Journal articles on the topic 'Personal communication service systems'

To see the other types of publications on this topic, follow the link: Personal communication service systems.

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 journal articles for your research on the topic 'Personal communication service systems.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.

1

BAFTIU, Naim, Ahmet NUREDINI, and Samedin KRRABAJ. "Encrypted Data Service for Security Electronic Communications." PRIZREN SOCIAL SCIENCE JOURNAL 3, no. 3 (December 26, 2019): 84. http://dx.doi.org/10.32936/pssj.v3i3.120.

Full text
APA, Harvard, Vancouver, ISO, and other styles
Abstract:
The law on electronic communications has so far enumerated a considerable number of natural persons, legal entities as well as public institutions that use code systems and crypto devices during communication. Of particular interest is addressing the key role of operators and providers of encrypted data services in combating abuses committed through or against computer systems as the responsible performance of their duties to protect the security of networks and computer systems affects significantly in controlling illegal risks and attacks. In this perspective, the specific legal obligations for the protection of privacy regarding personal data that are processed for the purpose of providing information services are also analyzed. The purpose of the paper is, Utilizing communication between two parties sharing a common key, implementing a shared key to protect data communicated with different security attributes, Role of cryptography in data protection during communication, and Focus on privacy. Of the data communicated, against their authenticity. Keywords: Communication, Security, Electronic privacy
2

Park, Daeun, and Sangeun Shin. "A Survey on AAC Fringe Vocabulary to Support Personal Assistance Service." Communication Sciences & Disorders 26, no. 4 (December 31, 2021): 820–33. http://dx.doi.org/10.12963/csd.21862.

Full text
APA, Harvard, Vancouver, ISO, and other styles
Abstract:
Objectives: There are increasing demands for personal assistance services which help the disabled to carry out their daily life. To use augmentative and alternative communication (AAC) approaches more effectively in daily communication, it is essential to include the appropriate core and fringe vocabulary in the AAC system. Considering the fact that there are few studies in Korea which have reported fringe vocabulary compared to core vocabulary, this study is aimed to develop a noun list that can be used to promote interactive communication between the disabled and their assistants in each communication situation.Methods: A literature review was conducted to elicit frequently used nouns in each communication situation. Then, a survey was carried out to identify nouns with high word commonality across 105 personal assistants.Results: Sixty-three nouns with more than 50% of word commonality across personal assistants were identified from the 244 fringe vocabulary; consisting of 112 nouns in the area of going out, 29 in cleaning, 27 in personal hygiene, 26 in cooking, 20 in meal supporting, 20 in other service areas, and 10 in commuting.Conclusion: The identified nouns are expected to help people with complex communication needs to express their needs and wants more clearly and effectively using those nouns embedded in their AAC systems. The list of nouns can be used not only for people who receive personal assistance services, but also for people who rely on AAC systems to express their daily needs.
3

Korzun, Dmitry G., Ilya Nikolaevskiy, and Andrei Gurtov. "Service Intelligence and Communication Security for Ambient Assisted Living." International Journal of Embedded and Real-Time Communication Systems 6, no. 1 (January 2015): 76–100. http://dx.doi.org/10.4018/ijertcs.2015010104.

Full text
APA, Harvard, Vancouver, ISO, and other styles
Abstract:
Mobile health (m-Health) scenarios and Internet of Things (IoT) technologies form an important direction for enhancing medical systems for Ambient Assisted Living (AAL). Yet current development meets with two challenges: 1) use of patient's health data with strong security guarantees in mobile network and resource-constrained assumptions and in emergency situations, 2) inclusion of personal data to the entire system for “smart” service construction and delivery. This paper presents a smart space based architectural model that adopts emerging IoT technologies to enable security of personal mobile data and their intelligent utilization in health services. To support the service intelligence, the authors employ the smart spaces approach with its prominent technologies adopted from IoT and Semantic Web. The intelligence and security solutions are considered symbiotic to present better user-experience, security level, and utility of a system.
4

Miskovic, Vanja, and Djordje Babic. "Pervasive Personal Healthcare Service Designed as Mobile Social Network." International Journal of Interactive Mobile Technologies (iJIM) 10, no. 4 (October 25, 2016): 65. http://dx.doi.org/10.3991/ijim.v10i4.5913.

Full text
APA, Harvard, Vancouver, ISO, and other styles
Abstract:
A global phenomenon of population ageing and an increasing number of patients with chronic diseases place substantial additional pressure on healthcare systems. A possible solution for this problem is a new emerging sort of pervasive personal healthcare service that is focused on the patient and allows the patient to be actively involved in his or her own health care. In this paper, we propose the architecture of the pervasive personal healthcare service which is based on the existing technologies available to almost everyone. Along with the conventional request-response synchronous communication, the proposed system features asynchronous communication based on publish-subscribe-notify model. In order to perform asynchronous communication, a web application server is integrated with the Google Cloud Messaging service. The communication between mobile device and servers is carried out through the available Wi-Fi or mobile networks, whereas Bluetooth protocol is conventional for Body Sensor Networks consisting of wearable sensor devices. We also present a mobile application which has been developed with use-case driven approach for both patients and medical personnel. The introduced application has a form of a nonintrusive customized mobile social network. We explain usage scenarios that clarify the required functions and present conclusions based on the system test.
5

Smith, Alan D. "E-Personalization and Its Tactical and Beneficial Relationships to E-Tailing." International Journal of Information Systems in the Service Sector 4, no. 2 (April 2012): 48–71. http://dx.doi.org/10.4018/jisss.2012040104.

Full text
APA, Harvard, Vancouver, ISO, and other styles
Abstract:
The numerous advancements in electronic-personalization communication have generated both benefits and challenges as online retailers try to regain competitive advantages in the current global recession. Through appropriate multivariate analyses and data-reduction techniques, the basic elements e-personalization, namely online purchasing behaviors, personalized communications, information retrieval services, degree of personal web presence, quality assurance of customer service, and the promotion of customization services, were found to be conceptually and statistically related to retailer benefits of e-personalization (increased buying and creates customer loyalty) from the viewpoint of managers for a large goods and services chain store headquartered in Pittsburgh, Pennsylvania.
6

Hung-Yu Lin and Lein Harn. "Authentication protocols with nonrepudiation services in personal communication systems." IEEE Communications Letters 3, no. 8 (August 1999): 236–38. http://dx.doi.org/10.1109/4234.781006.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Yacouba, Kouraogo, Orhanou Ghizlane, and Elhajji Said. "Securing Communication 2FA Using Post-Quantic Cryptosystem." International Journal of Information Security and Privacy 14, no. 2 (April 2020): 102–15. http://dx.doi.org/10.4018/ijisp.2020040106.

Full text
APA, Harvard, Vancouver, ISO, and other styles
Abstract:
Many financial institutions interact with their customers via short message services (SMS), which is today one of the fastest and most powerful means of communicating information around the world. This information can sometimes be an access code such as the unique password (OTP) for two-factor authentication (2FA) or banking information and personal identities. All this data is confidential, and it is a major disadvantage to send them since an SMS service does not provide data encryption during network transmission and on mobile. Recently, OTPs via SMS have suffered from strong attacks that intercept messages. In order to avoid attacks and offer effective content security to 2FA credentials sent via SMS, the authors propose an SMS encryption mechanism using a post quantic cryptosystem quasi-cyclic MDPC and an electronic signature of the OTPs. Finally, this article performs an implementation and a security analysis of the proposal.
8

Ing-Ray Chen, Baoshan Gu, and Sheng-Tzong Cheng. "On Integrated Location and Service Management for Minimizing Network Cost in Personal Communication Systems." IEEE Transactions on Mobile Computing 5, no. 2 (February 2006): 179–92. http://dx.doi.org/10.1109/tmc.2006.23.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Korhonen, Vesa A., and Ritva Pyykkönen. "Utilizing Context in Location-Aware Short-Range Wireless Communication." International Journal of Digital Multimedia Broadcasting 2010 (2010): 1–12. http://dx.doi.org/10.1155/2010/417213.

Full text
APA, Harvard, Vancouver, ISO, and other styles
Abstract:
We discuss how a short-range wireless communication service implemented for modern mobile communication devices can provide additional value for both the consumer and the service/product provider. When used as an information search tool, such systems allow services and products being promoted at the location they are available. For the customer, it may provide a “digitally augmented vision”, an enhanced view to the current environment. With data filtering and search rules, this may provide a self-manageable context, where the user's own personal environment and preferences to the features available in the current surroundings cooperate with a direct connection to the web-based social media. A preliminary design for such service is provided. The conclusion is that the method can generate additional revenue to the company and please the customers' buying process. In addition to the marketing, the principles described here are also applicable to other forms of human interaction.
10

Vemou, Konstantina, and Maria Karyda. "Requirements for private communications over public spheres." Information & Computer Security 28, no. 1 (November 11, 2019): 68–96. http://dx.doi.org/10.1108/ics-01-2019-0002.

Full text
APA, Harvard, Vancouver, ISO, and other styles
Abstract:
Purpose In the Web 2.0 era, users massively communicate through social networking services (SNS), often under false expectations that their communications and personal data are private. This paper aims to analyze privacy requirements of personal communications over a public medium. Design/methodology/approach This paper systematically analyzes SNS services as communication models and considers privacy as an attribute of users’ communication. A privacy threat analysis for each communication model is performed, based on misuse scenarios, to elicit privacy requirements per communication type. Findings This paper identifies all communication attributes and privacy threats and provides a comprehensive list of privacy requirements concerning all stakeholders: platform providers, users and third parties. Originality/value Elicitation of privacy requirements focuses on the protection of both the communication’s message and metadata and takes into account the public–private character of the medium (SNS platform). The paper proposes a model of SNS functionality as communication patterns, along with a method to analyze privacy threats. Moreover, a comprehensive set of privacy requirements for SNS designers, third parties and users involved in SNS is identified, including voluntary sharing of personal data, the role of the SNS platforms and the various types of communications instantiating in SNS.
11

Lu, Yaobin, Zhaohua Deng, and Bin Wang. "Exploring factors affecting Chinese consumers' usage of short message service for personal communication." Information Systems Journal 20, no. 2 (March 2010): 183–208. http://dx.doi.org/10.1111/j.1365-2575.2008.00312.x.

Full text
APA, Harvard, Vancouver, ISO, and other styles
12

Szádeczky, Tamás. "Security of E-Government Website Encryption in Germany and Hungary." Academic and Applied Research in Military and Public Management Science 17, no. 2 (June 30, 2018): 127–38. http://dx.doi.org/10.32565/aarms.2018.2.9.

Full text
APA, Harvard, Vancouver, ISO, and other styles
Abstract:
The paper deals with comparative research of the communication security of e-Government services in Germany and Hungary. The focus point of the research is to analyse the cryptographic security algorithms and protocols which encrypt communication in the relations of the citizen and a governmental body. The analysis includes the general e-Government portals, central web services, and specialised services, like taxation and criminal record extracts. The actuality of the topic lies in the fact that the security of the citizens’ personal data, used, stored and transferred by the governmental bodies can be in danger. Two examples are the loss of 25 million UK citizens’ personal data in 2007 because of a failure of the UK Customs Service and the compromise personally identifiable information of 191 million US citizens, stored in the Voter Database in 2015. The goal of the research is to check the current practice used for governmental communication, based on international standards and current practices. The study compares the e-administration systems of a country of Central Europe which is considered less developed in e-government systems and processes than a Western European country. Based on the evaluation, which can be found at the end of this study, those persons who are responsible for the operation of such systems, can see the actual benchmarks of the communication security. So, this way they can learn about the usage of what communication protocols and cryptographic algorithms are recommended and under what settings.
13

Little, Jeanette, Amanda Schmeltz, Mabel Cooper, Tabitha Waldrop, Jeffrey S. Yarvis, Larry Pruitt, and Katy Dondanville. "Preserving Continuity of Behavioral Health Clinical Care to Patients Using Mobile Devices." Military Medicine 186, Supplement_1 (January 1, 2021): 137–41. http://dx.doi.org/10.1093/milmed/usaa281.

Full text
APA, Harvard, Vancouver, ISO, and other styles
Abstract:
ABSTRACT Introduction The current model for treating behavioral health patients requires that providers and patients be in the same location for appointments. However, deploying warfighters present a challenge to this current model. Recent advances in technology make telehealth or virtual visits a viable option to replace the current model. This project leveraged mobile technology to see if performing tele-behavioral health visits presented a viable option to the current in-person model for future deployed warfighters. At the time of this publication, the authors note the current pandemic lends all the more urgency to the need for enhancing our video communication platforms for remote monitoring with the Military Health System. Materials and Methods The research team assessed existing Internet protocol-based desktop teleconferencing solutions, generically known as a Web Real-Time Communications (WebRTC) system, for establishing a secure connection to a Service Members personal mobile device outside of the Department of Defense (DoD) network. Of the five existing WebRTC systems evaluated, only the backbone component to the existing Defense Information Systems Agency Global Video Services (DISA GVS) known as Vidyo, was suitable to meet DoD security requirements and still connect with both major operating systems (OS) on mobile devices. An existing DoD program of record mobile application, mCare, was integrated with Vidyo desktop technologies to form what the research team called “Mobile Connect.” Results Deployment of the Mobile Connect product yielded distinct differences and high levels or variability between the .osd.mil and the army.mil network connections over time. These network differences impacted quality of service solution where Mobile Connect could not be used to provide care between the .mil and patient’s personal mobile devices from a osd.mil domain connection. The current DoD WebRTC systems offer potential solutions but presently cannot connect with personal mobile devices in their current configurations. Additionally, any WebRTC system used by the DoD for future connections to personal mobile device must leverage commercial Single Socket Layer certificates (e.g., not DoD issued), or the communications with the mobile device will fail as a result of an authentication error. Conclusion It is technically feasible to provide desktop Video Tele-Conference capabilities from a .mil computer to a personal mobile device without compromising DoD security and information assurance requirements using future WebRTC systems. Approved ports, protocols, and system settings must be configured to accept both inbound and outbound, encrypted traffic to/from personal mobile devices to maintain consistent quality of service with all DoD networks. Of the current DoD WebRTC options, working with the DISA GVS Program Manager to expand services to support commercial mobile devices has the highest probability of future success.
14

Horne, William Connor, and Zina Ben Miled. "Making the Case for a P2P Personal Health Record." Information 11, no. 11 (October 31, 2020): 512. http://dx.doi.org/10.3390/info11110512.

Full text
APA, Harvard, Vancouver, ISO, and other styles
Abstract:
Improved health care services can benefit from a more seamless exchange of medical information between patients and health care providers. This exchange is especially important considering the increasing trends in mobility, comorbidity and outbreaks. However, current Electronic Health Records (EHR) tend to be institution-centric, often leaving the medical information of the patient fragmented and more importantly inaccessible to the patient for sharing with other health providers in a timely manner. Nearly a decade ago, several client–server models for personal health records (PHR) were proposed. The aim of these previous PHRs was to address data fragmentation issues. However, these models were not widely adopted by patients. This paper discusses the need for a new PHR model that can enhance the patient experience by making medical services more accessible. The aims of the proposed model are to (1) help patients maintain a complete lifelong health record, (2) facilitate timely communication and data sharing with health care providers from multiple institutions and (3) promote integration with advanced third-party services (e.g., risk prediction for chronic diseases) that require access to the patient’s health data. The proposed model is based on a Peer-to-Peer (P2P) network as opposed to the client–server architecture of the previous PHR models. This architecture consists of a central index server that manages the network and acts as a mediator, a peer client for patients and providers that allows them to manage health records and connect to the network, and a service client that enables third-party providers to offer services to the patients. This distributed architecture is essential since it promotes ownership of the health record by the patient instead of the health care institution. Moreover, it allows the patient to subscribe to an extended range of personalized e-health services.
15

Gu, Baoshan, and Ing-Ray Chen. "Performance Analysis of Location-Aware Mobile Service Proxies for Reducing Network Cost in Personal Communication Systems." Mobile Networks and Applications 10, no. 4 (August 2005): 453–63. http://dx.doi.org/10.1007/s11036-005-1557-x.

Full text
APA, Harvard, Vancouver, ISO, and other styles
16

Gamzayev, Rustam, and Bohdan Shkoda. "Development and Investigation of Adaptive Micro-Service Architecture for Messaging Software Systems." Modeling Control and Information Technologies, no. 5 (November 21, 2021): 46–49. http://dx.doi.org/10.31713/mcit.2021.13.

Full text
APA, Harvard, Vancouver, ISO, and other styles
Abstract:
Messaging Software systems (MSS) are one of the most popular tools used by huge amount of people. They could be used for personal communication and for business purposes. Building an own MSS system requires analysis of the quality attributes and considering adaptation to the changing environment. In this paper an overview of existing MSS architecture was done. Data model was developed to support historical and real time data storage and processing. An own approach to build Adaptive Microservice MSS based on the messaging middleware and NoSQL database was proposed.
17

Masbullah, Masbullah, and Salmi Yuniar Bahri. "Sosialisasi Marketing Communication dalam Meningkatkan Sadar Wisata di Desa Tanjung Luar Lombok Timur." Jurnal Pengabdian Masyarakat (abdira) 2, no. 1 (January 5, 2022): 137–43. http://dx.doi.org/10.31004/abdira.v2i1.56.

Full text
APA, Harvard, Vancouver, ISO, and other styles
Abstract:
This Community Service activity was carried out in Tanjung Luar Village, East Lombok in the form of marketing communication socialization activities in increasing tourism awareness in Tanjung Luar Village. The goal is to understand public relations, personal selling, sales promotion and advertising, and improve through the application of information systems and technology and create relevant policy models. This PKM uses qualitative and field survey methods to reveal and find out the real social reality of the community. Informants who are used as partners and the main source of information are from the Tanjung Luar village government. The focus of socialization of marketing communications is to advance and promote this tourist area through individual expertise and online and in-person promotions. The results achieved in this activity are the results of effective communication for the surrounding community through online communication, implementing the potential of the Tourism Village through public relations activities, personal selling, sales promotion and advertising and packaged through system advancements and information manually and directly.
18

Song, Zhixiang, and Lingwei Dang. "Library Personalized Service System Based on Computer Network Technology." Security and Communication Networks 2022 (May 30, 2022): 1–6. http://dx.doi.org/10.1155/2022/2550820.

Full text
APA, Harvard, Vancouver, ISO, and other styles
Abstract:
In order to solve the library’s demand for computer network technology, a research on the library’s personal system service is proposed. A library-based self-service model was originally designed and developed. The system is developed from six aspects: resource association analysis and mining, reading interest analysis, data collection, personal service, personal service scheduling, and data warehouse. Secondly, it shows that this study has done some research on library application itself and completed some research. Finally, libraries can accomplish personal services in a variety of ways, such as distributing modifications, smart administrators, vertical portals, pushers, and more. In foreign libraries and universities represented by North Carolina State University and the Data and Information Center of the Chinese Academy of Sciences, the construction of personal data in digital libraries has become an important part of future development. According to the law, 57.9% and 65.0% of users ranked search engines as second only to e-mail in the China Internet Improvement Data released by the China Internet Network Information Center in 2000 and 2005, respectively.
19

Walsh, Jill, Brittany Leigh Andersen, James E. Katz, and Jacob Groshek. "Personal Power and Agency When Dealing with Interactive Voice Response Systems and Alternative Modalities." Media and Communication 6, no. 3 (September 25, 2018): 60–68. http://dx.doi.org/10.17645/mac.v6i3.1205.

Full text
APA, Harvard, Vancouver, ISO, and other styles
Abstract:
In summer 2015, we conducted an exploratory study of how people in the U.S. use and respond to robot-like systems in order to achieve their needs through mediated customer service interfaces. To understand this process, we carried out three focus groups sessions along with 50 in-depth interviews. Strikingly we found that people perceive (correctly or not) that interactive voice response customer service technology is set up to deter them from pursuing further contact. And yet, for the most part, people were unwilling to simply give up on the goals that motivated their initial contact. Consequently, they had to innovate ways to communicate with the automated systems that essentially serve as gatekeepers to their desired ends. These results have implications for communication theory and system design, especially since these systems will be increasingly presented to consumers as social media affordances evolve.
20

Wang, Bill, Yuanfei Kang, Paul Childerhouse, and Baofeng Huo. "Service supply chain integration: the role of interpersonal relationships." Industrial Management & Data Systems 118, no. 4 (May 14, 2018): 828–49. http://dx.doi.org/10.1108/imds-02-2017-0062.

Full text
APA, Harvard, Vancouver, ISO, and other styles
Abstract:
Purpose The purpose of this paper is to explore the role of interpersonal relationships (IPRs) in service supply chain integration (SSCI) in terms of strategic alliance, information integration, and process integration. Design/methodology/approach The research employs an exploratory/investigational approach to multiple case studies and empirically investigates effects of IPRs in SSCI. The data were mainly collected through semi-structured interviews with senior management staff from four service companies and their suppliers or customers in New Zealand. Archival data from the Internet and company documentations were also applied. Findings The authors find that three dimensions of IPRs influence SSCI in different ways. The effect of IPRs on SSCI is indirect: personal affection acts as an initiator, and personal credibility works as a “gate-keeper” and strengthens the confidence of interactive partners, while personal communication, a facilitator, plays a more important role in SSCI than personal affection and credibility. Practical implications The research provides managers in service supply chains the awareness of the importance of IPRs, as well as the characteristics of IPRs, in order to best utilize available resources. Managers should synergize all three dimensions of IPRs’ resources: make efforts to cultivate personal affection to avoid the instinctive isolation modern technology brings; attempt to accumulate positive personal credibility profiles; focus more on the role of personal communication and retain physical contact in SSCI processes. Originality/value This study contributes to SSCI literature by extending from the inter-organizational relationships (IORs) to interpersonal level relationships to explore the inner influence mechanism. Also, it explores the role of IPRs on all three dimensions of SSCI simultaneously rather than individual dimensions independently. Finally, it contributes to resource orchestration theory (ROT) by synthesizing three dimensions of IPRs resources, and IORs resources in order to achieve capabilities of SSCI. The study develops the individual-level research in supply chain integration (SCI) to a further depth.
21

Lau, Kam Y., David M. Cutrer, John B. Georges, and Simon Yeung. "Fiber Optic Infrastructure for Wireless Communication Networks." International Journal of High Speed Electronics and Systems 08, no. 02 (June 1997): 233–46. http://dx.doi.org/10.1142/s012915649700007x.

Full text
APA, Harvard, Vancouver, ISO, and other styles
Abstract:
It is clear that to meet the new demands of wireless customers, conventional cellular service providers and upcoming Personal Communication Service (PCS) providers for conventional phone service and high bandwidth wireless LAN must upgrade their networks to provide complete radio coverage. This evolution has motivated the need for low-cost systems that transport radio signals to and from areas of poor signal coverage. The most important area where this problem must be solved is inside of buildings, since this is where people spend most of their time. Unfortunately, the in-building enviroment is also the ost challenging area to provide radio coverage due to severe attenuation and multi-path effects. The problem must be tackled from the viewpoint of optimization of performance/cost ratio of the network. In this paper, we describe a system-level approach to tackle this problem. We demonstrate how one can trade-off hardware performance, which represent cost, with proper choice of system architecture which includes, among other factors, in-buiding radio environment, to arrive at an optimum network solution technically and economically.
22

Elder, Keith, Louise Meret-Hanke, Caress Dean, Jacqueline Wiltshire, Keon L. Gilbert, Jing Wang, Enbal Shacham, et al. "How Do African American Men Rate Their Health Care? An Analysis of the Consumer Assessment of Health Plans 2003-2006." American Journal of Men's Health 9, no. 3 (April 30, 2014): 178–85. http://dx.doi.org/10.1177/1557988314532824.

Full text
APA, Harvard, Vancouver, ISO, and other styles
Abstract:
African American (AA) men remain one of the most disconnected groups from health care. This study examines the association between AA men’s rating of health care and rating of their personal physician. The sample included 12,074 AA men aged 18 years or older from the 2003 to 2006 waves of the Consumer Assessment of Healthcare Providers and Systems Adult Commercial Health Plan Survey. Multilevel models were used to obtain adjusted means rating of health care systems and personal physician, and the relationship of ratings with the rating of personal physician. The adjusted means were 80 (on a 100-point scale) for most health ratings and composite health care scores: personal physician (83.9), specialist (83.66), health care (82.34), getting needed care (89.57), physician communication (83.17), medical staff courtesy (86.58), and customer service helpfulness (88.37). Physician communication was the strongest predictor for physician rating. AA men’s health is understudied, and additional research is warranted to improve how they interface with the health care system.
23

Anusornteerakul, Sioy, Kimaporn Khamanarong, Suranart Khamanarong, and Jadsada Thinkhamrop. "The Influence Factors That Affect Thailands Management Of Youth Reproductive Health Service." Journal of Diversity Management (JDM) 3, no. 4 (October 1, 2008): 27–32. http://dx.doi.org/10.19030/jdm.v3i4.4999.

Full text
APA, Harvard, Vancouver, ISO, and other styles
Abstract:
The management of reproductive health service for youth has become an important issue during the recent year. However, management has no clear idea about the influential factors of concern to. In this paper, we will discuss these influence factors that affect the management of youth reproductive healthcare service. Mixed methods were used for data collection, including qualitative methods that were conducted by in-dept interview and analyzed by binary logistic regression. According to the analysis, we found six factors that affect the management of reproductive health service, including (1) personal expense, (2) communication within the family, (3) fear of parents reactions, (4) the bureaucratic process of healthcare services, (5) the limitation of healthcare services, and (6) healthcare providers. Then, we reduced the six factors into three group factors that we call three systems to explain these important factors that are of concern to management of reproductive health service. These include the personnel system, service system, and the family support system.
24

Mishu, Masuma Pervin, Mehreen Riaz Faisal, Alexandra Macnamara, Wael Sabbah, Emily Peckham, Liz Newbronner, Simon Gilbody, and Lina Gega. "A Qualitative Study Exploring the Barriers and Facilitators for Maintaining Oral Health and Using Dental Service in People with Severe Mental Illness: Perspectives from Service Users and Service Providers." International Journal of Environmental Research and Public Health 19, no. 7 (April 5, 2022): 4344. http://dx.doi.org/10.3390/ijerph19074344.

Full text
APA, Harvard, Vancouver, ISO, and other styles
Abstract:
People with severe mental illness suffer from a high burden of oral diseases, which can negatively impact their physical and mental well-being. Despite the high burden, they are less likely to engage in oral health care including accessing dental services. We aimed to identify both the service users’ and service providers’ perspective on the barriers and facilitators for maintaining oral health and dental service use in people with severe mental illness. Qualitative exploration was undertaken using dyadic or one-to-one in-depth interviews with service users in the UK with a diagnosis of schizophrenia, schizoaffective disorder or bipolar disorder. Service providers, including mental health and dental health professionals, and informal carers (people identified as family or friend who are not paid carers) were also interviewed. Thematic analysis of the data revealed three main cross-cutting themes at the personal, inter-personal and systems level: amelioration of the problem, using a tailored approach and provision of comprehensive support. The main barriers identified were impact of mental ill-health, lack of patient involvement and tailored approach, and accessibility and availability of dental services including lack of integration of services. The main facilitators identified were service providers’ effective communication skills and further support through the involvement of carers. The findings suggest that the integration of dental and mental health services to provide tailored support for overall health and well-being, including the oral health of the patient, can better support people with severe mental illness regarding their oral health needs.
25

Ferrão, Sâmmara Éllen Renner, Artur Potiguara Carvalho, Edna Dias Canedo, Alana Paula Barbosa Mota, Pedro Henrique Teixeira Costa, and Anderson Jefferson Cerqueira. "Diagnostic of Data Processing by Brazilian Organizations—A Low Compliance Issue." Information 12, no. 4 (April 14, 2021): 168. http://dx.doi.org/10.3390/info12040168.

Full text
APA, Harvard, Vancouver, ISO, and other styles
Abstract:
In order to guarantee the privacy of users’ data, the Brazilian government created the Brazilian General Data Protection Law (LGPD). This article made a diagnostic of Brazilian organizations in relation to their suitability for LGPD, based on the perception of Information Technology (IT) practitioners who work in these organizations. We used a survey with 41 questions to diagnose different Brazilian organizations, both public and private. The diagnostic questionnaire was answered by 105 IT practitioners. The results show that 27% of organizations process personal data of public access based on good faith and LGPD principles. In addition, our findings also revealed that 16.3% of organizations have not established a procedure or methodology to verify that the LGPD principles are being respected during the development of services that will handle personal data from the product or service design phase to its execution and 20% of the organizations did not establish a communication process to the personal data holders, regarding the possible data breaches. The result of the diagnostic allows organizations and data users to have an overview of how the treatment of personal data of their customers is being treated and which points of attention are in relation to the principles of LGPD.
26

Fletcher, Kenneth K. "A Method for Aggregating Ranked Services for Personal Preference Based Selection." International Journal of Web Services Research 16, no. 2 (April 2019): 1–23. http://dx.doi.org/10.4018/ijwsr.2019040101.

Full text
APA, Harvard, Vancouver, ISO, and other styles
Abstract:
Typically, users' service requests, which are similar with varying preferences on non-functional attributes, may result in ranked lists of services that partially meet their needs due to conflicting non-functional attributes. The resultant multiple ranked lists of services that partially satisfies the user's request makes it challenging for the user to choose an optimal service, based on his/her preference. This work proposes a method that aggregates multiple ranked lists of services into a single aggregated ranked list, where top ranked services are selected for the user. Two algorithms are proposed; 1) Rank Aggregation for Complete Lists (RACoL), that aggregates complete ranked lists and 2) Rank Aggregation for Incomplete Lists (RAIL) to aggregate incomplete ranked lists. Examples using real-world airline services to evaluate both algorithms show that the results from both proposed algorithms closely represent the sets of ranked lists better than using alternative approaches. Experiments were also carried out to validate their performance.
27

Pérez, Eduardo, Raúl Parada, and Carlos Monzo. "An Global Emergency System Based on WPAN and LPWAN Hybrid Networks." Sensors 22, no. 20 (October 18, 2022): 7921. http://dx.doi.org/10.3390/s22207921.

Full text
APA, Harvard, Vancouver, ISO, and other styles
Abstract:
There are multiple methods of communication for the transmission of every type of alarm. In the case of emergency systems, they are usually controlled by private companies that work as bridges between the source and the receiver of an emergency. Furthermore, it is necessary to use an independent communication system for each building, requiring human vigilance, leading to an increase in infrastructure and service costs as well as response time. This paper proposes a hybrid network by combining both wireless personal access network (WPAN) and low power wide access network (LPWAN) communication for the complete development of a communication architecture oriented to an emergency system. The main aim of this work is to provide a global emergency system that is focused on fire detection but is also suitable for other critical events, with low energy consumption, a wide communication range covering up to 50 km, and a low cost of service and infrastructure. This proposal reduces the total energy consumption of the system with respect to typical fire detection systems.
28

Dou, Wanchun, Chao Lv, Xuyun Zhang, and Jinjun Chen. "A Collaborative QoS-Aware Service Evaluation Method Among Multi-Users for a Shared Service." International Journal of Web Services Research 9, no. 1 (January 2012): 30–50. http://dx.doi.org/10.4018/jwsr.2012010102.

Full text
APA, Harvard, Vancouver, ISO, and other styles
Abstract:
In service selection, an end user often has his or her personal preferences imposing on a candidate service’s non-functional properties. For a service selection process promoted by a group of users, candidate services are often evaluated by a group of end users who may have different preferences or priorities. In this situation, it is often a challenging effort to make a tradeoff among various preferences or priorities of the users. In view of this challenge, a multi-criteria decision-making method, named AHP (Analytic Hierarchy Process), is introduced to transform both qualitative personal preferences and users’ priorities into numeric weights. Furthermore, a QoS-aware service evaluation method is presented for a shared service’s co-selection taking advantage of AHP theory. At last, a case study is presented to demonstrate the feasibility of the method.
29

Li, Jingquan. "A Service-Oriented Model for Personal Health Records." Journal of Computer Information Systems 60, no. 4 (June 18, 2018): 316–25. http://dx.doi.org/10.1080/08874417.2018.1483213.

Full text
APA, Harvard, Vancouver, ISO, and other styles
30

Bani-Hani, Imad, and Eva Shepherd. "Self-Reinforcement Mechanisms of Sustainability and Continuous System Use: A Self-Service Analytics Environment Perspective." Informatics 8, no. 3 (July 15, 2021): 45. http://dx.doi.org/10.3390/informatics8030045.

Full text
APA, Harvard, Vancouver, ISO, and other styles
Abstract:
The capabilities of the people, processes, and technology are important factors to consider when exploring continuous use to create value. Multiple perceptions and attitudes towards self-service systems lead to various usage levels and outcomes. With complex analytical structures, organizations need a better understanding of IS value and users’ satisfaction. Incompatibility reduces the purpose of self-service analytics, decreasing its value and making it obsolete. In a qualitative, single case study, 20 interviews in a major digital Scandinavian marketplace were explored using the expectation–confirmation theory of continuous use to explore the mechanisms influencing the sustainability of self-service value. Two main mechanisms were identified: the personal capability reinforcement mechanism and the environment value reinforcement mechanism. This study contributes to the post-implementation and continuous use literature and self-service analytics literature and provides some practice implications to the related industry.
31

Vlasenko, Aleksandra, and Irina Korkh. "Issues of Security of Remote Banking Systems." NBI Technologies, no. 2 (December 2018): 6–10. http://dx.doi.org/10.15688/nbit.jvolsu.2018.2.1.

Full text
APA, Harvard, Vancouver, ISO, and other styles
Abstract:
The banking system of the Russian Federation is based on Federal legislation, as well as industry and inter-industry standards developed by the International community and the Central Bank of the Russian Federation. The introduction and development of remote banking services is the most popular direction in the modern banking system. The term ‘remote banking service’ refers to the technology of providing services for the remote transmission of orders by credit institutions (without clients’ presence in bank office), using different communication channels. Information security in bank-client systems is carried out by several types of protection. Client authentication is confirmed by the use of an electronic signature. The data channel and the data itself are encrypted. In order to implement the above-described functions of the bank-client system in any software, the client must first generate and register cryptographic keys with the bank and obtain electronic digital certificates. In addition to the protection of the transferred data, personal data that have entered the system of remote banking services also need protection. The research purpose is to analyze the system of remote banking services, to identify regulatory and methodological documents regulating information security issues, options for meeting the requirements of regulators. Confirmation or refutation of the issue’s urgency should be considered as research results.
32

BHATTACHARJEE, PARTHA SARATHI, DEBASHIS SAHA, and AMITAVA MUKHERJEE. "INTELLIGENT PAGING STRATEGIES FOR THIRD GENERATION PERSONAL COMMUNICATION SERVICES NETWORKS." Journal of Interconnection Networks 01, no. 03 (September 2000): 153–71. http://dx.doi.org/10.1142/s0219265900000111.

Full text
APA, Harvard, Vancouver, ISO, and other styles
Abstract:
We consider the problem of minimizing paging cost, subject to delay constraint, in Personal Communication Services Network (PSCN) and present two intelligent paging strategies for third generation systems. They are termed as sequential intelligent paging (SIP) and parallel-o-sequential intelligent paging (PSIP). Unlike the conventional blanket paging where all cells in a location area are polled at a time, in SIP (PSIP) one cell (a group of cells) is polled at a time. The proposed schemes lead to a decrease in paging signaling load at the cost of some extra processing power. When better discovery rate per cycle is expected irrespective of the incoming traffic PSIP is always preferred to other paging schemes primarily because of its less amount of polling delay. If the incoming traffic rate is low, SIP performs better than PSIP in terms of paging cost per cycle. However, the polling costs per cycle and the discovery rates for both the schemes become equal as number of paging requests per cycle increases. An improvement in respect of paging cost per cycle and discovery rate over conventional paging is shown with the help of simulation results.
33

Putra, Moody Rizqy Syailendra, Pascal Amadeo Yapputro, Maulida Syahrin Najmi, and Eriyan Rahmadani Dianova. "Protection of Personal Data of BPJS Health Users against Data Leakage." International Journal of Law and Politics Studies 4, no. 2 (November 26, 2022): 98–108. http://dx.doi.org/10.32996/ijlps.2022.4.2.11.

Full text
APA, Harvard, Vancouver, ISO, and other styles
Abstract:
The development of information and communication technology (from now on referred to as ICT) represents changes in human society from time to time. Data leakage is one of the challenges in this development. As a pioneer in implementing public service institutions, the government is challenged to tackle data leakage cases. This study aims to determine the legal relationship between BPJS health and users related to data leakage and mechanisms and to compare various personal data protections in countries with Common Law and Civil Law systems. This study uses qualitative data with a normative juridical method or approach. This study concludes that the public can sue BPJS with administrative efforts to the State Administrative Court, the Prosecutor acts on Personal Data Protection, and the results of the comparison of Personal Data Protection in 2 central legal systems.
34

Butt, Atif Saleem. "Personal relationships and supply chain communication: an exploratory case study of buyers and suppliers of logistics service provider." International Journal of Logistics Systems and Management 42, no. 4 (2022): 501. http://dx.doi.org/10.1504/ijlsm.2022.125385.

Full text
APA, Harvard, Vancouver, ISO, and other styles
35

BUTT, ATIF. "Personal Relationships and Supply Chain Communication: An Exploratory Case Study of Buyers and Suppliers of Logistics Service Provider." International Journal of Logistics Systems and Management 1, no. 1 (2020): 1. http://dx.doi.org/10.1504/ijlsm.2020.10030463.

Full text
APA, Harvard, Vancouver, ISO, and other styles
36

El-Khatib, K., Zhen E. Zhang, N. Hadibi, and G. v. Bochmann. "Personal and service mobility in ubiquitous computing environments." Wireless Communications and Mobile Computing 4, no. 6 (September 2004): 595–607. http://dx.doi.org/10.1002/wcm.231.

Full text
APA, Harvard, Vancouver, ISO, and other styles
37

May, Jerry R., and Linda Brown. "Delivery of Psychological Services to the U.s. Alpine Ski Team Prior to and during the Olympics in Calgary." Sport Psychologist 3, no. 4 (December 1989): 320–29. http://dx.doi.org/10.1123/tsp.3.4.320.

Full text
APA, Harvard, Vancouver, ISO, and other styles
Abstract:
A broad spectrum systems theory approach to the delivery of psychological services is presented. The target population includes the athletes, coaches, administrators, ski company representatives, and family members. The delivery of service involves individual dyadic and group sessions. The methods of service include educational, clinical, organizational, and a research data base. The major goal is to instill individual self-monitoring and self-control of personal well-being and achievement. Utilizing several theoretical frameworks such as behavioral, cognitive, humanistic, group dynamics, and insight oriented has worked best. Success of the program is multifactored: (a) being willing to commit a major amount of time to a single sport; (b) providing a broad range of services, from mental skills training, crises intervention, injury prevention and rehabilitation to team building, communication, and referral of individual to practitioners; (c) attending to organizational issues and program evaluation; and (d) common sense, practicability, and a willingness to be flexible with programs.
38

Dong, Jian, Xiaping Yu, and Guoqiang Hu. "Design of a Compact Quad-Band Slot Antenna for Integrated Mobile Devices." International Journal of Antennas and Propagation 2016 (2016): 1–9. http://dx.doi.org/10.1155/2016/3717681.

Full text
APA, Harvard, Vancouver, ISO, and other styles
Abstract:
In order to incorporate different communication standards into a single device, a compact quad-band slot antenna is proposed in this paper. The proposed antenna is composed of a dielectric substrate, T-shaped microstrip patch with a circle slot and an inverted L-slot, and a comb-shaped ground on the back of the substrate. By adopting these structures, it can produce four different bands, while maintaining a small size and a simple structure. Furthermore, a prototype of the quad-band antenna is designed and fabricated. The simulated and measured results show that the proposed antenna can operate over the 1.79–2.63 GHz, 3.46–3.97 GHz, 4.92–5.85 GHz, and 7.87–8.40 GHz, which can cover entire PCS (Personal Communications Service, 1.85–1.99 GHz), UMTS (Universal Mobile Telecommunications System, 1.92–2.17 GHz), WCDMA (wideband code-division multiple access, 2.1 GHz), Bluetooth (2.4–2.48 GHz), WiBro (Wireless Broad band access service, 2.3–3.39 GHz), WLAN (Wireless Local Area Networks, 2.4/5.2/5.8 GHz), WiMAX (Worldwide Interoperability for Microwave Access, 2.5/3.5/5.5 GHz), and X-band SATcom applications (7.9~8.4 GHz). The proposed antenna is particularly attractive for mobile devices integrating multiple communication systems.
39

Lim, Mian-Guan, Sining Wu, Tomasz Simon, Md Rashid, and Na Helian. "Personal Storage Grid Architecture." International Journal of Grid and High Performance Computing 2, no. 3 (July 2010): 17–30. http://dx.doi.org/10.4018/jghpc.2010070102.

Full text
APA, Harvard, Vancouver, ISO, and other styles
Abstract:
On-demand cloud applications like online email accounts and online virtual disk space are becoming widely available in various forms. In cloud applications, one can see the importance of underlying resources, such as disk space, that is available to the end-user but not easily accessible. In the authors’ study, a modern file system developed in linux is proposed, which enables consuming of cloud applications and making the underlying disk space resource available to the end-user. This system is developed as a web service to support cross operation system support. A free online mail account was used to demonstrate this solution, and an IMAP protocol to communicate with remote data spaces was used so that this method can mount onto any email system that supports IMAP. The authors’ definition of infinite storage as the user is able to mount file systems as a single logical drive.
40

Rong, Wenge, Baolin Peng, Yuanxin Ouyang, Kecheng Liu, and Zhang Xiong. "Collaborative personal profiling for web service ranking and recommendation." Information Systems Frontiers 17, no. 6 (May 10, 2014): 1265–82. http://dx.doi.org/10.1007/s10796-014-9495-4.

Full text
APA, Harvard, Vancouver, ISO, and other styles
41

Yang, Ming, Tilei Gao, Rong Jiang, Li Jia, and Di Yang. "Comprehensive Assessment of Mobile Service Privacy Security Based on FAHP and D–S Theory." Wireless Communications and Mobile Computing 2022 (February 23, 2022): 1–20. http://dx.doi.org/10.1155/2022/9547533.

Full text
APA, Harvard, Vancouver, ISO, and other styles
Abstract:
As an indispensable medium for people’s daily life and communication, mobile applications provide users with a variety of services. In order to enjoy these services, users inevitably need to provide personal privacy information or authorization to application providers in the process of use. In the case of insufficient privacy security evaluation, even if users use the applications verified by the application market, their privacy security will be threatened because of their weak awareness of privacy protection. Therefore, in order to ensure the privacy security of users, this paper establishes a mobile service assessment attribute model including 3 risk categories and 11 risk indicators. Based on this model, this paper proposes a service risk weight assessment method based on FAHP (fuzzy analytical hierarchy process), defines the risk level and its trust degree from two aspects of risk frequency and risk loss, and puts forward a reasonable fusion method for different assessment results of risk level based on D–S (Dempster–Shafer) theory, so as to realize the multidimensional and multilayer assessment of mobile service risk. Finally, the case analysis shows that the method proposed in this paper is reasonable and feasible and has important value for improving the security of mobile services and managing users’ privacy information.
42

Alruwaie, Mubarak. "The Role of Social Influence and Prior Experience on Citizens' Intention to Continuing to Use E-Government Systems." International Journal of Electronic Government Research 10, no. 4 (October 2014): 1–20. http://dx.doi.org/10.4018/ijegr.2014100101.

Full text
APA, Harvard, Vancouver, ISO, and other styles
Abstract:
The increasing use of the Internet over recent years has forced governments and individuals to utilise Information & Communication Technology (ICT) in the form of electronic government (e-government). However, the success of e-government delivery is dependent on usage generally but also on growing concerns about perceived social influence and prior experience of e-government service usage; this is in order to ensure better utilisation of ICT investments by retaining current users. Few studies have investigated the influences of perceived social influence and prior experience on personal factors, such as self-efficacy, personal outcome expectation and satisfaction, towards intention to the continual use of e-government systems. To fill this gap, the present research develops a conceptual framework by associating it with citizens' prior experience. A conceptual framework of six constructs is developed by integrating Social Cognitive Theory (SCT) and Expectation Confirmation Theory (ECT). Theoretically, the present study extends the roles of pre-adoption and post-adoption by offering a self-regulating process through self-efficacy as a physical ability. Further, the study reveals the importance of social influence and prior experience as well as personal outcome expectation and satisfaction as cognitive factors that represent personal goal assessments.
43

Mccool, Judith, Janine Hill, Rosie Dobson, and Robyn Whittaker. "Access to ICT in the Pacific Islands region: a brief report." Pacific Health Dialog 21, no. 6 (November 30, 2020): 347–50. http://dx.doi.org/10.26635/phd.2020.642.

Full text
APA, Harvard, Vancouver, ISO, and other styles
Abstract:
Abstract Mobile technologies are an essential component necessary for the functioning of contemporary health systems. The advent of digital health represents a logical collaboration between the need for greater efficiencies in health service delivery and systems and the rapid expansion of personal mobile devices. Worldwide mobile subscriptions are expected to reach 8.9bn, smartphone subscriptions 7.2bn and mobile broadband 8.3bn 1. For many countries, mobile subscriptions exceed population numbers; the Pacific Islands region is no different 1. Yet within the region huge diversity in access to information and communication technologies (ICT) contributes to gradual progress in implementing digital health initiatives that could accelerate and extend measures to improve public health.
44

Huer, Mary Blake, and Travis T. Threats. "Shared Responsibilities for Full Participation in Society: Planning Further Integration of the ICF Into AAC." Perspectives of the ASHA Special Interest Groups 1, no. 12 (March 31, 2016): 83–93. http://dx.doi.org/10.1044/persp1.sig12.83.

Full text
APA, Harvard, Vancouver, ISO, and other styles
Abstract:
The World Health Organization's (WHO's) 2001 International Classification of Functioning Disability and Health (ICF) has as one of its central tenets the full inclusion of persons with disabilities in society. It acknowledges the need for medical and rehabilitation intervention in its biopscychosocial framework. However, the WHO realizes that society must do its part to facilitate this full participation and empowerment. Persons with complex communication needs (PWCCN) often need augmentative and alternative communication (AAC) in order to express themselves. However, in order to access and successfully use AAC, PWCCN need access to the necessary AAC devices and services, as well as a willing society to interact with them as full contributing members of society. The factors outside of a person's specific physical and/or cognitive functional limitations are addressed in the ICF via the Personal and Environmental Factors. Personal Factors include the individual's personality traits, lifestyle, experiences, social/educational/professional background, race, gender, and age. Environmental Factors include community support systems, social service agencies, governments, social networks, and those persons that interact with the PWCCN. This article addresses the sociopolitical influences on PWCCN and their functioning from a human rights perspective. The necessary introspective role of speech-language pathologists in this process is explored.
45

You, Linlin, Junshu He, Juanjuan Zhao, and Jiemin Xie. "A Federated Mixed Logit Model for Personal Mobility Service in Autonomous Transportation Systems." Systems 10, no. 4 (August 10, 2022): 117. http://dx.doi.org/10.3390/systems10040117.

Full text
APA, Harvard, Vancouver, ISO, and other styles
Abstract:
Looking ahead to the future-stage autonomous transportation system (ATS), personal mobility service (PMS) aims to provide the recommended travel options based on both microscopic individual travel demand and the macroscopic supply system objectives. Such a goal relies on massive heterogeneous data to interpret and predict user travel intentions, facing the challenges caused by prevalent centralized approaches, such as an unbalanced utilization rate between cloud and edge, and data privacy. To fill the gap, we propose a federated logit model (FMXL), for estimating user preferences, which integrates a discrete choice model—the mixed logit model (MXL), with a novel decentralized learning paradigm—federated learning (FL). FMXL supports PMS by (1) respectively performing local and global estimation at the client and server to optimize the load, (2) collaboratively approximating the posterior of the standard mixed logit model through a continuous interaction mechanism, and (3) flexibly configuring two specific global estimation methods (sampling and aggregation) to accommodate different estimation scenarios. Moreover, the predicted rates of FMXL are about 10% higher compared to a flat logit model in both static and dynamic estimation. Meanwhile, the estimation time has been reduced by about 40% compared to a centralized MXL model. Our model can not only protect user privacy and improve the utilization of edge resources but also significantly improve the accuracy and timeliness of recommendations, thus enhancing the performance of PMS in ATS.
46

Yang, Yuanyuan. "Optimization Strategy of IoT Sensor Configuration Based on Genetic Algorithm-Neural Network." Journal of Sensors 2021 (August 22, 2021): 1–12. http://dx.doi.org/10.1155/2021/5098013.

Full text
APA, Harvard, Vancouver, ISO, and other styles
Abstract:
This article carries out the overall design framework of the IoT sensor data processing platform and analyzes the advantages of using the integrated construction platform. The platform is divided into two parts, a web management platform and a data communication system, and interacts with the database by integrating the business layers of the two into one. The web management platform provides configurable communication protocol customization services, equipment information, personal information, announcement information management services, and data collection information monitoring and analysis services. The collected data is analyzed by the sensor data communication service system and then provided to the web management platform for query and call. This paper discusses the theoretical basis of the combination of genetic algorithm and neural network and proposes the necessity of improving genetic algorithm. The improved level involves chromosome coding methods, fitness function selection, and genetic manipulation. We propose an improved genetic algorithm and use an improved genetic algorithm (IGA) to optimize the neural network structure. The finite element method is adopted, the finite element model is established, and the shock piezoelectric response is numerically simulated. The genetic neural network method is used to simulate the collision damage location detection problem. The piezoelectric sensor is optimized, and the optimal sensor configuration corresponding to its initial layout is obtained, which provides guidance for the optimal configuration of the actual piezoelectric sensor.
47

Ringelstein, Christoph, and Steffen Staab. "DiALog." International Journal of Web Services Research 7, no. 2 (April 2010): 1–20. http://dx.doi.org/10.4018/jwsr.2010040101.

Full text
APA, Harvard, Vancouver, ISO, and other styles
Abstract:
Service-oriented systems facilitate business workflows to span multiple organizations (e.g., by means of Web services). As a side effect, data may be more easily transferred over organizational boundaries. Thus, privacy issues arise. At the same time, there are personal, business and legal requirements for protecting privacy and IPR and allowing customers to request information about how and by whom their data was handled. Managing these requirements constitutes an unsolved technical and organizational problem. The authors propose to solve the information request problem by attaching meta-knowledge about how data was handled to the data itself. The authors present their solution, in form of an architecture, a formalization and an implemented prototype for logging and collecting logs in service-oriented and cross-organizational systems.
48

Girtsou, Christina, Pantelis Stergiannis, Theoharis Konstantinidis, and Georgios Martinis. "The Personal Electronic Health Folder and the usefulness of electronic systems to improve health services." Hellenic Journal of Nursing Science 13, no. 4 (December 31, 2020): 19–25. http://dx.doi.org/10.24283/hjns.202042.

Full text
APA, Harvard, Vancouver, ISO, and other styles
Abstract:
Continuity in patient healthcare shows significant gaps and variations, due to reduced communication between healthcare services. The information transfer to all stages of health structures is often inadequate with many variations, especially at the critical stage after discharge from the hospital, in which patients are usually more vulnerable. The major problem of the lack of interconnection between healthcare services occurs mainly among the elderly, the chronically ill and those who take a lot medication. The main effects of this problem are medication side effects, treatment overlap, poor quality of healthcare and financial costs. Enhancing communication, through the electronic interface and the use of the Personal Electronic Health Folder (P.E.H.F.), which will include the individual details of each patient and information about his clinical status, is aiming at the use of best practices for patient recovery by healthcare providers. The thorough literature review, the strategic analysis PESTEL and the control process, pointed out the need to use the P.E.H.F., to achieve substantial improvements in the quality of patient healthcare. With the practical use of P.E.H.F., the healthcare of all patients will be unquestionably, safe, effective, patient-centered, immediate and fair.
49

Helmi, Mochamat, Djayanti Sari, Andreasta Meliala, and Laksono Trisnantoro. "What Is Preparedness and Capacity of Intensive Care Service in Indonesia to Response to COVID-19? A Mixed-method Study." Open Access Macedonian Journal of Medical Sciences 9, B (December 13, 2021): 1686–94. http://dx.doi.org/10.3889/oamjms.2021.7626.

Full text
APA, Harvard, Vancouver, ISO, and other styles
Abstract:
BACKGROUND: Pandemics can increase disease spread, as well as unpredictable and highly in patient demand, which can have a negative impact on hospital capacity and the overall functioning of the health-care system. The preparedness and capacity of intensive care services to respond to COVID-19 in Indonesia are remain unknown. AIM: This study aimed to investigate the preparedness and capacity of intensive care services in Indonesia to respond to the initial stage of the COVID-19 pandemic. METHODS: A mixed-method research design was used in this study using in-depth interviews and an online survey. An in-depth interview was conducted with the medical team (intensive care consultant and an anesthesiologist) who is actively involved in the provision of COVID-19 services in 15 national referral hospitals. The online survey was conducted to all medical teams that provide direct care to the COVID-19 patients. A total of 459 (response rate was 95.2%) agreed to join the survey. The content analysis technique was used to analyze qualitative data and a descriptive analysis was used to describe issues encountered in providing health services to COVID-19 patients. RESULTS: The analysis preparedness and capacity of intensive care service in Indonesia to respond to the initial stage of the COVID-19 pandemic resulting in 4 themes with 12 sub-themes. The four themes were limited quality and quantity of standardized intensive care unit (ICU) isolation room (inadequate zoning systems, adequacy of the standardized ICU isolation room, the readiness of the hospital infrastructure, and telemedicine facilities are not yet widely used, including in the COVID-19 isolation room), limited medical service support (lack of personal protective equipment (personal protective equipment [PPE], re-used PPE, lack of availability of medical devices), limitations in the medical team’s quality and quantity management (lack of number and distribution of expert doctors and medical team screening for ICU), and command systems (task shifting, effective communication, and leadership). CONCLUSION: Medical team encounters several difficulties, particularly related to the quality of facilities, staff preparedness, and systems for the provision of services to COVID-19 patients with critical conditions. There is a critical need for well-defined pathways, legal protection, and occupational health for medical teams providing services in the aftermath of a pandemic.
50

Yang, Pan, Xiaolin Gui, Jian An, and Feng Tian. "An Efficient Secret Key Homomorphic Encryption Used in Image Processing Service." Security and Communication Networks 2017 (2017): 1–11. http://dx.doi.org/10.1155/2017/7695751.

Full text
APA, Harvard, Vancouver, ISO, and other styles
Abstract:
Homomorphic encryption can protect user’s privacy when operating on user’s data in cloud computing. But it is not practical for wide using as the data and services types in cloud computing are diverse. Among these data types, digital image is an important personal data for users. There are also many image processing services in cloud computing. To protect user’s privacy in these services, this paper proposed a scheme using homomorphic encryption in image processing. Firstly, a secret key homomorphic encryption (IGHE) was constructed for encrypting image. IGHE can operate on encrypted floating numbers efficiently to adapt to the image processing service. Then, by translating the traditional image processing methods into the operations on encrypted pixels, the encrypted image can be processed homomorphically. That is, service can process the encrypted image directly, and the result after decryption is the same as processing the plain image. To illustrate our scheme, three common image processing instances were given in this paper. The experiments show that our scheme is secure, correct, and efficient enough to be used in practical image processing applications.

To the bibliography