Search results

1 – 10 of over 11000
Article
Publication date: 1 March 2004

Susan J. Gregoroff, Robert S. McKelvie and Sylvia Szabo

This study of 216 congestive heart failure (CHF) patients at a large teaching hospital in south‐central Ontario was undertaken to determine whether the patients managed in an…

Abstract

This study of 216 congestive heart failure (CHF) patients at a large teaching hospital in south‐central Ontario was undertaken to determine whether the patients managed in an outpatient heart failure clinic used fewer hospital resources (as expressed in number of admissions, complexity of admission, and length of stay (LOS)) than a matched cohort who were not managed in an outpatient clinic. Statistical significance of LOS opportunities could not be demonstrated (owing to sample size), however, the heart failure clinic is making a positive impact on all types of admissions (CHF and non‐CHF) in terms of LOS and suggests that management in an outpatient setting for chronic disease states is important for acute care hospitals to consider.

Details

Leadership in Health Services, vol. 17 no. 1
Type: Research Article
ISSN: 1366-0756

Keywords

Article
Publication date: 7 August 2009

Dariusz Gąsior

The purpose of this paper is to deal with a problem of admission control in computer networks when some of their parameters are uncertain. The case is considered when the most…

Abstract

Purpose

The purpose of this paper is to deal with a problem of admission control in computer networks when some of their parameters are uncertain. The case is considered when the most common probabilistic description of the uncertainty cannot be used and another approach should be applied.

Design/methodology/approach

The uncertain versions of admission control problem with quality of service requirements are considered. The uncertain variables are used to describe possible values of the unknown parameters in computer networks.

Findings

Given are formulations for the admission control problem in computer networks with unknown values of the capacities based on the network utility maximization concept. Solution algorithms for all these problems are proposed.

Research limitations/implications

It is assumed that an expert can describe possible values of uncertain network parameters in the form of a certainty distribution. Then the formalism of uncertain variables is applied and the knowledge of an expert is modelled with the use of certainty distributions. Decisions strongly depends on the quality of an expert's knowledge.

Practical implications

Obtained admission control algorithms can be useful for planning and designing of computer networks.

Originality/value

A new approach to the admission control problem in computer networks in the presence of uncertainty, in the case when the uncertain variable can be applied, is proposed and discussed.

Details

Kybernetes, vol. 38 no. 7/8
Type: Research Article
ISSN: 0368-492X

Keywords

Article
Publication date: 8 May 2017

Judith Zimmermann, Alina von Davier and Hans Rudolf Heinimann

Graduate admission has become a critical process for quality assurance in tertiary education. Hitherto, most research has investigated the validity of admissions instruments…

Abstract

Purpose

Graduate admission has become a critical process for quality assurance in tertiary education. Hitherto, most research has investigated the validity of admissions instruments. However, surprisingly little work has been conducted on the overall organization of admission, which often remains “informal, ad hoc, and lacking in continuity.” The purpose of this paper is to investigate how to systematically design an admissions process for effectiveness, fairness, and the ability to continually improve, and determine how to condense and analyze the massive amount of data available from student records to obtain high-value feedback for admissions decision making.

Design/methodology/approach

An admissions process was systematically designed based on results from process management theory. Tenets of decision theory were applied to the organization of decision making and validity theory was utilized for validating admissions instruments. Performance of the implemented process was evaluated via student records covering a seven-year period.

Findings

The authors have designed a four-phase admissions process that ensures high quality through screening, scoping, selection, and evaluation/feedback. The last phase introduces closed-loop control and facilitates stabilization and continual improvement. Additionally, the authors have established a three-stage decision-making hierarchy that promotes consistency and equal treatment in admissions. The evaluations of undergraduate achievements and GRE® General Test scores indicate that both are valid admissions instruments in the European context. Finally, the evaluation of the implemented process provides evidence that decision making has effectively improved over the years and has become more consistent.

Originality/value

The systematic design of the admissions process presented generalizes well and is a significant contribution to the organization of decentralized graduate admission.

Details

International Journal of Educational Management, vol. 31 no. 4
Type: Research Article
ISSN: 0951-354X

Keywords

Article
Publication date: 8 December 2010

Evan Yacoub

Low security is a poorly understood concept, particularly in relation to people with an intellectual disability. Characteristics of patients offered an admission to low secure…

Abstract

Low security is a poorly understood concept, particularly in relation to people with an intellectual disability. Characteristics of patients offered an admission to low secure intellectual disability settings have not been robustly demonstrated. The same applies to staff perceptions of low security. The aims of the study were to ascertain the characteristics of patients referred to a low secure intellectual disability unit which lead to an offer of admission, identify the views of staff working on the unit on the concept of low security, and use both sets of data to discuss low secure provision for people with intellectual disability. A case‐controlled study was carried out for 33 patients referred to the unit over 42 months. The characteristics of 18 patients offered an admission were compared with those of 15 patients not offered an admission, and five of the staff working on the unit were interviewed about the concept of low security. Patients offered an admission were more able than those not offered an admission, posed more risks and were more complex diagnostically. Staff working on the unit agreed that their patients were complex, but felt that they were appropriately placed overall. The challenges of low secure provision were discussed by staff. Patients sampled were complex and heterogeneous, but not necessarily ‘forensic’. Their complexity requires sophisticated care plans and management strategies. This study has implications for referrers, staff, patients and managers, and highlights areas for future research.

Details

Advances in Mental Health and Intellectual Disabilities, vol. 4 no. 4
Type: Research Article
ISSN: 2044-1282

Keywords

Article
Publication date: 15 February 2011

Dimitris N. Kanellopoulos

This paper aims to provide an overview of representative multimedia applications in the cultural heritage sector, as well as research results on quality of service (QoS…

2055

Abstract

Purpose

This paper aims to provide an overview of representative multimedia applications in the cultural heritage sector, as well as research results on quality of service (QoS) mechanisms in internet protocol (IP) networks that support such applications.

Design/methodology/approach

The paper's approach is a literature review.

Findings

Cultural heritage multimedia applications require greater bandwidth capacity, especially where multiple users share the connections. For such applications, scalability and reliability of quality of service depend on packet‐level QoS mechanisms operating in a full end‐to‐end basis.

Research limitations/implications

The paper provides a foundation for future research directions in the professional communication context. For instance, the QoS mechanisms in possible network infrastructures could be used to explore effective multimedia data dissemination across cultural heritage institutions.

Practical implications

The paper provides an overview of which technologies/mechanisms are being used most broadly and which might provide the most potential for cultural heritage institutions managers considering experimenting in the multimedia communications area.

Originality/value

QoS mechanisms that support multimedia applications in the cultural heritage sector need to become well known by cultural heritage institutions managers and professional associations in the fields of libraries, museums and archives. This paper provides a useful overview of the topic.

Details

Program, vol. 45 no. 1
Type: Research Article
ISSN: 0033-0337

Keywords

Article
Publication date: 1 May 2002

Someswar Kesh, Sridhar Nerur and Sam Ramanujan

This paper discusses various facets of quality of service (QOS), a technology that allows network managers to prioritize data to optimize bandwidth use and maintain data quality…

1726

Abstract

This paper discusses various facets of quality of service (QOS), a technology that allows network managers to prioritize data to optimize bandwidth use and maintain data quality. Given the wide variety and high volume of data as well as bandwidth limitations on networks today, QOS has gained great importance in recent years. Successful implementation of QOS requires selecting from the wide array of models and algorithms available and careful consideration of other technical and organizational issues. Different QOS models and algorithms have been discussed to provide the network manager with an insight into these technologies that can aid in the selection of QOS models and algorithms. Various technical and organizational implementation issues, including how QOS is implemented in routers, have been discussed to assist the network manager to be aware of these issues and properly implement QOS.

Details

Information Management & Computer Security, vol. 10 no. 2
Type: Research Article
ISSN: 0968-5227

Keywords

Article
Publication date: 29 January 2020

Mojgan Fardinpour, Alireza Sadeghi Milani and Monire Norouzi

Cloud computing is qualified to present proper limitless storage and computation resources to users as services throughout the internet. Software as a service (SaaS) layer is the…

Abstract

Purpose

Cloud computing is qualified to present proper limitless storage and computation resources to users as services throughout the internet. Software as a service (SaaS) layer is the key paradigm perspective in the software layer of the cloud computing. SaaS is connected by business applications to access consumers on existing public, private and hybrid cloud models. This purpose of this paper is to present a discussion and analysis on the SaaS layer based on business applications in the cloud environment in form of a classical taxonomy to recognize the existing techniques, challenges and efforts.

Design/methodology/approach

Existing techniques, challenges and efforts are classified into four categories: platform-dependent, application-dependent, data-dependent and security-dependent mechanisms. The SaaS layer mechanisms are compared with each other according to the important factors such as the structural properties, quality of service metrics, applied algorithms and measurement tools.

Findings

The benefits and weaknesses of each research study are analyzed. In the comparison results, the authors observed that the application-based method, the non-heuristic algorithms, the business process method have the highest percentage of the usage in this literature.

Originality/value

The SaaS layer mechanisms based on business applications have some main features such as high accessibility, compatibility, reusability and collaboration to provide activated application and operation services for user with help of Web browsers. A comprehensive analysis was presented as originality on the SaaS layer mechanisms based on business applications for high level of the cloud environment that 46 peer-reviewed studies were considered.

Details

Kybernetes, vol. 49 no. 12
Type: Research Article
ISSN: 0368-492X

Keywords

Article
Publication date: 23 October 2007

Matthias Wählisch and Thomas C. Schmidt

This paper aims to discuss problems, requirements and current trends for deploying group communication in real‐world scenarios from an integrated perspective.

Abstract

Purpose

This paper aims to discuss problems, requirements and current trends for deploying group communication in real‐world scenarios from an integrated perspective.

Design/methodology/approach

The Hybrid Shared Tree is introduced – a new architecture and routing approach to combine network – and subnetwork‐layer multicast services in end‐system domains with transparent, structured overlays on the inter‐domain level.

Findings

The paper finds that The Hybrid Shared Tree solution is highly scalable and robust and offers provider‐oriented features to stimulate deployment.

Originality/value

A straightforward perspective is indicated in the paper for a mobility‐agnostic routing layer for future use.

Details

Internet Research, vol. 17 no. 5
Type: Research Article
ISSN: 1066-2243

Keywords

Article
Publication date: 4 January 2013

Sharmila Gamlath

The research aims to describe Sri Lanka's education system, discuss reforms that have been implemented within the school, university and vocational education sectors in the recent…

1992

Abstract

Purpose

The research aims to describe Sri Lanka's education system, discuss reforms that have been implemented within the school, university and vocational education sectors in the recent past and suggest potentially fruitful reforms whilst identifying the various constraints which can affect their implementation.

Design/methodology/approach

A descriptive approach is employed, with extensive review of related literature and the use of relevant secondary data where appropriate.

Findings

The research shows the need for considerable reform of Sri Lanka's education system, especially with regard to improving the quality of state education and encouraging greater private sector participation.

Research limitations/implications

The research shows the deficiencies Sri Lanka's education system suffers from and suggests means to overcome them. However, the political and social pressures may present obstacles upon the implementation of such courses of action.

Social implications

The recommendations offered by the research could make a contribution towards transforming the education system in Sri Lanka into one which can produce empowered individuals who can find employment within the emerging sectors of the economy and thereby improve overall living standards in the country.

Originality/value

The paper makes a novel contribution by encompassing school, tertiary and vocational education in Sri Lanka. It shows the numerous problems that could arise in a context where a universal system of free education from the primary to the tertiary level exists vis‐à‐vis a flourishing private sector, and would be of value to education policy‐planners in Sri Lanka and other countries with both state and private sector provision of education.

Details

Asian Education and Development Studies, vol. 2 no. 1
Type: Research Article
ISSN: 2046-3162

Keywords

Article
Publication date: 31 December 2006

Wei Li, Hang Chen and Dharma P. Agrawal

In code‐division multiple‐access (CDMA) systems, the number of mobile users that each cell can support is limitedby the total received power or interference received at each base…

Abstract

In code‐division multiple‐access (CDMA) systems, the number of mobile users that each cell can support is limited by the total received power or interference received at each base station (BS) and can vary with time. The total received power can be used as an indicator of traffic load in call admission control. In this paper, we propose a call admission control (CAC) scheme based on the total received power for CDMA systems supporting integrated voice/data services. Based on the current measure of the received power, we develop an algorithm to estimate the updated total received power due to a new incoming call. We analyze the optimal admission threshold for both power limited cells and interference limited cells. We model the system by a multi‐dimensional Markov chain and compute the system performance in terms of new call blocking probability, forced termination probability of voice calls, average transmission delay of data calls and outage probability. We compare our results with an existing degradation scheme.

Details

International Journal of Pervasive Computing and Communications, vol. 2 no. 1
Type: Research Article
ISSN: 1742-7371

Keywords

1 – 10 of over 11000