Thursday, March 24, 2016

Research Readings in Cloud

Teaching EHRs security with simulation for non-technical healthcare professionals.

M Gaynor, T Omer, JS Turner - … of healthcare protection management: publication of …, 2016
... patients that electronic medical data is safe and accurate. However, data security
and privacy are complex concepts and remain foreign to many healthcare managers.
This paper reviews the benefits of simulation learning and ...

Research of Mass Redundant Data Deleting Algorithm for Intelligent Manufacturing Process.

S Longlong, Z Pan, W Taiyong, X Lei, S Xiaowen - Key Engineering Materials, 2016
... Zhang Pan 2,3 zhangpan2003@126.com Wang Taiyong 1,2 tywang@189.cn Xu Lei 4
sf-xulei@cqsf.com Song Xiaowen 4 sf-songxiaowen@cqsf.com Source: Key Engineering Materials
Document Type: Article Keywords: data explosion data security information management ...

Simulation Modeling of Consumers' Participation in Product Take-Back Systems

AR Mashhadi, B Esmaeilian, S Behdad - Journal of Mechanical Design, 2016
2.

[PDF] A Taxonomy of Data Management Models in Distributed and Grid Environments

F Nadeem - International Journal of Information Technology and …, 2016
... In distributed and Grid environments data exists in different types and nature such as
input/output(I/O) files, access control data, version control datasecurity related data, and metadata.
Figure 1 describes the taxonomy of data types in distributed environments. ...

Perspective for Smart Factory in Petrochemical Industry

D Li - Computers & Chemical Engineering, 2016
Opportunities and challenges in the petrochemical industry and the emergence of massive
disruptive technologies have triggered a new revolution that has the pow.

[PDF] State of the Art Survey on Session Hijacking

P Kamal - Global Journal of Computer Science and Technology, 2016
Page 1. © 2016. Parves Kamal. This is a research/review paper, distributed under
the terms of the Creative Commons Attribution- Noncommercial 3.0 Unported License
http://creativecommons.org/licenses/by-nc/3.0/), permitting ...

[HTML] Availability, Strengths and Limitations of US State Driver's License Data for Obesity Research

B Littenberg, D Lubetkin - Cureus, 2016
... Each state had a unique process for releasing the data. Some required a signed memorandum
of understanding outlining the specific uses for the data, the scope of our research, and technical
systems in place for data security. Some sent the data without further paperwork. ...

SCALABLE FRAMEWORK FOR MANAGING CIVIL STRUCTURE MONITORING DEVICES

AN Srivastava, F Chang - US Patent 20,160,061,687, 2016
... issues associated with monitoring devices 210, etc. In some implementations, the
dashboard may enable the entity to control asset losses and costs due to data
security breaches. For example, the entity may determine that ...

[PDF] Package 'pvrank'

IL Amerise, M Marozzi, A Tarsitano, MIL Amerise - 2016
Page 1. Package 'pvrank' February 24, 2016 Type Package Title Rank Correlations
Version 1.1 Author Amerise IL <ilaria.amerise@unical.it>, Marozzi M. <marco.marozzi
@unical.it>, Tar- sitano A. <agostino.tarsitano@unical ...

Forensic video solution using facial feature-based synoptic Video Footage Record

Y Balasubramanian, K Sivasankaran, SP Krishraj - IET Computer Vision, 2016
Person specific identification is an important problem in computer vision. However, forensic video
analysis is the tool in surveillance applications, such as a specific person Video Footage Record
can be used to help personalised monitoring. This study proposes a solution to identify ...

No comments:

Post a Comment

 

blogger templates 3 columns | Make Money Online