Introduction: The aim of this study was to evaluate the technical efficiency medical training centers of Kermanshah University of Medical Sciences\nMethods: This study is applied And cross sectional was performed Using the form of the Ministry of Health and Medical Education, Deputy of treatment, Kermanshah University of Medical Sciences were collected Data using the software Windeap (2) were analyzed. \nResults: The results obtained show that the Imam Khomeini hospitals, Imam Ali, Taleghani, Mohammad Kermanshahi, and Motazedi has a fixed returns to scale. also Imam Reza Hospital has diminishing returns, Farabi Hospital increases efficiency.\nConclusion: This study suggests that with the exception of Imam Reza (AS) Hospital returns to scale is reduced, other hospital had a favorable trend Meaning that our resources are used effectively and efficiently
In the wireless networks, achieving efficient communication without packet loss is an important problem. In the network data frames are classified into packets before sending the network. In the streaming applications the packets are dependent to each other. So, if there is a drop in single packet there is no use in the whole sequence. Due to network traffic, all packets of a frame reach to the destination is a vital problem. If we retransmit the packets produce the delay constraints and increases the cost. The main objective of this paper is to reduce the packet delay and increases the packet delivery ratio in the streaming applications. So, we use buffer management algorithms to carry out the packet discard. By using the concept of packet scheduling we consider both packet delay and also the packet size. So, this can enhance the flexibility of network resource management and improvement in quality of service.
hospitals to meet the need\'s health care, people formed. It must therefore be accountable in front of people. The purpose of this study was to evaluate accountability in Teaching Hospital of Imam Reza (AS) Kermanshah.This study was cross-sectional and descriptive. And is the correlation type. Data were collected using a questionnaire. Statistical population consisted of all nurses in Medical Center of Imam Reza (AS) Kermanshah (493 persons). Sample size, using Cochran\'s formula (216 cases), respectively. reliability ,using Cronbach\'s alpha equal to 786. Obtained. And validity of the method the contents (use of opinions of teachers and experts) were reviewed and approved.Our results show that, dimension financial, with 38.3% as poor, aspects of Legal (48.6%), management (29.9%), institutional (47.7%), professionals (47.7%) performance by 49.1% on average and aspect of personal (40.2%) were supreme. And finally accountability in the center, with 53.7% of was average.based on results, hospitals have programs for greater accountability, including incentive programs, employee empowerment programs to enhance the quality and…design and implement their To the satisfaction of patients and staff there to increase.
Today there is new evidence that emotional intelligence plays a significant role in the entrepreneurship origin so little extended attempt done for it. For this, in this research the relationship between the emotional intelligence and entrepreneurship has been examined. Fars province industry, mine & trade organization is the present research statistical society with 251 personnel both formal and contractual that a sample with 69 selected in simple and random method and by Cockran formula. Greaves. Jean & Bradberry. Travis emotional intelligence (2003) and Badri et.al (2005) questionnaires were used to collect information. Data was analyzed by SPSS software. Study indicated that the emotional intelligence and its 4 dimensions based on the last Goleman model including self-concious, self-management, social knowledge and the relations management has positive correlation to entrepreneurship. Finding also indicated that there are no respondents’ significant anthropological differences to their entrepreneurship rate.
Dam construction is not only fulfilling the socio-economic necessities of human beings, it also has great impact on surrounding ecosystem. Present study was conducted to analyze the Land Use/Land Cover change around Mangla dam which is unprotected wetland. Land Use/Land Cover Change was analyzed by using Landsat satellite imagery of three years. Supervised classification method was applied in ERDAS Imagine and four major classes were delineated i.e. Water body, Built-up area, Vegetation and Barren area. Maps of change detection in different classes were built by using ArcGIS 10.2. Results of LU/LC change revealed significant increase in Built-up area, while reduction in Water body, Vegetation and Barren area was observed from 1992 to 2013. Greater transformation was recorded in Built-up area class from Vegetation and Barren area classes. This expansion posed threat to biodiversity and water bodies. This study through LULC change analysis can be used in biodiversity conservation and will be helpful in decision making for further land development and dam extension project
The inherent impact due to internal radiation exposure of human through ingestion of food has recently become worrisome to scientists all over the world. The higher natural radioactivity levels in the earth\'s crust are associated with granitic rock and the lower levels associated with sedimentary rocks have been reported. Data are sparse on radioactivity levels in the environments underlain by sedimentary rocks. Ayetoro is situated on sedimentary sequence rocks comprise of Abeokuta Formation. The radioactivity levels of 40K, 226Ra and 232Th in the maize and cassava food crops, farm soil samples beneath the food crops were measured, the soil-to-food crop transfer factors were determined, and the effective dose rates due to ingestion of food crops and the outdoor effective dose rates due to farm soils were evaluated. The mean activity concentrations of 40K, 226Ra and 232Th in maize were 160.3±66.5Bqkg-1, 18.1±7.1Bqkg-1 and 15.0±8.0Bqkg-1respectively. The farm soils underneath the maize food crop exhibited mean activity concentration of 671.5±352.9Bqkg-1, 66.8±25.3Bqkg-1and 62.1±27.9Bqkg-1for 40K, 226Ra and 232Th respectively. The mean activity concentrations in cassava were 294.6±137.2 Bqkg-1, 28.6±14.9 Bqkg-1and 18.2±13.0Bqkg-1for 40K, 226Ra and 232Th respectively, and the farm soils underneath the cassava food crop were 679.5±281.1 Bqkg-1, 66.8±32.7Bqkg-1and 49.7±46.9 Bqkg-1 for40K, 226Ra and 232Th respectively. The mean annual effective doses due to ingestion of maize and cassava were (108.±41.7) µSv and (843.0±322.0) µSv respectively. The outdoor effective doses due to the farm soil for maize and cassava were (0.11±0.032) mSv and (0.11±0.31) mSv respectively. The mean percentage of 40K, 226Ra and 232Th transferred to maize were 25%, 27% and 25%, while the transfers to cassava were 43%, 42% and 37% respectively. The annual outdoor effective dose was below the ICRP recommended limit of 1mSv and the transfer factors were comparable to other studies.
Images of patients requires privacy and as well as integrity. Security is an evolving phenomenon and no single technique is sufficient enough to provide the required level of security in the internet environment of the public domain [1][2].In this noble technique the secret information like serial number or user specific licenses are embedded first in the watermark logo itself which is an important factor for establishment of the owner’s right at later stage. Then the watermark logo is embedded in the host image by encryption and digital watermarking techniques together to achieve better security [3] [4]. In this technique watermark logo is encrypted, then the encrypted watermark logo is embedded in to the host image using DWT and SVD based techniques. The watermarked image is finally encrypted using key hashed based encryption techniques before distribution in the public domain [5]. This new mechanism will prevent MIM (man in the middle) attack by intercepting the watermarked image by the malicious attacker who may try to remove the watermark and use it for malicious purposes. This noble technique makes the watermarked image in the human unreadable format and the user specific watermark logo is encrypted and permanently tagged with the host image through watermarking for authentication purpose. The experimental results demonstrate the high robustness of the proposed algorithm to various image processing attacks like noise additions, geometric rotations, cropping etc.