Health Auditing Scheme Utilizing Electrocardiogram
نویسندگان
چکیده
منابع مشابه
Micropayment Scheme with Distributed Probabilistic Auditing
Micropayment systems are electronic payment systems that are used for very small payment and for their viability must have small transaction cost. In this paper we propose a coin-based micropayment scheme that uses a probabilistic fraud checking with distributed verification to provide an efficient solution to detect double spending by malicious customers and hence reduces the risk on the merch...
متن کاملCloud Data Security using Auditing Scheme
Cloud computing has emerged as one of the latest computing paradigm and is a growing technology for upcoming years. According to NIST Cloud computing is a model for convenient, on-demand network access to a large pool of computing resources. Resource can be hardware or software resource and this pool of resources can be rapidly provisioned and released with minimum management effort or cloud se...
متن کاملA Co-payment Auditing Scheme For Financial Misreporting
The innovative idea of introducing a third party (Ronen,2002) into the agency relationship has motivated our proposal of a co-payment scheme as a solution to financial misreporting. In the co-payment scheme, both the client firm and a third party such as FASB are asked to share the auditing fee. We will demonstrate that the participation of a third party can create an endogenous collusion cost ...
متن کاملEfficient Electrocardiogram (ECG) Lossy Compression Scheme For Real Time e-Health Monitoring
E-health monitoring is adopted to solve multiple problems such as: difficult access to hospitals, health monitoring of old patients ... Several operations slow down the e health systems, the most important one is the signal compression / decompression step. In this paper we present a new algorithm for compression / decompression of the ECG vital signal. The complexity of the proposed algorithm ...
متن کاملA Metadata Verification Scheme for Data Auditing in Cloud Environment
Cloud, being the most vulnerable next generation architecture consists of two major design elements i.e. the cloud service provider and the client. The architecture shifts data, applications and development environments to large data centers thereby providing storage, software and platform services online. The notion on verifying data for intactness is termed as data auditing and the process is...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Communications on Applied Electronics
سال: 2015
ISSN: 2394-4714
DOI: 10.5120/cae2015651752