首页 > 最新文献

Computer Science Journal of Moldova最新文献

英文 中文
Outer independent total double Italian domination number 外独立总双意大利支配数
IF 0.3 Q4 Mathematics Pub Date : 2024-04-01 DOI: 10.56415/csjm.v32.02
S. M. Sheikholeslami, L. Volkmann
If $G$ is a graph with vertex set $V(G)$, then let $N[u]$ be the closed neighborhood of the vertex $uin V(G)$. A total double Italian dominating function (TDIDF) on a graph $G$ is a function $f:V(G)rightarrow{0,1,2,3}$ satisfying (i) $f(N[u])ge 3$ for every vertex $uin V(G)$ with $f(u)in{0,1}$ and (ii) the subgraph induced by the vertices with a non-zero label has no isolated vertices. A TDIDF is an outer-independent total double Italian dominating function (OITDIDF) on $G$ if the set of vertices labeled $0$ induces an edgeless subgraph. The weight of an OITDIDF is the sum of its function values over all vertices, and the outer independent total double Italian domination number $gamma_{tdI}^{oi}(G)$ is the minimum weight of an OITDIDF on $G$. In this paper, we establish various bounds on $gamma_{tdI}^{oi}(G)$, and we determine this parameter for some special classes of graphs.
如果 $G$ 是一个具有顶点集 $V(G)$ 的图,那么设 $N[u]$ 是 V(G)$ 中顶点 $u 的封闭邻域。图 $G$ 上的总双意占优函数(TDIDF)是一个函数 $f:V(G)rightarrow{0,1,2,3}$,它满足:(i) $f(N[u])ge 3$ 对于 V(G)$ 中的每个顶点 $u,且 $f(u)in{0,1}$;(ii) 由具有非零标签的顶点所诱导的子图中没有孤立顶点。如果标有 $0$ 的顶点集诱导了一个无边子图,那么 TDIDF 就是 $G$ 上的一个外部独立全双意占优函数(OITDIDF)。OITDIDF 的权重是其在所有顶点上的函数值之和,而外部独立全双意支配数 $gamma_{tdI}^{oi}(G)$ 是 OITDIDF 在 $G$ 上的最小权重。在本文中,我们建立了 $gamma_{tdI}^{oi}(G)$ 的各种界限,并确定了一些特殊图类的这一参数。
{"title":"Outer independent total double Italian domination number","authors":"S. M. Sheikholeslami, L. Volkmann","doi":"10.56415/csjm.v32.02","DOIUrl":"https://doi.org/10.56415/csjm.v32.02","url":null,"abstract":"If $G$ is a graph with vertex set $V(G)$, then let $N[u]$ be the closed neighborhood of the vertex $uin V(G)$. A total double Italian dominating function (TDIDF) on a graph $G$ is a function $f:V(G)rightarrow{0,1,2,3}$ satisfying (i) $f(N[u])ge 3$ for every vertex $uin V(G)$ with $f(u)in{0,1}$ and (ii) the subgraph induced by the vertices with a non-zero label has no isolated vertices. A TDIDF is an outer-independent total double Italian dominating function (OITDIDF) on $G$ if the set of vertices labeled $0$ induces an edgeless subgraph. The weight of an OITDIDF is the sum of its function values over all vertices, and the outer independent total double Italian domination number $gamma_{tdI}^{oi}(G)$ is the minimum weight of an OITDIDF on $G$. In this paper, we establish various bounds on $gamma_{tdI}^{oi}(G)$, and we determine this parameter for some special classes of graphs.","PeriodicalId":42293,"journal":{"name":"Computer Science Journal of Moldova","volume":null,"pages":null},"PeriodicalIF":0.3,"publicationDate":"2024-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140761771","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Binary Grey Wolf Optimizer with Mutation for Mining Association Rules 用于挖掘关联规则的带突变的二元灰狼优化器
IF 0.3 Q4 Mathematics Pub Date : 2024-04-01 DOI: 10.56415/csjm.v32.06
K. Heraguemi, Nadjet Kamel, Majdi M. Mafarja
In this decade, the internet becomes indispensable in companies and people life. Therefore, a huge quantity of data, which can be a source of hidden information such as association rules that help in decision-making, is stored. Association rule mining (ARM) becomes an attractive data mining task to mine hidden correlations between items in sizeable databases. However, this task is a combinatorial hard problem and, in many cases, the classical algorithms generate extremely large number of rules, that are useless and hard to be validated by the final user. In this paper, we proposed a binary version of grey wolf optimizer that is based on sigmoid function and mutation technique to deal with ARM issue, called BGWOARM. It aims to generate a minimal number of useful and reduced number of rules. It is noted from the several carried out experimentations on well-known benchmarks in the field of ARM, that results are promising, and the proposed approach outperforms other nature-inspired algorithms in terms of quality, number of rules, and runtime consumption.
在这十年里,互联网已成为公司和人们生活中不可或缺的一部分。因此,大量数据被存储起来,这些数据可能是有助于决策的关联规则等隐藏信息的来源。关联规则挖掘(ARM)成为一项极具吸引力的数据挖掘任务,它可以在庞大的数据库中挖掘项目之间隐藏的关联。然而,这项任务是一个难以解决的组合问题,在很多情况下,经典算法会生成大量规则,而这些规则毫无用处,也很难被最终用户验证。在本文中,我们提出了一种基于西格玛函数和突变技术的二进制灰狼优化器来解决 ARM 问题,称为 BGWOARM。它旨在生成最少的有用规则,并减少规则数量。在 ARM 领域的知名基准上进行的几项实验表明,结果很有希望,所提出的方法在质量、规则数量和运行时间消耗方面都优于其他自然启发算法。
{"title":"A Binary Grey Wolf Optimizer with Mutation for Mining Association Rules","authors":"K. Heraguemi, Nadjet Kamel, Majdi M. Mafarja","doi":"10.56415/csjm.v32.06","DOIUrl":"https://doi.org/10.56415/csjm.v32.06","url":null,"abstract":"In this decade, the internet becomes indispensable in companies and people life. Therefore, a huge quantity of data, which can be a source of hidden information such as association rules that help in decision-making, is stored. Association rule mining (ARM) becomes an attractive data mining task to mine hidden correlations between items in sizeable databases. However, this task is a combinatorial hard problem and, in many cases, the classical algorithms generate extremely large number of rules, that are useless and hard to be validated by the final user. In this paper, we proposed a binary version of grey wolf optimizer that is based on sigmoid function and mutation technique to deal with ARM issue, called BGWOARM. It aims to generate a minimal number of useful and reduced number of rules. It is noted from the several carried out experimentations on well-known benchmarks in the field of ARM, that results are promising, and the proposed approach outperforms other nature-inspired algorithms in terms of quality, number of rules, and runtime consumption.","PeriodicalId":42293,"journal":{"name":"Computer Science Journal of Moldova","volume":null,"pages":null},"PeriodicalIF":0.3,"publicationDate":"2024-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140786147","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Optimizing Cervical Cancer Classification with SVM and Improved Genetic Algorithm on Pap Smear Images 利用 SVM 和改进遗传算法优化子宫颈抹片图像上的宫颈癌分类
IF 0.3 Q4 Mathematics Pub Date : 2024-04-01 DOI: 10.56415/csjm.v32.05
S. Umamaheswari, Y. Birnica, J. Boobalan, V. S. Akshaya
This study presents an approach to optimize cervical cancer classification using Support Vector Machines (SVM) and an improved Genetic Algorithm (GA) on Pap smear images. The proposed methodology involves preprocessing the images, extracting relevant features, and employing a genetic algorithm for feature selection. An SVM classifier is trained using the selected features and optimized using the genetic algorithm. The performance of the optimized model is evaluated, demonstrating improved accuracy and efficiency in cervical cancer classification. The findings hold the potential for assisting healthcare professionals in early cervical cancer diagnosis based on Pap smear images.
本研究提出了一种在巴氏涂片图像上使用支持向量机(SVM)和改进遗传算法(GA)优化宫颈癌分类的方法。所提出的方法包括预处理图像、提取相关特征并采用遗传算法进行特征选择。使用所选特征训练 SVM 分类器,并使用遗传算法进行优化。对优化模型的性能进行了评估,结果表明宫颈癌分类的准确性和效率都有所提高。研究结果有望帮助医疗专业人员根据巴氏涂片图像进行早期宫颈癌诊断。
{"title":"Optimizing Cervical Cancer Classification with SVM and Improved Genetic Algorithm on Pap Smear Images","authors":"S. Umamaheswari, Y. Birnica, J. Boobalan, V. S. Akshaya","doi":"10.56415/csjm.v32.05","DOIUrl":"https://doi.org/10.56415/csjm.v32.05","url":null,"abstract":"This study presents an approach to optimize cervical cancer classification using Support Vector Machines (SVM) and an improved Genetic Algorithm (GA) on Pap smear images. The proposed methodology involves preprocessing the images, extracting relevant features, and employing a genetic algorithm for feature selection. An SVM classifier is trained using the selected features and optimized using the genetic algorithm. The performance of the optimized model is evaluated, demonstrating improved accuracy and efficiency in cervical cancer classification. The findings hold the potential for assisting healthcare professionals in early cervical cancer diagnosis based on Pap smear images.","PeriodicalId":42293,"journal":{"name":"Computer Science Journal of Moldova","volume":null,"pages":null},"PeriodicalIF":0.3,"publicationDate":"2024-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140780221","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Formal Analysis of Medical Systems using Multi-Agent Systems with Information Sharing 利用信息共享多代理系统对医疗系统进行形式分析
IF 0.3 Q4 Mathematics Pub Date : 2024-04-01 DOI: 10.56415/csjm.v32.01
Bogdan Aman, Gabriel Ciobanu
Improving safety is a main objective for medical systems. To assist the modelling and formal analysis of medical systems, we define a language for multi-agent systems handling information, timed communication, and timed migration. We use a simplified airway laser surgery scenario to demonstrate our approach. An implementation in Maude is presented; we use the strategies allowed by Maude to guide the rules application in order to decrease substantially the number of possible executions and results in the highly nondeterministic and concurrent multi-agent systems. Finally, we present how the executable specifications can be verified with the model-checking tools in Maude to detect the behavioural problems or desired properties of the~agents.
提高安全性是医疗系统的主要目标。为了帮助医疗系统的建模和形式分析,我们为处理信息、定时通信和定时迁移的多代理系统定义了一种语言。我们使用一个简化的气道激光手术场景来演示我们的方法。我们使用 Maude 允许的策略来指导规则的应用,以大幅减少高度非确定性和并发多代理系统中可能的执行次数和结果。最后,我们介绍了如何利用 Maude 中的模型检查工具验证可执行规范,以检测行为问题或代理的预期属性。
{"title":"Formal Analysis of Medical Systems using Multi-Agent Systems with Information Sharing","authors":"Bogdan Aman, Gabriel Ciobanu","doi":"10.56415/csjm.v32.01","DOIUrl":"https://doi.org/10.56415/csjm.v32.01","url":null,"abstract":"Improving safety is a main objective for medical systems. To assist the modelling and formal analysis of medical systems, we define a language for multi-agent systems handling information, timed communication, and timed migration. We use a simplified airway laser surgery scenario to demonstrate our approach. An implementation in Maude is presented; we use the strategies allowed by Maude to guide the rules application in order to decrease substantially the number of possible executions and results in the highly nondeterministic and concurrent multi-agent systems. Finally, we present how the executable specifications can be verified with the model-checking tools in Maude to detect the behavioural problems or desired properties of the~agents.","PeriodicalId":42293,"journal":{"name":"Computer Science Journal of Moldova","volume":null,"pages":null},"PeriodicalIF":0.3,"publicationDate":"2024-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140769621","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Efficient GPU Power Management through Advanced Framework Utilizing Optimization Algorithms 利用优化算法的先进框架实现高效的 GPU 电源管理
IF 0.3 Q4 Mathematics Pub Date : 2024-04-01 DOI: 10.56415/csjm.v32.08
Ramesha Rehman, Mashood Ul Haq Chishti, Hamza Yamin
The rapid rise in power usage by GPUs due to advances in machine and deep learning has led to an increase in power consumption of GPUs in Deep Learning workloads. To address this issue, a novel research project focuses on integrating Particle Swarm Optimization into a model training optimization framework to effectively reduce GPU power consumption during machine learning and deep learning training workloads. By utilizing the Particle Swarm Optimization (PSO)protecthyperlink{b1}{{[}1{]}} algorithm within the proposed framework, we show the effectiveness of PSO in creating a more efficient power management strategy while also maintaining the performance. Upon evaluation of the proposed framework, it shows a reduction of 15.8% to 75.8% in power consumption across multiple workloads, with little to no performance loss.
由于机器学习和深度学习的进步,GPU 的功耗迅速上升,导致深度学习工作负载中 GPU 的功耗增加。为解决这一问题,一个新颖的研究项目侧重于将粒子群优化技术整合到模型训练优化框架中,以有效降低机器学习和深度学习训练工作负载中的 GPU 功耗。通过在拟议框架中使用粒子群优化(PSO)/protect/hyperlink{b1}{[}1{]}}算法,我们展示了粒子群优化在创建更高效的电源管理策略方面的有效性,同时还能保持性能。在对所提出的框架进行评估后发现,该框架在多个工作负载中的功耗降低了 15.8% 到 75.8%,而性能几乎没有损失。
{"title":"Efficient GPU Power Management through Advanced Framework Utilizing Optimization Algorithms","authors":"Ramesha Rehman, Mashood Ul Haq Chishti, Hamza Yamin","doi":"10.56415/csjm.v32.08","DOIUrl":"https://doi.org/10.56415/csjm.v32.08","url":null,"abstract":"The rapid rise in power usage by GPUs due to advances in machine and deep learning has led to an increase in power consumption of GPUs in Deep Learning workloads. To address this issue, a novel research project focuses on integrating Particle Swarm Optimization into a model training optimization framework to effectively reduce GPU power consumption during machine learning and deep learning training workloads. By utilizing the Particle Swarm Optimization (PSO)protecthyperlink{b1}{{[}1{]}} algorithm within the proposed framework, we show the effectiveness of PSO in creating a more efficient power management strategy while also maintaining the performance. Upon evaluation of the proposed framework, it shows a reduction of 15.8% to 75.8% in power consumption across multiple workloads, with little to no performance loss.","PeriodicalId":42293,"journal":{"name":"Computer Science Journal of Moldova","volume":null,"pages":null},"PeriodicalIF":0.3,"publicationDate":"2024-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140767020","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Vector finite fields of characteristic two as algebraic support of multivariate cryptography 作为多元密码学代数支持的特征二向量有限域
IF 0.3 Q4 Mathematics Pub Date : 2024-04-01 DOI: 10.56415/csjm.v32.04
A. Moldovyan, N. Moldovyan
The central issue of the development of the multivariate public key algorithms is the design of reversible non-linear mappings of $n$-dimensional vectors over a finite field, which can be represented in a form of a set of power polynomials. For the first time, finite fields $GFleft((2^d)^mright)$ of characteristic two, represented in the form of $m$-dimensional finite algebras over the fields $GF(2^d)$ are introduced for implementing the said mappings as exponentiation operation. This technique allows one to eliminate the use of masking linear mappings, usually used in the known approaches to the design of multivariate cryptography algorithms and causing the sufficiently large size of the public key. The issues of using the fields $GFleft((2^d)^mright)$ as algebraic support of non-linear mappings are considered, including selection of appropriate values of $m$ and $d$. In the proposed approach to development of the multivariate cryptography algorithms, a superposition of two non-linear mappings is used to define resultant hard-to-reverse mapping with a secret trap door. The used two non-linear mappings provide mutual masking of the corresponding reverse maps, due to which the size of the public key significantly reduces as compared with the known algorithms-analogues at a given security level.
多元公钥算法发展的核心问题是设计有限域上 $n$ 维向量的可逆非线性映射,它可以用一组幂多项式的形式表示。为实现上述映射,首次引入了特征为二的有限域 $GF/left((2^d)^m/right)$,并以域 $GF(2^d)$上的 $m$ 维有限代数的形式表示。这种技术可以避免使用掩蔽线性映射,而这种映射通常用于已知的多元加密算法设计方法中,并导致公钥的足够大。我们考虑了使用域 $GFleft((2^d)^mright)$ 作为非线性映射的代数支持的问题,包括选择适当的 $m$ 和 $d$ 值。在所提出的多元加密算法开发方法中,两个非线性映射的叠加被用来定义带有秘密陷阱门的难以逆转的映射结果。所使用的两个非线性映射为相应的反向映射提供了相互掩蔽,因此,在给定的安全级别下,与已知的类似算法相比,公钥的大小大大减小。
{"title":"Vector finite fields of characteristic two as algebraic support of multivariate cryptography","authors":"A. Moldovyan, N. Moldovyan","doi":"10.56415/csjm.v32.04","DOIUrl":"https://doi.org/10.56415/csjm.v32.04","url":null,"abstract":"The central issue of the development of the multivariate public key algorithms is the design of reversible non-linear mappings of $n$-dimensional vectors over a finite field, which can be represented in a form of a set of power polynomials. For the first time, finite fields $GFleft((2^d)^mright)$ of characteristic two, represented in the form of $m$-dimensional finite algebras over the fields $GF(2^d)$ are introduced for implementing the said mappings as exponentiation operation. This technique allows one to eliminate the use of masking linear mappings, usually used in the known approaches to the design of multivariate cryptography algorithms and causing the sufficiently large size of the public key. The issues of using the fields $GFleft((2^d)^mright)$ as algebraic support of non-linear mappings are considered, including selection of appropriate values of $m$ and $d$. In the proposed approach to development of the multivariate cryptography algorithms, a superposition of two non-linear mappings is used to define resultant hard-to-reverse mapping with a secret trap door. The used two non-linear mappings provide mutual masking of the corresponding reverse maps, due to which the size of the public key significantly reduces as compared with the known algorithms-analogues at a given security level.","PeriodicalId":42293,"journal":{"name":"Computer Science Journal of Moldova","volume":null,"pages":null},"PeriodicalIF":0.3,"publicationDate":"2024-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140797261","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
On the trees with maximum Cardinality-Redundance number 关于具有最大卡片冗余数的树
IF 0.3 Q4 Mathematics Pub Date : 2024-04-01 DOI: 10.56415/csjm.v32.03
Elham Mohammadi, N. J. Rad
A vertex $v$ is said to be over-dominated by a set $S$ if $|N[u]cap S|geq 2$. The cardinality--redundance of $S$, $CR(S)$, is the number of vertices of $G$ that are over-dominated by $S$. The cardinality--redundance of $G$, $CR(G)$, is the minimum of $CR(S)$ taken over all dominating sets $S$. A dominating set $S$ with $CR(S) = CR(G)$ is called a $CR(G)$-set. In this paper, we prove an upper bound for the cardinality--redundance in trees in terms of the order and the number of leaves, and characterize all trees achieving equality for the proposed bound.
如果$|N[u]cap S|geq 2$,则顶点$v$被集合$S$过度支配。$S$的冗余度(cardinality-redundance),即$CR(S)$,是$G$中被$S$过度支配的顶点数。$G$的冗余度$CR(G)$是$CR(S)$在所有支配集$S$上的最小值。$CR(S)=CR(G)$的支配集$S$称为$CR(G)$集。在本文中,我们用阶和叶的数量证明了树的 Cardinality-redundance 的上界,并描述了所有达到所提界相等的树的特征。
{"title":"On the trees with maximum Cardinality-Redundance number","authors":"Elham Mohammadi, N. J. Rad","doi":"10.56415/csjm.v32.03","DOIUrl":"https://doi.org/10.56415/csjm.v32.03","url":null,"abstract":"A vertex $v$ is said to be over-dominated by a set $S$ if $|N[u]cap S|geq 2$. The cardinality--redundance of $S$, $CR(S)$, is the number of vertices of $G$ that are over-dominated by $S$. The cardinality--redundance of $G$, $CR(G)$, is the minimum of $CR(S)$ taken over all dominating sets $S$. A dominating set $S$ with $CR(S) = CR(G)$ is called a $CR(G)$-set. In this paper, we prove an upper bound for the cardinality--redundance in trees in terms of the order and the number of leaves, and characterize all trees achieving equality for the proposed bound.","PeriodicalId":42293,"journal":{"name":"Computer Science Journal of Moldova","volume":null,"pages":null},"PeriodicalIF":0.3,"publicationDate":"2024-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140761127","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Coloured Petri Net-based approach and Genetic Algorithms for improving services in the Emergency Department 基于彩色 Petri 网的方法和遗传算法改善急诊科的服务
IF 0.3 Q4 Mathematics Pub Date : 2024-04-01 DOI: 10.56415/csjm.v32.07
Zouaoui Louhab, Fatma Boufera
The Emergency Department (ED) plays an important role in the healthcare field, due to the nature of the services it provides, especially for patients with urgent cases. Therefore, good management of ED is very important in improving the quality of services. Good management depends on the effective use of material and human resources. One of the most common problems that the ED suffers from is the long waiting period and the length of the patient’s stay. Many researchers have proposed many solutions to reduce waiting time and length of stay (LOS). One of the best solutions for resource optimization is modeling and simulation based on inputs such as patient length of stay and door-to-doctor time (DTDT). In this study, the ED was modeled using a Coloured Petri Net, and to determine the number of resources needed, genetic algorithms were used. This study was conducted in the ED of Hassani Abdelkader Hospital in Sidi Bel Abbes, and several simulation models were evaluated, which reduced the waiting time and the length of stay for the patient.
急诊科(ED)在医疗保健领域发挥着重要作用,因为它提供的服务性质特殊,尤其是为急诊病人提供服务。因此,良好的急诊室管理对提高服务质量非常重要。良好的管理取决于对物质和人力资源的有效利用。急诊室最常见的问题之一是病人等候时间长,住院时间长。许多研究人员提出了许多减少等候时间和住院时间(LOS)的解决方案。资源优化的最佳解决方案之一是根据病人住院时间和门到医生时间(DTDT)等输入数据进行建模和模拟。在这项研究中,使用彩色 Petri 网对急诊室进行建模,并使用遗传算法来确定所需资源的数量。这项研究是在 Sidi Bel Abbes 的 Hassani Abdelkader 医院急诊室进行的,对几个模拟模型进行了评估,这些模型缩短了病人的等待时间和住院时间。
{"title":"A Coloured Petri Net-based approach and Genetic Algorithms for improving services in the Emergency Department","authors":"Zouaoui Louhab, Fatma Boufera","doi":"10.56415/csjm.v32.07","DOIUrl":"https://doi.org/10.56415/csjm.v32.07","url":null,"abstract":"The Emergency Department (ED) plays an important role in the healthcare field, due to the nature of the services it provides, especially for patients with urgent cases. Therefore, good management of ED is very important in improving the quality of services. Good management depends on the effective use of material and human resources. One of the most common problems that the ED suffers from is the long waiting period and the length of the patient’s stay. Many researchers have proposed many solutions to reduce waiting time and length of stay (LOS). One of the best solutions for resource optimization is modeling and simulation based on inputs such as patient length of stay and door-to-doctor time (DTDT). In this study, the ED was modeled using a Coloured Petri Net, and to determine the number of resources needed, genetic algorithms were used. This study was conducted in the ED of Hassani Abdelkader Hospital in Sidi Bel Abbes, and several simulation models were evaluated, which reduced the waiting time and the length of stay for the patient.","PeriodicalId":42293,"journal":{"name":"Computer Science Journal of Moldova","volume":null,"pages":null},"PeriodicalIF":0.3,"publicationDate":"2024-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140772005","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
Computer Science Journal of Moldova
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1