Sharing of Medical Information on Cloud Platform-A Review
Journal Title: IOSR Journals (IOSR Journal of Computer Engineering) - Year 2014, Vol 16, Issue 2
Abstract
Abstract: At present hospitals store the physical fitness data in paper printed format and these formats are saved in archives in a very irregular manner. The present work aims at the application of cloud computing in a secure way to share and store the medical information. With the stored information concerned physician will be able to build better and deeper referral networks of online medical information transfer system. It results in increase of volume and opens more transferred platform for exchange and collaboration of medical information.
Authors and Affiliations
Abhishek Kumar Gupta , Kulvinder Singh Mann
Detection of Replica Nodes in Wireless Sensor Network: A Survey
Abstract: Network security has become a challenging area, historically only tackled by well qualified andfamiliar experts. Although more pupils are becoming wired, an increasing number of pupils need to understandb...
Object Detection & Tracking in Moving Background Under Different Environmental Conditions
Abstract: Object detection and tracking has been a widely studied research problem in recent years. Currently system architectures are service oriented i.e. they offer number of services. All such common services are gro...
A Survey on Enhancing Routing using NCPR in Mobile Ad hoc Networks
Abstract: Mobile Ad hoc Network (MANET) is collection of wireless mobile hosts (or nodes) that are free to move in any directions at any speed. This nature of MANET’s leads to periodic link breakage, which in turn...
Congestion Control: A Dynamic Approach
Abstract: Congestion control is a very important concept used in practical networks. Congestion of a networkoccurs when a network carries such high traffic of data that the quality of service deteriorates. In moder...
Image Based Authentication for Folder Security using Persuasive Cued Click-Points and SHA
Abstract: In this paper Image Based Authentication application is applied on folder’s (folders that are confidential to user) ,since the studies till date have shown that textual passwords are more prone that the...