Search results for "communication technology"
showing 10 items of 360 documents
The Developmental Contribution From Mobile Phones Across the Agricultural Value Chain in Rural Africa
2011
Published version of an article from the journal: The Electronic Journal of Information Systems in Developing Countries. Also available fro the publisher: http://www.ejisdc.org/Ojs2/index.php/ejisdc/article/viewFile/849/377 The most widespread information and communication technology (ICT) in developing countries today is the mobile phone. The majority of people in the least developed countries still live in rural areas and their livelihood depends on the primary industries. This study investigates the use of mobile phones among farmers in rural Tanzania in order to supply empirical data on the developmental role of this technology. The results show that the improved access to communication…
Sex, social reproduction, and mobile telephony as responses to precarity in urban Tanzania
2019
The gendered effects of neoliberal economic restructuring around the world are usually studied in their most dramatic forms: cross-border migration, exploitation, resistance, and violence. This chapter examines significant transformations arising from economic restructuring in the nexus between gender, labour, and urban space — transformations in which mobile technologies are deeply implicated. It explores how mobile phones are used by the poor for day-to-day survival in Tanzania’s largest city. The chapter shows how gendered economic bargains are negotiated at the very bottom of a survival economy located within the dynamics of a globalized economic system. An important characteristic of m…
Aggregate uncertainty and sectoral productivity growth: The role of credit constraints
2016
Abstract We show that an increase in aggregate uncertainty—measured by stock market volatility—reduces productivity growth more in industries that depend heavily on external finance. The mechanism at play is that during periods of high uncertainty, firms that are credit constrained switch the composition of investment by reducing productivity-enhancing investment—such as on ICT capital—which is more subject to liquidity risks (Aghion et al., 2010). The effect is larger during recessions, when financing constraints are more likely to be binding, than during expansions. Our statistical method—a difference-in-difference approach using productivity growth of 25 industries from 18 advanced econo…
Elektronisk meldingsutveksling- et bidrag til å oppfylle Samhandlingsreformens intensjoner om helhetlige, sømløse, koordinerte og trygge tjenester? :…
2014
Masteroppgave i helse- og sosialinformatikk HSI 500 Universitetet i Agder 2014 Project background: Patient information is exchanged between different governmental levels of health care to provide new health level with correct/adequate information. The information exchanged is important in securing a seamless and continuous care. Purpose/problem: This projects objective is to assess the information quality of electronic messages, in particular if the content received meets the recipient’s need of information to customize patient treatment/care. Selection/method: The project made requests to a coordination manager and interaction coordinators in a region, who communicated the projects request…
Ant colony optimisation for planning safe escape routes
2013
Published version of a chapter from the volume: Recent Trends in Applied Artificial Intelligence. Also available on SpringerLink: http://dx.doi.org/10.1007/978-3-642-38577-3_6 An emergency requiring evacuation is a chaotic event filled with uncertainties both for the people affected and rescuers. The evacuees are often left to themselves for navigation to the escape area. The chaotic situation increases when a predefined escape route is blocked by a hazard, and there is a need to re-think which escape route is safest. This paper addresses automatically finding the safest escape route in emergency situations in large buildings or ships with imperfect knowledge of the hazards. The proposed so…
Antecedents and consequences of problematic smartphone use: A systematic literature review of an emerging research area
2021
Abstract This article provides a systematic review of existing research on problematic smartphone use (PSU) to guide other researchers in search of relevant studies, and to propose areas for future research. In total, 293 studies were analyzed leading to the development of an overview model in the field of PSU, presenting findings on demographic factors, explanations for smartphone use and why this use becomes problematic, consequences of PSU, and how such use can be corrected. In addition, we considered in which contexts, with which methods, and with which theoretical lenses this stream of research has been studied to date. Smartphone use is most often explained by the smartphone design, a…
A Novel Mathematical Formula for Retrieval Algorithm
2014
Published version of an article in the journal: Mathematical Problems in Engineering. Also available from the publisher at: http://dx.doi.org/10.1155/2014/859157 A method is proposed to retrieve mathematical formula in LaTeX documents. Firstly, we represent the retrieved mathematical formula by binary tree according to its LaTeX description, normalize the structure of the binary tree, and obtain the structure code and then search the mathematical formula table that is named by the structure code and the formula elements of the first two levels of the binary tree in the mathematical formula database. If the table exists, then we search the normalizing variable name preorder traversing sequen…
Identification of LTI Time-Delay Systems with Missing Output Data Using GEM Algorithm
2014
Published version of an article in the journal: Mathematical Problems in Engineering. Also available from the publisher at: http://dx.doi.org/10.1155/2014/242145 This paper considers the parameter estimation for linear time-invariant (LTI) systems in an input-output setting with output error (OE) time-delay model structure. The problem of missing data is commonly experienced in industry due to irregular sampling, sensor failure, data deletion in data preprocessing, network transmission fault, and so forth; to deal with the identification of LTI systems with time-delay in incomplete-data problem, the generalized expectation-maximization (GEM) algorithm is adopted to estimate the model parame…
Design of Wideband MIMO Car-to-Car Channel Models Based on the Geometrical Street Scattering Model
2012
Published version of an article in the journal: Modelling and Simulation in Engineering. Also available from the publisher at: http://dx.doi.org/10.1155/2012/264213 Open access We propose a wideband multiple-input multiple-output (MIMO) car-to-car (C2C) channel model based on the geometrical street scattering model. Starting from the geometrical model, a MIMO reference channel model is derived under the assumption of single-bounce scattering in line-of-sight (LOS) and non-LOS (NLOS) propagation environments. The proposed channel model assumes an infinite number of scatterers, which are uniformly distributed in two rectangular areas located on both sides of the street. Analytical solutions a…
The impact of fixed and moving scatterers on the statistics of MIMO vehicle-to-vehicle channels
2021
©2009 IEEE. Personal use of this material is permitted. However, permission to reprint/republish this material for advertising or promotional purposes or for creating new collective works for resale or redistribution to servers or lists, or to reuse any copyrighted component of this work in other works must be obtained from the IEEE. Article also available from publisher: http://dx.doi.org/10.1109/VETECS.2009.5073879 In this paper, we study the impact of fixed and moving clusters of scatterers on the statistics of multiple- input multiple-output (MIMO) vehicle-to-vehicle (V2V) channels. Double-bounce scattering is assumed for fixed scatterers, while single-bounce scattering is considered fo…