6 resultados para Adoption of IFRS
em Digital Commons - Michigan Tech
Resumo:
Indoor air pollution from combustion of solid fuels is the fifth leading contributor to disease burden in low-income countries. This, and potential to reduce environmental impacts, has resulted in emphasis on use of improved stoves. However, many efforts have failed to meet expectations and effective coverage remains limited. A disconnect exists between technologies, delivery methods, and long-term adoption. The purpose of this research is to develop a framework to increase long-term success of improved stove projects. The framework integrates sustainability factors into the project life-cycle. It is represented as a matrix and checklist which encourages consideration of social, economic, and environmental issues in projects. A case study was conducted in which an improved stove project in Honduras was evaluated using the framework. Results indicated areas of strength and weakness in project execution and highlighted potential improvements for future projects. The framework is also useful as a guide during project planning.
Resumo:
This thesis attempts to understand why people adopt or reject individual-use renewable energy technologies (IURET). I used factors from Everett Rogers' Diffusion of Innovation Theory to understand how people's perceptions towards the characteristics of a given IURET (such as price, compatibility, complexity, etc.), the characteristics of the individual adopter (such as innovativeness and environmental awareness), and the communication network (inter-personal communications and mass media) can influence adoption. An online questionnaire was sent to 101randomly selected Michigan households (using random digit dialing) to ask people whether or not they had adopted at least one IURET and to assess the above-mentioned factors from Rogers' theory. Data analysis was then conducted in SPSS using Chi-squared and binary logistic regression to determine the relationship between adoption behaviors (the dependent variable) and the factors from Rogers' theory (the independent variables) while controlling for education. The results show that Rogers' factors of price and observability and the control variable of education were all significant in explaining adoption but the other factors of Rogers' theory were not. For example, if individuals perceive the price of IURET to be reasonable or if they observe their neighbors using these technologies, then they are more likely to adopt. These results indicate that, if we want to promote greater adoption of IURET, we should focus our efforts on making the price of IURET more affordable through incentives and other mechanisms. Adopters should also be given some form of reward if they provide free demonstrations of their IURET in use to their neighbors to take advantage of the observability effects.
Resumo:
In Panama, one of the Environmental Health (EH) Sector’s primary goals is to improve the health of rural Panamanians by helping them to adopt behaviors and practices that improve access to and use of sanitation systems. In complying with this goal, the EH sector has used participatory development models to improve hygiene and increase access to latrines through volunteer managed latrine construction projects. Unfortunately, there is little understanding of the long term sustainability of these interventions after the volunteers have completed their service. With the Peace Corps adapting their Monitoring, Reporting, and Evaluation procedures, it is appropriate to evaluate the sustainability of sanitation interventions offering recommendations for the adaptions of the EH training program, project management, and evaluation procedures. Recognizing the need for evaluation of past latrine projects, the author performed a post project assessment of 19 pit latrine projects using participatory analysis methodologies. First, the author reviewed volunteers’ perspectives of pit latrine projects in a survey. Then, for comparison, the author performed a survey of latrine projects using a benchmarking scoring system to rate solid waste management, drainage, latrine siting, latrine condition, and hygiene. It was observed that the Sanitation WASH matrix created by the author was an effective tool for evaluating the efficacy of sanitation interventions. Overall more than 75%, of latrines constructed were in use. However, there were some areas where improvements could be made for both latrine construction and health and hygiene. The latrines scored poorly on the indicators related to the privacy structure and seat covers. Interestingly those are the two items least likely to be included in project subsidies. Furthermore, scores for hygiene-related indicators were low; particularly those related to hand washing and cleanliness of the kitchen, indicating potential for improvement in hygiene education. Based on these outcomes, the EH sector should consider including subsidies and standardized designs for privacy structures and seat covers for latrines. In addition, the universal adoption of contracts and/or deposits for project beneficiaries is expected to improve the completion of latrines. In order to address the low scores in the health and hygiene indicators, the EH sector should adapt volunteer training, in addition to standardizing health and hygiene intervention procedures. In doing so, the sector should mimic the Community Health Club model that has shown success in improving health and hygiene indicators, as well as use a training session plan format similar to those in the Water Committee Seminar manual. Finally, the sector should have an experienced volunteer dedicated to program oversight and post-project monitoring and evaluation.
Resumo:
The push for improved fuel economy and reduced emissions has led to great achievements in engine performance and control. These achievements have increased the efficiency and power density of gasoline engines dramatically in the last two decades. With the added power density, thermal management of the engine has become increasingly important. Therefore it is critical to have accurate temperature and heat transfer models as well as data to validate them. With the recent adoption of the 2025 Corporate Average Fuel Economy(CAFE) standard, there has been a push to improve the thermal efficiency of internal combustion engines even further. Lean and dilute combustion regimes along with waste heat recovery systems are being explored as options for improving efficiency. In order to understand how these technologies will impact engine performance and each other, this research sought to analyze the engine from both a 1st law energy balance perspective, as well as from a 2nd law exergy analysis. This research also provided insights into the effects of various parameters on in-cylinder temperatures and heat transfer as well as provides data for validation of other models. It was found that the engine load was the dominant factor for the energy distribution, with higher loads resulting in lower coolant heat transfer and higher brake work and exhaust energy. From an exergy perspective, the exhaust system provided the best waste heat recovery potential due to its significantly higher temperatures compared to the cooling circuit. EGR and lean combustion both resulted in lower combustion chamber and exhaust temperatures; however, in most cases the increased flow rates resulted in a net increase in the energy in the exhaust. The exhaust exergy, on the other hand, was either increased or decreased depending on the location in the exhaust system and the other operating conditions. The effects of dilution from lean operation and EGR were compared using a dilution ratio, and the results showed that lean operation resulted in a larger increase in efficiency than the same amount of dilution with EGR. Finally, a method for identifying fuel spray impingement from piston surface temperature measurements was found. Note: The material contained in this section is planned for submission as part of a journal article and/or conference paper in the future.
Resumo:
This report discusses steps for the integration and adoption of information and communication technologies (ICT) in Uganda schools. Barriers of ICT adoption for teachers were determined through surveys at three schools in Eastern Uganda. Teachers identified lack of familiarity of ICT resources and lack of ICT skills as the two greatest barriers to ICT integration. Administrators and staffs were also interviewed to determine current resources. Through observations, interviews and collected data the report addresses two major ideas, promoting utilization of ICT resources and development of sustainable ICT programs. Promotion of utilization not only relies on overcoming the major barriers listed, but also developing a positive attitude of ICT. Sustainability is an issue reliant on all three groups of the school community; administration, staff and users.
Resumo:
File system security is fundamental to the security of UNIX and Linux systems since in these systems almost everything is in the form of a file. To protect the system files and other sensitive user files from unauthorized accesses, certain security schemes are chosen and used by different organizations in their computer systems. A file system security model provides a formal description of a protection system. Each security model is associated with specified security policies which focus on one or more of the security principles: confidentiality, integrity and availability. The security policy is not only about “who” can access an object, but also about “how” a subject can access an object. To enforce the security policies, each access request is checked against the specified policies to decide whether it is allowed or rejected. The current protection schemes in UNIX/Linux systems focus on the access control. Besides the basic access control scheme of the system itself, which includes permission bits, setuid and seteuid mechanism and the root, there are other protection models, such as Capabilities, Domain Type Enforcement (DTE) and Role-Based Access Control (RBAC), supported and used in certain organizations. These models protect the confidentiality of the data directly. The integrity of the data is protected indirectly by only allowing trusted users to operate on the objects. The access control decisions of these models depend on either the identity of the user or the attributes of the process the user can execute, and the attributes of the objects. Adoption of these sophisticated models has been slow; this is likely due to the enormous complexity of specifying controls over a large file system and the need for system administrators to learn a new paradigm for file protection. We propose a new security model: file system firewall. It is an adoption of the familiar network firewall protection model, used to control the data that flows between networked computers, toward file system protection. This model can support decisions of access control based on any system generated attributes about the access requests, e.g., time of day. The access control decisions are not on one entity, such as the account in traditional discretionary access control or the domain name in DTE. In file system firewall, the access decisions are made upon situations on multiple entities. A situation is programmable with predicates on the attributes of subject, object and the system. File system firewall specifies the appropriate actions on these situations. We implemented the prototype of file system firewall on SUSE Linux. Preliminary results of performance tests on the prototype indicate that the runtime overhead is acceptable. We compared file system firewall with TE in SELinux to show that firewall model can accommodate many other access control models. Finally, we show the ease of use of firewall model. When firewall system is restricted to specified part of the system, all the other resources are not affected. This enables a relatively smooth adoption. This fact and that it is a familiar model to system administrators will facilitate adoption and correct use. The user study we conducted on traditional UNIX access control, SELinux and file system firewall confirmed that. The beginner users found it easier to use and faster to learn then traditional UNIX access control scheme and SELinux.