College students often experience sports injuries on the basketball court due to their lack of understanding of their own situation and poor self-protection awareness. This article takes college students in the Chengdu Chongqing region as the research object, analyzes the causes of basketball sports injuries among college students through questionnaire survey, and proposes rehabilitation methods and preventive measures for sports injuries. The research results indicate that the main reasons for athlete injuries include improper preparation activities, technical errors, excessive load, poor physical fitness. To reduce the occurrence of injuries, it is necessary to do good warm-up training and enhance the flexibility of joints and ligaments. During physical rehabilitation training, it is necessary to focus on controlling the training intensity and establishing a phased recovery plan. Ultrasound can be used to accelerate the recovery speed of athletes' injuries. The research results provide theoretical data support for preventing basketball injuries among college students.
{"title":"Common Injuries and Healthcare in College Basketball Sports","authors":"Liyun Wang, Qingbin Sun","doi":"10.4018/ijhisi.325236","DOIUrl":"https://doi.org/10.4018/ijhisi.325236","url":null,"abstract":"College students often experience sports injuries on the basketball court due to their lack of understanding of their own situation and poor self-protection awareness. This article takes college students in the Chengdu Chongqing region as the research object, analyzes the causes of basketball sports injuries among college students through questionnaire survey, and proposes rehabilitation methods and preventive measures for sports injuries. The research results indicate that the main reasons for athlete injuries include improper preparation activities, technical errors, excessive load, poor physical fitness. To reduce the occurrence of injuries, it is necessary to do good warm-up training and enhance the flexibility of joints and ligaments. During physical rehabilitation training, it is necessary to focus on controlling the training intensity and establishing a phased recovery plan. Ultrasound can be used to accelerate the recovery speed of athletes' injuries. The research results provide theoretical data support for preventing basketball injuries among college students.","PeriodicalId":56158,"journal":{"name":"International Journal of Healthcare Information Systems and Informatics","volume":" ","pages":""},"PeriodicalIF":1.1,"publicationDate":"2023-07-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"48508331","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Tennis elbow is a chronic inflammatory injury caused by the connection between the humerus and the tendon attachment point in the elbow. Further in-depth research is needed to cure tennis elbow with extracorporeal shock waves. This article selects 400 tennis elbow patients who were recuperated at Southwest Medical University in 2020 and uses extracorporeal shock wave therapy and ultrasound therapy to compare and analyze the visual analogue scale of pain and positive rate of traction characteristics before and after treatment and summarizes nursing care. The research results indicate that after extracorporeal shock wave and ultrasound treatment, the lower the pain visual analogue scale and the faster the positive rate of traction features in patients, and the better the treatment effect of extracorporeal shock wave. The most accurate impact treatment site is the most painful area that the patient usually feels. The research results provide theoretical data support for the efficacy of extracorporeal shock wave therapy for tennis elbow.
{"title":"Observation and Nursing of the Therapeutic Effect of Extracorporeal Shock Wave Therapy on Tennis Elbow","authors":"Wanping Jia, Guangyong Zhao","doi":"10.4018/ijhisi.325226","DOIUrl":"https://doi.org/10.4018/ijhisi.325226","url":null,"abstract":"Tennis elbow is a chronic inflammatory injury caused by the connection between the humerus and the tendon attachment point in the elbow. Further in-depth research is needed to cure tennis elbow with extracorporeal shock waves. This article selects 400 tennis elbow patients who were recuperated at Southwest Medical University in 2020 and uses extracorporeal shock wave therapy and ultrasound therapy to compare and analyze the visual analogue scale of pain and positive rate of traction characteristics before and after treatment and summarizes nursing care. The research results indicate that after extracorporeal shock wave and ultrasound treatment, the lower the pain visual analogue scale and the faster the positive rate of traction features in patients, and the better the treatment effect of extracorporeal shock wave. The most accurate impact treatment site is the most painful area that the patient usually feels. The research results provide theoretical data support for the efficacy of extracorporeal shock wave therapy for tennis elbow.","PeriodicalId":56158,"journal":{"name":"International Journal of Healthcare Information Systems and Informatics","volume":" ","pages":""},"PeriodicalIF":1.1,"publicationDate":"2023-07-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"41947752","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
S. Chintalapati, B. C. Krishna, B. Madhav, Dumisani Lickson Namakhwa
In this paper, the authors used LabView to design a sensor-based module and analyse it for an accident prevention system. For the purpose of forecasting potential combinations of accident occurrence, various sensor nodes are integrated into a single system. A LabView-based simulation has been performed to address additional potential conditions after a real-time hardware module with a constrained number of sensors was used to examine various conditions. With the help of an IoT interface, this design will allow a new model in the vehicular communication system to identify different accident occurrences and provide the relevant information to the underprivileged. The proposed model will cover all potential combinations, provide comparative analysis between low- and high-end vehicles, and provide a strategic framework for IoT-enabled vehicular communication systems in the future.
{"title":"Accident Prevention-Based Analysis Using IoT-Interfaced LabVIEW Model","authors":"S. Chintalapati, B. C. Krishna, B. Madhav, Dumisani Lickson Namakhwa","doi":"10.4018/ijhisi.325220","DOIUrl":"https://doi.org/10.4018/ijhisi.325220","url":null,"abstract":"In this paper, the authors used LabView to design a sensor-based module and analyse it for an accident prevention system. For the purpose of forecasting potential combinations of accident occurrence, various sensor nodes are integrated into a single system. A LabView-based simulation has been performed to address additional potential conditions after a real-time hardware module with a constrained number of sensors was used to examine various conditions. With the help of an IoT interface, this design will allow a new model in the vehicular communication system to identify different accident occurrences and provide the relevant information to the underprivileged. The proposed model will cover all potential combinations, provide comparative analysis between low- and high-end vehicles, and provide a strategic framework for IoT-enabled vehicular communication systems in the future.","PeriodicalId":56158,"journal":{"name":"International Journal of Healthcare Information Systems and Informatics","volume":" ","pages":""},"PeriodicalIF":1.1,"publicationDate":"2023-06-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"43718127","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
A. Maanav, K. Mithun, T. L. Naparajith, K. Maarvin Abiram Suraj, Regin Bose, Belwin J. Brearley
This study examines the use of support vector machine (SVM) learning algorithms in predictive analytics models for the detection of breast cancer. This study uses the breast cancer Wisconsin dataset and evaluates the model's performance using measures including accuracy, F1-score, precision, and recall. Comparisons are made between the SVM model's performance and those of alternative classification techniques including logistic regression, decision trees, and random forests. The findings demonstrate the usefulness of utilising predictive analytics models, notably the SVM algorithm, for the detection of breast cancer. The SVM model demonstrated significant predictive effectiveness and accuracy, making it a viable choice of tool for clinicians in the early identification and diagnosis of breast cancer.
{"title":"Investigating the Prediction of Breast Cancer Diagnosis by Use of Support Vector Machines","authors":"A. Maanav, K. Mithun, T. L. Naparajith, K. Maarvin Abiram Suraj, Regin Bose, Belwin J. Brearley","doi":"10.4018/ijhisi.325219","DOIUrl":"https://doi.org/10.4018/ijhisi.325219","url":null,"abstract":"This study examines the use of support vector machine (SVM) learning algorithms in predictive analytics models for the detection of breast cancer. This study uses the breast cancer Wisconsin dataset and evaluates the model's performance using measures including accuracy, F1-score, precision, and recall. Comparisons are made between the SVM model's performance and those of alternative classification techniques including logistic regression, decision trees, and random forests. The findings demonstrate the usefulness of utilising predictive analytics models, notably the SVM algorithm, for the detection of breast cancer. The SVM model demonstrated significant predictive effectiveness and accuracy, making it a viable choice of tool for clinicians in the early identification and diagnosis of breast cancer.","PeriodicalId":56158,"journal":{"name":"International Journal of Healthcare Information Systems and Informatics","volume":" ","pages":""},"PeriodicalIF":1.1,"publicationDate":"2023-06-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"48003082","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
The provision of quality services in the healthcare sector has become a highly prioritized goal, as it is seen as a key factor in the satisfaction and loyalty of patients. This study aims to explore patients' perception of service quality in the UAE, a topic that has not yet been extensively studied. A qualitative approach, using social media data, was employed. Grounded theory techniques were used to analyze online feedback and comments on clinical services posted by patients. Results revealed five key factors that shape patients' perception of service quality: time efficiency, human interaction, complementary facilities, value for money match, and accountability. This study's findings and implications, particularly regarding how technology can be used to guarantee quality services and address issues raised in the research, are discussed.
{"title":"Using Social Media Data for Exploring Healthcare Service Quality","authors":"Mohanad Halaweh, Fathi Fayeq Salameh","doi":"10.4018/ijhisi.325064","DOIUrl":"https://doi.org/10.4018/ijhisi.325064","url":null,"abstract":"The provision of quality services in the healthcare sector has become a highly prioritized goal, as it is seen as a key factor in the satisfaction and loyalty of patients. This study aims to explore patients' perception of service quality in the UAE, a topic that has not yet been extensively studied. A qualitative approach, using social media data, was employed. Grounded theory techniques were used to analyze online feedback and comments on clinical services posted by patients. Results revealed five key factors that shape patients' perception of service quality: time efficiency, human interaction, complementary facilities, value for money match, and accountability. This study's findings and implications, particularly regarding how technology can be used to guarantee quality services and address issues raised in the research, are discussed.","PeriodicalId":56158,"journal":{"name":"International Journal of Healthcare Information Systems and Informatics","volume":" ","pages":""},"PeriodicalIF":1.1,"publicationDate":"2023-06-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"46729049","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Smart healthcare monitoring systems make use of IoT, the most recent technology. As a result, IoT incorporates one of its most critical applications, the health monitoring and control system. Within those systems, individuals commonly use pulse rate sensing devices, ECG sensor systems, and blood pressure sensor with various embedded systems to collect observations from the identification modules and send them to a database machine so that records can be transferred with the patient and the physician in an Android app. This investigation makes it easier to imagine how IoT could be used in difficult medical procedures. The remote health monitoring management system (HMS) is a key IoT app that allows users to connect to smart sensors, people, healthcare professionals, networks, and other connected devices. Clinicians can now constantly monitor their own patients from afar thanks to the tried method, the internet of things.
{"title":"An In-Depth Analysis of Smart Healthcare Monitoring Systems for Humans Based on IoT","authors":"Rubal Jeet, S. Kang","doi":"10.4018/ijhisi.324931","DOIUrl":"https://doi.org/10.4018/ijhisi.324931","url":null,"abstract":"Smart healthcare monitoring systems make use of IoT, the most recent technology. As a result, IoT incorporates one of its most critical applications, the health monitoring and control system. Within those systems, individuals commonly use pulse rate sensing devices, ECG sensor systems, and blood pressure sensor with various embedded systems to collect observations from the identification modules and send them to a database machine so that records can be transferred with the patient and the physician in an Android app. This investigation makes it easier to imagine how IoT could be used in difficult medical procedures. The remote health monitoring management system (HMS) is a key IoT app that allows users to connect to smart sensors, people, healthcare professionals, networks, and other connected devices. Clinicians can now constantly monitor their own patients from afar thanks to the tried method, the internet of things.","PeriodicalId":56158,"journal":{"name":"International Journal of Healthcare Information Systems and Informatics","volume":" ","pages":""},"PeriodicalIF":1.1,"publicationDate":"2023-06-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"45027854","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-06-10DOI: 10.47747/ijisi.v4i2.1085
H. Abdullahi
The insecurity of cloud leads to loss or exposure of vital information thereby threatens online transactions. These unfortunate happenings resulted in financial loss, reduced patronage of cloud services and investment diversions. Therefore, this chapter assesses cloud security and electronic transaction security. The chapter adopts qualitative research method, data were sourced secondarily through content analysis of edited books, peer-reviewed journals and credible online resources. It was descriptive in nature and thematically analyzed. The paper anchors on routine activity theory and broken windows theory. Findings revealed that cloud activities are under internal security threats of the cloud service providers and external threats of other users of cloud services. The chapter recommends proper background checks for the staff of the cloud service providers, public enlightenment on cloud security protocols. This chapter will be useful to individuals, cloud services providers, NGOs and researchers in the field of online crimes.
{"title":"Cloud Security And Electronic Transaction Security:","authors":"H. Abdullahi","doi":"10.47747/ijisi.v4i2.1085","DOIUrl":"https://doi.org/10.47747/ijisi.v4i2.1085","url":null,"abstract":"The insecurity of cloud leads to loss or exposure of vital information thereby threatens online transactions. These unfortunate happenings resulted in financial loss, reduced patronage of cloud services and investment diversions. Therefore, this chapter assesses cloud security and electronic transaction security. The chapter adopts qualitative research method, data were sourced secondarily through content analysis of edited books, peer-reviewed journals and credible online resources. It was descriptive in nature and thematically analyzed. The paper anchors on routine activity theory and broken windows theory. Findings revealed that cloud activities are under internal security threats of the cloud service providers and external threats of other users of cloud services. The chapter recommends proper background checks for the staff of the cloud service providers, public enlightenment on cloud security protocols. This chapter will be useful to individuals, cloud services providers, NGOs and researchers in the field of online crimes. \u0000 ","PeriodicalId":56158,"journal":{"name":"International Journal of Healthcare Information Systems and Informatics","volume":"17 1","pages":""},"PeriodicalIF":1.1,"publicationDate":"2023-06-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"80027794","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-06-10DOI: 10.47747/ijisi.v4i2.1168
B. Lainjo, Hanan Tmouche
The research explores and understands the thematic dynamics of the Internet of Things (IoT) and its complementary and cross-cutting data mining (DM) platform. As part of the process, secondary data is utilized based on user-app searches generated by Google Scholar. A database is compiled, analyzed, and presented. This study also discusses the classification of data mining methods and the key data mining techniques for IoT applications. The research findings indicate that IoT continues to evolve with significant degrees of proliferation. Complementary and trailblazing data mining (DM) with more access to cloud computing platforms has accelerated the achievement of planned technological innovations. The outcome has been myriads of apps currently used in different thematic landscapes. Based on available data on user app searches, between 2016 and 2019, themes like sports, supply chain, and agriculture maintained positive trends over the four years. Moreover, the emerging Internet of Nano-Things was beneficial in many sectors. Wireless Sensor Networks (WSNs) were also emerging with more accurate and effective results in gathering information and processing data and communication technologies. However, data mining in IoT applications faces significant security, complexity, and privacy challenges. In summary, available data indicate that IoT is happening and has a significant implication for data mining. All indications suggest that it will continue to grow and increasingly affect how the world interacts with "things." A backdrop of concerns exists, from developing standard protocols to protecting individual privacy. This study recommends various potential solutions; however further studies are required to determine the practicality of the suggested solutions.
{"title":"The Dynamics and Implications of the Internet of Things on Data Mining","authors":"B. Lainjo, Hanan Tmouche","doi":"10.47747/ijisi.v4i2.1168","DOIUrl":"https://doi.org/10.47747/ijisi.v4i2.1168","url":null,"abstract":"The research explores and understands the thematic dynamics of the Internet of Things (IoT) and its complementary and cross-cutting data mining (DM) platform. As part of the process, secondary data is utilized based on user-app searches generated by Google Scholar. A database is compiled, analyzed, and presented. This study also discusses the classification of data mining methods and the key data mining techniques for IoT applications. The research findings indicate that IoT continues to evolve with significant degrees of proliferation. Complementary and trailblazing data mining (DM) with more access to cloud computing platforms has accelerated the achievement of planned technological innovations. The outcome has been myriads of apps currently used in different thematic landscapes. Based on available data on user app searches, between 2016 and 2019, themes like sports, supply chain, and agriculture maintained positive trends over the four years. Moreover, the emerging Internet of Nano-Things was beneficial in many sectors. Wireless Sensor Networks (WSNs) were also emerging with more accurate and effective results in gathering information and processing data and communication technologies. However, data mining in IoT applications faces significant security, complexity, and privacy challenges. In summary, available data indicate that IoT is happening and has a significant implication for data mining. All indications suggest that it will continue to grow and increasingly affect how the world interacts with \"things.\" A backdrop of concerns exists, from developing standard protocols to protecting individual privacy. This study recommends various potential solutions; however further studies are required to determine the practicality of the suggested solutions.","PeriodicalId":56158,"journal":{"name":"International Journal of Healthcare Information Systems and Informatics","volume":"183 1","pages":""},"PeriodicalIF":1.1,"publicationDate":"2023-06-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"85609163","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-06-10DOI: 10.47747/ijisi.v4i2.1155
Muhammad Abubakar Falalu, I. Umar, Amina Ibrahim, Abdulkadir Shehu Bari, Naja’atu Kabir Naja’atu Kabir, Aminu Aminu, Muhammad Ahmad Baballe
The average number of automobiles on the roads around the world has increased as cars become more and more accessible. Our lives are now easier because to the technology and infrastructure that are developing quickly. Technology has also increased the frequency of traffic risks and road accidents, which result in significant loss of life and property due to inadequate emergency resources. Accidents wreak havoc on victims, costing them valuable time and money. It has been determined via considerable research that the majority of accidents result in fatalities as a result of poor communication with the relevant medical authorities and the ensuing dearth of prompt medical assistance. In this study, an accelerometer can be applied as a rollover or crash detector for the car both during and after a collision. The vibration sensor can also be employed in research to measure the vibration rates of any vehicle. A serious accident can be identified by keeping an eye on the information from the accelerometer and vibration sensor. The police control center, any rescue team, or the owners of the vehicle are then sent the alert message via the GSM module, together with the latitude and longitude information provided by the GPS module. As a result, as soon as they receive the emergency notification, the police can locate the accident's site and take the appropriate action. When an accident occurs in a remote place and no one is available to report it, this technique may prove to be a lifesaver. By responding quickly, the emergency services can prevent an accident from happening and save a life
{"title":"Design and Simulation of a GSM, Buzzer, and GPS Module-Based Accident Detection System","authors":"Muhammad Abubakar Falalu, I. Umar, Amina Ibrahim, Abdulkadir Shehu Bari, Naja’atu Kabir Naja’atu Kabir, Aminu Aminu, Muhammad Ahmad Baballe","doi":"10.47747/ijisi.v4i2.1155","DOIUrl":"https://doi.org/10.47747/ijisi.v4i2.1155","url":null,"abstract":"The average number of automobiles on the roads around the world has increased as cars become more and more accessible. Our lives are now easier because to the technology and infrastructure that are developing quickly. Technology has also increased the frequency of traffic risks and road accidents, which result in significant loss of life and property due to inadequate emergency resources. Accidents wreak havoc on victims, costing them valuable time and money. It has been determined via considerable research that the majority of accidents result in fatalities as a result of poor communication with the relevant medical authorities and the ensuing dearth of prompt medical assistance. In this study, an accelerometer can be applied as a rollover or crash detector for the car both during and after a collision. The vibration sensor can also be employed in research to measure the vibration rates of any vehicle. A serious accident can be identified by keeping an eye on the information from the accelerometer and vibration sensor. The police control center, any rescue team, or the owners of the vehicle are then sent the alert message via the GSM module, together with the latitude and longitude information provided by the GPS module. As a result, as soon as they receive the emergency notification, the police can locate the accident's site and take the appropriate action. When an accident occurs in a remote place and no one is available to report it, this technique may prove to be a lifesaver. By responding quickly, the emergency services can prevent an accident from happening and save a life","PeriodicalId":56158,"journal":{"name":"International Journal of Healthcare Information Systems and Informatics","volume":"54 1","pages":""},"PeriodicalIF":1.1,"publicationDate":"2023-06-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"80209387","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
In this paper, a bi- objective Operating Theater scheduling is proposed. The problem is subject to order and assignment constraints. The first objective is the minimization of the operating theater opening total time also called makespan in manufacturing systems while the second is to maximize constraints satisfaction. The scheduling problem is considered as a two-stage hybrid flow shop with blocking. Several metaheuristics are compared: the firefly algorithm, bats algorithm, particles swarm optimization and local search. In addition to the care specific qualitative and quantitative parameters, the average deviation from the lower bound is used in order to confirm the effectiveness of the methods. The implementation is done on the operating theater of the paediatric hospital of Oran when it is properly and improperly sized.
{"title":"A Bi-Objective Paediatric Operating Theater Scheduling","authors":"L. Dekhici, K. Belkadi","doi":"10.4018/ijhisi.323451","DOIUrl":"https://doi.org/10.4018/ijhisi.323451","url":null,"abstract":"In this paper, a bi- objective Operating Theater scheduling is proposed. The problem is subject to order and assignment constraints. The first objective is the minimization of the operating theater opening total time also called makespan in manufacturing systems while the second is to maximize constraints satisfaction. The scheduling problem is considered as a two-stage hybrid flow shop with blocking. Several metaheuristics are compared: the firefly algorithm, bats algorithm, particles swarm optimization and local search. In addition to the care specific qualitative and quantitative parameters, the average deviation from the lower bound is used in order to confirm the effectiveness of the methods. The implementation is done on the operating theater of the paediatric hospital of Oran when it is properly and improperly sized.","PeriodicalId":56158,"journal":{"name":"International Journal of Healthcare Information Systems and Informatics","volume":" ","pages":""},"PeriodicalIF":1.1,"publicationDate":"2023-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"48266624","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}