Internet of things (IoT) is one of the futuristic and upcoming technologies which have led to the concept of automation in many daily chores. IoT has placed its fame nearly in all possible platforms and the main idea is to enhance this technology in the current healthcare system, for the purpose of automatic monitoring of hospitals and patient's health by spreading positive vibes to the vision of IoT. With the support of certain technologies such as Radio Frequency Identification (RFID), Brainsense headband, Wireless Sensor Network and smart mobile, by keeping the IoT as its connecting platform, a Smart E-Healthcare System is framed. A low power wireless personal area connection helps in incorporating these technologies together through a Constrained Application Protocol/IPv6. To track the state of the patient, Smart Healthcare Sensor (SHS) and RFID are used that are attached to the person's wrist bands automatically by using electromagnetic fields. Each tag held by the person has a unique ID and it contains information that is electronically stored in a separate cloud environment. Based on the various information sensed by the SHS sensors, required prescription is given to the victim in the absence of doctors. This technology represents a significant step in the development of health care sectors. In this paper, we are proposing pro prediction algorithm for detecting the prescription for the patient.
In developing countries, though electrical energy has been recognized as a noteworthy input for their economic growth and societal development, nearly 2 Â 10 9 people lack access to electrical energy use. Many national policies were designed to provide electric service to an entire population; nevertheless, all have encountered with significant barriers. Securing a passable electric service for isolated societies with small population and large distance from the main electricity grid has been proved to be a hard-hitting challenge to the energy policy strategists. To overcome the energy barriers and the energy scarcity of the secluded society, this paper proposes a sustainable, economic, and environmental friendly energy mix option with fossil-fuelled, wind, and solar energy systems as a curative solution. V C 2014 AIP Publishing LLC. [http://dx.
In SCTP's Concurrent Multipath Transfer, if data is sent to the destined IP(s) without knowledge of the paths condition, packets may be lost or delayed. This is because of the bursty nature of IP traffic and physical damage to the network. To offset these problems, network path status is examined using our new mechanism Multipath State Aware Concurrent Multipath Transfer using redundant transmission (MSACMT-RTv2). Here the status of multiple paths is analyzed, initially and periodically thereafter transmitted. After examination, paths priority is assigned before transmission. One path is temporarily employed as redundant path for the failure-expected path (FEP); this redundant path is used for transmitting redundant data. At the end of predefined period, reliability of the FEP is confirmed. If FEP is ensured to be reliable, temporary path is transformed into normal CMT path. MSACMT-RTv2 algorithm is simulated using the Delaware University ns-2 SCTP/CMT module (ns-2; V2.29). We present and discuss MSACMT-RTv2 performance in asymmetric path delay and with finite receiver buffer (rbuf) size. We extended our experiment to test robustness of this algorithm and inferred exhaustive result. It is inferred that our algorithm outperforms better in terms of increasing the throughput and reducing the latency than existing system.
<p>Internet based computing dissimilar services such as server storage and applications are shared on the internet. This makes cloud computing one of the most promising and rapidly growing technologies. As it relies on sharing computer resources, it is prone to various security risks. Individual such security issue is Distributed Denial of Services attack on cloud. A DDos assault can begin from anyplace in the system and normally overpowers the casualty server by sending countless. This paper deals with the prevention of DDos attacks and how honey pot approach can be used in cloud computing to counter DDos attacks.</p>
<p>The explosive increase of data brings new challenges to the data storage and supervision in cloud settings. These data typically have to be processed in an appropriate fashion in the cloud. Thus, any improved latency may originanimmense loss to the enterprises. Duplication detection plays a very main role in data management. Data deduplication calculates an exclusive fingerprint for each data chunk by using hash algorithms such as MD5 and SHA-1. The designed fingerprint is then comparing against other accessible chunks in a database that dedicates for storing the chunks. As an outcome, Deduplication system improves storage consumption while reducing reliability. Besides, the face of privacy for responsive data also arises while they are outsourced by users to cloud. Aiming to deal with the above security challenges, this paper makes the first effort to honor the notion of distributed dependable Deduplication system. We offer new distributed Deduplication systems with privileged reliability in which the data chunks are distributed across a variety of cloud servers. The protection needs an different of using convergent encryption as in foregoing Deduplication systems.</p>
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.
customersupport@researchsolutions.com
10624 S. Eastern Ave., Ste. A-614
Henderson, NV 89052, USA
This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.
Copyright © 2024 scite LLC. All rights reserved.
Made with 💙 for researchers
Part of the Research Solutions Family.