Internet of Things (IoT) technology could be an effective solution to accomplish real-time retrieval of historical electronic health records (EHRs) to present better service of healthcare. In a pilgrimage environment such as the Hajj, IoT can be applied by identifying the non-local patients as electronic tags, and the tag data can be read by wireless sensors. The data that is collected using Radio-Frequency Identification (RFID) can be acquired from a Wireless Sensor Network (WSN) in order to accomplish many decisions, such as sending an ambulance to a patient’s location, sending an emergency alert to his immediate family circle, and retrieving his EHR from a database. The main contribution of this research is to propose a conceptual IoT framework relevant to support the non-local patients through retrieval of EHR between countries via internet network. The conceptual framework based on four layers (connectivity, access, abstraction and service) is proposed to show how the IoT can be a solution for the case study. The validation results show that the proposed framework is useful to serve the health cases of Malaysian pilgrims.
The analysis of time series considers one of the mathematical and statistical methods in explanation of the nature phenomena and its manner in a specific time period.
Because the studying of time series can get by building, analysis the models and then forecasting gives the priority for the practicing in different fields, therefore the identification and selection of the model is of great importance in spite of its difficulties.
The selection of a standard methods has the ability for estimation the errors in the estimated the parameters for the model, and there will be a balance between the suitability and the simplicity of the model.
In the analysis of d
... Show MoreShe noted most of the results of research conducted on the use of computers and the Internet in the areas of administrative, economic, agricultural and educational to a significant improvement in learning outcomes of these groups in the development of mechanisms of action, has increased rates of computer use and applications in various spheres of life at very fast pace so that the computer and the Internet is a vital part of any activity, whether administrative or research or the media, hence it can be said that the use of computers and the Internet in the management of public relations activities in any organization can accelerate the pace of echo positive goals and purposes of public relations, this study comes to looking at us
... Show MoreAbstract
Should be the goal of Government controls, including environmental controls and safety laws to protect citizens from the harmful effects of negative secreted by human's additions and changes in the environment. and perhaps the protection aspects of the protection of citizens from the adverse effects of communications towers, including those produced by towers of health effects. The people the right to choose the nature of the physical environment, which should not be imposed on them by others. Communications towers are one of the main problems that have been
... Show MoreThe research aims to enhance the level of evaluation of the performance of banking transactions control policies and procedures. The research is based on the following hypothesis: efficient transactions control policies and procedures contribute enhancing financial reporting, by assessing non-application gap of those policies and procedures in a manner that helps to prevent, discover, and correct material misstatements. The researchers designed an examination list that includes the control policies and procedures related to the transactions, as a guide to the bank audit program prepared by the Federal Financial Supervision Bureau. The research methodology is
... Show MoreIn this paper, the concept of normalized duality mapping has introduced in real convex modular spaces. Then, some of its properties have shown which allow dealing with results related to the concept of uniformly smooth convex real modular spaces. For multivalued mappings defined on these spaces, the convergence of a two-step type iterative sequence to a fixed point is proved
User confidentiality protection is concerning a topic in control and monitoring spaces. In image, user's faces security in concerning with compound information, abused situations, participation on global transmission media and real-world experiences are extremely significant. For minifying the counting needs for vast size of image info and for minifying the size of time needful for the image to be address computationally. consequently, partial encryption user-face is picked. This study focuses on a large technique that is designed to encrypt the user's face slightly. Primarily, dlib is utilizing for user-face detection. Susan is one of the top edge detectors with valuable localization characteristics marked edges, is used to extract
... Show More