service components
Recently Published Documents


TOTAL DOCUMENTS

141
(FIVE YEARS 26)

H-INDEX

10
(FIVE YEARS 3)

2021 ◽  
pp. 4595-4607
Author(s):  
Tong Guo ◽  
Rongbing Li ◽  
Qingchun Liu ◽  
Jianye Liu
Keyword(s):  

2021 ◽  
Vol 2021 ◽  
pp. 1-9
Author(s):  
Ming Chen ◽  
Junqiang Cheng ◽  
Guanghua Ma ◽  
Liang Tian ◽  
Xiaohong Li ◽  
...  

Due to the lack of domain and interface knowledge, it is difficult for users to create suitable service processes according to their needs. Thus, the paper puts forward a new service composition recommendation method. The method is composed of two steps: the first step is service component recommendation based on recurrent neural network (RNN). When a user selects a service component, the RNN algorithm is exploited to recommend other matched services to the user, aiding the completion of a service composition. The second step is service composition recommendation based on Naive Bayes. When the user completes a service composition, considering the diversity of user interests, the Bayesian classifier is used to model their interests, and other service compositions that satisfy the user interests are recommended to the user. Experiments show that the proposed method can accurately recommend relevant service components and service compositions to users.


2021 ◽  
Vol 21 (1) ◽  
Author(s):  
Lisa D. Hawke ◽  
Lehana Thabane ◽  
Srividya N. Iyer ◽  
Alexia Jaouich ◽  
Paula Reaume-Zimmer ◽  
...  

Abstract Background Given high rates of mental health and substance challenges among youth and substantial system access barriers, system innovation is required. Integrated youth services (IYS) models aim to transform youth mental health and substance use services by creating integrative, collaborative models of care in youth-friendly settings. This study examines service provider perspectives on the key service components to include in IYS models. Method A discrete choice experiment modeled service provider preferences for the service components of IYSs. The sample includes 388 service provider/agency leader participants (age 18+) from youth-serving organizations in Ontario. Importance scores and utility values were calculated for 12 attributes represented by four levels each. Latent class analysis identified subgroups of participants with different preferences. Results The majority of participants were direct service providers working in larger organizations in the mental health and/or substance use sectors in large urban centers. Participants strongly endorsed service models that provide rapid access to the widest variety of culturally sensitive service options, with supplementary e-health services, in youth-focused community settings with evening and weekend hours. They prefer caregiver involvement in youth services and treatment decisions and support youth and family engagement. Latent class analyses reveal three segments of service providers: a Youth-Focused Service Accessibility segment representing 62.1% (241/388) of participants, a Service Options segment representing 27.6% (107/388) of participants, and a Caregiver Integration segment representing 10.3% (40/388) of participants. Within these segments, the degree of prioritization of the various service components differ; however, the overall endorsement of the service components remains largely consistent across classes for most attributes. The segments did not differ based on demographic or agency characteristics. Conclusions The core characteristics of IYS settings for youth with mental health and substance use challenges, i.e., rapid access to a wide range of youth-oriented services, are strong priorities of service providers and youth-serving agency leaders. These findings confirm that youth-oriented service providers endorse the importance and relevance of IYS models as a whole; strong service provider buy-in to the model is expected to facilitate development, implementation and scaling of IYS models. Hearing stakeholder perspectives, including those of service providers, youth, and caregivers, is essential to developing, effectively implementing, and scaling effective youth services.


2021 ◽  
Author(s):  
Kyle Koren ◽  
Toluwalase Olajoyegbe ◽  
Beshoy Morkos ◽  
Hector Gutierrez

Abstract The adoption of additive manufacturing methods is becoming prevalent in industry. Socio-economic trends seek more customization and sustainability in production. An increase in unique service components will warrant the need for more flexible repair methods. This is particularly important for components that are difficult to access or disassemble — thus requiring an on-site repair. This paper introduces the use of 3D printing pens as a means to perform repair to additively manufacturing components. A study was conducted to assess the feasibility of using a 3D printing pen in maintenance, repair and overhaul (MRO) applications on polymer-based service products. A series of tensile tests were conducted on printed specimens, pre- and post-repair, to examine the tensile retention of the mended region. Results indicate significant retention in tensile strength in the mended specimens, supporting the notion of the pens relevance in repair and overhaul applications. Specimens that fractured within the repair region were seen to have retained (81 ± 10) % of their original tensile strength while specimens that fractured outside the region retained (86 ± 4) %. Considering the limited control of the study, results acquired encourage further analysis of the underlying mechanisms in the process, with the intent to more efficiently exploit this approach for practical structure-based repair applications.


Author(s):  
Tafesse Gizaw ◽  
Mekonnen Bogale ◽  
Tadesse Gudeta

Abstract Background These days, pharmaceutical customers are the utmost stakeholders in the healthcare supply chain, and ensuring their satisfaction with the logistics services has become worthwhile. This study aimed to investigate the effect of perceived logistics service performance on customer satisfaction in the public health facilities served under the Ethiopian Pharmaceutical Supply Agency of the western cluster. Methods An analytical cross-sectional study was conducted between January and February 2020. We selected 269 respondents using a multistage sampling technique. A pretested semi-structured questionnaire was used to collect the intended data. We employed SPSS version 26 and AMOS 22 software to analyze the quantitative data. The findings obtained from the open-ended questions were summarized in word document manually and used to discuss the quantitative data. We tested the hypotheses using structural equation modeling. Results Of the 269 questionnaires, 247 were duly completed and returned, making a 92% response rate. The findings indicated that the pre-transaction logistics service components (β = 0.31, p < .001), the transaction logistics service components (β = 0.54, p < .001), and the post-transaction logistics service components (β = 0.62, p < .001) influenced customer satisfaction positively and significantly explaining 77.1% of variations. The respondents indicated that the right person with appropriate qualifications, adequate knowledge, and experience should be employed to provide specific logistics services to please clients. Conclusion It is worth pointing out that the higher logistics services performances are likely to enhance customer satisfaction. Therefore, logistics managers should strive to ensure customers get the desired products and services reliably to increase their satisfaction even better than the current performance.


Author(s):  
Володимир Вікторович Бараннік ◽  
Сергій Олександрович Сідченко ◽  
Наталія Вячеславівна Бараннік ◽  
Андрій Михайлович Хіменко

The demand for video privacy is constantly increasing. Simultaneously, it is necessary to solve an urgent scientific and applied problem, which consists in increasing the confidentiality of video information under conditions of a given time delay for its processing and delivery, while ensuring its reliability. The crypto compression transformations can be used to solve it. A service component is used as a conversion key, which is directly formed in the conversion process and contains information about the identified structural characteristics of the video data. Therefore, such information requires confidentiality. The existing methods of cryptography are designed to process a universal data stream and do not consider the structure and features of service components. It leads to the formation of redundant data, the use of an excessive number of operations, and an increase in processing time in the process of protecting service information using universal cryptography methods. Therefore, the article aims to develop a method for masking service data compression to ensure their confidentiality, considering the peculiarities of their formation by crypto compression methods. In modes with controlled loss of information quality, the elements of the service component are formed in a reduced dynamic range. Their length is 7 bits. To ensure the confidentiality of such elements, it is necessary to develop a method for masking overhead compression in video compression systems. On the one hand, overhead blocks should not contain redundant information. On the other hand, they must be formed from bit positions from different elements of the service components. On the other hand, they should be formed from bit positions from different elements of the service components. For that, it is proposed to organize the assembly of the elements of the service components. It is organized by combining 7-bit elements of service components into 8-bit complete sequences. Encryption blocks are formed from 8-bit sequences. The assembly of service components ensures the mixing of service data and reducing their quantity. To violate the structure of the representation of service components, it is proposed to additionally organize the permutation of 8-bit completed sequences. It provides a significant dispersion of the bit positions of the 7-bit overhead elements and the destruction of the correlation between the overhead elements. The correlation coefficients of the original and reconstructed images using encrypted service components are in the region of 0. The number of changing pixels is above the theoretical threshold value of 99.5341%.


2021 ◽  
Author(s):  
Jens Fitzke ◽  
Claus Rinner ◽  
Dirk Schmidt

This paper gives an overview of GIS applications on the Internet starting with an introductory scenario. The technical background of Internet GIS is examined from three perspectives: the browser-centered view, the Internet-enabled GIS view, and the component view. Subsequently, a consistent terminology for the classification of Internet GIS applications, according to the services they offer, is proposed as a base for further discussion. The individual service components can be interpreted as functional modules of different application types. The paper concludes with outlines of future technical advances and possible resulting consequences for GIS experts, users and the GIS market on the way into the next millenium.


Sign in / Sign up

Export Citation Format

Share Document