service basis
Recently Published Documents


TOTAL DOCUMENTS

29
(FIVE YEARS 7)

H-INDEX

5
(FIVE YEARS 0)

2021 ◽  
Vol 7 (4) ◽  
pp. 54-62
Author(s):  
A. Kovalsky ◽  
G. Mitryaev ◽  
A. Pitrin

The article develops a methodology for scheduling an orbital channel resource with operational priority assignment based on the calculation of the parameters of a non-Markov service model with a limited residence time of a request in the system, which differs from known methods in that it takes into account the priority of various network subscribers, taking into account the high dynamics of their movement and the average waiting time in the service system with priority in the allocation of the orbital channel resource of the satellite command-relay system. The analysis of the influence of service quality indicators of information data flows is carried out.It is shown that the developed method of priority scheduling makes it possible to meet the requirements for the quality of service. A complex of experimental studies was carried out, which showed the possibility of ensuring the required level of stability with the deterioration in difficult conditions of radio electronic equipment, which made it possible to formulate practical proposals for improving the complex of coordination and distribution of resources of in the satellite command relay system.


2021 ◽  
Vol 4 (1) ◽  
pp. 7-15
Author(s):  
Sekamwa Umar ◽  
Semwogerere Twaibu ◽  
Gilbert Gilibrays Ocen ◽  
Lusiba Badru ◽  
Alunyu Andrew ◽  
...  

Supermarkets are large retail stores operated on a self-service basis. They sell a range of goods from agricultural produce to electronics with tagged prices. They are coupled with numerous advantages like supporting advanced means of payment like cheques, credit cards, smart store electronic cards and mobile money, offering transportation incentives and discounts. The study aimed at coming up with an RFID-Based billing system through automation. The methods and materials used included document reviews, observational experiments, system design, implementation and testing based on current situations in the supermarket business. Findings showed that there are several weaknesses with the existing systems and the new system could ably uphold the time resource, efficiency improvement of both workers and customers, and it is secure, cost-effective, and time-saving especially from queues. The widely implemented system can improve the revenue gap and possibly rejuvenate the national or international economy to a large extent.


2021 ◽  
Vol 7 (3) ◽  
pp. 38-46
Author(s):  
A. Kovalsky ◽  
G. Mitryaev ◽  
A. Pitrin

In work systems analysis of process of target functioning of the satellite command relay system (SCRS) in the conditions of a difficult radio-electronic situation is carried out. The carried-out analysis of perspectives of development of a subsystem of relaying of SKRS of orbital grouping of spacecrafts of remote sensing of Earth, allowed to draw a conclusion on features of a stage of coordination planning of the means of a subsystem of relaying consisting in distribution of SKRS the orbital channel resource (OCR) on the basis of the non-Markov priority systems of service. The model of operational distribution of ROC of a subsystem of relaying on the basis of the priority systems of service in which, unlike the known models, time of stay of the request in a system is limited is received, limits for a type of distribution of holding time of requests are lifted and also expression for calculation of the initial moments of distribution of waiting time of messages of different priorities is received. Use of model allows to evaluate the probability of untimely delivery of details and also to provide required figures of merit of service of priority flows and at the expense of it to provide the required connectivity and stability of SKRS in general.


2021 ◽  
Vol 39 (28_suppl) ◽  
pp. 44-44
Author(s):  
Stacie Corcoran ◽  
Frank Licciardi ◽  
Eliza Weber ◽  
Erika Duggan ◽  
Alexandria Woodside ◽  
...  

44 Background: Patients often feel lost in the transition from cancer patient to survivor. As cancer treatment improves, the number of survivors in the US is expected to approach 22 million by the year 2029. Smaller increases in the MD workforce coupled with long-term effects of new treatments necessitate the creation survivorship clinics led by advanced practice providers (APP) who are disease-specialized and specifically trained to manage unique survivor needs. Although the institutions Survivorship program was established more than a decade ago, the average referral rate to the program is only 30%. Given the high levels of patient satisfaction with the program, we sought to understand and address clinician awareness and referral obstacles. Methods: Based on patient input, members of our Patient & Family Advisory Council for Quality (PFACQ) put forth a proposal aimed at increasing referrals to the Survivorship program. A multidisciplinary working group comprising patients, clinicians, administrators and process engineers was assembled. Process Improvement training was conducted, and a primary goal was developed: increase Survivorship referrals by 25%. Central to the approach was engagement with referring physicians and APPs on a service-by-service basis. A four-question survey was developed to address timing of initial discussion, challenges to referring, knowledge of visit elements, and materials needed to support referrals. A customized ‘roadshow’ presentation was created and delivered by a PFACQ member at a faculty meeting. Highlights included: the importance of Survivorship care to patients and details of the visit, survey responses, and additional faculty discussion and input. Results: Four roadshows were completed from August 2020-June 2021: Gynecologic Surgery, Endocrine, Breast Medicine and Lymphoma. Based on survey responses and dialogue with providers, new material to support patient discussions and education have been developed: a patient-facing brochure, clinician- & patient-facing video, and clinician talking points. Methods to facilitate identifying eligible patients were also discussed, as well as automatic referrals to Survivorship for selected services. Data reveal a significant increase in referral rates from GYN and Endocrine services (follow up > 6 months) of 63% and 228%, respectively. (Breast Medicine and Lymphoma with shorter follow up will be reported.) Engagement with other services is underway. Conclusions: Results have exceeded the goal of increasing referral rates to the program. This process suggests that ongoing engagement with referring clinicians is essential to achieving and maintaining higher referral rates. The patient voice throughout this process has been a powerful tool in raising clinician awareness of their experiences and expectations for comprehensive follow up care, which can be delivered on a greater scale by survivorship providers.


Author(s):  
Ramaz Otinashvili ◽  

To neutralize the danger associated with business management there is a special security service in the management system of successful companies the structure of which depends on the nature and scale of the business. A medium-sized security service consists of four structural divisions: 1. Security; 2. Operative; 3. Analytical; 4. Technical. In each, depending on the specifics of the activity , up to 1 or 10 employees can be employed. Every business has its general and specific challenges. The main challenge still comes from direct competitors. Rivalry often transcends civilized boundaries and escalates into physical or other confrontation, especially if there is a new "player" in the segment. In the advanced countries of the West, in addition to state security institutions, there are private detective and detective organizations, news agencies, studying scientific and consulting centers, which provide various services on a fee-for-service basis. Coordination of state law enforcement agencies and private security structures is sophisticated. There is created a special body, if necessary and it harmonizes their activities. It would be nice to transfer this practice to Georgian conditions.


2019 ◽  
pp. 096834451982978
Author(s):  
Matthew Powell

This article investigates the work conducted by the Royal Air Force (RAF) in the development of tactical air power in the interwar period. It analyses the RAF’s theoretical doctrinal thinking during the period along with exercises conducted on a joint Service basis to further develop these ideas in practice. It will argue that, rather than neglecting tactical air power during this period as is the accepted view, much good theoretical work was done that formed a theoretical and intellectual basis for the further development of tactical air power in the light of operational experience during the Second World War.


The implementation of several modern concepts of enterprise architecture creation is analyzed and real-time business process generation is described. Cloud-based self-generated business service is constructed as a basis of the resulting concept with an aim to increase the flexibility of enterprise and introduce AaaS (architecture as a service). Under particular business request in form of correctly formulated strategic goal the generation of business process model is produced. The result of the generation is cross-cutting business process architecture model, which is approved or rejected/corrected by business owner expertise. During generation all necessary requirements for supporting resources, such as information, know-how, intellectual and professional skills, inputs and outputs, quality and operational risk limitations, control and monitoring, are formed. All formed requirements have to be satisfied by appropriate selections from the cloud facilities and again approved. Finally, after several iterations, the business model will be able to be realized in reality and could be executed with predicted results. Briefly, that means that certain sets of valued and weighted business process replicas are located in clouds and served in clouds. Thus, enterprise architecture becomes a regular service from clouds extending row of SOA in the name of AaaS. In addition, the advanced view on the topic is provided with an attempt to install a virtual SOA torrent that catches services from the internet and makes them available to customers and represents a business service basis for real-time business processes.


2018 ◽  
Vol 7 (2.7) ◽  
pp. 363
Author(s):  
A Vijaya Kumar ◽  
L S. S. Reddy

Security is the essential entity of the digital computations in the internet world. Many internet and mobile applications require private data inputs from different clients for data analysis. Now a days many of the Mobile Apps collect the sensitive user data for analysis may be without knowledge of users. Secure Multi Party computation enables distributed users to share their private inputs to a third party which computes a common function over these inputs and the collaborative outcome shared to the user. It is very essential in many engineering, medical and financial sectors where privacy of the sensitive data provided by the user. Many medical researchers require sensitive patient’s data for typical diagnosis. This paper detailed the origin for SMC which is secret sharing. It discussed the evolution of two party computation to secure multiparty computation. Several protocols and their pros and limitations are described. Cloud computing changed the way SMC was interpreted by earlier works. Cloud provides all the computations as a service basis is used to drastically reducing the communications overhead of the SMC. Our contribution is focused on evolution from conventional SMC with towards Secure Multiple Computation in collaboration with the cloud. The works focuses on the research issues to be addressed because of the untrustworthy nature of the cloud. A comparative analysis of different approach of SMC is presented. The comparative study details the open issues like transparency, public data auditability in SMC with cloud architecture. 


2013 ◽  
Vol 2013 ◽  
pp. 1-5
Author(s):  
Hong Hui Li ◽  
Xue Liang Fu

This paper develops a new scalable and efficient model for the design ofp-cycles with the differentiated levels of node protection. The proposed model allows the indicated level of node survivability ranging from 0% to 100%, which could facilitate a carrier offer node-failure survivability (and hence availability) on a differentiated service basis. To designp-cycles, an integer linear program (ILP) is usually formulated with the prerequisite of a prior enumeration of all possiblep-cycle candidates. A huge number of candidates may exist in a large-scale network. Thus, the resulting ILP becomes intractable. We propose a new design and solution method based on large-scale optimization techniques, known as column generation (CG). With CG, our design method generatesp-cycle candidates dynamically when needed. Extensive experiments have been conducted for evaluation. The numerical results show that, with the spare capacity used only for link protection, up to 50% node-failure survivability can be achieved for free. Full node protection can be achieved at a marginal cost in comparison with those for link protection only.


Sign in / Sign up

Export Citation Format

Share Document