Health Auditing Scheme Utilizing Electrocardiogram

نویسندگان
چکیده

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Micropayment Scheme with Distributed Probabilistic Auditing

Micropayment systems are electronic payment systems that are used for very small payment and for their viability must have small transaction cost. In this paper we propose a coin-based micropayment scheme that uses a probabilistic fraud checking with distributed verification to provide an efficient solution to detect double spending by malicious customers and hence reduces the risk on the merch...

متن کامل

Cloud Data Security using Auditing Scheme

Cloud computing has emerged as one of the latest computing paradigm and is a growing technology for upcoming years. According to NIST Cloud computing is a model for convenient, on-demand network access to a large pool of computing resources. Resource can be hardware or software resource and this pool of resources can be rapidly provisioned and released with minimum management effort or cloud se...

متن کامل

A Co-payment Auditing Scheme For Financial Misreporting

The innovative idea of introducing a third party (Ronen,2002) into the agency relationship has motivated our proposal of a co-payment scheme as a solution to financial misreporting. In the co-payment scheme, both the client firm and a third party such as FASB are asked to share the auditing fee. We will demonstrate that the participation of a third party can create an endogenous collusion cost ...

متن کامل

Efficient Electrocardiogram (ECG) Lossy Compression Scheme For Real Time e-Health Monitoring

E-health monitoring is adopted to solve multiple problems such as: difficult access to hospitals, health monitoring of old patients ... Several operations slow down the e health systems, the most important one is the signal compression / decompression step. In this paper we present a new algorithm for compression / decompression of the ECG vital signal. The complexity of the proposed algorithm ...

متن کامل

A Metadata Verification Scheme for Data Auditing in Cloud Environment

Cloud, being the most vulnerable next generation architecture consists of two major design elements i.e. the cloud service provider and the client. The architecture shifts data, applications and development environments to large data centers thereby providing storage, software and platform services online. The notion on verifying data for intactness is termed as data auditing and the process is...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Communications on Applied Electronics

سال: 2015

ISSN: 2394-4714

DOI: 10.5120/cae2015651752