A Mobile Cloud Based Approach for Secure MHealth Application
Journal Title: International Journal for Research in Applied Science and Engineering Technology (IJRASET) - Year 2017, Vol 5, Issue 4
Abstract
Mobile cloud Computing is one of the major components of cloud computing that also deals with various issues of cloud services when is accessed by portable devices in the wireless environment. The Healthcare data which is stored in cloud computing is relatively sensitive compared to additional information which requires the majority management. While Cloud services are accessed by the mobile devices the extra confront like security arises. Providing the safety (security) and privacy for the healthcare information is a motivating topic to deal with. In this paper, we are implementing the health Prediction application, which is an end user support and online consultation project. Here we propose an android application that allows users to get immediate response on their health issues through an intelligent health care application online.
Authors and Affiliations
Alekhya. J, P. Sowjanya, P. Abhi Tarun
Path Planning in Outdoor and Unknown Environment using BAPSO Algorithm
The path planning through BAPSO algorithm in outdoor and unknown environments is a novel approach for robotic path planning. The BAPSO is a hybrid (BAT and PSO) algorithm. The main challenges of robotics are its automat...
Modelling and Simulation of Three Phases to Seven Phases Transformer Connection
The main aim in this paper to build a three to seven phase AC multiphase transformers to converted into DC power through modelling and simulation. A new technique of pure seven-phase Sine-wave of fixed current/voltage a...
Adapting New Generation Technologies in Smart Farming
Modern challenges of the present situation of our country is to improve the plant growth with low cost because as the population of the country is increasing need for the vegetation is becoming a major criteria, with th...
The Faces of Engagement: A Method to Infer Emotions from Facial Action Units
We present a robust method to map detected facial Action Units (AUs) to six basic emotions. Automatic AU recognition is prone to errors due to illumination, tracking failures and occlusions. Hence, traditional rule base...
Secure Data Aggregation Technique in the Existence of Conspiracy Attacks for WSN
Network security implicates the authorization of access to data in a network, which is precise the network administrator. Wireless Sensor Network (WSN) states to a set of spatially isolated and committed sensors for wat...