Data Cleaning Framework for Healthcare Applications
Journal Title: Bonfring International Journal of Research in Communication Engineering - Year 2012, Vol 1, Issue 1
Abstract
RFID technologies are used in various applications ranging from traditional applications such as access control, electronic toll collection, e-ID documents to modernizing applications such as asset management, baggage handling, cargo tracking/security, contactless payment and ticketing, supply chain management and healthcare. Of these medical healthcare applications are of more importance because minute errors in it can cost heavy financial and personal losses. Data captured by RFID reader often has errors including false negatives, false positives and duplicates. In order to provide reliable data to RFID application, it is necessary to clean the collected data. In this paper we have suggested physical solutions to solve missed readings, middleware solutions to overcome anomalies found within the reader and finally rule based solutions to correct various anomalies already exist in the database. Drawbacks of the methodologies are also discussed and some solutions are suggested. With the aid of the planned data cleaning technique we can bring down the health care costs, optimize business processes, streamline patient identification processes and improve patient safety. The security and privacy issues of RFID , and their solutions are also discussed.
Authors and Affiliations
Anne Leema A, Dr. M. Hemalatha
Analysis and Comparison of a Coplanar Waveguide and Micro Strip based Rectenna
In this paper, a modified form of rectenna has been designed for wireless power transmission. Generally, rectenna is nothing but a rectifying antenna which is very much useful for converting RF power into usable DC power...
Analytical Framework for Path Reliability and Load Balancing in Mobile Adhoc Networks
In current existence, multi-path routing protocols have attained more concentration in mobile ad hoc networks as compared to further routing schemes due to their abilities and efficiency in civilizing bandwidth of commun...
Border Gateway Protocol Performance and Its Protection against Disturbed Denial of Service Attack
Now a day the internet has become very popular in the world. Simple work to complicated work you can accomplish by using internet. Such popularity leads to chances of exhaustion of Internet protocol version 4 which is cu...
Performance Comparison of Adaptive and Blind Equalization Algorithms for Wireless Communication
Adaptive equalization is a well known method to minimize the Inter-Symbol Interference (ISI) in wireless communication. Often, adaptive algorithm requires transmission of known training sequence to track the time varying...
Improving Throughput and Controlling Congestion Collapse in Mobile Ad Hoc Networks
Mobile ad hoc networks are collections of mobile nodes that can dynamically form temporary networks without the need for pre-existing network infrastructure or centralized administration. These nodes can be arbitrarily l...