Landasan Teori Paper 100

Mengevaluasi efektivitas pendidikan anestesi disampaikan melalui konferensi video internet antara Rumah Sakit Umum Massachusetts, Boston, MA, dan Mbarara Rumah Sakit Rujukan Regional, Uganda.Transfer pengetahuan anestesi terjadi melalui ceramah kelompok kecil disampaikan baik secara pribadi dan jarak jauh melalui konferensi video sinkron Internet [2]. Gangguan kecanduan internet (IAD) ditandai dengan penggunaan bermasalah video game online, menggunakan komputer, dan perangkat genggam mobile. Meskipun tidak secara resmi diagnosis klinis menurut versi terbaru dari Manual Diagnostik dan Statistik Gangguan Mental (DSM), individu dengan IAD mewujudkan disfungsi emosional, sosial, dan mental yang berat di beberapa daerah dari kegiatan sehari-hari karena penggunaan bermasalah mereka teknologi dan internet [5]. Penelitian ini menguji sifat psikometrik versi bilingual Internet Addicion Test. Hasil analisis Model Rasch pada item IAT menunjukkan bahwa skala rating 6-titik adalah optimal dan struktur unidimensional dari IAT dikonfirmasi. Bukti-bukti yang diberikan oleh analisis Rasch Model didukung bahwa IAT adalah instrumen yang baik dan dapat diandalkan untuk memeriksa penggunaan internet psikopatologis (PIU) [1]. Peran sentinel biopsi kelenjar getah bening (SLNB) pada karsinoma duktal in situ (DCIS) adalah controversial [6]. : Insiden lebih tinggi dari pertumbuhan ekstranodal (pelanggaran kapsul kelenjar getah bening) di hadapan ekstensi extrathyroidal (pelanggaran kapsul tiroid) pada kanker tiroid papiler diminta kesimpulan bahwa biologi kanker tiroid diberikan ke kelenjar getah bening, menyebabkan invasi jaringan perinodal [7]. Menjaga waktu akses dan latensi yang singkat untuk melestarikan daya baterai. Dan data yang disiarkan melalui penjadwalan teknik dan pengiriman model seperti mendorong berbasis, tarik berbasis dan hibrida [21]. Kapasitas sistem jaringan aliran tunggal komoditas adalah aliran maksimum dari sumber ke tujuan. kapasitas sistem untuk dua komoditas jaringan aliran multistate terdiri dari komponen multistate (tepi dan node) [31]. memperkenalkan koleksi jaringan yang kompleks yang dihasilkan oleh kombinasi preferensial lampiran dan proses sebelumnya teruji dari '' splitting '' node derajat k ke k node derajat 1. Empat jaringan dianggap, masing-masing berkembang pada setiap langkah waktu dengan baik lampiran preferensial, dengan probabilitas p, atau membelah dengan probabilitas 1-p [32]. node khusus yang disebut node kk-out-of-n, yang tidak dapat menerima lebih dari jumlah tertentu arus, baru saja diperkenalkan [33]. Banyak sistem dunia nyata (seperti telepon seluler, transportasi, dll) adalah multistate-node acyclic network (MNAN) terdiri dari multistate-node. Jaringan tersebut memiliki node sumber (posisi) di mana sumber sinyal terletak, sejumlah node wastafel yang hanya menerima sinyal, dan sejumlah node intermediate yang memancarkan kembali sinyal yang diterima ke beberapa node lainnya. Keandalan MNAN dapat dihitung dalam hal minimal trees (MTs) [35]. : Banyaknya aplikasi perangkat lunak mobile (aplikasi) telah menciptakan tantangan keamanan. Kurangnya standar pembangunan dan praktik terbaik mengekspos perangkat mobile untuk serangan potensial. SRG (Security Requirements Guide)  ini sangat ketat di daerah-daerah tertentu dan mencakup banyak aspekkerentanan aplikasi mobile, meskipun tidak semua skenario kemungkinan ancaman [36]. : Aplikasi mobile (aplikasi) untuk aktivitas fisik yang populer dan menjanjikan untuk mempromosikan perubahan perilaku dan mengurangi risiko penyakit tidak menular [37]. 


Daftar Pustaka :
[1] L. Xi and J.Y. Kee, "Psychometric properties of the Internet Addiction Test in a Sample of Malayasian undergraduate students." Internet Addiction Test, vol. 21, pp.17-25, 2015.
[2] J.K.Kianuka et al, ” Synchronous distance anesthesia education by Internet videoconference between Uganda and the United States.” Internet videoconference, vol. 20, pp. 1-5, 2015.
[3] A. Erik, A. Gerhard, A. Erland, H. Erik, L. Mats, L. Nils, L. Brjann and R. Christian, "Psychometric properties of Internet-administered measures of health anxiety: An investigation of the Health Anxiety Inventory, the Illness Attitude Scales, and the Whiteley Index.” Internet-administered measures, vol. 31, pp. 32-37, 2015.
[4] L.T. Lawrence, “Parental mental health and Internet Addiction in adolescents.” Internet Addiction in adolescent, vol. 42, pp. 20-23, 2015.
[5] E. Erin, D.L. Diane, K.P. Warren, P.D. Andrew and Y. Kathryn, “Internet addiction disorder and problematic use of Google Glass™ in patient treated at a residential substance abuse treatment program.” Problematic use of Google Glass, vol. 41, pp. 58-60, 2015.
[6] F. Linda, J.B. Tara, J.O. Martin,  O. Fionnuala, P. Susan, R. Ciara, O. Fionnuala and W.B. Michael, “Sentinel lymph node biopsy is not warranted following a core needle biopsy diagnosis of ductal carcinoma in situ (DCIS) of the breast.” Breast lymph node biopsy, vol. 24, pp. 197-200, 2015.
[7] A. Machens and H. Dralle, “Breach of the thyroid capsule and lymph node capsule in node-positive papillary and medullary thyroid cancer: Different biology.” Medullary thyroid cancer, vol. 41, pp. 766-772, 2015.
[8] F. Liu, J. Zhu, R. Chen, T. Wei, X. Zou and Z. Li, “Predictive factors of contralateral paratracheal lymph node metastasis in unilateral papillary thyroid carcinoma.” Papillary thyroid carcinoma, vol. 41, pp. 746-750, 2015.
[9] I. Roberto and T. Andrea, “Ranking Silent Nodes in Information Networks: a Quantitative Approach and Applications.” Silent Nodes in Information Networks, vol. 62, pp. 36-41, 2015.
[10] A. Pi~nero-Madrona , J.A. Torro-Richart , J.M. de Leon-Carrillo , G. de Castro-Parga , J. Navarro-Cecilia , F. Domınguez-Cunchillos , J.M. Roman-Santamarıa , C. Fuster-Diana , R. Pardo-Garcıa , “Superparamagnetic iron oxide as a tracer for sentinel node biopsy in breast cancer: A comparative non-inferiority study.” Sentinel_node_breast cancer, vol. 20, pp. 1-7, 2015.
[11] N. Pressca et al., “Unlocking the Determinants of Pathological Internet Use (PIU) among Urban Millennial Teens”, Pathological Internet Use, vol.130, pp.21-27, 2014.
[12] B. Nachit et al., “The use of the Internet in Moroccan high schools mathematics teaching: state and perspectives”, Use Of The Internet, vol.116, pp.5175-5179, 2014.
[13] J. Tang et al., “Prevalence of internet addiction and its association with stressful life events and psychological symptoms among adolescent internet users”, Prevalence of internet addiction, vol.39, pp.744-747, 2014.
[14] C. Yen-Lin and T. Chin-Chung, “Thrroles of social factor and internet self-efficacy in nurses' web-based continuing learning”, Internet Self-Evaluation, vol.34, pp.446-450, 2014.
[15] Y.S. Bahman et al., “A Survey of the Amount of Internet Usage among High School Students of Khafr County and its Impacts on Students”, Amount of Internet Usage, vol.114, pp.610-616, 2014.
[16] D.K. Patten et al., “Sentinel lymph node biopsy after neo-adjuvant chemotherapy in patients with breast cancer: Are the current false negative rates acceptable?”, Chemotherapy In Breast, pp.1-3, 2015.
[17] M. Jayadev, “Mapping Among The Nodes Of Infinite Trees: a Variation Of Konig’s Infinity Lemma”, Mapping among Nodes, vol.115, pp.548-549, 2015.
[18] D. Ibrahima et al., “Two Node-Disjoint 3-Hop-Constrained Survivable Network Design and Polyhedra”, Two Node-Disjoint 3-Hop, vol.41, pp.551-558, 2013.
[19] R. Jenny et al., “Maternal Mobile Device Use During a Structured Parent–Child Interaction Task”, Maternal Mobile Device, vol.15, no.2, 2015.
[20] M. Joanna et al., “Mobile phone ownership, usage and readiness to use by patients in drug treatment”, Mobile phone ownership Drug, vol.146, pp.111-115, 2015.
[21] N. Meera, M. Heena, Mantha. Dr. S.S. “Comparison of Broadcast Scheduling Techniques in Mobile Computing Environment”. Procedia Computer Science, vol.45, pp. 706-711, 2015.
[22] C. Daniele, I. Andrea, R. Aldo. “Education financing and intergenerational mobility in Italy and in the US”. Journal of Public Economics, vol. 74, pp. 351-393, 1999.
[23] L. Yin-Kuei. “Generate upper boundary vectors meeting in the demand and budget for a p-commodity network with unreliable nodes”. Europan Journal of Operational Research, vol.183, pp. 253-262, 2007.
[24] Mobile phone-Their increasing role in education and implementation of CPR, Resuscitation vol. 82, pp. 1479-1480, 2011.
[25] C. Nadire. “Investigating mobile devices and LMS integration in higher education: Student perspectives”. Department of Computer Information System, Near East University, Lefkosa 98010, Northern Cyprus.
[26] W. Ruei-Yu, C. Gen-Huey, K. Yu-Liang, C. Gerard J. “Node-disjoint paths in hierarchical hypercube networks”. Information Sciences vol.177, pp. 4200-4207, 2007.
[27] MSc. S. Goodman, PhD, B. Morrongiello, RD, PhD. J. R. Simpson. Podcast available online at  Kelly Meckling.
[28] K. Richard. “Current and Emerging regulatory and contracting issues”. Computer Law & Security Review 29 (2013), pp. 175-179 at www.comseconline.com/publication/prodclaw.htm
[29] X. Wang., W. Yuan Chao. “An semi-anonymity offline mobile payment protocol based on smart card”.  Nov, pp.63-66, 2010.
[30] M. Niina. “Exploring consumer adoption of mobile payments – A qualitative study”. Journal of Strategic Information System vol.16, pp. 413-432, 2007.
[31] Lin Yi-Kuei,” System capacity for a two-commodity multistate flow network with unreliable nodes and capacity weight,” Computers & Operations Research, vol.34, pp.3043-3054,2007.
[32] Colman E.R and Rodger G.j.,” Kinetics of node splitting in evolving complex networks,” Physica A 391, pp.6626-6631, 2012.
[33] Yeh Wei-Chang,” The k-out-of-n acyclic multistate-node networks reliability evaluation using the universal generating function method,” Reliability Engineering and System Safety, vol.91, pp.800-808, 2006.
[34] Chung Sunghun, Lee Kyung Young and Choi Jinho,“ Corrigendum to ‘‘Exploring digital creativity in the workplace: The role of enterprise mobile applications on perceived job performance and creativity’’ [Comput. Human Behav. 42 (2015) 93–109],” Computers in Human Behavior, vol. 49, pp.679, 2015.
[35] Yeh Wei-Chang, “Multistate-node acyclic network reliability evaluation,” Reliability Engineering and System Safety, vol.78, pp.123-129, 2002.
[36] Dye Stephen M., and Scarfone Karen,” A standard for developing secure mobile applications,” Computer Standards & Interfaces, Vol. 36, pp.524-530, 2014.
[37] Yang Chih-Hsiang, Maher Jaclyn P., And Conroy David E.,” Implementation of Behavior Change Techniques in Mobile Applications for Physical Activity,” American Journal of Preventive Medicine, vol.48, no.4, pp.452-455, 2015.
[38] Yeh Wie-Chang,” Search for all MCs in networks with unreliable nodes and arcs,” Reliability Engineering and System Safety, vol. 79, pp.95-101, 2003.
[39] Lin Yi-Kuei,” Study on the system capacity for a multicommodity stochastic-flow network with node failure,” Reliability Engineering and System Safety, vol. 78, pp.57-62, 2002.
[40] Toner Keri N., Lynn Michael J., Candy T. Rowan, And Hutchinson Amy K.,” The Handy Eye Check: a mobile medical application to test visual acuity in children,” Journal of AAPOS, vol. 18, pp. 258-260, 2014.
[41] L. Melo, J. Abreu and T. Silva, "Mobile Applications for Natural Parks: Guidelines Study For The Development of a Mobile Device Application," Procedia Technology, vol. 16, pp. 263-268, 2014.
[42] F. Darema, "DDDAS, a Key Driver for Large-Scale-Big-Data and Large-Scale-Big-Computing," Procedia Computer Science, vol. 51, p. 2463, 2015.
[43] Y. Yang, L. Zhang, Y. Zhen and R. Ji, "Learning for Visual Semantic Understanding in Big Data," Neurocomputing, pp. 1-4, May 2015.
[44] YunfengLi, ZhijianYe, YanfangNie, JianZhang, G. L. Wang and ZhenzhongWang, "Data Set from The Phosphoproteomic Analysis of Magnaporthe Oryzae-Responsive Proteins in Susceptible and Resistant Rice Cultivars," Data in Brief, vol. 3, pp. 7-11, 2015.
[45] H. L. Sollins, D. J. Senft and S. A. Turner, "New CMS Focused Surveys are Coming: Minimum Data Set Compliance and Staffing Level Assessments," Geriatric Nursing , vol. 36, pp. 226-227, 2015.
[46] L. Xiang-wei and Q. Yian-fang, "A Data Preprocessing Algorithm for Classification Model Based on Rough Sets," Physics Procedia , vol. 25, pp. 2025-2029, 2012.
[47] L. Xiang-wei and Q. Yian-fang, "A Data Preprocessing Algorithm for Classification Model Based on Rough Sets," Physics Procedia , vol. 25, pp. 2025-2029, 2012.
[48] H. C. Schwartz, "Does Computer-Aided Surgical Simulation Improve Efficiency in Bimaxillary Orthognathic Surgery?," Clinical Paper Orthognathic Surgery, vol. 43, pp. 572-576, 2014.
[49] Y. Yusof, H. Sanusi and K. Mat, "Computer Simulation as Preparation for Electronics Laboratory," Procedia - Social and Behavioral Sciences, vol. 60, pp. 397-404, 2012.
[50] S. Bharti and K.K.Pattanaik, "Dynamic Distributed Flow Scheduling with Load Balancing for Data Center Networks," Procedia Computer Science, vol. 19, pp. 124-130, 2013.
[51] Chin.L.Y and Wu.S.F, "A study on Operating Pattern of Restaurant Franchise from the Service Dominant Logic Perspective", Restaurant Franchise,pp.312-316,2014.
[52] Chen.Q and Jin.S, “Queue Length Analysis of Delayed Vacation Geom/G/1 with Set-up”,Delayed vacation,pp.5298-5300,2008.
[53] Haiyan.C, Naishuo.T, Fengwen.W and Lu Donghua, “Study on N-Policy Working Vacation Polling System for WDM”,Vacation Polling System,pp.394-397,2008.
[54] Alvarez.G, Enctioas.H.L, and Masque.M.J ,”Known-Plaintext Attack to Two Cryptosystems Basedon the BB Equation”,BB Equation,Vol.55,No.5,2008.
[55] Dafpus : Yanxia.H,”The properties of trafelling wave solutions for Kdv-Burger-Kuramoto equation “,Wave Equation,pp.1979-1982,2013.
[56] Polifroni.J, Seneff.S, Branavan.S.R.K and Barzilay.C.W.R,” Good Grief,I can speak it premilinary experiment in audio restaurant reviews”,Audio Restaurant Reviews,pp.91-96,2010.
[57] Zhu.S and Tan.G,” Discussion on future design trend of children's chair in Chinese restaurant”,Future Design Trend Chair,pp.476-480,2009.
[58] Huan .W and Qiang.S.Y,” Simulation and Optimization of Service System for Restaurant”,Optimalization Service System,pp.1390-1392,2011.
[59] Wu.X, Liu.X and Dai.S,” The Reliability of Big Data”,Reability Big Data,pp.295-299,2014.
[60] Dong.X.L and Srivastava.D,”Big Data Integration”,Data Integration,pp.1245-1248,2010.
[61] B. Saha and D. Srivastava, "Data Quality: The other Face of Big Data," ICDE Conference 2014, 2014.
[62] L. Baishu, L. Xinggang and T. jiafu, "Product family design method based on sensitivity analysis for performance ang Cost," IEEE, pp. 1031-1036, 2009.
[63] Z. Li, L. Yu-chuan and L. Feng-jiang, "Work Support and Turnover Intention: The Mediating Roles of Work-to-Family Conflict and Facilitation," in 2011 International Conference on Management Science & Engineering (18th), RIM, 2011.
[64] Y. Dan, "the relationship among work-family conflict, organizational support and job statisfaction,"in International Conference on Information Management, Innovation Management and Industrial Engineering, 2013.
[65] M. Shen and H. Chen, "On a Class of New Solutions to Vacuum Einstein’s Field Equations," 978-1-61284-774-0/11/$26.00 ©2011 IEEE, Vols. 978-1-61284-774-0, no. 11, pp. 2226-2228, 2011.
[66] S. Lie, "Regulatory Mechanism of China’s Highway-Market," in The Fifth Advanced Forum on Transportation of China.
[67] H. Xianping, H. Dengshi, X. Kai and a. Z. Hu, "Research on Contagion effect Among China's Bond Market and Stock Market," IEEE, vol. 13 , no. 978-1-4799-0245-3, pp. 648 - 612, 2013.
[68] B. Vukeli and K. Škaron, "Cyber crime and violation of copyright," in MIPRO 2013,, Opatija, Croatia,May 20-24, 2013.
[69] C. Featherstone, "Identifying vehicle descriptions in microblogging text with the aim of reducing or predicting crime," IEEE, 2013.
[70] A. R. Mathew, A. A. Hajj and K. A. Ruqeishi, "Cyber Crimes: Threats and Protection," in 201O International Conference on Networking and Information Technology, 2010.
[81] R. Rzepka, S. Higuchi, M. Ptaszynski and K. Araki, “Straight Thinking Straight From The Net – On The Web-Based Intelligent Talking Toy Development,” IEEE International Conference on Systems, Man and Cybernetic, pp.2172-2176, 2008.
[82] F. Yang, “Toy, Breathing a New Life into Traditional Arts,” IEEE Traditional Arts, pp. 1242-1244, 2008.
[83] G. Xin-li, “The Impact of the May 12 Wenchuan Earthquake on China's Stock Market As An Example to the Chenyu Price Index of China,” International Conference on Management Science & Engineering, pp.1365-1372, 2010.
[84] W.W. Hays, “Reduction of Earthquake Risk in the United States: Bridging the Gap Between Research and Practice,” IEEE Transaction On Engineering Management, vol.45, no.2 pp.176-180, 1998.
[85] C. Xiuqiong and  S.Kaiquan, “Analysis on Earthquake Precursory Anomalies Based on Two Direction S-rough Sets,” International Conference on Intelligent System and Knowledge Engineering, pp.940-944, 2008.
[86] M.C. Logsdon, M. Mittelberg and J. Myers, “Use of social media and Internet to obtain health information by rural adolescent mothers,” Applied Nursing Research, vol.28 pp.55-56, 2015.
[87] D. Chen and Z. Zhu, “Study on Bomb Sound Signal De-noising in Spotting the Point of Impact of Weapons,” Procedings of the 6th World Congress on Intelligent Control and Automation, pp.5233-5235, 2006.
[88] F. Peng and X. Jiang “A Novel Education System Requirements Engineering Methodology,” pp.428-430, 2011.
[89] Y. Liu and Y.Y. Chung, “Mining Center data with Discrete Particle Swarm Optimization and Rule Pruning,” pp.31-34, 2011.
[90] N. Rashidi, R. Omidvar, M.T. Shadpour and M. Ebrahimi, “Evaluation of elastic properties of breast cancer stem-like/tumor initiating cells using Atomic Force Microscopy,” pp.1-4, 2014.
[91] M. Cao, B. Li, and C. Wang, “Modeling Intelligent Distance Education System Based On Agent,” pp. 348–353, 2007.
[92] S. Chen, “The TCR Cancer Registry Repository for Annotating Cancer Data.”
[93] X. D. Xu Qin, “Vocational Engineering Education Model Research,” no. Iccse, pp. 1457–1459, 2012.
[94] Y. Hezhan, “Application of Fuzzy Analytical Hierarchy Process in Innovation Education Quality Evaluation of Higher Education Institution,” pp. 438–441, 2012.
[95] G. Hongtao, “Forensic Method Analysis Involving VoIP Crime.”
[96] X. Li-zhi, “Research of Private Higher Education in China Based on the Stratification Theory,” vol. 4, pp. 497–500, 2010.
[97] Z. Mohammed, H. Mostafa, and N. Chakib, “An oriented service architecture and model for GIS health management: Case of cancer in Morocco,” 2011 Colloq. Inf. Sci. Technol., pp. 6–6, 2011.
[98] S. Wang, “On Interfusion of ‘ Action-oriented ’ Teaching and Confucian Education Thought,” no. Iccse, pp. 1782–1784, 2012.
[99] D. Wei, S. Liu, and J. Liu, “Network Information Impacting on Rural Education,” pp. 918–921, 2012.
[100] D. Xu, “Research on Problems and Countermeasures of College Entrepreneurship Education,” 2011.


0 komentar:

Posting Komentar

Diberdayakan oleh Blogger.