149 research outputs found

    Government size, institutions, and export performance among OECD economies

    Get PDF
    We investigate the effect of the size of government, captured by the tax revenue as a share of GDP, and institutional features on countries’ export performance (export shares in international markets). Theoretically, we show in a model of endogenous extent of domestically-produced goods that there exists a well-defined government size that optimally promotes exports. Empirically, we show in a panel of 18countries for 1980-2005 that the tax-GDP ratio is significant and exerts a non-linear effect on export performance, showing that there indeed exists an optimal size of government, which we estimate at around 40%. Product market rigidities are also shown to affect negatively export performance via a negative effect on R&D. Among traditional variables, relative unit labour cost and R&D shares in GDP show up significantly and with the expected signs

    Stream bundle management layer for optimum management of co-existing telemedicine traffic streams under varying channel conditions in heterogeneous networks.

    Get PDF
    Heterogeneous networks facilitate easy and cost-effective penetration of medical advice in both rural and urban areas. However, disparate characteristics of different wireless networks lead to noticeable variations in network conditions when users roam among them e.g. during vertical handovers. Telemedicine traffic consists of a variety of real-time and non real-time traffic streams, each with a different set of Quality of Service requirements. This paper discusses the challenges and issues involved in the successful adaptation of heterogeneous networks by wireless telemedicine applications. We propose the development of a Smart Bundle Management (SBM) Layer for optimally managing co-existing traffic streams under varying channel conditions in a heterogeneous network. The SBM Layer acts as an interface between the applications and the underlying layers for maintaining a fair sharing of channel resources. Internal priority management algorithms are explained using Coloured Petri nets. This paper lays the foundation for the development of strategies for efficient management of co-existing traffic streams across varying channel conditions

    Proactive policy management for heterogeneous networks

    Get PDF
    Context-awareness is a vital requirement of heterogeneous devices which allows them to predict future network conditions with sufficient accuracy. In this paper we present a proactive modelling-based approach for policy management which allows the mobile node to calculate Time Before Vertical Handover for open and closed environments. The paper explains how the knowledge of this component can improve the manner in which multi-class traffic streams are allocated to available network channels. Simulation results confirm the feasibility of the concept

    Developing a novel programme for transition to nursing and graduate study at Middlesex University London using accreditation of prior learning

    Get PDF
    Poster title: Developing a novel programme for Transition to Nursing and Graduate Study at Middlesex University London using accreditation of prior learning. Authors: Sheila Sobrany, Kevin Corbett, Marion Taylor. Institution: Department of Adult, Child and Midwifery School of Health and Education Middlesex University London. Abstract: There are reportedly many overseas qualified nurses working as Healthcare Assistants (HCAs) who, for a number of different reasons, have been unable to register with the Nursing Midwifery Council (NMC). The 26-week Transition to Nursing and Graduate Study Programme at Middlesex University London in 2015 enabled 22 students to enter the final year of the BSc (Hons) Nursing programme after successfully reaching NMC progression point 2. This newly validated programme combines accreditation of prior learning (APL) with traditionally assessed theory and practice placements. Whilst our novel programme cannot offer a universal panacea to the current nursing workforce problems, it does aim to build on local potential in order to help ameliorate the situation so offering one creative solution to the current staffing crisis. It does this by helping the NHS to capitalise on its human resources by upskilling an existing HCA workforce in partnership with the local NHS Trusts and funded by Health Education North Central and East London (HENCEL), which is responsible for ensuring high quality professional education is provided across the north central London area. We will describe the educational processes whereby these students have demonstrably enhanced their existing knowledge, skills, attitudes and academic standards by successfully attaining NMC progression point 2. We will also critically evaluate the curriculum design and the teaching and learning processes deployed, as well as the difficulties, and the requisite development areas, arising from this new programme. For nurse educators organising and delivering this new programme, a number of challenges and lessons have been learnt which are associated with meeting the learning needs of these students and designing such a programme so as to meet the requirements of both the NMC and the Quality Assurance Agency (QAA)

    Client-based SBM layer for predictive management of traffic flows in heterogeneous networks

    Get PDF
    In a heterogeneous networking environment, the knowledge of the time before a vertical handover (TBVH) for any network is vital in correctly assigning connections to available channels. In this paper, we introduce a predictive mathematical model for calculating the estimated TBVH component from available network parameters and discuss the different scenarios that arise based on a mobile host’s trajectory. We then introduce the concept of an intelligent Stream Bundle Management Layer (SBM) which consists of a set of policies for scheduling and mapping prioritised traffic streams on to available channels based on their priority, device mobility pattern and prevailing channel conditions. The layer is also responsible for the maintenance of connections during vertical handovers to avoid their forced termination

    Proactive policy management using TBVH mechanism in heterogeneous networks.

    Get PDF
    In order to achieve seamless interoperability in heterogeneous networking, it is vital to improve the context-awareness of the mobile node (MN) so that it is able to predict future network conditions with sufficient accuracy. In this paper, we introduce a predictive mathematical model for calculating the estimated Time Before Vertical Handover (TBVH) component from available network parameters. The model is practically implemented in OPNET and our simulation results confirm the validity of the concept. We then demonstrate how the knowledge of TBVH along with other network parameters can be applied by downward Quality of Service management policies which bundle multi-class traffic streams on to available network channels based on application QoS, device mobility patterns and prevailing channel conditions

    Exploring gate-limited analytical models for high-performance network storage servers

    Get PDF
    Gate-limited service is a type of service discipline found in queueing theory and can be used to describe a number of operational environments, for example, large transport systems such as buses, trains or taxis, etc. Recently, there has been the observation that such systems can also be used to describe interactive Internet Services which use a Client/Server interaction. In addition, new services of this genre are being developed for the local area. One such service is a Network Memory Server (NMS) being developed here at Middlesex University. Though there are several examples of real systems that can be modelled using gate-limited service, it is fair to say that the analytical models which have been developed for gate-limited systems have been difficult to use, requiring many iterations before practical results can be generated. In this paper, a detailed gate-limited bulk service queueing model based on Markov chains is explored and a numerical solution is demonstrated for simple scenarios. Quantitative results are presented and compared with a mathematical simulation. The analysis is used to develop an algorithm based on the concept of optimum operational points. The algorithm is then employed to build a high-performance server which is capable of balancing the need to prefetch for streaming applications while promptly satisfying demand misses. The algorithm is further tested using a systems simulation and then incorporated into an Experimental File System (EFS) which showed that the algorithm can be used in a real networking environment

    Exploring the concept of scope to provide better security for internet services.

    Get PDF
    The Internet was originally designed to support universal reachability by allowing any host to communicate with any end server over the globe. Unfortunately, this feature has been abused by attackers to overload the servers with malicious traffic. In order to deal with this situation, many mechanisms such as Firewalls and Access Lists have been introduced to restrict servers’ accessibility only to legitimate users. This paper discusses some of these mechanisms, highlights their pros and cons and then proposes a new mechanism that attempts to limit a server’s reachability based on its operational scope

    Providing security in 4G systems: unveiling the challenges

    Get PDF
    Several research groups are working on designing new security architectures for 4G networks such as Hokey and Y-Comm. Since designing an efficient security module requires a clear identification of potential threats, this paper attempts to outline the security challenges in 4G networks. A good way to achieve this is by investigating the possibility of extending current security mechanisms to 4G networks. Therefore, this paper uses the X.805 standard to investigate the possibility of implementing the 3G’s Authentication and Key Agreement (AKA) protocol in a 4G communication framework such as YComm. The results show that due to the fact that 4G is an open, heterogeneous and IP-based environment, it will suffer from new security threats as well as inherent ones. In order to address these threats without affecting 4G dynamics, Y-Comm proposes an integrated security module to protect data and security models to target security on different entities and hence protecting not only the data but, also resources, servers and users
    • …
    corecore