Conceptual model for mobile health services using cloud computing environment: A case study of Uttarakhand a state in the central Himalayan region of India
Journal Title: International Journal of Computer Science & Engineering Technology - Year 2013, Vol 4, Issue 2
Abstract
Information and communication technologies (ICT) with the continuous growth and diversified advancement, has evolved into a key facilitating quantifiable services across different sector of society while proving to be a powerful driver of enhanced living conditions and opportunities around the globe. ICT has changed the world radically and it is bound to continue to do so in the future. The next urgency of technology is to handle the vast amount of information generated by modern society. This research is to provide a platform for exploring the new ways to determine how the emerging advancements of IT like “cloud computing” can be used with its innovation to enhance the hyperconnectivity, hence helps to transform all the sectors of society. In this research we are proposing to use the advancements of cloud computing for the mobile health vans and ongoing 108 medical services in Uttarkhand state to support the medical facilities in difficult geographical areas of state. We have collected the primary data on state health status like health indexes (like maternal mortality rate (MMR)) and discussed the influences of using technical support systems as cloud computing on those indexes , hence proposed a conceptual model to use IT and communication advancements for health services .
Authors and Affiliations
Jatin Pandey , Darshana Pathak
Text Extraction from Image Using MSER Approach
The automated understanding of textual information in images is an important problem to solve for the Computer Vision and Document Analysis for extracting that information for processing. This needs to generate required...
DETECTING AND BLOCKING OF SPAM ZOMBIE MECHANISM
A zombie is a computer connected to the Internet that has been compromised by a hacker, computer virus or Trojan horse and can be used to perform malicious tasks of one sort or another under remote direction. Botnets of...
Workflow Scheduling Algorithms in Grid Computing
Grid computing is a process of aggregate the functionality of different geographically resources and provide services to the user. Scheduling is most popular research area in grid computing for achieving high performance...
Handwritten Character Recognition with Feedback Neural Network
The ability of a machine to interpret handwritten characters from sources like paper document, photograph, etc. to some editable computerized form is the first and foremost aim of handwritten character recognition system...
Comparative evaluation of Recursive Dimensional Cutting Packet Classification, DimCut, with Analysis
an infinitely expanding number of network appliances are utilising packet classifiers to fulfil Quality of Service, security, and traffic engineering tasks. Packet classification is an important role of firewalls and rou...