Double Standard Security Mechanism In The Management Cloud Based Mobile Application
Journal Title: International Journal of Research in Computer and Communication Technology - Year 2015, Vol 4, Issue 2
Abstract
Patient care is the focus of many clinical disciplines application but it is very complex as patient care is the essential information for direct patient care is defined on the applications. The present applications are not provide security on health monitoring system. The patient details are stored in cloud for the purpose of privacy and security but these are not retrieved accurate and not provide efficient privacy. However we are having major question in cloud health monitoring system What information does each professional generate? Where, when, and in what form is it needed? Even broader definitions of e-health and eenvironment are used for describing processes in health care and the environment that are electronically / digitally covered, instead of just being available on the Internet. So this paper address above problem and solved the problem of patient health details are monitored very and retrospective analysis of patient-care data had become a priority need of all customers. So we are providing section health monitoring..
Authors and Affiliations
Sandhya Rani P, Mahesh N, Lakshmi Tulasi R
Abrupt Software Cost Estimation Technique Based on Basic Requirement
Software cost estimation is the process to measure the required effort and cost to build system. In the project management still it is one of the most difficult tasks. There is a lack of reliable estimation technique...
Vision Defect Identification System (VDIS) using Knowledge Base and Image Processing Framework
In this research paper, a novel system has been designed which is using two discipline of Computer science area which are Artificial intelligence and image Processing. Fuzzy sets and logic has been chosen from AI and...
Efficient and Flexible Access Control for Outsourced Data In Cloud
This paper presents a scheme achieves scalability and also inherits flexibility and finegrained access control in supporting compound attributes of ASBE . In the other hand HASBE implement multiple value assignments f...
Attribute Sparse Coding (ASC’s) for Content-Based Image Retrieval (CBIR)
Photographs with individuals are the foremost attention of users. Consequently with the exponentially increasing pictures, large-scale content-based face image retrieval is a facilitating knowledge for various develo...
An Effective Approach Of Compressing Encrypted Images
In this paper proposing a novel scheme of scalable coding for encrypted images. In the encryption phase, the original pixel values are masked by a modulo- 256 addition with nonrandom numbers that are derived from a s...