به نام خدا
Title: Clinical Information Systems in Private Hospitals
Author: Aini Aman
Abstract: With the tremendous developments in Information Technology (IT), many organizations in private sectors use IT to transform their services and operation. Like any other sectors, the health sector has been benefited from the adoption of IT in transforming their services for society well-being. The applications of IT have greatly improved accessibility, quality and cost-effectiveness of health care. Clinical Information Systems (CIS) are one of the examples of the applications of IT in healthcare. CIS are computer applications that support the operations of clinicians engaged in providing care to patients. However, CIS does not always improve the outcomes and performance of the health professionals, but might bring about negative impacts on their performance and practices. Studies on medical errors have shown that errors in healthcare and medicine are not rare and may bring about severe harm to patients. This paper aims to understand the use of CIS in hospitals and their impact on patient safety. Using interviews with medical practitioners in private hospitals in Malaysia, the findings provide insights for system developers and hospital managers on the usability of CIS to ensure the delivery of better patient care since error reduction is one of the dimensions of health service quality.
Publish Year: 2013
Published in: ICACT – IEEE
موضوع: سیستمهای اطلاعاتی بیمارستانی (Hospital Information Systems)
ایران سای – مرجع مقالات علمی فنی مهندسی
حامی دانش بومی ایرانیان
به نام خدا
Title: Leveraging a Crowd Sourcing Methodology to Enhance Supply Chain Integrity
Authors: Han Lin, Moses Schwartz, John Michalski, Mayuri Shakamuri, Philip Campbell
Abstract: Supply chain integrity (SCI) is emerging as one of the top security issues facing critical systems. The government’s reliance on commercial off-the-shelf (COTS) products is apparent, as is the threat of critical systems being designed and manufactured overseas. To date, few tools or capabilities exist to prevent or even detect these classes of attacks. Programs, such as DARPA Trust, exist to identify solutions; however, alternative strategies must be explored. It is extremely challenging to establish the trustworthiness of a supply chain for a product or system in today’s globalized climate, especially given the complexity and variability of the hardware and software, and the diverse geographical areas where they are made. Counterfeit items, from individual chips to entire systems, have been found both in commercial and government sectors. Supply chain attacks can be inserted at any point during the product or system life cycle and can have detrimental effects to mission success. We hypothesize that wisdom of crowds techniques may be applicable to the analysis of supply chain integrity. Current supply chain security efforts are hindered by a lack of detailed information on a product’s entire supply chain. End-users have virtually no access to supply chain information, and even major manufacturers may have difficulty getting access to their suppliers’ Sub suppliers. Component testing and even reverse engineering can be used to mitigate risks, but these approaches are imperfect, time consuming, and expensive. This paper will discuss the development of a semi-automated supply chain integrity risk analysis framework to assist the supply chain security analysts in assessing the level of risk associated with a component of a mission critical system. This capability can provide the system designer a more rigorous and efficient approach to assess the security of the components in the design. By fusing all of these tools into a centralized framework, we hypothesis that we can create a capability that will enable analysts to more effectively interrogate the data and extract trending as well as critical information.
Publish Year: 2012
Published in: ICCST – IEEE
موضوع: مدیریت زنجیره تامین (Supply Chain Management)
ایران سای – مرجع مقالات علمی فنی مهندسی
حامی دانش بومی ایرانیان
به نام خدا
Title: Data mining agent conversations: A qualitative approach to multi-agent systems analysis
Authors: Emilio Serrano, Michael Rovatsos, Juan A Botia
Abstract: This paper presents a novel method for analyzing the behavior of multivalent systems on the basis of the semantically rich information provided by agent communication languages and interaction protocols specified at the knowledge level. More low-level communication mechanisms only allow for a quantitative analysis of the occurrence of message types, the frequency of message sequences, and the empirical distributions of parameter values. Quite differently, the semantics of languages and protocols in multi-agent systems can help to extract qualitative properties of observed conversations among agents. This can be achieved by interpreting the logical constraints associated with protocol execution paths or individual messages as the context of an observed interaction, and using them as features of learning samples. The contexts mined from such analyses, or context models, can then be used for various tasks, e.g. for predicting others future responses (useful when trying to make strategic communication decisions to achieve a particular outcome), to support ontological alignment (by comparing the properties of logical constraints attached to messages across participating agents), or to assess the trustworthiness of agents (by verifying the logical coherence of their behavior). This paper details a formal approach that describes our notion of context models in multi-agent conversations, an implementation of this approach in a practical tool for mining qualitative context models, and experimental results to illustrate its use and utility.
Publish Year: 2013
Published in: Information Sciences - Science Direct
موضوع: داده کاوی (Data Mining) – عاملهای هوشمند (Intelligent Agents)
ایران سای – مرجع مقالات علمی فنی مهندسی
حامی دانش بومی ایرانیان
به نام خدا
Title: Handwritten Text Segmentation using Average Longest Path Algorithm
Authors: Dhaval Salvi, Jun Zhou, Jarrell Waggoner, and Song Wang
Abstract: Offline handwritten text recognition is a very challenging problem. Aside from the large variation of different hand-writing styles, neighboring characters within a word are usually connected, and we may need to segment a word into individual characters for accurate character recognition. Many existing methods achieve text segmentation by evaluating the local stroke geometry and imposing constraint on the size of each resulting character, such as the character width, height and aspect ratio. These constraints are well suited for printed texts, but may not hold for handwritten texts. Other methods apply holistic approach by using setof lexicons to guide and correct the segmentation and recognition. This approach may fail when the lexicon domain is insufficient. In this paper, we present a new global non-holistic method for handwritten text segmentation, which does not make any limiting assumptions on the characterize and the number of characters in a word. Specifically, the proposed method finds the text segmentation with the maximum average likeliness for the resulting characters. For this purpose, we use a graph model that describes the possible locations for segmenting neighboring characters, and we then develop an average longest path algorithm to identify the globally optimal segmentation. We conduct experiments on real images of handwritten texts taken from the IAM handwriting database and compare the performance of the proposed method against an existing text segmentation algorithm that uses dynamic programming.
Publish Year: 2013
Published in: WACV – IEEE
موضوع: تشخصی دست خط (Handwritten Text Recognition)
ایران سای – مرحع علمی فنی مهندسی
حامی دانش بومی ایرانیان
به نام خدا
Title: Influence of Sci-Fi Films on Artificial Intelligence and Vice-Versa
Authors: D Lorenk, M Tarhaniov and P Sincak
Abstract: Sci-fi technological movie domain is an important part of human culture. The paper focus on comparison study of selected robotics sci-fi movie domain from a technological point of view. It is necessary to accomplish technological analysis of studied sci-fi movies and able to distinguish about possible current technology and future direction of the artificial intelligence in the domain of Robot intelligence. The review of existing movies which are in fact influencing thinking of humans is essential since it can influence a future research direction in AI. This information is interesting for inspiration of students and research associates in theory and applications. In conclusion, we envision potential problems of social networks and impact of Internet of things facts which is becoming a reality with IPv6 protocol. The goal of the paper is also to underline the importance of such cultural phenomena as sci-fi movies for the future of humanity.
Publish Year: 2013
Published in: SAMI – IEEE
موضوع: هوش مصنوعی (Artificial Intelligence)
ایران سای – مرجع علمی فنی مهندسی
حامی دانش بومی ایرانیان