3,266 research outputs found

    Demographics and Perceptions of Work Environment for Registered Nurses

    Get PDF
    Registered nurses (RNs) are the lifeblood of hospitals. Therefore, retaining skilled nurses is necessary to insure the viability of these institutions. A two-year longitudinal, non-experimental research study utilized a descriptive design to compare the perceptions of RNs who remained on their units to those who left or changed units over a two-year time period. The purpose of this study was to ascertain whether there was a statistically significant difference between these two groups. Results in several areas indicate that further evaluation is necessary by nurse managers and administration. This information could help retain RNs as well as attract qualified nurses to a center of excellence

    Performance of active multicast congestion control

    Get PDF
    This paper aims to provide insight into the behavior of congestion control mechanisms for reliable multicast protocols. A multicast congestion control based on active networks has been proposed and simulated using ns-2 over a network topology obtained using the Tiers tool. The congestion control mechanism has been simulated under different network conditions and with different settings of its configuration parameters. The objective is to analyze its performance and the impact of the different configuration parameters on its behavior. The simulation results show that the performance of the protocol is good in terms of delay and bandwidth utilization. The compatibility of the protocol with TCP flows has not been demonstrated, but the simulations performed show that by altering the parameter settings, the proportion of total bandwidth taken up by the two types of flow, multicast and TCP, may be modified.Publicad

    WhatsApping terror: how media applied instant messaging to cover Barcelona terrorist attack

    Get PDF
    Audiences love live communication (Deuze, 2011), the possibility of reaching news in real time. Previous research focus on the reporting of natural disasters or emergency news like terrorist attacks show that the concept “news now” (Sheller, 2014) is an audience imperative in those contexts. Bauman’s (2000) liquid society is the objective public of this kind of content, characterized by mobility and the individualization of media consumption. Our paper analyzes how media adapted their publishing strategies to reach this public through mobile instant messaging during Barcelona terrorist attack coverage in August 2017. This type of social news and information flow is characterized by unpredictability, classlessness, and a lack of hierarchy (Rampazzo & Peret, 2017). In order to reach this main goal we applied mixed methods, based on quantitative and qualitative techniques. Firstly, we designed a directory of Spanish media applying Whatsapp and Telegram to connect with audiences. Then we analyzed the content distributed by all national, regional and local media through these platforms from 17th to 21th August 2017. The first informative alert appeared 25 minutes after the van was driven into pedestrians in Las Ramblas. According to our results, 214 headlines in WhatsApp and Telegram were directly connected with the terrorist attack, but not all of them offered the appropriate tone and/or respectful emoticons. Most of the media made a great effort increasing the regularity of their messages during those days, but only the national media focused their MIM (Mobile Instant Messaging) strategy on the attack. Finally we classified the reaction into three types of content: last minute alerts, contextualizing news and solidarity content.Universidad de Málaga. Campus de Excelencia Internacional Andalucía Tech

    Affordable heat: A whole-buildings efficiency service for Vermont families and businesses

    Get PDF
    Policy Leadership Initiative Year III Addressing Energy Challenges for Low-income Families in Northern New Englan

    DoS protection for a Pragmatic Multiservice Network Based on Programmable Networks

    Get PDF
    Proceedings of First International IFIP TC6 Conference, AN 2006, Paris, France, September 27-29, 2006.We propose a scenario of a multiservice network, based on pragmatic ideas of programmable networks. Active routers are capable of processing both active and legacy packets. This scenario is vulnerable to a Denial of Service attack, which consists in inserting false legacy packets into active routers. We propose a mechanism for detecting the injection of fake legacy packets into active routers. This mechanism consists in exchanging accounting information on the traffic between neighboring active routers. The exchange of accounting information must be carried out in a secure way using secure active packets. The proposed mechanism is sensitive to the loss of packets. To deal with this problem some improvements in the mechanism has been proposed. An important issue is the procedure for discharging packets when an attack has been detected. We propose an easy and efficient mechanism that would be improved in future work.Publicad

    Multidomain Network Based on Programmable Networks: Security Architecture

    Get PDF
    This paper proposes a generic security architecture designed for a multidomain and multiservice network based on programmable networks. The multiservice network allows users of an IP network to run programmable services using programmable nodes located in the architecture of the network. The programmable nodes execute codes to process active packets, which can carry user data and control information. The multiservice network model defined here considers the more pragmatic trends in programmable networks. In this scenario, new security risks that do not appear in traditional IP networks become visible. These new risks are as a result of the execution of code in the programmable nodes and the processing of the active packets. The proposed security architecture is based on symmetric cryptography in the critical process, combined with an efficient manner of distributing the symmetric keys. Another important contribution has been to scale the security architecture to a multidomain scenario in a single and efficient way.Publicad

    The Black Box of Mutual Fund Fees

    Get PDF
    This paper re-examines the determinants of mutual fund fees paid by mutual fund shareholders for management costs and other expenses. There are two novelties with respect to previous studies. First, each type of fee is explained separately. Second, the paper employs a new dataset consisting of Spanish mutual funds, making it the second paper to study mutual fund fees outside the US market. Furthermore, the Spanish market has three interesting characteristics: (i) both distribution and management are highly dominated by banks and savings banks, which points towards potential conflicts of interest; (ii) Spanish mutual fund law imposes caps on all types of fees; and (iii) Spain ranks first in terms of average mutual fund fees among similar countries. We find significant differences in mutual fund fees not explained by the fund’s investment objective. For instance, management companies owned by banks and savings banks charge higher management fees and redemption fees to nonguaranteed funds. Also, investors in older non-guaranteed funds and non-guaranteed funds with a lower average investment are more likely to end up paying higher management fees. Moreover, there is clear evidence that some mutual funds enjoy better conditions from custodial institutions than others. In contrast to evidence from the US market, larger funds are not associated with lower fees, but with higher custody fees for guaranteed funds and higher redemption fees for both types of funds. Finally, fee-setting by mutual funds is not related to fund before-fee performance.mutual fund, fee caps, censored data

    Endogenous Timing in a Mixed Duopoly: Wighted Welfare and Price Competition

    Get PDF
    In this paper we analyse the endogenous order of moves in a mixed duopoly for differentiated goods. Firms choose whether to set prices sequentially or simultaneously. The private firm maximises profits while the public firm maximises the weighted sum of the consumer and producer surpluses (wighted welfare). It is shown that the result obtained in equilibrium depends crucially on the weigth given to the consumer surplus in weighted welfare and on the degree to which goods are substitutes or complements. We also anlyse whether the equilibria obtained maximise the sum of the consumer and producer suspluses or not. Finally we study whether the nationality of the private firm influences the results.mixed duopoly, price competition, endogenous timing, weighted welfare

    Characteristics of pervasive learning environments in museum contexts

    Get PDF
    There is no appropriate learning model for pervasive learning environments (PLEs), and museums maintain authenticity at the cost of unmarked information. To address these problems, we present the LieksaMyst PLE developed for Pielinen Museum and we derive a set of characteristics that an effective PLE should meet and which form the basis of a new learning model currently under development. We discuss how the characteristics are addressed in LieksaMyst and present an evaluation of the game component of LieksaMyst. Results indicate that, while some usability issues remain to be resolved, the game was received well by the participants enabling them to immerse themselves in the story and to interact effectively with its virtual characters
    corecore