GLORIA

GEOMAR Library Ocean Research Information Access

Your email was sent successfully. Check your inbox.

An error occurred while sending the email. Please try again.

Proceed reservation?

Export
  • 1
    In: 網際網路技術學刊, Angle Publishing Co., Ltd., Vol. 24, No. 2 ( 2023-03), p. 389-400
    Abstract: 〈p〉Digital transformation becomes the focus of all industries, governments are actively promoting it to increase the welfare of the people in the technological maturity era. Hospitals are highly relevant to people’s lives, and their continuous improvement is necessary. However, the promotion of progress is limited to the hospital culture, management, and health care system, which affects the development of various departments. Through literature review and in-depth interviews with relevant employees who implement electronic medical records and nursing information plans, this study demonstrates that the hospital has experienced many difficulties before reaching the digitization stage. Therefore, the dilemma that the hospital promotes in the digitization stage is all examples of digital transformation. The paper proposes seven digitization strategies: (1) constructing new digital transformation strategies and corresponding system development; (2) re-organize a new hospital culture according to the digital transformation strategy; (3) the hospital management understands and supports the digital transformation; (4) establish a dedicated team for digital transformation; (5) comprehensive process transformation and continuous improvement of user interaction experience; (6) strengthen the ability to use data and drive digital transformation; (7) refrain from regulatory restrictions on medical regulations.〈/p〉 〈p〉 〈/p〉
    Type of Medium: Online Resource
    ISSN: 1607-9264 , 1607-9264
    Uniform Title: Key Strategies for Digital Transformation- A Non-medical Center Hospital in Taiwan as An Example
    Language: Unknown
    Publisher: Angle Publishing Co., Ltd.
    Publication Date: 2023
    Location Call Number Limitation Availability
    BibTip Others were also interested in ...
  • 2
    Online Resource
    Online Resource
    Informa UK Limited ; 2012
    In:  Total Quality Management & Business Excellence Vol. 23, No. 7-8 ( 2012-08), p. 981-995
    In: Total Quality Management & Business Excellence, Informa UK Limited, Vol. 23, No. 7-8 ( 2012-08), p. 981-995
    Type of Medium: Online Resource
    ISSN: 1478-3363 , 1478-3371
    Language: English
    Publisher: Informa UK Limited
    Publication Date: 2012
    detail.hit.zdb_id: 2129076-3
    SSG: 3,2
    Location Call Number Limitation Availability
    BibTip Others were also interested in ...
  • 3
    Online Resource
    Online Resource
    Angle Publishing Co., Ltd. ; 2022
    In:  網際網路技術學刊 Vol. 23, No. 1 ( 2022-01), p. 063-071
    In: 網際網路技術學刊, Angle Publishing Co., Ltd., Vol. 23, No. 1 ( 2022-01), p. 063-071
    Abstract: 〈p〉This study explores why a developing country may fall into the privacy trap of digital transformation after Covid-19. The privacy trap is that, when the developing country executes its digital transformation policy, the government inevitably compromises their civilian privacy and often have no way of knowing when/why/how the service will use or leak the privacy. To date, little scholarly literature has examined the existence and implication of the privacy trap in a developing country. Therefore, we analyze data from 306 respondents in Taiwan based on descriptive and inferential statistics. The results show the privacy trap exists and may be derived by that the bandwagon effect overriding the effects of privacy concerns on the willingness to provide personal information. These findings implicate that, based on the in-depth expert interview, one possible way but also the biggest challenge to escaping the privacy trap is to transform from the current economic system of cost-oriented labor to the economic system of a risk-oriented education system supporting breakthroughs in science and technology. This study could ultimately contribute to the developing countries to protect their civilian’s privacy when executing digital transformation especially from a digital minority to a digital beneficiary.〈/p〉 〈p〉 〈/p〉
    Type of Medium: Online Resource
    ISSN: 1607-9264 , 1607-9264
    Uniform Title: The Privacy Trap of Digital Transformation: The Existence and the Implication
    Language: Unknown
    Publisher: Angle Publishing Co., Ltd.
    Publication Date: 2022
    Location Call Number Limitation Availability
    BibTip Others were also interested in ...
  • 4
    In: 網際網路技術學刊, Angle Publishing Co., Ltd., Vol. 24, No. 1 ( 2023-01), p. 113-121
    Abstract: 〈p〉This study explores why the business firm survival due to provide the service quality and perceived values since servicescape, waiting experiences and food quality are three major factors that affect customer intentions. Therefore, the most examined restaurant attributes are included physical setting and environment, wait time, and food and service quality in this study. Servicescape positively effects perceived service quality. However, service quality is an overall judgment that a based on the perception of the object in consumer process of customer and can be seen as the result of customer evaluation. Therefore, we analyze data from 396 full-service restaurant diners in Taiwan based on Fuzzy Cognitive Map (FCM) and Structural Equation Model (SEM) to investigate hypothesis and to identify the most relevant decision factors to enhance outcome variables and furthers to help decision makers have a clear picture of affecting factors in the customer behavioral intention. The findings support the model and show that perceived overall service quality and perceived value do exert mediating effects in the relationship between restaurant-related attributes and customer behavioral intention. This study could ultimately contribute to the business firms in service industry to provide decision makers the most desirable outcomes to survival the competitive society.〈/p〉 〈p〉 〈/p〉
    Type of Medium: Online Resource
    ISSN: 1607-9264 , 1607-9264
    Uniform Title: Applying Fuzzy Cognitive Map Based on Structural Equation Modeling for Perceiving the Service Quality and Attributes in Service Industry
    Language: Unknown
    Publisher: Angle Publishing Co., Ltd.
    Publication Date: 2023
    Location Call Number Limitation Availability
    BibTip Others were also interested in ...
  • 5
    Online Resource
    Online Resource
    Angle Publishing Co., Ltd. ; 2023
    In:  網際網路技術學刊 Vol. 24, No. 3 ( 2023-05), p. 577-583
    In: 網際網路技術學刊, Angle Publishing Co., Ltd., Vol. 24, No. 3 ( 2023-05), p. 577-583
    Abstract: 〈p〉With international travel trending toward globalization, countries are increasingly focusing on preserving their unique local cultures while maintaining awareness about global tourism perspectives. Since 2017, Taiwan’s Tourism Bureau proposed the Taiwanese Sustainable Tourism Development Program for further development, the Program aims to encourage local governments to promote “Time for Celebration – Taiwan Tourism Events” and create tourism event highlights by promoting developments in regional tourism and related industries. This study aims to explore the role of local residents in festivals from a sustainable development perspective using survey data. It examines local residents’ attitudes and support residents toward festivals. The study details the influence of local residents on festivals, which in turn, depends on the benefits visitors gain from such participation.〈/p〉 〈p〉 〈/p〉
    Type of Medium: Online Resource
    ISSN: 1607-9264 , 1607-9264
    Uniform Title: Exploring the Sustainable Strategies to Reinforce the Benefit Awareness from Festival Events Management
    Language: Unknown
    Publisher: Angle Publishing Co., Ltd.
    Publication Date: 2023
    Location Call Number Limitation Availability
    BibTip Others were also interested in ...
  • 6
    In: Applied Sciences, MDPI AG, Vol. 9, No. 2 ( 2019-01-17), p. 321-
    Abstract: Radio Frequency Identification (RFID) technique is broadly adopted as the automated identification system for the Internet of Things (IoT). Many RFID anti-collision algorithms were proposed to accelerate the tag identification process. However, they misjudged some unreadable slots which were due to collision instead of the bad channel condition, causing low bandwidth usage. This study proposes the Channel-quality Aware Query Tree algorithm (CAQT) to improve the identification performance in an error-prone channel environment. CAQT has three novel features: (1) it estimates the channel quality continuously and statistically in the rapidly changing channel quality environment; (2) it asks the tag for retransmission or to split the collide tags based on the channel quality; (3) the number of the groups which it splits tags is based on the estimated number of tags collide in current slot. The simulation results show that CAQT uses less than 31% slots compared with the conventional algorithms. The simulation results also demonstrate that CAQT provides enhanced performance when the channel quality is varying especially in outdoor environment, for example, ticket checking for railway or subway system.
    Type of Medium: Online Resource
    ISSN: 2076-3417
    Language: English
    Publisher: MDPI AG
    Publication Date: 2019
    detail.hit.zdb_id: 2704225-X
    Location Call Number Limitation Availability
    BibTip Others were also interested in ...
  • 7
    Online Resource
    Online Resource
    MDPI AG ; 2019
    In:  Applied Sciences Vol. 9, No. 2 ( 2019-01-21), p. 354-
    In: Applied Sciences, MDPI AG, Vol. 9, No. 2 ( 2019-01-21), p. 354-
    Abstract: Conventional orthogonal frequency division multiple access (OFDMA) burst construction methods can only support limited numbers of connections due to the map overhead and corresponding limitations in the numbers of orthogonal resources blocks, which limits the capacity of current 4G and the following 5th generation (5G) networks. This study therefore provides a novel OFDMA burst construction algorithm and enhanced burst indexing aware algorithm (EHA), which try to maximize the throughput while considering the subchannel diversity and optimizing burst indexing issues. The EHA not only allocates the subchannels with the best channel quality for each burst, but also groups the bursts to alleviate the MAP overhead. Simulation results showed that the EHA yields two times the throughput that has been achieved using previous algorithms under a heavy load. Two contributions of the EHA are: (1) the overhead of burst indexing decreases because massive numbers of connections can be accommodated by one burst; and (2) the overall throughput increases due to that one connection with large data transferring requirements can be split and distributed into several bursts and placed on the subchannels with good channel quality to adopt better modulation coding scheme (MCS), if the saved bandwidth in this burst construction is more than the increased overhead of burst indexing.
    Type of Medium: Online Resource
    ISSN: 2076-3417
    Language: English
    Publisher: MDPI AG
    Publication Date: 2019
    detail.hit.zdb_id: 2704225-X
    Location Call Number Limitation Availability
    BibTip Others were also interested in ...
  • 8
    Online Resource
    Online Resource
    Elsevier BV ; 2019
    In:  Computer Standards & Interfaces Vol. 65 ( 2019-07), p. 167-179
    In: Computer Standards & Interfaces, Elsevier BV, Vol. 65 ( 2019-07), p. 167-179
    Type of Medium: Online Resource
    ISSN: 0920-5489
    Language: English
    Publisher: Elsevier BV
    Publication Date: 2019
    detail.hit.zdb_id: 635712-X
    detail.hit.zdb_id: 1466180-9
    Location Call Number Limitation Availability
    BibTip Others were also interested in ...
  • 9
    Online Resource
    Online Resource
    MDPI AG ; 2021
    In:  Sensors Vol. 21, No. 4 ( 2021-02-03), p. 1027-
    In: Sensors, MDPI AG, Vol. 21, No. 4 ( 2021-02-03), p. 1027-
    Abstract: (1) Background: Link flooding attacks (LFA) are a spatiotemporal attack pattern of distributed denial-of-service (DDoS) that arranges bots to send low-speed traffic to backbone links and paralyze servers in the target area. (2) Problem: The traditional methods to defend against LFA are heuristic and cannot reflect the changing characteristics of LFA over time; the AI-based methods only detect the presence of LFA without considering the spatiotemporal series attack pattern and defense suggestion. (3) Methods: This study designs a deep ensemble learning model (Stacking-based integrated Convolutional neural network–Long short term memory model, SCL) to defend against LFA: (a) combining continuous network status as an input to represent “continuous/combination attacking action” and to help CNN operation to extract features of spatiotemporal attack pattern; (b) applying LSTM to periodically review the current evolved LFA patterns and drop the obsolete ones to ensure decision accuracy and confidence; (c) stacking System Detector and LFA Mitigator module instead of only one module to couple with LFA detection and mediation at the same time. (4) Results: The simulation results show that the accuracy rate of SCL successfully blocking LFA is 92.95%, which is 60.81% higher than the traditional method. (5) Outcomes: This study demonstrates the potential and suggested development trait of deep ensemble learning on network security.
    Type of Medium: Online Resource
    ISSN: 1424-8220
    Language: English
    Publisher: MDPI AG
    Publication Date: 2021
    detail.hit.zdb_id: 2052857-7
    Location Call Number Limitation Availability
    BibTip Others were also interested in ...
Close ⊗
This website uses cookies and the analysis tool Matomo. More information can be found here...