To see the other types of publications on this topic, follow the link: Personal communication service systems.

Journal articles on the topic 'Personal communication service systems'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 journal articles for your research on the topic 'Personal communication service systems.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.

1

BAFTIU, Naim, Ahmet NUREDINI, and Samedin KRRABAJ. "Encrypted Data Service for Security Electronic Communications." PRIZREN SOCIAL SCIENCE JOURNAL 3, no. 3 (December 26, 2019): 84. http://dx.doi.org/10.32936/pssj.v3i3.120.

Full text
Abstract:
The law on electronic communications has so far enumerated a considerable number of natural persons, legal entities as well as public institutions that use code systems and crypto devices during communication. Of particular interest is addressing the key role of operators and providers of encrypted data services in combating abuses committed through or against computer systems as the responsible performance of their duties to protect the security of networks and computer systems affects significantly in controlling illegal risks and attacks. In this perspective, the specific legal obligations for the protection of privacy regarding personal data that are processed for the purpose of providing information services are also analyzed. The purpose of the paper is, Utilizing communication between two parties sharing a common key, implementing a shared key to protect data communicated with different security attributes, Role of cryptography in data protection during communication, and Focus on privacy. Of the data communicated, against their authenticity. Keywords: Communication, Security, Electronic privacy
APA, Harvard, Vancouver, ISO, and other styles
2

Park, Daeun, and Sangeun Shin. "A Survey on AAC Fringe Vocabulary to Support Personal Assistance Service." Communication Sciences & Disorders 26, no. 4 (December 31, 2021): 820–33. http://dx.doi.org/10.12963/csd.21862.

Full text
Abstract:
Objectives: There are increasing demands for personal assistance services which help the disabled to carry out their daily life. To use augmentative and alternative communication (AAC) approaches more effectively in daily communication, it is essential to include the appropriate core and fringe vocabulary in the AAC system. Considering the fact that there are few studies in Korea which have reported fringe vocabulary compared to core vocabulary, this study is aimed to develop a noun list that can be used to promote interactive communication between the disabled and their assistants in each communication situation.Methods: A literature review was conducted to elicit frequently used nouns in each communication situation. Then, a survey was carried out to identify nouns with high word commonality across 105 personal assistants.Results: Sixty-three nouns with more than 50% of word commonality across personal assistants were identified from the 244 fringe vocabulary; consisting of 112 nouns in the area of going out, 29 in cleaning, 27 in personal hygiene, 26 in cooking, 20 in meal supporting, 20 in other service areas, and 10 in commuting.Conclusion: The identified nouns are expected to help people with complex communication needs to express their needs and wants more clearly and effectively using those nouns embedded in their AAC systems. The list of nouns can be used not only for people who receive personal assistance services, but also for people who rely on AAC systems to express their daily needs.
APA, Harvard, Vancouver, ISO, and other styles
3

Korzun, Dmitry G., Ilya Nikolaevskiy, and Andrei Gurtov. "Service Intelligence and Communication Security for Ambient Assisted Living." International Journal of Embedded and Real-Time Communication Systems 6, no. 1 (January 2015): 76–100. http://dx.doi.org/10.4018/ijertcs.2015010104.

Full text
Abstract:
Mobile health (m-Health) scenarios and Internet of Things (IoT) technologies form an important direction for enhancing medical systems for Ambient Assisted Living (AAL). Yet current development meets with two challenges: 1) use of patient's health data with strong security guarantees in mobile network and resource-constrained assumptions and in emergency situations, 2) inclusion of personal data to the entire system for “smart” service construction and delivery. This paper presents a smart space based architectural model that adopts emerging IoT technologies to enable security of personal mobile data and their intelligent utilization in health services. To support the service intelligence, the authors employ the smart spaces approach with its prominent technologies adopted from IoT and Semantic Web. The intelligence and security solutions are considered symbiotic to present better user-experience, security level, and utility of a system.
APA, Harvard, Vancouver, ISO, and other styles
4

DURRESI, Mimoza. "Ad-hoc wireless sensor communications for health monitoring systems." Ingenious 2, no. 1 (2022): 7–14. http://dx.doi.org/10.58944/rycc2468.

Full text
Abstract:
The Covid 19 challenge, the increased aging population, and the modern way of living are increasing the need for health monitoring communications services. Healthcare monitoring is a very important research field of study. This is related in finding new, more efficient ways in health data communications with three main quality of service requirements: low delay, high security, high quality data transmission. Considering these requirements and recent developments in domestical health monitoring services, it is important not only the equipment used for health monitoring sensing but also the communication protocol used to access the data center. In this paper we develop a new communication protocol for ad-hoc wireless network created by the sensors used for personal health monitoring systems installed in patient wrists. This is a hierarchical protocol where the sensors communicate through a virtual infrastructure that helps to collect the data from the personal health monitoring equipments in an efficient way even in the areas with no wireless infrastructure. The communication scheme ensures a hierarchy of nodes that gets translated to hierarchy of costs as only a few nodes need to have a larger processing power resulting in a lower battery consumption for most of the patients. The neighbourhood area is divided into virtual cells where each cell is represented from one node center that holds the communication for all the surrounded nodes and forwards its information towards the next cell center found in the direction of the sink. As a result the information collected even in the fields without any wireless infrastructure might be carried towards the cells that are in a communication distance with the sink. The updated information data is forwarded toward the data centers to be analysed by the specialists. Taking in consideration that even in the urban areas the elderly population doesn’t have internet services, this ad-hoc communication protocol represents a good solution for health monitoring equipments. Moreover, the same communication protocol can be used for signaling life signs in war areas.
APA, Harvard, Vancouver, ISO, and other styles
5

Jian, Weitao, Kunxu Chen, Junshu He, Sifan Wu, Hongli Li, and Ming Cai. "A Federated Personal Mobility Service in Autonomous Transportation Systems." Mathematics 11, no. 12 (June 14, 2023): 2693. http://dx.doi.org/10.3390/math11122693.

Full text
Abstract:
A personal mobility service (PMS) is developed to support personalized travel options for users in autonomous transportation systems (ATS), based on a macro-system state and micro-user behavior. However, this functionality necessitates processing and transmitting vast amounts of data, raising concerns about user privacy protection during data processing and transmission within the PMS. Furthermore, the PMS must be maintained and perform well, while preserving privacy. Therefore, we propose a novel federated PMS, denoted as a FPMS. Specifically, the FPMS can serve users’ personal mobility needs by facilitating the collaboration between the physical and information domains. Then, a common framework for FPMS architectures, which captures the features of ATSs, is proposed and discussed from both physical and logical perspectives, which include both the logical architecture and physical architecture; and we present the key algorithms for the FPMS, in conjunction with a artificial neural network (ANN). Additionally, in static estimation scenarios, the FPMS demonstrated a similar accuracy for three different models compared to the traditional PMS, while reducing the computing time by approximately 60% and communication resource consumption by approximately 85%.
APA, Harvard, Vancouver, ISO, and other styles
6

Miskovic, Vanja, and Djordje Babic. "Pervasive Personal Healthcare Service Designed as Mobile Social Network." International Journal of Interactive Mobile Technologies (iJIM) 10, no. 4 (October 25, 2016): 65. http://dx.doi.org/10.3991/ijim.v10i4.5913.

Full text
Abstract:
A global phenomenon of population ageing and an increasing number of patients with chronic diseases place substantial additional pressure on healthcare systems. A possible solution for this problem is a new emerging sort of pervasive personal healthcare service that is focused on the patient and allows the patient to be actively involved in his or her own health care. In this paper, we propose the architecture of the pervasive personal healthcare service which is based on the existing technologies available to almost everyone. Along with the conventional request-response synchronous communication, the proposed system features asynchronous communication based on publish-subscribe-notify model. In order to perform asynchronous communication, a web application server is integrated with the Google Cloud Messaging service. The communication between mobile device and servers is carried out through the available Wi-Fi or mobile networks, whereas Bluetooth protocol is conventional for Body Sensor Networks consisting of wearable sensor devices. We also present a mobile application which has been developed with use-case driven approach for both patients and medical personnel. The introduced application has a form of a nonintrusive customized mobile social network. We explain usage scenarios that clarify the required functions and present conclusions based on the system test.
APA, Harvard, Vancouver, ISO, and other styles
7

Smith, Alan D. "E-Personalization and Its Tactical and Beneficial Relationships to E-Tailing." International Journal of Information Systems in the Service Sector 4, no. 2 (April 2012): 48–71. http://dx.doi.org/10.4018/jisss.2012040104.

Full text
Abstract:
The numerous advancements in electronic-personalization communication have generated both benefits and challenges as online retailers try to regain competitive advantages in the current global recession. Through appropriate multivariate analyses and data-reduction techniques, the basic elements e-personalization, namely online purchasing behaviors, personalized communications, information retrieval services, degree of personal web presence, quality assurance of customer service, and the promotion of customization services, were found to be conceptually and statistically related to retailer benefits of e-personalization (increased buying and creates customer loyalty) from the viewpoint of managers for a large goods and services chain store headquartered in Pittsburgh, Pennsylvania.
APA, Harvard, Vancouver, ISO, and other styles
8

Hung-Yu Lin and Lein Harn. "Authentication protocols with nonrepudiation services in personal communication systems." IEEE Communications Letters 3, no. 8 (August 1999): 236–38. http://dx.doi.org/10.1109/4234.781006.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Kuraś, Paweł, Patryk Organiściak, Bartosz Kowal, Veronika Vanivska, Krzysztof Smalara, Krzysztof Demidowski, and Piotr Krawiec. "IOT COMMUNICATION SECURITY: CHALLENGES AND SOLUTIONS." Zeszyty Naukowe SGSP 2, no. 88 (February 24, 2024): 69–90. http://dx.doi.org/10.5604/01.3001.0054.3829.

Full text
Abstract:
This paper investigates the obstacles and resolutions concerning the security of communicationin the Internet of Things (IoT). It commences with a discussion of the remarkable proliferationof internet-connected devices, ranging from personal computers to mobile devices, and now tothe era of IoT and IoE. The paper illuminates the impact of IoT on network addresses, leading tothe depletion of IPv4 addresses and the necessity for address translation services. Subsequently,the article delves into the risks confronted by IoT systems, encompassing physical and digitalassaults, unauthorized access, system failures, as well as diverse forms of malicious software. Thesignificance of IoT security in industrial and agricultural systems is underscored. Finally, the paperconcludes by presenting strategies to combat these risks, including antivirus countermeasures,safeguards against Distributed Denial-of-Service (DDoS) attacks, and security considerations inIoT systems for agriculture. In essence, this paper offers valuable insights into the challenges andsolutions associated with ensuring the security of IoT communication.
APA, Harvard, Vancouver, ISO, and other styles
10

Yacouba, Kouraogo, Orhanou Ghizlane, and Elhajji Said. "Securing Communication 2FA Using Post-Quantic Cryptosystem." International Journal of Information Security and Privacy 14, no. 2 (April 2020): 102–15. http://dx.doi.org/10.4018/ijisp.2020040106.

Full text
Abstract:
Many financial institutions interact with their customers via short message services (SMS), which is today one of the fastest and most powerful means of communicating information around the world. This information can sometimes be an access code such as the unique password (OTP) for two-factor authentication (2FA) or banking information and personal identities. All this data is confidential, and it is a major disadvantage to send them since an SMS service does not provide data encryption during network transmission and on mobile. Recently, OTPs via SMS have suffered from strong attacks that intercept messages. In order to avoid attacks and offer effective content security to 2FA credentials sent via SMS, the authors propose an SMS encryption mechanism using a post quantic cryptosystem quasi-cyclic MDPC and an electronic signature of the OTPs. Finally, this article performs an implementation and a security analysis of the proposal.
APA, Harvard, Vancouver, ISO, and other styles
11

Ing-Ray Chen, Baoshan Gu, and Sheng-Tzong Cheng. "On Integrated Location and Service Management for Minimizing Network Cost in Personal Communication Systems." IEEE Transactions on Mobile Computing 5, no. 2 (February 2006): 179–92. http://dx.doi.org/10.1109/tmc.2006.23.

Full text
APA, Harvard, Vancouver, ISO, and other styles
12

Korhonen, Vesa A., and Ritva Pyykkönen. "Utilizing Context in Location-Aware Short-Range Wireless Communication." International Journal of Digital Multimedia Broadcasting 2010 (2010): 1–12. http://dx.doi.org/10.1155/2010/417213.

Full text
Abstract:
We discuss how a short-range wireless communication service implemented for modern mobile communication devices can provide additional value for both the consumer and the service/product provider. When used as an information search tool, such systems allow services and products being promoted at the location they are available. For the customer, it may provide a “digitally augmented vision”, an enhanced view to the current environment. With data filtering and search rules, this may provide a self-manageable context, where the user's own personal environment and preferences to the features available in the current surroundings cooperate with a direct connection to the web-based social media. A preliminary design for such service is provided. The conclusion is that the method can generate additional revenue to the company and please the customers' buying process. In addition to the marketing, the principles described here are also applicable to other forms of human interaction.
APA, Harvard, Vancouver, ISO, and other styles
13

Vemou, Konstantina, and Maria Karyda. "Requirements for private communications over public spheres." Information & Computer Security 28, no. 1 (November 11, 2019): 68–96. http://dx.doi.org/10.1108/ics-01-2019-0002.

Full text
Abstract:
Purpose In the Web 2.0 era, users massively communicate through social networking services (SNS), often under false expectations that their communications and personal data are private. This paper aims to analyze privacy requirements of personal communications over a public medium. Design/methodology/approach This paper systematically analyzes SNS services as communication models and considers privacy as an attribute of users’ communication. A privacy threat analysis for each communication model is performed, based on misuse scenarios, to elicit privacy requirements per communication type. Findings This paper identifies all communication attributes and privacy threats and provides a comprehensive list of privacy requirements concerning all stakeholders: platform providers, users and third parties. Originality/value Elicitation of privacy requirements focuses on the protection of both the communication’s message and metadata and takes into account the public–private character of the medium (SNS platform). The paper proposes a model of SNS functionality as communication patterns, along with a method to analyze privacy threats. Moreover, a comprehensive set of privacy requirements for SNS designers, third parties and users involved in SNS is identified, including voluntary sharing of personal data, the role of the SNS platforms and the various types of communications instantiating in SNS.
APA, Harvard, Vancouver, ISO, and other styles
14

Szádeczky, Tamás. "Security of E-Government Website Encryption in Germany and Hungary." Academic and Applied Research in Military and Public Management Science 17, no. 2 (June 30, 2018): 127–38. http://dx.doi.org/10.32565/aarms.2018.2.9.

Full text
Abstract:
The paper deals with comparative research of the communication security of e-Government services in Germany and Hungary. The focus point of the research is to analyse the cryptographic security algorithms and protocols which encrypt communication in the relations of the citizen and a governmental body. The analysis includes the general e-Government portals, central web services, and specialised services, like taxation and criminal record extracts. The actuality of the topic lies in the fact that the security of the citizens’ personal data, used, stored and transferred by the governmental bodies can be in danger. Two examples are the loss of 25 million UK citizens’ personal data in 2007 because of a failure of the UK Customs Service and the compromise personally identifiable information of 191 million US citizens, stored in the Voter Database in 2015. The goal of the research is to check the current practice used for governmental communication, based on international standards and current practices. The study compares the e-administration systems of a country of Central Europe which is considered less developed in e-government systems and processes than a Western European country. Based on the evaluation, which can be found at the end of this study, those persons who are responsible for the operation of such systems, can see the actual benchmarks of the communication security. So, this way they can learn about the usage of what communication protocols and cryptographic algorithms are recommended and under what settings.
APA, Harvard, Vancouver, ISO, and other styles
15

Lu, Yaobin, Zhaohua Deng, and Bin Wang. "Exploring factors affecting Chinese consumers' usage of short message service for personal communication." Information Systems Journal 20, no. 2 (March 2010): 183–208. http://dx.doi.org/10.1111/j.1365-2575.2008.00312.x.

Full text
APA, Harvard, Vancouver, ISO, and other styles
16

Little, Jeanette, Amanda Schmeltz, Mabel Cooper, Tabitha Waldrop, Jeffrey S. Yarvis, Larry Pruitt, and Katy Dondanville. "Preserving Continuity of Behavioral Health Clinical Care to Patients Using Mobile Devices." Military Medicine 186, Supplement_1 (January 1, 2021): 137–41. http://dx.doi.org/10.1093/milmed/usaa281.

Full text
Abstract:
ABSTRACT Introduction The current model for treating behavioral health patients requires that providers and patients be in the same location for appointments. However, deploying warfighters present a challenge to this current model. Recent advances in technology make telehealth or virtual visits a viable option to replace the current model. This project leveraged mobile technology to see if performing tele-behavioral health visits presented a viable option to the current in-person model for future deployed warfighters. At the time of this publication, the authors note the current pandemic lends all the more urgency to the need for enhancing our video communication platforms for remote monitoring with the Military Health System. Materials and Methods The research team assessed existing Internet protocol-based desktop teleconferencing solutions, generically known as a Web Real-Time Communications (WebRTC) system, for establishing a secure connection to a Service Members personal mobile device outside of the Department of Defense (DoD) network. Of the five existing WebRTC systems evaluated, only the backbone component to the existing Defense Information Systems Agency Global Video Services (DISA GVS) known as Vidyo, was suitable to meet DoD security requirements and still connect with both major operating systems (OS) on mobile devices. An existing DoD program of record mobile application, mCare, was integrated with Vidyo desktop technologies to form what the research team called “Mobile Connect.” Results Deployment of the Mobile Connect product yielded distinct differences and high levels or variability between the .osd.mil and the army.mil network connections over time. These network differences impacted quality of service solution where Mobile Connect could not be used to provide care between the .mil and patient’s personal mobile devices from a osd.mil domain connection. The current DoD WebRTC systems offer potential solutions but presently cannot connect with personal mobile devices in their current configurations. Additionally, any WebRTC system used by the DoD for future connections to personal mobile device must leverage commercial Single Socket Layer certificates (e.g., not DoD issued), or the communications with the mobile device will fail as a result of an authentication error. Conclusion It is technically feasible to provide desktop Video Tele-Conference capabilities from a .mil computer to a personal mobile device without compromising DoD security and information assurance requirements using future WebRTC systems. Approved ports, protocols, and system settings must be configured to accept both inbound and outbound, encrypted traffic to/from personal mobile devices to maintain consistent quality of service with all DoD networks. Of the current DoD WebRTC options, working with the DISA GVS Program Manager to expand services to support commercial mobile devices has the highest probability of future success.
APA, Harvard, Vancouver, ISO, and other styles
17

Horne, William Connor, and Zina Ben Miled. "Making the Case for a P2P Personal Health Record." Information 11, no. 11 (October 31, 2020): 512. http://dx.doi.org/10.3390/info11110512.

Full text
Abstract:
Improved health care services can benefit from a more seamless exchange of medical information between patients and health care providers. This exchange is especially important considering the increasing trends in mobility, comorbidity and outbreaks. However, current Electronic Health Records (EHR) tend to be institution-centric, often leaving the medical information of the patient fragmented and more importantly inaccessible to the patient for sharing with other health providers in a timely manner. Nearly a decade ago, several client–server models for personal health records (PHR) were proposed. The aim of these previous PHRs was to address data fragmentation issues. However, these models were not widely adopted by patients. This paper discusses the need for a new PHR model that can enhance the patient experience by making medical services more accessible. The aims of the proposed model are to (1) help patients maintain a complete lifelong health record, (2) facilitate timely communication and data sharing with health care providers from multiple institutions and (3) promote integration with advanced third-party services (e.g., risk prediction for chronic diseases) that require access to the patient’s health data. The proposed model is based on a Peer-to-Peer (P2P) network as opposed to the client–server architecture of the previous PHR models. This architecture consists of a central index server that manages the network and acts as a mediator, a peer client for patients and providers that allows them to manage health records and connect to the network, and a service client that enables third-party providers to offer services to the patients. This distributed architecture is essential since it promotes ownership of the health record by the patient instead of the health care institution. Moreover, it allows the patient to subscribe to an extended range of personalized e-health services.
APA, Harvard, Vancouver, ISO, and other styles
18

Gu, Baoshan, and Ing-Ray Chen. "Performance Analysis of Location-Aware Mobile Service Proxies for Reducing Network Cost in Personal Communication Systems." Mobile Networks and Applications 10, no. 4 (August 2005): 453–63. http://dx.doi.org/10.1007/s11036-005-1557-x.

Full text
APA, Harvard, Vancouver, ISO, and other styles
19

Masbullah, Masbullah, and Salmi Yuniar Bahri. "Sosialisasi Marketing Communication dalam Meningkatkan Sadar Wisata di Desa Tanjung Luar Lombok Timur." Jurnal Pengabdian Masyarakat (abdira) 2, no. 1 (January 5, 2022): 137–43. http://dx.doi.org/10.31004/abdira.v2i1.56.

Full text
Abstract:
This Community Service activity was carried out in Tanjung Luar Village, East Lombok in the form of marketing communication socialization activities in increasing tourism awareness in Tanjung Luar Village. The goal is to understand public relations, personal selling, sales promotion and advertising, and improve through the application of information systems and technology and create relevant policy models. This PKM uses qualitative and field survey methods to reveal and find out the real social reality of the community. Informants who are used as partners and the main source of information are from the Tanjung Luar village government. The focus of socialization of marketing communications is to advance and promote this tourist area through individual expertise and online and in-person promotions. The results achieved in this activity are the results of effective communication for the surrounding community through online communication, implementing the potential of the Tourism Village through public relations activities, personal selling, sales promotion and advertising and packaged through system advancements and information manually and directly.
APA, Harvard, Vancouver, ISO, and other styles
20

Gamzayev, Rustam, and Bohdan Shkoda. "Development and Investigation of Adaptive Micro-Service Architecture for Messaging Software Systems." Modeling Control and Information Technologies, no. 5 (November 21, 2021): 46–49. http://dx.doi.org/10.31713/mcit.2021.13.

Full text
Abstract:
Messaging Software systems (MSS) are one of the most popular tools used by huge amount of people. They could be used for personal communication and for business purposes. Building an own MSS system requires analysis of the quality attributes and considering adaptation to the changing environment. In this paper an overview of existing MSS architecture was done. Data model was developed to support historical and real time data storage and processing. An own approach to build Adaptive Microservice MSS based on the messaging middleware and NoSQL database was proposed.
APA, Harvard, Vancouver, ISO, and other styles
21

Song, Zhixiang, and Lingwei Dang. "Library Personalized Service System Based on Computer Network Technology." Security and Communication Networks 2022 (May 30, 2022): 1–6. http://dx.doi.org/10.1155/2022/2550820.

Full text
Abstract:
In order to solve the library’s demand for computer network technology, a research on the library’s personal system service is proposed. A library-based self-service model was originally designed and developed. The system is developed from six aspects: resource association analysis and mining, reading interest analysis, data collection, personal service, personal service scheduling, and data warehouse. Secondly, it shows that this study has done some research on library application itself and completed some research. Finally, libraries can accomplish personal services in a variety of ways, such as distributing modifications, smart administrators, vertical portals, pushers, and more. In foreign libraries and universities represented by North Carolina State University and the Data and Information Center of the Chinese Academy of Sciences, the construction of personal data in digital libraries has become an important part of future development. According to the law, 57.9% and 65.0% of users ranked search engines as second only to e-mail in the China Internet Improvement Data released by the China Internet Network Information Center in 2000 and 2005, respectively.
APA, Harvard, Vancouver, ISO, and other styles
22

Walsh, Jill, Brittany Leigh Andersen, James E. Katz, and Jacob Groshek. "Personal Power and Agency When Dealing with Interactive Voice Response Systems and Alternative Modalities." Media and Communication 6, no. 3 (September 25, 2018): 60–68. http://dx.doi.org/10.17645/mac.v6i3.1205.

Full text
Abstract:
In summer 2015, we conducted an exploratory study of how people in the U.S. use and respond to robot-like systems in order to achieve their needs through mediated customer service interfaces. To understand this process, we carried out three focus groups sessions along with 50 in-depth interviews. Strikingly we found that people perceive (correctly or not) that interactive voice response customer service technology is set up to deter them from pursuing further contact. And yet, for the most part, people were unwilling to simply give up on the goals that motivated their initial contact. Consequently, they had to innovate ways to communicate with the automated systems that essentially serve as gatekeepers to their desired ends. These results have implications for communication theory and system design, especially since these systems will be increasingly presented to consumers as social media affordances evolve.
APA, Harvard, Vancouver, ISO, and other styles
23

Elder, Keith, Louise Meret-Hanke, Caress Dean, Jacqueline Wiltshire, Keon L. Gilbert, Jing Wang, Enbal Shacham, et al. "How Do African American Men Rate Their Health Care? An Analysis of the Consumer Assessment of Health Plans 2003-2006." American Journal of Men's Health 9, no. 3 (April 30, 2014): 178–85. http://dx.doi.org/10.1177/1557988314532824.

Full text
Abstract:
African American (AA) men remain one of the most disconnected groups from health care. This study examines the association between AA men’s rating of health care and rating of their personal physician. The sample included 12,074 AA men aged 18 years or older from the 2003 to 2006 waves of the Consumer Assessment of Healthcare Providers and Systems Adult Commercial Health Plan Survey. Multilevel models were used to obtain adjusted means rating of health care systems and personal physician, and the relationship of ratings with the rating of personal physician. The adjusted means were 80 (on a 100-point scale) for most health ratings and composite health care scores: personal physician (83.9), specialist (83.66), health care (82.34), getting needed care (89.57), physician communication (83.17), medical staff courtesy (86.58), and customer service helpfulness (88.37). Physician communication was the strongest predictor for physician rating. AA men’s health is understudied, and additional research is warranted to improve how they interface with the health care system.
APA, Harvard, Vancouver, ISO, and other styles
24

Wang, Bill, Yuanfei Kang, Paul Childerhouse, and Baofeng Huo. "Service supply chain integration: the role of interpersonal relationships." Industrial Management & Data Systems 118, no. 4 (May 14, 2018): 828–49. http://dx.doi.org/10.1108/imds-02-2017-0062.

Full text
Abstract:
Purpose The purpose of this paper is to explore the role of interpersonal relationships (IPRs) in service supply chain integration (SSCI) in terms of strategic alliance, information integration, and process integration. Design/methodology/approach The research employs an exploratory/investigational approach to multiple case studies and empirically investigates effects of IPRs in SSCI. The data were mainly collected through semi-structured interviews with senior management staff from four service companies and their suppliers or customers in New Zealand. Archival data from the Internet and company documentations were also applied. Findings The authors find that three dimensions of IPRs influence SSCI in different ways. The effect of IPRs on SSCI is indirect: personal affection acts as an initiator, and personal credibility works as a “gate-keeper” and strengthens the confidence of interactive partners, while personal communication, a facilitator, plays a more important role in SSCI than personal affection and credibility. Practical implications The research provides managers in service supply chains the awareness of the importance of IPRs, as well as the characteristics of IPRs, in order to best utilize available resources. Managers should synergize all three dimensions of IPRs’ resources: make efforts to cultivate personal affection to avoid the instinctive isolation modern technology brings; attempt to accumulate positive personal credibility profiles; focus more on the role of personal communication and retain physical contact in SSCI processes. Originality/value This study contributes to SSCI literature by extending from the inter-organizational relationships (IORs) to interpersonal level relationships to explore the inner influence mechanism. Also, it explores the role of IPRs on all three dimensions of SSCI simultaneously rather than individual dimensions independently. Finally, it contributes to resource orchestration theory (ROT) by synthesizing three dimensions of IPRs resources, and IORs resources in order to achieve capabilities of SSCI. The study develops the individual-level research in supply chain integration (SCI) to a further depth.
APA, Harvard, Vancouver, ISO, and other styles
25

Lau, Kam Y., David M. Cutrer, John B. Georges, and Simon Yeung. "Fiber Optic Infrastructure for Wireless Communication Networks." International Journal of High Speed Electronics and Systems 08, no. 02 (June 1997): 233–46. http://dx.doi.org/10.1142/s012915649700007x.

Full text
Abstract:
It is clear that to meet the new demands of wireless customers, conventional cellular service providers and upcoming Personal Communication Service (PCS) providers for conventional phone service and high bandwidth wireless LAN must upgrade their networks to provide complete radio coverage. This evolution has motivated the need for low-cost systems that transport radio signals to and from areas of poor signal coverage. The most important area where this problem must be solved is inside of buildings, since this is where people spend most of their time. Unfortunately, the in-building enviroment is also the ost challenging area to provide radio coverage due to severe attenuation and multi-path effects. The problem must be tackled from the viewpoint of optimization of performance/cost ratio of the network. In this paper, we describe a system-level approach to tackle this problem. We demonstrate how one can trade-off hardware performance, which represent cost, with proper choice of system architecture which includes, among other factors, in-buiding radio environment, to arrive at an optimum network solution technically and economically.
APA, Harvard, Vancouver, ISO, and other styles
26

Anusornteerakul, Sioy, Kimaporn Khamanarong, Suranart Khamanarong, and Jadsada Thinkhamrop. "The Influence Factors That Affect Thailands Management Of Youth Reproductive Health Service." Journal of Diversity Management (JDM) 3, no. 4 (October 1, 2008): 27–32. http://dx.doi.org/10.19030/jdm.v3i4.4999.

Full text
Abstract:
The management of reproductive health service for youth has become an important issue during the recent year. However, management has no clear idea about the influential factors of concern to. In this paper, we will discuss these influence factors that affect the management of youth reproductive healthcare service. Mixed methods were used for data collection, including qualitative methods that were conducted by in-dept interview and analyzed by binary logistic regression. According to the analysis, we found six factors that affect the management of reproductive health service, including (1) personal expense, (2) communication within the family, (3) fear of parents reactions, (4) the bureaucratic process of healthcare services, (5) the limitation of healthcare services, and (6) healthcare providers. Then, we reduced the six factors into three group factors that we call three systems to explain these important factors that are of concern to management of reproductive health service. These include the personnel system, service system, and the family support system.
APA, Harvard, Vancouver, ISO, and other styles
27

Lokhman, N. V., T. M. Beridze, M. O. Lokhman, and D. A. Chokoi. "ACTIVATORS OF MARKETING COMMUNICATIONS REGARDING THE SALE OF TOURIST SERVICES." Visnyk of Donetsk National University of Economics and Trade named after Mykhailo Tugan-Baranovsky, no. 1(78) 2023 (2023): 30–37. http://dx.doi.org/10.33274/2079-4819-2023-78-1-30-37.

Full text
Abstract:
Objective. Identification and systematization of activators of marketing communications, as an iterative integrator of processes, factors, tools that ensure the promotion of tourist services. Methods. In the research process, the following methods were used: theoretical generalization (when characterizing the concepts of "marketing communications", "tourist service"), analysis and synthesis (for the formation of a complex of methods of marketing communications of tourist enterprises), matrix (when systematizing the activators of marketing communications regarding the sale of tourist services). Results. Tourist services, i.e. transportation, temporary accommodation, food, excursion, resort, sports, entertainment and other services are provided by tour operators, travel agents, accommodation establishments, restaurant establishments, transport organizations, etc. That is, the range of business entities that must ensure interaction and communication is wide and requires established communications. The communication policy of the business entity involves the integration of management decisions regarding the goals of marketing communications, the implementation of the communication process for their implementation, a set of marketing communications methods that should ensure an effective commercial result from the sale of tourist services. In a certain sense, the provision of tourist services can be represented as a communication process, within the framework of which communications take place between travel agencies and tourists, as well as within these groups. As a result, different marketing communication systems can be considered: between travel agencies and customers, between travel agencies and between tourists, all of which require different methods of marketing communications. In order to successfully implement the communication process, which has an iterative feature, i.e. the possible unlimited sequence options and combinations of communication policy elements, it is necessary to identify and systematize the activators of marketing communications regarding the implementation of tourist services. By activators we will understand the factors, tools, processes of marketing communications that ensure the promotion of tourist services, overcoming the negative consequences of macroeconomic (consequences of the war in Ukraine, political, economic, social instability, etc.) and microeconomic (limitation of costs for marketing communications, lack of a strategic vision for the development of tourist enterprises, shortcomings in the training of personnel involved in the field of tourism, etc.) upheavals. The activators of marketing communications regarding the sale of tourist services can be considered separate processes related to the quality of tourist services, demand formation, informational support of tourist enterprises, social moments of communication with consumers and the public, etc.; factors (institutional, social, cultural, infrastructural); tools (formally established rules and informal traditions, market segmentation, modification of tourist services, language environment, entrepreneurial culture, special information systems) and methods of marketing communications (advertising, sales promotion, personal sales, PR, sponsorship, direct marketing, direct communications, promotion -tours), which in the proposed combination ensure the realization of the goals of marketing communications of tourist enterprises.
APA, Harvard, Vancouver, ISO, and other styles
28

Ferrão, Sâmmara Éllen Renner, Artur Potiguara Carvalho, Edna Dias Canedo, Alana Paula Barbosa Mota, Pedro Henrique Teixeira Costa, and Anderson Jefferson Cerqueira. "Diagnostic of Data Processing by Brazilian Organizations—A Low Compliance Issue." Information 12, no. 4 (April 14, 2021): 168. http://dx.doi.org/10.3390/info12040168.

Full text
Abstract:
In order to guarantee the privacy of users’ data, the Brazilian government created the Brazilian General Data Protection Law (LGPD). This article made a diagnostic of Brazilian organizations in relation to their suitability for LGPD, based on the perception of Information Technology (IT) practitioners who work in these organizations. We used a survey with 41 questions to diagnose different Brazilian organizations, both public and private. The diagnostic questionnaire was answered by 105 IT practitioners. The results show that 27% of organizations process personal data of public access based on good faith and LGPD principles. In addition, our findings also revealed that 16.3% of organizations have not established a procedure or methodology to verify that the LGPD principles are being respected during the development of services that will handle personal data from the product or service design phase to its execution and 20% of the organizations did not establish a communication process to the personal data holders, regarding the possible data breaches. The result of the diagnostic allows organizations and data users to have an overview of how the treatment of personal data of their customers is being treated and which points of attention are in relation to the principles of LGPD.
APA, Harvard, Vancouver, ISO, and other styles
29

Mishu, Masuma Pervin, Mehreen Riaz Faisal, Alexandra Macnamara, Wael Sabbah, Emily Peckham, Liz Newbronner, Simon Gilbody, and Lina Gega. "A Qualitative Study Exploring the Barriers and Facilitators for Maintaining Oral Health and Using Dental Service in People with Severe Mental Illness: Perspectives from Service Users and Service Providers." International Journal of Environmental Research and Public Health 19, no. 7 (April 5, 2022): 4344. http://dx.doi.org/10.3390/ijerph19074344.

Full text
Abstract:
People with severe mental illness suffer from a high burden of oral diseases, which can negatively impact their physical and mental well-being. Despite the high burden, they are less likely to engage in oral health care including accessing dental services. We aimed to identify both the service users’ and service providers’ perspective on the barriers and facilitators for maintaining oral health and dental service use in people with severe mental illness. Qualitative exploration was undertaken using dyadic or one-to-one in-depth interviews with service users in the UK with a diagnosis of schizophrenia, schizoaffective disorder or bipolar disorder. Service providers, including mental health and dental health professionals, and informal carers (people identified as family or friend who are not paid carers) were also interviewed. Thematic analysis of the data revealed three main cross-cutting themes at the personal, inter-personal and systems level: amelioration of the problem, using a tailored approach and provision of comprehensive support. The main barriers identified were impact of mental ill-health, lack of patient involvement and tailored approach, and accessibility and availability of dental services including lack of integration of services. The main facilitators identified were service providers’ effective communication skills and further support through the involvement of carers. The findings suggest that the integration of dental and mental health services to provide tailored support for overall health and well-being, including the oral health of the patient, can better support people with severe mental illness regarding their oral health needs.
APA, Harvard, Vancouver, ISO, and other styles
30

Fletcher, Kenneth K. "A Method for Aggregating Ranked Services for Personal Preference Based Selection." International Journal of Web Services Research 16, no. 2 (April 2019): 1–23. http://dx.doi.org/10.4018/ijwsr.2019040101.

Full text
Abstract:
Typically, users' service requests, which are similar with varying preferences on non-functional attributes, may result in ranked lists of services that partially meet their needs due to conflicting non-functional attributes. The resultant multiple ranked lists of services that partially satisfies the user's request makes it challenging for the user to choose an optimal service, based on his/her preference. This work proposes a method that aggregates multiple ranked lists of services into a single aggregated ranked list, where top ranked services are selected for the user. Two algorithms are proposed; 1) Rank Aggregation for Complete Lists (RACoL), that aggregates complete ranked lists and 2) Rank Aggregation for Incomplete Lists (RAIL) to aggregate incomplete ranked lists. Examples using real-world airline services to evaluate both algorithms show that the results from both proposed algorithms closely represent the sets of ranked lists better than using alternative approaches. Experiments were also carried out to validate their performance.
APA, Harvard, Vancouver, ISO, and other styles
31

Pérez, Eduardo, Raúl Parada, and Carlos Monzo. "An Global Emergency System Based on WPAN and LPWAN Hybrid Networks." Sensors 22, no. 20 (October 18, 2022): 7921. http://dx.doi.org/10.3390/s22207921.

Full text
Abstract:
There are multiple methods of communication for the transmission of every type of alarm. In the case of emergency systems, they are usually controlled by private companies that work as bridges between the source and the receiver of an emergency. Furthermore, it is necessary to use an independent communication system for each building, requiring human vigilance, leading to an increase in infrastructure and service costs as well as response time. This paper proposes a hybrid network by combining both wireless personal access network (WPAN) and low power wide access network (LPWAN) communication for the complete development of a communication architecture oriented to an emergency system. The main aim of this work is to provide a global emergency system that is focused on fire detection but is also suitable for other critical events, with low energy consumption, a wide communication range covering up to 50 km, and a low cost of service and infrastructure. This proposal reduces the total energy consumption of the system with respect to typical fire detection systems.
APA, Harvard, Vancouver, ISO, and other styles
32

Dou, Wanchun, Chao Lv, Xuyun Zhang, and Jinjun Chen. "A Collaborative QoS-Aware Service Evaluation Method Among Multi-Users for a Shared Service." International Journal of Web Services Research 9, no. 1 (January 2012): 30–50. http://dx.doi.org/10.4018/jwsr.2012010102.

Full text
Abstract:
In service selection, an end user often has his or her personal preferences imposing on a candidate service’s non-functional properties. For a service selection process promoted by a group of users, candidate services are often evaluated by a group of end users who may have different preferences or priorities. In this situation, it is often a challenging effort to make a tradeoff among various preferences or priorities of the users. In view of this challenge, a multi-criteria decision-making method, named AHP (Analytic Hierarchy Process), is introduced to transform both qualitative personal preferences and users’ priorities into numeric weights. Furthermore, a QoS-aware service evaluation method is presented for a shared service’s co-selection taking advantage of AHP theory. At last, a case study is presented to demonstrate the feasibility of the method.
APA, Harvard, Vancouver, ISO, and other styles
33

McIntyre, Heather, Mark Loughhead, Laura Hayes, Caroline Allen, Dean Barton-Smith, Brooke Bickley, Louis Vega, Jewels Smith, Ursula Wharton, and Nicholas Procter. "Let Us Keep the Emergency Department Safe: National Disability Insurance Scheme Supports Workers’ Experiences When Supporting People with Psychosocial Disability in the Emergency Department." Health & Social Care in the Community 2024 (May 22, 2024): 1–12. http://dx.doi.org/10.1155/2024/4643566.

Full text
Abstract:
Internationally, community healthcare is provided by personal health budgets or personalised schemes as part of a consumer-directed care emphasis. Although the introduction of a personalised scheme in Australia has improved the lives of many, people with psychosocial disability (PSD) and their families have experienced many challenges with service integration. Six focus groups with 17 National Disability Insurance Scheme (NDIS) support workers were conducted between June and November 2022. Participants were asked semistructured questions about their engagement with emergency department (ED) clinicians when presenting with a person with PSD and NDIS plan. They were also asked how they contribute to service integration to improve communication practices between the two services. A qualitative, descriptive thematic analysis approach was used. Results indicate there is a need for improved service integration pathways between the ED and NDIS services. The thematic analyses identified five main themes: the ED is harmful and not safe, but nowhere else to go; make the ED safe; further training for ED staff; improving communication across services; and alternatives to the ED. This study reports NDIS support worker’s experience when supporting a person they are caring for in the ED. NDIS support workers have an understanding of the needs of the people they care for;their wisdom can contribute greatly to ED clinical responses in crisis care. Recommendations are offered to assist with service integration between the two systems.
APA, Harvard, Vancouver, ISO, and other styles
34

Li, Jingquan. "A Service-Oriented Model for Personal Health Records." Journal of Computer Information Systems 60, no. 4 (June 18, 2018): 316–25. http://dx.doi.org/10.1080/08874417.2018.1483213.

Full text
APA, Harvard, Vancouver, ISO, and other styles
35

Vlasenko, Aleksandra, and Irina Korkh. "Issues of Security of Remote Banking Systems." NBI Technologies, no. 2 (December 2018): 6–10. http://dx.doi.org/10.15688/nbit.jvolsu.2018.2.1.

Full text
Abstract:
The banking system of the Russian Federation is based on Federal legislation, as well as industry and inter-industry standards developed by the International community and the Central Bank of the Russian Federation. The introduction and development of remote banking services is the most popular direction in the modern banking system. The term ‘remote banking service’ refers to the technology of providing services for the remote transmission of orders by credit institutions (without clients’ presence in bank office), using different communication channels. Information security in bank-client systems is carried out by several types of protection. Client authentication is confirmed by the use of an electronic signature. The data channel and the data itself are encrypted. In order to implement the above-described functions of the bank-client system in any software, the client must first generate and register cryptographic keys with the bank and obtain electronic digital certificates. In addition to the protection of the transferred data, personal data that have entered the system of remote banking services also need protection. The research purpose is to analyze the system of remote banking services, to identify regulatory and methodological documents regulating information security issues, options for meeting the requirements of regulators. Confirmation or refutation of the issue’s urgency should be considered as research results.
APA, Harvard, Vancouver, ISO, and other styles
36

Bani-Hani, Imad, and Eva Shepherd. "Self-Reinforcement Mechanisms of Sustainability and Continuous System Use: A Self-Service Analytics Environment Perspective." Informatics 8, no. 3 (July 15, 2021): 45. http://dx.doi.org/10.3390/informatics8030045.

Full text
Abstract:
The capabilities of the people, processes, and technology are important factors to consider when exploring continuous use to create value. Multiple perceptions and attitudes towards self-service systems lead to various usage levels and outcomes. With complex analytical structures, organizations need a better understanding of IS value and users’ satisfaction. Incompatibility reduces the purpose of self-service analytics, decreasing its value and making it obsolete. In a qualitative, single case study, 20 interviews in a major digital Scandinavian marketplace were explored using the expectation–confirmation theory of continuous use to explore the mechanisms influencing the sustainability of self-service value. Two main mechanisms were identified: the personal capability reinforcement mechanism and the environment value reinforcement mechanism. This study contributes to the post-implementation and continuous use literature and self-service analytics literature and provides some practice implications to the related industry.
APA, Harvard, Vancouver, ISO, and other styles
37

Putra, Moody Rizqy Syailendra, Pascal Amadeo Yapputro, Maulida Syahrin Najmi, and Eriyan Rahmadani Dianova. "Protection of Personal Data of BPJS Health Users against Data Leakage." International Journal of Law and Politics Studies 4, no. 2 (November 26, 2022): 98–108. http://dx.doi.org/10.32996/ijlps.2022.4.2.11.

Full text
Abstract:
The development of information and communication technology (from now on referred to as ICT) represents changes in human society from time to time. Data leakage is one of the challenges in this development. As a pioneer in implementing public service institutions, the government is challenged to tackle data leakage cases. This study aims to determine the legal relationship between BPJS health and users related to data leakage and mechanisms and to compare various personal data protections in countries with Common Law and Civil Law systems. This study uses qualitative data with a normative juridical method or approach. This study concludes that the public can sue BPJS with administrative efforts to the State Administrative Court, the Prosecutor acts on Personal Data Protection, and the results of the comparison of Personal Data Protection in 2 central legal systems.
APA, Harvard, Vancouver, ISO, and other styles
38

BHATTACHARJEE, PARTHA SARATHI, DEBASHIS SAHA, and AMITAVA MUKHERJEE. "INTELLIGENT PAGING STRATEGIES FOR THIRD GENERATION PERSONAL COMMUNICATION SERVICES NETWORKS." Journal of Interconnection Networks 01, no. 03 (September 2000): 153–71. http://dx.doi.org/10.1142/s0219265900000111.

Full text
Abstract:
We consider the problem of minimizing paging cost, subject to delay constraint, in Personal Communication Services Network (PSCN) and present two intelligent paging strategies for third generation systems. They are termed as sequential intelligent paging (SIP) and parallel-o-sequential intelligent paging (PSIP). Unlike the conventional blanket paging where all cells in a location area are polled at a time, in SIP (PSIP) one cell (a group of cells) is polled at a time. The proposed schemes lead to a decrease in paging signaling load at the cost of some extra processing power. When better discovery rate per cycle is expected irrespective of the incoming traffic PSIP is always preferred to other paging schemes primarily because of its less amount of polling delay. If the incoming traffic rate is low, SIP performs better than PSIP in terms of paging cost per cycle. However, the polling costs per cycle and the discovery rates for both the schemes become equal as number of paging requests per cycle increases. An improvement in respect of paging cost per cycle and discovery rate over conventional paging is shown with the help of simulation results.
APA, Harvard, Vancouver, ISO, and other styles
39

Butt, Atif Saleem. "Personal relationships and supply chain communication: an exploratory case study of buyers and suppliers of logistics service provider." International Journal of Logistics Systems and Management 42, no. 4 (2022): 501. http://dx.doi.org/10.1504/ijlsm.2022.125385.

Full text
APA, Harvard, Vancouver, ISO, and other styles
40

BUTT, ATIF. "Personal Relationships and Supply Chain Communication: An Exploratory Case Study of Buyers and Suppliers of Logistics Service Provider." International Journal of Logistics Systems and Management 1, no. 1 (2020): 1. http://dx.doi.org/10.1504/ijlsm.2020.10030463.

Full text
APA, Harvard, Vancouver, ISO, and other styles
41

Sugiat, Maria, Nadia Saabira, and Deden Witarsyah. "Omni-Channel Service Analysis of Purchase Intention." JOIV : International Journal on Informatics Visualization 7, no. 4 (December 31, 2023): 2543. http://dx.doi.org/10.30630/joiv.7.4.02442.

Full text
Abstract:
The COVID-19 pandemic has caused a decline in various aspects of the economy, including the fashion sector. Many fashion retailers have closed, so sales have fallen. However, many retailers can also adapt and change using new communication channels. This change presents new challenges for fashion companies and retailers to integrate channels into omnichannel services. This study aims to analyze the factors influencing customer behavior in omnichannel services through their intention to accept and use new technology in shopping. This study adopts the UTAUT2 model by adding two new variables: personal innovation and perceived security. This model was tested on 353 samples from Uniqlo customers residing in Indonesia. This research method uses a Quantitative PLS-SEM approach. This study tested the outer model, inner model, and hypothesis t-test with a bootstrap procedure using SmartPLS software. The results showed that the performance expectation factor did not affect the omnichannel purchase intention variable because the t-statistic value is less than 1.65. Meanwhile, other factors such as effort expectation, social influences, habits, hedonic motivation, perceived security, and personal innovativeness affect omnichannel purchase intentions because the t-statistic value is more than 1.65. The most positive and significant factor is personal innovativeness. Based on the results of this study, it is revealed that digitalization creates challenges for companies in maintaining digital businesses. Through various omnichannel service channels, this research can identify the factors influencing consumers' purchase intention
APA, Harvard, Vancouver, ISO, and other styles
42

STRELKOVSKAYA, Irina, Roman ZOLOTUKHIN, and Viktoria PASCALENKO. "RESEARCH OF AUDIO AND VIDEO TRAFFIC THE CHARACTERISTICS IN LOW-BANDWIDTH RADIO COMMUNICATION NETWORKS." MEASURING AND COMPUTING DEVICES IN TECHNOLOGICAL PROCESSES, no. 4 (November 30, 2023): 183–90. http://dx.doi.org/10.31891/2219-9365-2023-76-26.

Full text
Abstract:
The construction of mass service systems, namely automated control systems, requires preliminary analysis and modeling of traffic in their communication networks. Mathematical models of various types of traffic have been developed for public networks, which allows to estimate the necessary functional characteristics of equipment for building a communication network, depending on the number of users. Low-bandwidth communication networks, which are built on the basis of ultra high frequency and very high frequency (UHF/VHF) radio stations, are distinguished by low speed, high delay and jitter of data transmission. To work in such communication networks, special data transmission protocols are adapted and developed. In this paper, a study of the characteristics of audio and video traffic in low-bandwidth communication networks is carried out, which are built on the basis of UHF/VHF radio stations, which will allow creating a software implementation of simulated traffic modeling for the further determination of the services availability at the stage of planning and designing the communication system. Two personal computers and two modern RF‑7850M-HH UHF/VHF radio stations were used to study the characteristics of audio traffic. The radio stations worked in three operating modes: narrowband mode with a fixed carrier frequency FF, narrowband mode with pseudo-random adjustment of the operating frequency QL1A, and wideband mode ANW2C. The voice was transmitted in digital mode using the built-in MELP 2400 codec, and the "iperf-v2.0.5" software was used to determine the characteristics of the audio traffic on personal computers connected to these radio stations. Two personal computers, two modern RF‑7850M‑HH UHF/VHF radio stations, a video encoder and a video camera were used to study video traffic characteristics. The radio stations operated in ANW2C broadband mode. To evaluate the characteristics of the video traffic, the Wireshark software was used on a personal computer, with the help of which the video broadcast from the video encoder was presented. It was found that voice transmission in low-speed communication networks based on UHF/VHF radio stations occupies a bandwidth of 2 Kbit/s - 2.5 Kbit/s, and when voice and data are simultaneously transmitted in radio stations, data buffering and jitter increase. The resolution, bitrate, FPS, and necessary bandwidth of video traffic that can be transmitted via UHF/VHF radio communication channels are determined. Based on the conducted research, recommendations are provided for the transmission of video traffic through low-bandwidth communication channels.
APA, Harvard, Vancouver, ISO, and other styles
43

May, Jerry R., and Linda Brown. "Delivery of Psychological Services to the U.s. Alpine Ski Team Prior to and during the Olympics in Calgary." Sport Psychologist 3, no. 4 (December 1989): 320–29. http://dx.doi.org/10.1123/tsp.3.4.320.

Full text
Abstract:
A broad spectrum systems theory approach to the delivery of psychological services is presented. The target population includes the athletes, coaches, administrators, ski company representatives, and family members. The delivery of service involves individual dyadic and group sessions. The methods of service include educational, clinical, organizational, and a research data base. The major goal is to instill individual self-monitoring and self-control of personal well-being and achievement. Utilizing several theoretical frameworks such as behavioral, cognitive, humanistic, group dynamics, and insight oriented has worked best. Success of the program is multifactored: (a) being willing to commit a major amount of time to a single sport; (b) providing a broad range of services, from mental skills training, crises intervention, injury prevention and rehabilitation to team building, communication, and referral of individual to practitioners; (c) attending to organizational issues and program evaluation; and (d) common sense, practicability, and a willingness to be flexible with programs.
APA, Harvard, Vancouver, ISO, and other styles
44

El-Khatib, K., Zhen E. Zhang, N. Hadibi, and G. v. Bochmann. "Personal and service mobility in ubiquitous computing environments." Wireless Communications and Mobile Computing 4, no. 6 (September 2004): 595–607. http://dx.doi.org/10.1002/wcm.231.

Full text
APA, Harvard, Vancouver, ISO, and other styles
45

Dong, Jian, Xiaping Yu, and Guoqiang Hu. "Design of a Compact Quad-Band Slot Antenna for Integrated Mobile Devices." International Journal of Antennas and Propagation 2016 (2016): 1–9. http://dx.doi.org/10.1155/2016/3717681.

Full text
Abstract:
In order to incorporate different communication standards into a single device, a compact quad-band slot antenna is proposed in this paper. The proposed antenna is composed of a dielectric substrate, T-shaped microstrip patch with a circle slot and an inverted L-slot, and a comb-shaped ground on the back of the substrate. By adopting these structures, it can produce four different bands, while maintaining a small size and a simple structure. Furthermore, a prototype of the quad-band antenna is designed and fabricated. The simulated and measured results show that the proposed antenna can operate over the 1.79–2.63 GHz, 3.46–3.97 GHz, 4.92–5.85 GHz, and 7.87–8.40 GHz, which can cover entire PCS (Personal Communications Service, 1.85–1.99 GHz), UMTS (Universal Mobile Telecommunications System, 1.92–2.17 GHz), WCDMA (wideband code-division multiple access, 2.1 GHz), Bluetooth (2.4–2.48 GHz), WiBro (Wireless Broad band access service, 2.3–3.39 GHz), WLAN (Wireless Local Area Networks, 2.4/5.2/5.8 GHz), WiMAX (Worldwide Interoperability for Microwave Access, 2.5/3.5/5.5 GHz), and X-band SATcom applications (7.9~8.4 GHz). The proposed antenna is particularly attractive for mobile devices integrating multiple communication systems.
APA, Harvard, Vancouver, ISO, and other styles
46

Lim, Mian-Guan, Sining Wu, Tomasz Simon, Md Rashid, and Na Helian. "Personal Storage Grid Architecture." International Journal of Grid and High Performance Computing 2, no. 3 (July 2010): 17–30. http://dx.doi.org/10.4018/jghpc.2010070102.

Full text
Abstract:
On-demand cloud applications like online email accounts and online virtual disk space are becoming widely available in various forms. In cloud applications, one can see the importance of underlying resources, such as disk space, that is available to the end-user but not easily accessible. In the authors’ study, a modern file system developed in linux is proposed, which enables consuming of cloud applications and making the underlying disk space resource available to the end-user. This system is developed as a web service to support cross operation system support. A free online mail account was used to demonstrate this solution, and an IMAP protocol to communicate with remote data spaces was used so that this method can mount onto any email system that supports IMAP. The authors’ definition of infinite storage as the user is able to mount file systems as a single logical drive.
APA, Harvard, Vancouver, ISO, and other styles
47

Molchanova, Svetlana M. "DIGITAL TRANSFORMATION DIRECTIONS OF THE SERVICE SECTOR." EKONOMIKA I UPRAVLENIE: PROBLEMY, RESHENIYA 6/4, no. 138 (2023): 201–7. http://dx.doi.org/10.36871/ek.up.p.r.2023.06.04.022.

Full text
Abstract:
The article deals with the issues of digital transformation of the service sector. The author reveals the features of automation of technological and logistics processes, improvement of customer focus, development of online platforms and the introduction of artificial intelligence. Particular attention is paid to the issues of ensuring confidentiality and security of the service sector. The implementation of digital transformation requires a special attitude to the security of personal data, the introduction of appropriate systems and protective measures. Summarization of information allows businesses to collect, analyze and structure large amounts of data about customers, their preferences, behavior and needs. Digital technologies make it possible to personalize service and offers, optimize customer communication by providing convenient online communication channels, the ability to leave reviews and ratings. The author emphasizes the importance of training, motivation, staff development and changes in corporate culture for the successful implementation of the digital transformation of technologies. The directions of digitalization of the service sector in the practical activities of domestic enterprises are revealed. The digital transformation of the service sector in practice continues to expand with the development of technology and provides new opportunities for scaling and improving the efficiency of companies in the market. Examples of digitalization of processes reflect their diversity, opportunities to improve the quality of service, increase customer satisfaction and optimize operating costs in the enterprise.
APA, Harvard, Vancouver, ISO, and other styles
48

C, Anudharshini, Mohanapriya K, Prathisha K, and Shalini M. "Efficient and Secure Communication in VANETS Using Block Chain." International Research Journal of Computer Science 11, no. 04 (April 5, 2024): 164–68. http://dx.doi.org/10.26562/irjcs.2024.v1104.05.

Full text
Abstract:
We have made great progress in resolving the crucial problem of location privacy in Vehicular Impromptus Networks (VANETs), an essential component of Intelligent Traffic Systems (ITS), using our innovative block chain-based trust management methodology. VANETs' high inherent mobility has long presented security issues, especially when it comes to using Location-Based Services (LBS). Our creative solution gives cars the ability to request LBS while protecting their personal data with a secure verification process. Vehicle privacy is protected via the creation of anonymous shrouding zones, and vehicle behaviour is controlled and governed by an advanced trust management algorithm. By using block chain technology, the system's data security is strengthened even more, resulting in a strong, impenetrable architecture. Thorough testing has proven the system's resilience against a range of assaults based on trust models, proving its efficacy in protecting vehicle privacy. The outcomes of our simulation demonstrate the practicality of our suggested method in actual VANET circumstances, pointing to the possibility of a new era in safe and private ITC systems.
APA, Harvard, Vancouver, ISO, and other styles
49

Mccool, Judith, Janine Hill, Rosie Dobson, and Robyn Whittaker. "Access to ICT in the Pacific Islands region: a brief report." Pacific Health Dialog 21, no. 6 (November 30, 2020): 347–50. http://dx.doi.org/10.26635/phd.2020.642.

Full text
Abstract:
Abstract Mobile technologies are an essential component necessary for the functioning of contemporary health systems. The advent of digital health represents a logical collaboration between the need for greater efficiencies in health service delivery and systems and the rapid expansion of personal mobile devices. Worldwide mobile subscriptions are expected to reach 8.9bn, smartphone subscriptions 7.2bn and mobile broadband 8.3bn 1. For many countries, mobile subscriptions exceed population numbers; the Pacific Islands region is no different 1. Yet within the region huge diversity in access to information and communication technologies (ICT) contributes to gradual progress in implementing digital health initiatives that could accelerate and extend measures to improve public health.
APA, Harvard, Vancouver, ISO, and other styles
50

Rong, Wenge, Baolin Peng, Yuanxin Ouyang, Kecheng Liu, and Zhang Xiong. "Collaborative personal profiling for web service ranking and recommendation." Information Systems Frontiers 17, no. 6 (May 10, 2014): 1265–82. http://dx.doi.org/10.1007/s10796-014-9495-4.

Full text
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography