At the moment, most of the hospitals are more interested in patient satisfaction because this has been identified as a main issue of quality of service indexes. In most of the Asian countries' the type of registra...
At the moment, most of the hospitals are more interested in patient satisfaction because this has been identified as a main issue of quality of service indexes. In most of the Asian countries' the type of registration system being operated in the healthcare systems are a sort of mixed-mode. Specifically, there are scheduled patients, as well as patients who just walk in and register. Unfortunately, this type of registration structure could increase the patient waiting period even in emergency cases. Interestingly, various methodologies have been explored in order to shorten this undesirable waiting time. This paper focuses on exploration of the characteristics and significance of existing models and simulation techniques from the literature. The combination of agent-based modelling (ABM), DES and integration of DES and ABS technique has been chosen as the solution to modelling patient emergency waiting time in the emergency department realistically. The proactive and independent characteristics of agents in both approaches will contribute to the good representation of patient emergency waiting time in the especially in the emergency department.
In this paper we discusses some pros and cons of using AJAX for increasing the usability of Web applications. As AJAX allows Web applications look like desktop applications, it can increase the learnability of a Web a...
详细信息
In this paper we discusses some pros and cons of using AJAX for increasing the usability of Web applications. As AJAX allows Web applications look like desktop applications, it can increase the learnability of a Web application. Nevertheless, AJAX can also be the source of end user frustration if the XMLHttpRequest is not supported by the browser, Javascript is not available, or an Internet connection is missing. We also provide some workarounds for server response time gaps, for example by providing visible user feedback messages) and enabling the back button to work properly.
The enthusiasm of IT entrepreneurs in producing Internet of Things (IoT) systems is undeniable as currently, the number of connected devices is enormously increasing. Many research has been done to efficiently develop...
The enthusiasm of IT entrepreneurs in producing Internet of Things (IoT) systems is undeniable as currently, the number of connected devices is enormously increasing. Many research has been done to efficiently develop IoT systems. IoT systems are usually engineered from scratch. IoT component models have been introduced but lack of generic development framework or model that supports high reusability and loose coupling in dealing with the heterogeneous devices that can hinder its development. Thus, an IoT component model is proposed. Meta-modelling has been used to define the component model where the specific interaction and composition standard in a component are abstracted. IoT component model is intended to develop a prototype for IoT development. With this IoT prototype, IoT system developers will not need to develop everything from scratch every time, as generic components can be reused even when it is applied in different domains or during system enhancement is required. Smart home IoT system has been selected as a case study to evaluate our prototype tool. In this study, we provide an alternative way to develop IoT software in component-based softwareengineering method. A prototype has also been developed to assist reusability and reduce coupling between modules.
In this study, a system of discrete optical pulse generation via a series of microring resonator (MRR) is presented. Chaotic signals can be generated by an optical soliton or a Gaussian pulse within a MRR system. Larg...
详细信息
In this study, a system of discrete optical pulse generation via a series of microring resonator (MRR) is presented. Chaotic signals can be generated by an optical soliton or a Gaussian pulse within a MRR system. Large bandwidth signals of optical soliton are generated by input pulse propagating within the MRRs, which can be used to form continuous wavelength or frequency with large tunable channel capacity. Therefore, distinguished discrete wavelength or frequency pulses can be generated by using localized spatial pulses via a networks communication system. Selected discrete pulses are more suitable to generate high-secured quantum codes because of the large free spectral range (FSR). Quantum codes can be generated by using a polarization control unit and a beam splitter, incorporating to the MRRs. In this work, frequency band of 10.7 MHz and 16 MHz and wavelengths of 206.9 nm, 1448 nm, 2169 nm and 2489 nm are localized and obtained which can be used for quantum codes generation applicable for secured networks communication.
Cognitive Computing (CC) is a contemporary field of fundamental intelligence theories and general AI technologies triggered by the transdisciplinary development in intelligence, computer, brain, knowledge, cognitive, ...
详细信息
In hyperspectral remote sensing data mining, it is important to take into account of both spectral and spatial information, such as the spectral signature, texture feature and morphological property, to improve the pe...
详细信息
This article is devoted to the research and development of innovative two-factor authentication (2FA) methods using neural networks. 2FA plays a key role in ensuring the security of data and accounts in the modern dig...
详细信息
ISBN:
(数字)9798350374865
ISBN:
(纸本)9798350374872
This article is devoted to the research and development of innovative two-factor authentication (2FA) methods using neural networks. 2FA plays a key role in ensuring the security of data and accounts in the modern digital world, and the use of neural networks opens up new prospects in strengthening protection and improving the user experience. The article presents an analysis of existing 2FA methods, identifies their limitations, and discusses the advantages of using neural networks in this area. The main focus is on the development of new authentication algorithms based on deep learning, providing effective anomaly detection and support for a dynamic adaptive approach. In the context of the article, the issues of privacy and data security are also considered, as well as the possibilities of applying the developed methods in various fields, including finance, medicine and the Internet of Things. The results of the study represent a significant contribution to the field of digital
One of the crucial elements in an Internet of Things (IoT) environment is a database. IoT performance will be at stake if the wrong database is adopted. In this research, three Structured Query Language (SQL) database...
One of the crucial elements in an Internet of Things (IoT) environment is a database. IoT performance will be at stake if the wrong database is adopted. In this research, three Structured Query Language (SQL) databases were tested against multiple network speeds in an IoT device. Single board computers (SBC) were used as a media of testing instead of an ordinary computer. A controlled wireless sensor network (WSN) was developed with several uniform constants and variable network speeds. A new data transmission rate equation also was proposed and tested. From the result, it was found that not all SQL databases can cater IoT devices. Some of them showed that performance decreased along with network speed. The correlation, between 0.90 and 0.96, proved the strong influence between the research subjects. In addition, file-type database is the best option available for SQL-wise IoT storage.
Context: Microservices Architecture (MSA) has received significant attention in the software industry. However, little empirical evidence exists on design, monitoring, and testing of microservices systems. Objective: ...
详细信息
暂无评论