The four-volume set LNCS 13350, 13351, 13352, and 13353 constitutes the proceedings of the 22ndt International Conference on Computational Science, ICCS 2022, held in London, UK, in June 2022.* The ...total of 175 full papers and 78 short papers presented in this book set were carefully reviewed and selected from 474 submissions. 169 full and 36 short papers were accepted to the main track; 120 full and 42 short papers were accepted to the workshops/ thematic tracks. *The conference was held in a hybrid format This is an open access book.
Introduction to Network Simulator NS2 is a primer providing materials for NS2 beginners, whether students, professors, or researchers for understanding the architecture of Network Simulator 2 (NS2) ...and for incorporating simulation modules into NS2. The authors discuss the simulation architecture and the key components of NS2 including simulation-related objects, network objects, packet-related objects, and helper objects. The NS2 modules included within are nodes, links, SimpleLink objects, packets, agents, and applications. Further, the book covers three helper modules: timers, random number generators, and error models. Also included are chapters on summary of debugging, variable and packet tracing, result compilation, and examples for extending NS2. Two appendices provide the details of scripting language Tcl, OTcl and AWK, as well object oriented programming used extensively in NS2.
The primary objectives of Graphs, Dioïds and Semirings: New Models and Algorithms are to emphasize the deep relations existing between the semiring and dioïd structures with graphs and their ...combinatorial properties, while demonstrating the modeling and problem-solving capability and flexibility of these structures. In addition the book provides an extensive overview of the mathematical properties employed by "nonclassical" algebraic structures, which either extend usual algebra (i.e., semirings), or correspond to a new branch of algebra (i.e., dioïds), apart from the classical structures of groups, rings, and fields.
Patient-provider electronic communication has proliferated in recent years, yet there is a dearth of published research either leading to, or including, recommendations that improve clinical care and ...prevent unintended negative consequences. We critically appraise published guidelines and suggest an agenda for future work in this area.
To understand how existing guidelines align with current practice, evidence, and technology.
We performed a narrative review of provider-targeted guidelines for electronic communication between patients and providers, searching Ovid MEDLINE, Embase, and PubMed databases using relevant terms. We limited the search to articles published in English, and manually searched the citations of relevant articles. For each article, we identified and evaluated the suggested practices.
Across 11 identified guidelines, the primary focus was on technical and administrative concerns, rather than on relational communication. Some of the security practices recommended by the guidelines are no longer needed because of shifts in technology. It is unclear the extent to which the recommendations that are still relevant are being followed. Moreover, there is no guideline-cited evidence of the effectiveness of the practices that have been proposed.
Our analysis revealed major weaknesses in current guidelines for electronic communication between patients and providers: the guidelines appear to be based on minimal evidence and offer little guidance on how best to use electronic tools to communicate effectively. Further work is needed to systematically evaluate and identify effective practices, create a framework to evaluate quality of communication, and assess the relationship between electronic communication and quality of care.
In recent years, the blocking of internet sites with harmful content or those deemed to be (illegal content) has increased. The policy of blocking dangerous sites has pros and cons regarding freedom ...of expression. Blocking is considered to be carried out to control citizens' expression, which can impact all areas, especially freedom of opinion, which can be seen as a threat to certain parties. This research aims to compare criminalization policies for blocking dangerous content in electronic communications networks in the Netherlands, the United States, and Singapore and provide thoughts on law enforcement models for blocking dangerous content in more democratic electronic communication networks. This is normative legal research using a law and case approach and comparing several countries. The conceptual approach is directed at the concept of a democratic state and the protection of human rights to formulate relevant policy models. The results of blocking studies in the Netherlands, The USA, and Singapore already have regulations and policy directions for blocking dangerous content, or at least rules regarding law enforcement for cybercrime. The difference is in the level of sensitivity to the specifications of existing problems. The policy model for blocking dangerous content with special regulations outside the Criminal Code must be carried out in a non-repressive manner so that it does not violate the ultimum remedium principle and becomes over-criminalized. The formulation of policy model of all crime prevention plans using the criminal law system, which pays attention to the problem of formulating criminal acts (criminalization), criminal responsibility, and criminal regulations and punishment.
Purpose Technology has enhanced modern health care delivery, particularly through accessibility to health information and ease of communication with tools like mobile device messaging (texting). ...However, text messaging has created new risks for breach of protected health information (PHI). In the current study, we sought to evaluate hand surgeons’ knowledge and compliance with privacy and security standards for electronic communication by text message. Methods A cross-sectional survey of the American Society for Surgery of the Hand membership was conducted in March and April 2016. Descriptive and inferential statistical analyses were performed of composite results as well as relevant subgroup analyses. Results A total of 409 responses were obtained (11% response rate). Although 63% of surgeons reported that they believe that text messaging does not meet Health Insurance Portability and Accountability Act of 1996 security standards, only 37% reported they do not use text messages to communicate PHI. Younger surgeons and respondents who believed that their texting was compliant were statistically significantly more like to report messaging of PHI (odds ratio, 1.59 and 1.22, respectively). Discussion A majority of hand surgeons in this study reported the use of text messaging to communicate PHI. Of note, neither the Health Insurance Portability and Accountability Act of 1996 statute nor US Department of Health and Human Services specifically prohibits this form of electronic communication. To be compliant, surgeons, practices, and institutions need to take reasonable security precautions to prevent breach of privacy with electronic communication. Clinical relevance Communication of clinical information by text message is not prohibited under Health Insurance Portability and Accountability Act of 1996, but surgeons should use appropriate safeguards to prevent breach when using this form of communication.
With the radical changes in information production that the Internet has introduced, we stand at an important moment of transition, says Yochai Benkler in this thought-provoking book. The phenomenon ...he describes as social production is reshaping markets, while at the same time offering new opportunities to enhance individual freedom, cultural diversity, political discourse, and justice. But these results are by no means inevitable: a systematic campaign to protect the entrenched industrial information economy of the last century threatens the promise of today's emerging networked information environment.
In this comprehensive social theory of the Internet and the networked information economy, Benkler describes how patterns of information, knowledge, and cultural production are changing-and shows that the way information and knowledge are made available can either limit or enlarge the ways people can create and express themselves. He describes the range of legal and policy choices that confront us and maintains that there is much to be gained-or lost-by the decisions we make today.
For a long time, phosphors with long‐lived emission are dominated by rare earth/transition metal ion‐doped sulfides and oxides. Recently, organic materials capable of emitting long‐lived ...room‐temperature phosphorescence (RTP) are reported, carbon skeletons are almost the exclusive structural feature of the conjugated luminophores. Herein, we reported that boric acid, a non‐metal and C‐free material, could emit RTP with lifetime up to 0.3 s. Detailed investigations indicated the weak conjugation between the n electrons of the O atoms in the B‐O confined space was the possible origin of RTP. Similar RTP was also found in electron‐rich N/F systems, namely, BN and BF3 (BF4−). Importantly, the vacant pz0
orbital of B was found to contribute to the relevant unoccupied molecular orbitals involved in excitation, which is different from previous reports on phosphorescence from arylboronic acids. The results confirm the unique role of B as a versatile structure motif for construction of new RTP materials.
The vacant pz0
orbital of boron contributes to the unexpected long‐lived room‐temperature phosphorescence of boric acid, boron nitride, and fluoborite.
This open access book presents outstanding doctoral dissertations in Information Technology from the Department of Electronics, Information and Bioengineering, Politecnico di Milano, Italy. ...Information Technology has always been highly interdisciplinary, as many aspects have to be considered in IT systems. The doctoral studies program in IT at Politecnico di Milano emphasizes this interdisciplinary nature, which is becoming more and more important in recent technological advances, in collaborative projects, and in the education of young researchers. Accordingly, the focus of advanced research is on pursuing a rigorous approach to specific research topics starting from a broad background in various areas of Information Technology, especially Computer Science and Engineering, Electronics, Systems and Control, and Telecommunications. Each year, more than 50 Ph.D.s. graduate from the program. This book gathers the outcomes of the best theses defended in 2022–23 and selected for the IT Ph.D. Award. Each of the authors provides a chapter summarizing his/her findings, including an introduction, description of methods, main achievements and future work on the topic. Hence, the book provides a cutting-edge overview of the latest research trends in Information Technology at Politecnico di Milano, presented in an easy-to-read format that will also appeal to non-specialists.