A PROJECT REPORT ON EMERGENCY HEALTHCARE BASED MOBILE COMPUTING FRAMEWORK
J Prashanth, ND Kale, N Srinivas - IJCER, 2013
... by the help of wires based strategy oriented sensor networks where in this advancement in the
system the attention moved towards the system based on the mobile health respectively. ... The
problems includes preservation privacy followed by the data security respectively. ...
system the attention moved towards the system based on the mobile health respectively. ... The
problems includes preservation privacy followed by the data security respectively. ...
MOBILE NETWROK BASED PRICING OF THEORITICAL GAMING STRATEGY
R Sivayya, SS Ali - IJCER, 2013
... Proc. Int. Conf. SoftCom, Sep. 2008, pp. 309–313. S. Sudin, A. Tretiakov, RHRM
Ali, and ME Rusli, "Attacks on mobile networks: An overview of new security
challenge," in Proc. Int. Conf. Electron. Design, Dec. 2008, pp. 1–6 ...
Ali, and ME Rusli, "Attacks on mobile networks: An overview of new security
challenge," in Proc. Int. Conf. Electron. Design, Dec. 2008, pp. 1–6 ...
[HTML] International Journal of Advanced Research in Computer Engineering and Technology
S No, P No - Signal, 2013
... 56, Technologies of Cloud Computing – Architecture Concepts based on Security and its
Challenges Nandini Mishra ,Kanchan khushwha, Ritu chasta,Er. ... 58, Efficient Timeslot
Assignment and Route Discovery Mechanism for Mobile Clients Gayathri. ...
Challenges Nandini Mishra ,Kanchan khushwha, Ritu chasta,Er. ... 58, Efficient Timeslot
Assignment and Route Discovery Mechanism for Mobile Clients Gayathri. ...
[PDF] 2nd ACM International Workshop on Mobile Systems for Computational Social Science
ND Lane, M Musolesi - Proceedings of the 2013 ACM conference on …, 2013
... Then, from September 2007 to August 2008 he was an Institute for Security, Technology and
Society Fellow at Dartmouth College, NH, USA, and from September 2008 to October 2009 a
Postdoctoral ... Integration of mobile technologies and cloud computing for ...
Society Fellow at Dartmouth College, NH, USA, and from September 2008 to October 2009 a
Postdoctoral ... Integration of mobile technologies and cloud computing for ...
AN OVERVIEW OF MOBILE SAMPLING OF SENSOR FIELD INFORMATION USING RESTRICTED TRANSMIT
J Paluru, K Anusha - IJCER, 2013
... AN OVERVIEW OF MOBILE SAMPLING OF SENSOR FIELD INFORMATION USING RESTRICTED
TRANSMIT. ... Abstract. In recent times, the perception of employing mobile objects ie sometimes
referred to as mobile sinks to query a sensor network has been proposed. ...
TRANSMIT. ... Abstract. In recent times, the perception of employing mobile objects ie sometimes
referred to as mobile sinks to query a sensor network has been proposed. ...
[PDF] Trusted Cloud Platform for Cloud Infrastructure
P Gupta, D Agrawal - INTERNATIONAL JOURNAL OF COMPUTERS & …, 2013
... on GeneticAlgorithm in Cloud Computing",In Wireless Communications, Networking and Mobile
Computing, 2009 ... colony Optimization: A Solution of Load balancing in Cloud", International Journal ...
IJCSNS International Journal of Computer Science and Network Security,VOL.10 ...
Computing, 2009 ... colony Optimization: A Solution of Load balancing in Cloud", International Journal ...
IJCSNS International Journal of Computer Science and Network Security,VOL.10 ...
Research about Rural Information Management Multi-Level Platform Based on Cloud Computing
YE Duan - Advanced Materials Research, 2013
... Research about Rural Information Management... Paper Title: Research about Rural Information
Management Multi-Level Platform Based on Cloud Computing. ... The theory, technology, service
and deploy model and characteristic of cloud computing were discussed in detail. ...
Management Multi-Level Platform Based on Cloud Computing. ... The theory, technology, service
and deploy model and characteristic of cloud computing were discussed in detail. ...
[PDF] Application of Smart Technologies for Mobile Patient Appointment System
Y Symey, S Sankaranarayanan, SN binti Sait - International Journal, 2013
... 2.3. Mobile Appointment System Recently, healthcare industry has slowly moved towards
implementing cloud-based platforms, regardless of security issues that may or may not happen.
With the existence of such system, storage size and ability to manage records and data ...
implementing cloud-based platforms, regardless of security issues that may or may not happen.
With the existence of such system, storage size and ability to manage records and data ...
Prospects and Challenges of Implementing Enterprise Mobility Management–Case of a Large Telecom Service Provider in United Arab Emirates
SM Ali, M Usman - INTERNATIONAL JOURNAL OF COMPUTERS & …, 2013
... Keywords. Bring Your Own Device; BYOD; Enterprise Mobility Management; Mobile Device
Management; MDM; UAE. Full Text: PDF. References. ... Organizational Dynamics, 41(3), 2012,
194-201. Ali, S. M, Challenges and security issues in future IT infrastructure components. ...
Management; MDM; UAE. Full Text: PDF. References. ... Organizational Dynamics, 41(3), 2012,
194-201. Ali, S. M, Challenges and security issues in future IT infrastructure components. ...
DESIGN OF RFID BASED ATTRACTION OF TOURISTMONITORING SYSTEM
KS Devi, R Bharath - IJCER, 2013
... J. Axup and S. Viller, "Augmenting travel gossip: Design for mobile communities," OZCHI'05,
Proceedings of the 19th Conference of the Computer-Human Interaction ... Juels, "RFID security
and privacy: A research survey," IEEE Journal on Selected Areas in Communications, Vol. ...
Proceedings of the 19th Conference of the Computer-Human Interaction ... Juels, "RFID security
and privacy: A research survey," IEEE Journal on Selected Areas in Communications, Vol. ...
DETECTION OF THE CUT BASED STRATEGY IN A NETWORK ORIENTED WIRELESS PHENOMENA
S Begum, A Mohammed - IJCER, 2013
... Iteration; Estimation, Detection; Separation of Network. References. M. Hauspie,
J. Carle, and D. Simplot, "Partition detection in mobile ad-hoc networks," in 2nd
Mediterranean Workshop on Ad-Hoc Networks, 2003, pp. 25–27. ...
J. Carle, and D. Simplot, "Partition detection in mobile ad-hoc networks," in 2nd
Mediterranean Workshop on Ad-Hoc Networks, 2003, pp. 25–27. ...
A Universal Attack Against Histogram-Based Image Forensics
M Barni, M Fontani, B Tondi - International Journal of Digital Crime and Forensics ( …, 2013
In this paper the authors propose a universal image counter-forensic scheme that contrasts
any detector based on the analysis of the image histogram. Being.
any detector based on the analysis of the image histogram. Being.
Multi-Response Optimization of Electrochemical Machining of Al-Si/B4C Composites Using RSM
SR Rao, G Padmanabhan - International Journal of Manufacturing, Materials, and …, 2013
The present work reports the electrochemical machining (ECM) of the aluminium-silicon
alloy/boron carbide (Al-Si /B4C) composites, fabricated by stir casting.
alloy/boron carbide (Al-Si /B4C) composites, fabricated by stir casting.
[PDF] Human Localization at Home Using Kinect
T Chattopadhyay, S Roy - Proceedings of the 2013 ACM conference on …, 2013
... Introduction Robust indoor surveillance and security system, which has an excellent market
traction, also ... and living rooms where the person forgets to carry the mobile phone most ... i) Vision
based background subtraction (ii) Silhouette based approach and (iii) Cloud point based ...
traction, also ... and living rooms where the person forgets to carry the mobile phone most ... i) Vision
based background subtraction (ii) Silhouette based approach and (iii) Cloud point based ...
Bitstream-Based JPEG Encryption in Real-time
S Auer, A Bliem, D Engel, A Uhl, A Unterweger - International Journal of Digital Crime …, 2013
... Similarly, encrypting a limited number of bits on bitstream level starting from the DC coefficient
(Puech & Rodrigues, 2005) or the high-frequency AC coefficients (Puech & Rodrigues, 2007),
respectively, is of lower security as compared to the proposed approach which encrypts ...
(Puech & Rodrigues, 2005) or the high-frequency AC coefficients (Puech & Rodrigues, 2007),
respectively, is of lower security as compared to the proposed approach which encrypts ...
AN EFFICIENT STRATEGY BASED DATA HIDING AGAINST JAMMING
MN Fathima, G Minni - IJCER, 2013
... M. Cagalj, S. Capkun, and J.-P. Hubaux. Wormhole-based antijamming techniques in sensor
networks. IEEE Transactions on Mobile Computing, 6(1):100–114, 2007. A. Chan, X. Liu, G. Noubir,
and B. Thapa. Control channel jamming: Resilience and identification of traitors. ...
networks. IEEE Transactions on Mobile Computing, 6(1):100–114, 2007. A. Chan, X. Liu, G. Noubir,
and B. Thapa. Control channel jamming: Resilience and identification of traitors. ...
[PDF] A Novel Content Provisioning Framework for Multi-technology Wireless Networks
SMA Shah, D Tabassam Nawaz, A Akram - Life Science Journal, 2013
... References [1] Keng Y., Yilun C., Flora S., Ang Wee T., and Rajaraman K. "Cloud-based Semantic
Service- Oriented Content Provisioning Architecture for Mobile Learning", Journal of Internet
Services and Information Security, May 2011, Volume: 1, Number: 1:59-69. ...
Service- Oriented Content Provisioning Architecture for Mobile Learning", Journal of Internet
Services and Information Security, May 2011, Volume: 1, Number: 1:59-69. ...
Top Police Departments in Europe: Top 100
A Trost, V Kravetsky - 2013
... m still flaunty) 1. AZERBAIJANI NATIONAL POLICE (89 I'm on cloud nine ) 1 ... POLICIA DO
EXERCITO PORTUGUESE (63 It's still me) 1. PRESIDENTIAL SECURITY SERVICE (62 ... 1. POLIZIA
PROVINCIALE ITALY (9 ball corner pocket) 1. GENDARMERIE MOBILE FRANCE (Eight ...
EXERCITO PORTUGUESE (63 It's still me) 1. PRESIDENTIAL SECURITY SERVICE (62 ... 1. POLIZIA
PROVINCIALE ITALY (9 ball corner pocket) 1. GENDARMERIE MOBILE FRANCE (Eight ...
MDA-based Visual Modeling Approach for Resources Link Relationships Using UML Profile
I Hsu, DH Ting, NL Hsueh - Computer Standards & Interfaces, 2013
... Hsu; Multilayer context cloud framework for mobile Web 2.0: a proposed infrastructure.
International Journal of Communication Systems, 26 (5) (2013), pp. 610–625. Full
Text via CrossRef. [5]; I.-C. Hsu, YK Tzeng, D.-C. Huang; ...
International Journal of Communication Systems, 26 (5) (2013), pp. 610–625. Full
Text via CrossRef. [5]; I.-C. Hsu, YK Tzeng, D.-C. Huang; ...
Why Did Napoleon Do It? Hubris, Security Dilemmas, Brinksmanship, and the 1812 Russian Campaign
W Nester - Diplomacy & Statecraft, 2013
... The emperor and tsar straight-jacketed themselves in a classic "security dilemma" whereby the
defensive measures each took to deter the other ... When the emperor and empress boarded his
carriage at Saint Cloud and clattered eastward on 9 May 1812, they were accompanied ...
defensive measures each took to deter the other ... When the emperor and empress boarded his
carriage at Saint Cloud and clattered eastward on 9 May 1812, they were accompanied ...
No comments:
Post a Comment