964 resultados para governance networks
Resumo:
Research on men’s networks and homosociality in and around organisations can produce knowledge on organisational power relations, and contribute to the efforts to promote equality in working life. The search for a conceptual framework to study these issues arises in this paper from my ongoing work on men's social networks and gendered power in and around organisations. Men give each other social support through networks in which formal and informal relationships intermingle, but networks are also contexts of competition and oppression, and of construction of masculinities that are in hierarchical relations with each other and with femininities. For studying the networks men have with each other in work organisations I suggest a broader starting point that contextualises these homosocial networks with men’s other personal relations, and integrates different perspectives deriving from social network analysis, critical studies on men and organisational studies.
Resumo:
A method is presented to model server unreliability in closed queuing networks. Breakdowns and repairs of servers, assumed to be time-dependent, are modeled using virtual customers and virtual servers in the system. The problem is thus converted into a closed queue with all reliable servers and preemptive resume priority centers. Several recent preemptive priority approximations and an approximation of the one proposed are used in the analysis. This method has approximately the same computational requirements as that of mean-value analysis for a network of identical dimensions and is therefore very efficient
Resumo:
This paper examines the association between corporate governance attributes and firm performance of Finnish firms during 1990 – 2000. The empirical results suggest that corporate governance matters for firm performance. First, univariate test results indicate that firms characterized by a high (efficient) level of corporate governance have delivered greater stock returns, are higher valued based on the measure of Tobin’s Q, and exhibit higher ratios of cash flow to assets, on average, in comparison to their counterparts characterized by a low (inefficient) level of corporate governance. Second, controlling for a number of well-known determinants of stock returns, we find evidence that firms categorized by inefficient corporate governance have delivered inferior returns to shareholders during the investigation period. Finally, after controlling for several common determinants of firm value, we find that firms characterized by efficient corporate governance have been valued higher during the investigation period, measured by Tobin’s Q.
Resumo:
Africa is threatened by climate change. The adaptive capacity of local communities continues to be weakened by ineffective and inefficient livelihood strategies and inappropriate development interventions. One of the greatest challenges for climate change adaptation in Africa is related to the governance of natural resources used by vulnerable poor groups as assets for adaptation. Practical and good governance activities for adaptation in Africa is urgently and much needed to support adaptation actions, interventions and planning. The adaptation role of forests has not been as prominent in the international discourse and actions as their mitigation role. This study therefore focused on the forest as one of the natural resources used for adaptation. The general objective of this research was to assess the extent to which cases of current forest governance practices in four African countries Burkina Faso, The Democratic Republic of Congo (DRC), Ghana and Sudan are supportive to the adaptation of vulnerable societies and ecosystems to impacts of climate change. Qualitative and quantitative analyses from surveys, expert consultations and group discussions were used in analysing the case studies. The entire research was guided by three conceptual sets of thinking forest governance, climate change vulnerability and ecosystem services. Data for the research were collected from selected ongoing forestry activities and programmes. The study mainly dealt with forest management policies and practices that can improve the adaptation of forest ecosystems (Study I) and the adaptive capacity through the management of forest resources by vulnerable farmers (Studies II, III, IV and V). It was found that adaptation is not part of current forest policies, but, instead, policies contain elements of risk management practices, which are also relevant to the adaptation of forest ecosystems. These practices include, among others, the management of forest fires, forest genetic resources, non-timber resources and silvicultural practices. Better livelihood opportunities emerged as the priority for the farmers. These vulnerable farmers had different forms of forest management. They have a wide range of experience and practical knowledge relevant to ensure and achieve livelihood improvement alongside sustainable management and good governance of natural resources. The contributions of traded non-timber forest products to climate change adaptation appear limited for local communities, based on their distribution among the stakeholders in the market chain. Plantation (agro)forestry, if well implemented and managed by communities, has a high potential in reducing socio-ecological vulnerability by increasing the food production and restocking degraded forest lands. Integration of legal arrangements with continuous monitoring, evaluation and improvement may drive this activity to support short, medium and long term expectations related to adaptation processes. The study concludes that effective forest governance initiatives led by vulnerable poor groups represent one practical way to improve the adaptive capacities of socio-ecological systems against the impacts of climate change in Africa.
Resumo:
This paper deals with the development and performance evaluation of three modified versions of a scheme proposed for medium access control in local area networks. The original scheme implements a collision-free and fair medium arbitration by using a control wire in conjunction with a data bus. The modifications suggested in this paper are intended to realize the multiple priority function in local area networks.
Resumo:
We study wireless multihop energy harvesting sensor networks employed for random field estimation. The sensors sense the random field and generate data that is to be sent to a fusion node for estimation. Each sensor has an energy harvesting source and can operate in two modes: Wake and Sleep. We consider the problem of obtaining jointly optimal power control, routing and scheduling policies that ensure a fair utilization of network resources. This problem has a high computational complexity. Therefore, we develop a computationally efficient suboptimal approach to obtain good solutions to this problem. We study the optimal solution and performance of the suboptimal approach through some numerical examples.
Resumo:
The objective of the present paper is to select the best compromise irrigation planning strategy for the case study of Jayakwadi irrigation project, Maharashtra, India. Four-phase methodology is employed. In phase 1, separate linear programming (LP) models are formulated for the three objectives, namely. net economic benefits, agricultural production and labour employment. In phase 2, nondominated (compromise) irrigation planning strategies are generated using the constraint method of multiobjective optimisation. In phase 3, Kohonen neural networks (KNN) based classification algorithm is employed to sort nondominated irrigation planning strategies into smaller groups. In phase 4, multicriterion analysis (MCA) technique, namely, Compromise Programming is applied to rank strategies obtained from phase 3. It is concluded that the above integrated methodology is effective for modeling multiobjective irrigation planning problems and the present approach can be extended to situations where number of irrigation planning strategies are even large in number. (c) 2004 Elsevier Ltd. All rights reserved.
Resumo:
For the past two centuries, nationalism has been among the most influential legitimizing principles of political organization. According to its simple definition, nationalism is a principle or a way of thinking and acting which holds that the world is divided into nations, and that national and political units should be congruent. Nationalism can thus be divided into two aspects: internal and external. Internally, the political units, i.e., states, should be made up of only one nation. Externally each nation-state should be sovereign. Transnational national governance of rights of national minorities violates both these principles. This study explores the formation, operation, and effectiveness of the European post-Cold War minorities system. The study identifies two basic approaches to minority rights: security and justice. These approaches have been used to legitimize international minority politics and they also inform the practice of transnational governance. The security approach is based on the recognition that the norm of national self-determination cannot be fulfilled in all relevant cases, and so minority rights are offered as a compensation to the dissatisfied national groups, reducing their aspiration to challenge the status quo. From the justice perspective, minority rights are justified as a compensatory strategy against discrimination caused by majority nation-building. The research concludes that the post-Cold War minorities system was justified on the basis of a particular version of the security approach, according to which only Eastern European minority situations are threatening because of the ethnic variant of nationalism that exists in that region. This security frame was essential in internationalising minority issues and justifying the swift development of norms and institutions to deal with these issues. However, from the justice perspective this approach is problematic, since it justified double standards in European minority politics. Even though majority nation-building is often detrimental to minorities also in Western Europe, Western countries can treat their minorities more or less however they choose. One of the main contributions of this thesis is the detailed investigation of the operation of the post-Cold War minorities system. For the first decade since its creation in the early 1990s, the system operated mainly through its security track, which is based on the field activities of the OSCE that are supported by the EU. The study shows how the effectiveness of this track was based on inter-organizational cooperation in which various transnational actors compensate for each other s weaknesses. After the enlargement of the EU and dissolution of the membership conditionality this track, which was limited to Eastern Europe from the start, has become increasingly ineffective. Since the EU enlargement, the focus minorities system has shifted more and more towards its legal track, which is based on the Framework Convention for the Protection of National Minorities (Council of Europe). The study presents in detail how a network of like-minded representatives of governments, international organizations, and independent experts was able strengthen the framework convention s (originally weak) monitoring system considerably. The development of the legal track allows for a more universal and consistent, justice-based approach to minority rights in contemporary Europe, but the nationalist principle of organization still severely hinders the materialization of this possibility.
Resumo:
It has been shown in an earlier paper that I-realizability of a unate function F of up to six variables corresponds to ' compactness ' of the plot of F on a Karnaugh map. Here, an algorithm has been presented to synthesize on a Karnaugh map a non-threahold function of up to Bix variables with the minimum number of threshold gates connected in cascade. Incompletely specified functions can also be treated. No resort to inequalities is made and no pre-processing (such as positivizing and ordering) of the given switching function is required.