Access to Data : Comparing
نویسنده
چکیده
Ob’ t’ Iec rve: To evaluate the performance of tools for authoring patient database
منابع مشابه
Comparing the Moral Intelligence, Social Skills and Personality Characteristics of Normal and Internet Addicted Adolescence
Background: Internet access is a growing phenomenon. With increasing and widespread access to Internet, dependency to Internet is observed among the adolescents. The present research was done with the purpose of comparing the moral intelligence, social skills and personality characteristics of internet addicted adolescents with normal adolescents. Method: We used casual – comparative method. St...
متن کاملتشخیص ناهنجاری روی وب از طریق ایجاد پروفایل کاربرد دسترسی
Due to increasing in cyber-attacks, the need for web servers attack detection technique has drawn attentions today. Unfortunately, many available security solutions are inefficient in identifying web-based attacks. The main aim of this study is to detect abnormal web navigations based on web usage profiles. In this paper, comparing scrolling behavior of a normal user with an attacker, and simu...
متن کاملRole of small size -Credits Regarding Empowerment of Rural Women Case Study: Lakestan Sub- District Salmas of County
The empowerment of rural women and their involvement in decision making process is being considered as one of the prerequisite for achieving sustainable development. Access to small credit could well facilitate the empowerment mechanism. This study tries to answer the following question: Could access to small credit be influential on economic and psychological empowerment of women? The research...
متن کاملPrivacy Preserving Dynamic Access Control Model with Access Delegation for eHealth
eHealth is the concept of using the stored digital data to achieve clinical, educational, and administrative goals and meet the needs of patients, experts, and medical care providers. Expansion of the utilization of information technology and in particular, the Internet of Things (IoT) in eHealth, raises various challenges, where the most important one is security and access control. In this re...
متن کاملA Method for Protecting Access Pattern in Outsourced Data
Protecting the information access pattern, which means preventing the disclosure of data and structural details of databases, is very important in working with data, especially in the cases of outsourced databases and databases with Internet access. The protection of the information access pattern indicates that mere data confidentiality is not sufficient and the privacy of queries and accesses...
متن کاملComparing Two Sports Injury Surveillance Systems: A Novel Systematic Approach
Purpose: The present study aimed to compare two sports injury surveillance systems per the sports injury recording system of the sports medicine federation. Methods: A sports injury surveillance system was implemented to collect injury data. Athletic trainers recorded athletes’ sports injuries in soccer, volleyball, handball, taekwondo, and wrestling for 6 months in their user account via a sm...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2000