In today’s complex global environments, it is highly challenging to achieve effective healthcare management. The critical challenges faced by healthcare management are being met by the revolution of m-health where mo...
详细信息
ISBN:
(数字)9798350387537
ISBN:
(纸本)9798350387544
In today’s complex global environments, it is highly challenging to achieve effective healthcare management. The critical challenges faced by healthcare management are being met by the revolution of m-health where mobile cloud computing plays a major role. The taxonomy of mobile computing comprises operational aspects, end-user issues, and service quality and mobility management. The use of smartphone technologies and applications has become a highly significant approach to improving healthcare management. Mobile health services such as mobile pathology, mobile neurosurgery, cancer treatment, and behavioral/psychological disorders are gaining significance where smartphone applications are being used. Portability, flexibility, and convenience are major characteristics of mobile computing that have helped patients and doctors to develop better relationships through coordination and communication. The relationship between smartphone technologies and applications and healthcare management can be understood in several broad aspects. This article aims to analyze the current and future implications of these technologies on healthcare and disease management systems.
An e-Commerce company has been using an Enterprise Resource Planning (ERP) system for several years, but is still constrained in its implementation, this is reflected in the number of issue/change request tickets subm...
详细信息
Along with technological improvements, online shopping is currently developing quickly. Online shops started by selling electronics, clothing, food, and home appliances and continue to evolve, selling various things. ...
详细信息
This study aims to investigate the use of artificial intelligence in health education in the last ten years from 2012 to 2022 using the Scopus database. Researchers use bibliometric analysis combined with the quantifi...
详细信息
Many different industries are currently making substantial use of the Internet of Things (IoT). IoT is the process through which electronic devices communicate with their surrounding virtual environment by continuousl...
详细信息
Load Balancing is very well applied to the distribution of internet access at any point of the Wi-Fi area so that the use of limited devices can be optimal and on target. The proper use of the Greedy Algorithms when a...
Load Balancing is very well applied to the distribution of internet access at any point of the Wi-Fi area so that the use of limited devices can be optimal and on target. The proper use of the Greedy Algorithms when applied to an access point device is very capable in resolving excessive loading in a single resource to take the best choice at every stage in an optimum process. Access point device is also a success factor in running the optimization of the distribution of Wi-Fi access on the Access Point is strongly influenced by the parameters set. In this research, user access factor in one very high Wi-Fi area also influences the possibility of incoming access failure. For the application of the results of this study can be utilized on all access point devices that have limits, but for speed internet access remains at the capacity provided bandwidth.
The increasing use of digital payment systems has led to a rise in fraudulent activities, presenting a significant challenge in ensuring secure transactions. This research focuses on implementing the Support Vector Ma...
详细信息
ISBN:
(数字)9798331519643
ISBN:
(纸本)9798331519650
The increasing use of digital payment systems has led to a rise in fraudulent activities, presenting a significant challenge in ensuring secure transactions. This research focuses on implementing the Support Vector Machine (SVM) algorithm with a Radial Basis Function (RBF) kernel to detect fraud in digital payment systems. One of the main challenges addressed in this study is the severe class imbalance in the dataset, where fraudulent transactions account for only 0.17% of total transactions. To overcome this, the SMOTE (Synthetic Minority Over-sampling Technique) method was applied to balance the dataset, allowing the model to better recognize fraudulent patterns. The results indicate that the SVM model achieved an accuracy of 99.93%, with a precision of 86.23% and a recall of 75.51%. These results demonstrate that SVM, combined with SMOTE and RBF kernel, is highly effective in detecting fraudulent transactions while minimizing false positives. This research provides a strong foundation for improving fraud detection models in the context of digital payment systems, offering enhanced security and trust for users. Further research could explore hybrid models and real-time data analysis to improve performance.
Citrus Limon L. (Lemon) is a type of fruit that is currently widely consumed, because it contains abundant vitamin C, fiber, and antioxidants. This fruit have high potential in the agribusiness sector and is widely cu...
Citrus Limon L. (Lemon) is a type of fruit that is currently widely consumed, because it contains abundant vitamin C, fiber, and antioxidants. This fruit have high potential in the agribusiness sector and is widely cultivated by traditional farmers. However, during harvest time, traditional farmers generally still use manual methods using the human eye in distinguishing the maturity level of lemons which is less efficient because it has a low accuracy. Digital image processing is one solution to this problem. In the research on the classification of lemon maturity levels using digital image processing with the feature extraction method of the Mean RGB, HSV, and LBP methods and the K-Nearest Neighbor classification algorithm in this study, a total of 120 lemon images were used which were divided into 80 training image data and 40 image data. testing. The results of model performance measurements in the form of the highest accuracy level in the Mean RGB method of 100%, the highest accuracy in the HSV method of 98%, and the highest accuracy in the LBP method of 82.5%.
This study examines the mapping of research data on digital technology in the field of health education using bibliometric analysis method. Data was collected by identifying keywords in the Scopus database and sorting...
详细信息
ISBN:
(纸本)9781665473286
This study examines the mapping of research data on digital technology in the field of health education using bibliometric analysis method. Data was collected by identifying keywords in the Scopus database and sorting them out to sort the studies from the last 10 years (2012–2021). Through this step, a total of 1482 documents were obtained (articles, journals, proceedings, books, and others). The data is then processed using the VOSViewer instrument to obtain a visualization of the mapping analysis. This study also analyzes the network types of authors and co-authors through the VOSViewer instrument. The result of this study indicates that the most document types published within ten years are Articles (66.5%), Review (22.9 % ), Conference Paper (4.2 % ), and others. The most studied subjects are Medicine (55.7%), Nursing (9.0%), Health Professions (8.2%), Social sciences (7.8%), engineering (3.9%), computerscience (2.6 % ), Environmental science (2.6 % ), Biochemistry-Genetics and Molecular Biology (2.2%), Psychology (1.6%), and Dentistry (1.3%). This study offers a written communication process and the nature and direction of developing descriptive means of counting and analyzing the various phases of communication as well as recognizing the authorship and direction of its symptoms in documents on the subject of digital technology in the health sector.
Raspberry Pi is a mini-computer that is provided to carry out activities quickly and precisely, but Raspberry Pi was created to not be able to do the real-time system with the support of Windows 10 IoT operating syste...
Raspberry Pi is a mini-computer that is provided to carry out activities quickly and precisely, but Raspberry Pi was created to not be able to do the real-time system with the support of Windows 10 IoT operating system, so the real-time system can be done on Raspberry Pi. The real-time applied in the application needs to be tested with the Nyquist theory. The purpose of this study was to get real-time system measurements available on Windows 10 IoT. This test is done using the Nyquist theory by calculating the results of measurements on mp3 streaming performed on Windows 10 IoT.
暂无评论