This paper discusses The Use of Information Technology in Health Care in Kosovo. The main focus of this paper will be in The Use of Technology in Private Clinics, the Licensed Private Hospitals in particular. On one h...
详细信息
This paper discusses The Use of Information Technology in Health Care in Kosovo. The main focus of this paper will be in The Use of Technology in Private Clinics, the Licensed Private Hospitals in particular. On one hand it will discuss and analyze the level and the type of technology implemented by these Private Clinics. On the other hand it will give a brief overview of the readiness / potential of Kosovo's Private Health Care Institutions to integrate in the Health Information System, specifically in the e-Health as part of the Government's “Strategy for Electronic Governance 2009-2015”.
Intrusion detection is the process of monitoring the events occurring in a computer system or network and analyzing them for signs of intrusions, defined as attempts to compromise the confidentiality, integrity, avail...
详细信息
Intrusion detection is the process of monitoring the events occurring in a computer system or network and analyzing them for signs of intrusions, defined as attempts to compromise the confidentiality, integrity, availability, or to bypass the security mechanisms of a computer or net-work. This paper proposes the development of an Intrusion Detection program (IDP) which could detect known attack patterns. An IDP does not eliminate the use of any preventive mechanism but it works as the last defensive mechanism in securing the system. Three variants of genetic programming techniques namely Linear Ge-netic programming (LGP), Multi-Expression programming (MEP) and Gene Expression programming (GEP) were evaluated to design IDP. Several indices are used for comparisons and a detailed analysis of MEP technique is provided. Empirical results reveal that genetic programming technique could play a major role in developing IDP, which are light weight and accurate when compared to some of the conventional intrusion detection systems based on machine learning paradigms.
It is important to figure out the patterns of woven fabrics before producing woven fabric with a machine. Recognition of woven fabric pattern usually with the help of the human eye can understand the fabric pattern. H...
详细信息
An optimized packaging configuration for high-power white-light-emitting diode (LED) lamps that employs a diffuse reflector cup, a remote phosphor and a hemi-spherically-shaped encapsulation is presented. Ray tracing ...
详细信息
An optimized packaging configuration for high-power white-light-emitting diode (LED) lamps that employs a diffuse reflector cup, a remote phosphor and a hemi-spherically-shaped encapsulation is presented. Ray tracing simulations for this configuration show that the phosphor efficiency can be enhanced by up to 50% over conventional packages. It is experimentally shown that dichromatic LED lamps with remote phosphor and diffuse reflector cup configuration have higher phosphor efficiency by 15.4% for blue-pumped yellow phosphor and by 27% for ultraviolet-pumped blue phosphor over conventional packages. Those improvements are attributed to reduced absorption of the phosphorescence by the LED chip and the reduction of deterministic optical modes trapped inside the encapsulant.
This paper presents a shunt active power filter based on the concept of open-end winding (OEW) transformers. The proposed configuration is constituted of two converters with three legs each series connected throughout...
详细信息
ISBN:
(纸本)9781479903375
This paper presents a shunt active power filter based on the concept of open-end winding (OEW) transformers. The proposed configuration is constituted of two converters with three legs each series connected throughout a three-phase OEW transformer. Model PWM strategy and control scheme are presented as well. The main advantage of the proposed system lies on the multi-level waveform generation, which allows reduction of either harmonic distortions or switching losses. This proposed topology is suitable for medium voltage (MV) distribution systems. Simulation and experimental results validate the theoretical study.
The liquid-crystal spatial light modulators (SLMs), are proving to be an important tool for research aimed at emulation of atmospheric turbulence. Emulating turbulence is necessary for testing the performance of adapt...
详细信息
The liquid-crystal spatial light modulators (SLMs), are proving to be an important tool for research aimed at emulation of atmospheric turbulence. Emulating turbulence is necessary for testing the performance of adaptive-optics system in a controlled environment. SLMs have the ability to compensate for hundreds of waves of aberration through the use of modulo 2π operation. Thus, a device with only slightly more than one wave of phase stroke can emulate large phase of strokes. Optical modulation is not directly dependent on the back-plane used, but instead on the liquid-crystal and the liquid-crystal layer thickness, the same backplane can be used for many application. This modular design makes SLMs versatile across a wide range of technologies such as optical correlators, beamsteerers, optical trapping, and many more.
Indonesia has enormous geothermal potential, but it only contributes 5% to Indonesia's energy matrix. During 37 years of operation, PT. Pertamina Geothermal Energy Kamojang area has been operating to produce elect...
详细信息
The third international conference on Human-Robot Interaction (HRI-2008) was held in Amsterdam, The Netherlands, March 12-15, 2008. The theme of HRI-2008, "living with robots," highlights the importance of t...
详细信息
Out-of-distribution (OOD) generalization in the graph domain is challenging due to complex distribution shifts and a lack of environmental contexts. Recent methods attempt to enhance graph OOD generalization by genera...
详细信息
暂无评论