communication in rural areas – formal and informal – a central role. Furthermore, we investigate other factors (incl. credit accessibility and interest rate) that reveal the nature of farmers participating in TIST. The findings suggest that spread of information via formal and informal networks is a major driver of participation in the TIST program. Furthermore, variables such credit constrains, age and labour supply positively correlate with TIST participation, while for education the opposite is true. It is important to mention that these correlations, although somewhat consistent, were all found to be weak. The results indicate that participation in the TIST program is not influenced by farm size; therefore we argue that the TIST scheme is NOT an ‘exclusive club’ comprising wealthy and successful farmers. Older farmers’ being more likely to join the TIST is an argument for their long- rather than widely assumed short-term planning horizon and a new contribution to the literature. Given the importance of poverty alleviation and climate smart agriculture in developing countries, sustainable policy should strengthening the social and human capital as well as informal networks in rural areas. Extension services should effectively communicate benefits to less educated and credit constrained farmers.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Demand Side Management (DSM) plays an important role in Smart Grid. It has large scale access points, massive users, heterogeneous infrastructure and dispersive participants. Moreover, cloud computing which is a service model is characterized by resource on-demand, high reliability and large scale integration and so on and the game theory is a useful tool to the dynamic economic phenomena. In this study, a scheme design of cloud + end technology is proposed to solve technical and economic problems of the DSM. The architecture of cloud + end is designed to solve technical problems in the DSM. In particular, a construct model of cloud + end is presented to solve economic problems in the DSM based on game theories. The proposed method is tested on a DSM cloud + end public service system construction in a city of southern China. The results demonstrate the feasibility of these integrated solutions which can provide a reference for the popularization and application of the DSM in china.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Background
Trials depend on good recruitment and retention, but efforts to improve these have had varying success. This may be due to inadequate understanding of what participants would value in return for taking part. An opportunity arose in one trial to investigate the incentives that might help recruit and retain participants to another.

Aim
To determine what adults value as an incentive for involvement in a trial.

Methods
In the PAL Scheme, employees used a ‘loyalty card’ to monitor their physical activity over 12 weeks. The incentive group (n=199) collected points and received rewards for physical activity (1 minute = 1 point, max: 30 pts/day). A comparator group (n=207) self-monitored their physical activity only. Points could be redeemed as retail vouchers. 17 different incentives were available, from 75 pts (£2.50, a sandwich) to 1800 pts (£60, 1 month gym membership).

Results
148 of the 199 intervention participants used their card at least once, earning a mean of 374 pts. 121 earned sufficient to collect a reward and 76 redeemed points for vouchers but only 48 exchanged the vouchers for rewards. The most popular reward was not that of highest monetary value: two cinema tickets (300 pts, £10).

Conclusions
The value that participants place on a reward might be more important than its monetary value. Some might appreciate receiving the voucher, without spending it. In choosing incentives to boost trial participation, it may help to allow people to choose from a variety of rewards, rather than reimbursing in money.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Wearable devices performing advanced bio-signal analysis algorithms are aimed to foster a revolution in healthcare provision of chronic cardiac diseases. In this context, energy efficiency is of paramount importance, as long-term monitoring must be ensured while relying on a tiny power source. Operating at a scaled supply voltage, just above the threshold voltage, effectively helps in saving substantial energy, but it makes circuits, and especially memories, more prone to errors, threatening the correct execution of algorithms. The use of error detection and correction codes may help to protect the entire memory content, however it incurs in large area and energy overheads which may not be compatible with the tight energy budgets of wearable systems. To cope with this challenge, in this paper we propose to limit the overhead of traditional schemes by selectively detecting and correcting errors only in data highly impacting the end-to-end quality of service of ultra-low power wearable electrocardiogram (ECG) devices. This partition adopts the protection of either significant words or significant bits of each data element, according to the application characteristics (statistical properties of the data in the application buffers), and its impact in determining the output. The proposed heterogeneous error protection scheme in real ECG signals allows substantial energy savings (11% in wearable devices) compared to state-of-the-art approaches, like ECC, in which the whole memory is protected against errors. At the same time, it also results in negligible output quality degradation in the evaluated power spectrum analysis application of ECG signals.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

This paper presents a new encryption scheme implemented at the physical layer of wireless networks employing orthogonal frequency-division multiplexing (OFDM). The new scheme obfuscates the subcarriers by randomly reserving several subcarriers for dummy data and resequences the training symbol by a new secure sequence. Subcarrier obfuscation renders the OFDM transmission more secure and random, while training symbol resequencing protects the entire physical layer packet, but does not affect the normal functions of synchronization and channel estimation of legitimate users while preventing eavesdroppers from performing these functions. The security analysis shows the system is robust to various attacks by analyzing the search space using an exhaustive key search. Our scheme is shown to have a better performance in terms of search space, key rate and complexity in comparison with other OFDM physical layer encryption schemes. The scheme offers options for users to customize the security level and key rate according to the hardware resource. Its low complexity nature also makes the scheme suitable for resource limited devices. Details of practical design considerations are highlighted by applying the approach to an IEEE 802.11 OFDM system case study.