Data Cleaning Framework for Healthcare Applications
Journal Title: Bonfring International Journal of Research in Communication Engineering - Year 2012, Vol 1, Issue 1
Abstract
RFID technologies are used in various applications ranging from traditional applications such as access control, electronic toll collection, e-ID documents to modernizing applications such as asset management, baggage handling, cargo tracking/security, contactless payment and ticketing, supply chain management and healthcare. Of these medical healthcare applications are of more importance because minute errors in it can cost heavy financial and personal losses. Data captured by RFID reader often has errors including false negatives, false positives and duplicates. In order to provide reliable data to RFID application, it is necessary to clean the collected data. In this paper we have suggested physical solutions to solve missed readings, middleware solutions to overcome anomalies found within the reader and finally rule based solutions to correct various anomalies already exist in the database. Drawbacks of the methodologies are also discussed and some solutions are suggested. With the aid of the planned data cleaning technique we can bring down the health care costs, optimize business processes, streamline patient identification processes and improve patient safety. The security and privacy issues of RFID , and their solutions are also discussed.
Authors and Affiliations
Anne Leema A, Dr. M. Hemalatha
Data Integrity and Dynamic Storage Way in Cloud Computing Resonance and Parametric Analysis of Planar Broad-Wall Longitudinal Slot Array Antennas
It is not an easy task to securely maintain all essential data where it has the need in many applications for clients in cloud. To maintain our data in cloud, it may not be fully trustworthy because client doesn?t have c...
Distributed System Framework for Mobile Cloud Computing
Todays global computing environment involves the vital role of the mobile cloud computing. Mobile Cloud Computing (MCC) is the combination of cloud computing, mobile computing and wireless networks which brings rich comp...
Comparison of Cellular Automata and DSP Processors towards DSP Application
In this paper we have emphasized on alternative uses of Cellular Automata (CA) in Digital Signal Processing (DSP). The corollary of the distinction is centered on the parallel nature for both of the processors. For digit...
Butterfly Graphs with Shell Orders m and 2m+1 are Graceful
A graceful labelling of an un directed graph G with n edges is a one-one function from the set of vertices V(G) to the set {0, 1, ,2, . . ., n} such that the induced edge labels are all distinct. An induced edge label is...
Border Gateway Protocol Performance and Its Protection against Disturbed Denial of Service Attack
Now a day the internet has become very popular in the world. Simple work to complicated work you can accomplish by using internet. Such popularity leads to chances of exhaustion of Internet protocol version 4 which is cu...