An Online Based Approach for Health Care Using Clustering Algorithm with Map Reduce For Scalable Data
Journal Title: International Journal for Research in Applied Science and Engineering Technology (IJRASET) - Year 2016, Vol 4, Issue 4
Abstract
The world is moving on the speed of the internet. With the increase of internet user’s in past years has given rise to multiple online things like booking tickets, shopping. Shopping through internet has paved way to order medicines through online. So, this method is one such online communications of patients and doctors. Effective and authenticated communication is the best way for people to use any kind of internet participation. Here we provide a concept of data anonymization were the details of every single user whether it is a patient, doctor or a third-party user is hidden from another person. The third party user can be split into 3 and they are region, age, disease through which the classification can be done. This third-party user can be any of the government organization of any medicines manufacturing company’s or an university taking a survey.
Authors and Affiliations
R. Sasi Kannan, C. Venu Gopal, R. Viswanathan, S. Athinarayanan
Smart Home using PLC
In the present work, attempt has been made to automate the home with minimal human interference by using the programmable logic controller. The purpose of this paper is to utilize the advanced technologies effectively t...
Design of FPGA Controlled Closed Loop BiDirectional DC-DC (BDC) Converter for Renewable Energy Storage Applications
This paper describes the development of Bi-Directional DC-DC converter (BDC) for solar application. BDC can be used either as a Buck converter or either as a Boost converter. Designed converter in this paper is controll...
Reducing Web Response Time in Peer to Peer Network Using Peer’s History and Caching
With the dramatic explosion of online information, the Internet has undergone a transition from a data communication infrastructure to a global information utility and web searching has become a normal way of informatio...
Detection and Localization of IDS Based Spoofing Attackers in Wireless Sensor Network
Wireless spoofing attacks are easy to launch, it plays a significant role in the performance of wireless sensor networks. Although the identity of a node can be verified through cryptographic authentication, conventiona...
Detection of Spatio-Textual Top-K Queries in Location-Based Services Using Reverse Keyword Search
A spatio-textual query retrieves the best objects with respect to a given location and a keyword set. A common solution is to employ a hybrid index which records the digest of the spatial and textual information. To eff...