19,082 research outputs found

    Attitudes of undergraduate nursing students to cultural diversity: (Portuguese-Spanish) in a transboundary context.

    Get PDF
    Our main goal was to identify the attitudes of nursing students to cultural diversity in a healthcare setting, and find the potential relationship between this and the students' national background and their knowledge of cultural diversity. A descriptive observational study comparing two culturally different populations within a cross-border area (Algarve-Huelva) was conducted. The attitudes of the participants were measured across six categories: this study will describe the most significant ones. The cultural context is essential to the development of attitudes to immigration. Nursing care is a communicative act and encountering the "other" the core of the nursing professionals' work. (C) 2017 The Authors. Published by Elsevier Ltd

    The minimum maximal k-partial-matching problem

    Get PDF
    In this paper, we introduce a new problem related to bipartite graphs called minimum maximal k-partial-matching (MMKPM) which has been modelled by using a relaxation of the concept of matching in a graph. The MMKPM problem can be viewed as a generalization of the classical Hitting Set and Set Cover problems. This property has been used to prove that the MMKPM problem is NPComplete. An integer linear programming formulation and a greedy algorithm have been proposed. The problem can be applied to the design process of finite state machines with input multiplexing for simplifying the complexity of multiplexers

    Minimum maximum reconfiguration cost problem

    Get PDF
    This paper discusses the problem of minimizing the reconfiguration cost of some types of reconfigurable systems. A formal definition of the problem and a proof of its NP-completeness are provided. In addition, an Integer Linear Programming formulation is proposed. The proposed problem has been used for optimizing a design stage of Finite Virtual State Machines

    High-Performance Architecture for Binary-Tree-Based Finite State Machines

    Get PDF
    A binary-tree-based finite state machine (BT-FSM) is a state machine with a 1-bit input signal whose state transition graph is a binary tree. BT-FSMs are useful in those application areas where searching in a binary tree is required, such as computer networks, compression, automatic control, or cryptography. This paper presents a new architecture for implementing BT-FSMs which is based on the model finite virtual state machine (FVSM). The proposed architecture has been compared with the general FVSM and conventional approaches by using both synthetic test benches and very large BT-FSMs obtained from a real application. In synthetic test benches, the average speed improvement of the proposed architecture respect to the best results of the other approaches achieves 41% (there are some cases in which the speed is more than double). In the case of the real application, the average speed improvement achieves 155%

    A methodology for the development of a sustainability index for construction works in Spain

    Get PDF
    The present paper tries to describe in a systematic way the process followed to develop a methodology to obtain a Sustainable Index for Construction Works in Spain. Given the complexity of the task at hand, and having into account that this is the first attempt within the Spanish construction sector to create an integrating index, the description of the process becomes indispensable in order to replicate the index in a different context –e.g. another European country-. On the other hand, the development of an index with a triple focus -economic, environmental and social-, transcending the interests of the different activities which coexist inside this sector, and joining efforts towards a common objective fills an existing gap in the Spanish construction sector, as it will be shown. The proposed index aims at establishing, on a permanent basis, a common reference for the assessment of sustainability within this sector, to the improvement of which all parties involved could and should contribute

    Finite State Machines With Input Multiplexing: A Performance Study

    Get PDF
    Finite state machines with input multiplexing (FSMIMs) have been proposed in previous works as a technique for efficient mapping FSMs into ROM memory. In this paper, we propose a new architecture for implementing FSMIMs, called FSMIM with state-based input selection, whose goal is to achieve a further reduction in memory usage. This paper also describes in detail the algorithms for generating FSMIMs used by the tool FSMIM-Gen, which has been developed and made available on the Internet for free public use. A comparative study in terms of speed and area between FSMIM approaches and other field programmable gate array-based techniques is presented. The results show that the FSMIM approaches obtain huge reductions in the look-up table (LUT) usage by using a small number of embedded memory blocks. In addition, speed improvements over conventional LUT-based implementations have been obtained in many cases

    A new countermeasure against side-channel attacks based on hardware-software co-design

    Get PDF
    This paper aims at presenting a new countermeasure against Side-Channel Analysis (SCA) attacks, whose implementation is based on a hardware-software co-design. The hardware architecture consists of a microprocessor, which executes the algorithm using a false key, and a coprocessor that performs several operations that are necessary to retrieve the original text that was encrypted with the real key. The coprocessor hardly affects the power consumption of the device, so that any classical attack based on such power consumption would reveal a false key. Additionally, as the operations carried out by the coprocessor are performed in parallel with the microprocessor, the execution time devoted for encrypting a specific text is not affected by the proposed countermeasure. In order to verify the correctness of our proposal, the system was implemented on a Virtex 5 FPGA. Different SCA attacks were performed on several functions of AES algorithm. Experimental results show in all cases that the system is effectively protected by revealing a false encryption key.Peer ReviewedPreprin

    Acoustical Behavior Of Churches: Mudejar-Gothic Churches

    Get PDF
    Christian churches have traditionally been considered to have very good acoustical behavior. This unfounded belief has led to important en-on in church rehabilitation works, especially when the church is to be used subsequently as an auditorium or theater; this is the case of many churches in Spain. Our research group has worked in acoustical analysis for more than ten years. We have participated in many cases of church rehabilitation and have had the opp&unity to achieve surprisingly good acwstical behavior in several. We deal with a very common type in southern Spain: Gothic-Mudejar churches, which have a small volume, a triple-nave layout, and wooden ceilings

    Using microelectrode models for real time cell-culture monitoring

    Get PDF
    This paper proposes a cell-microelectrode model for cell biometry applications, based on the area overlap as main parameter. The model can be applied to cell size identification, cell count, and their extension to cell growth and dosimetry protocols. Experiments performed with comercial electrodes are presented, illustrating a procedure to obtain cell number in both growth and dosimetry processes. Results obtained for the AA8 cell line are promising.Junta de Andalucía P0-TIC-538
    corecore