Access to Data : Comparing

نویسنده

  • ROBERT LEE
چکیده

Ob’ t’ Iec rve: To evaluate the performance of tools for authoring patient database

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Comparing the Moral Intelligence, Social Skills and Personality Characteristics of Normal and Internet Addicted Adolescence

Background: Internet access is a growing phenomenon. With increasing and widespread access to Internet, dependency to Internet is observed among the adolescents. The present research was done with the purpose of comparing the moral intelligence, social skills and personality characteristics of internet addicted adolescents with normal adolescents. Method: We used casual – comparative method. St...

متن کامل

تشخیص ناهنجاری روی وب از طریق ایجاد پروفایل کاربرد دسترسی

Due to increasing in cyber-attacks, the need for web servers attack detection technique has drawn attentions today. Unfortunately, many available security solutions are inefficient in identifying web-based attacks. The main aim of this study is to detect abnormal web navigations based on web usage profiles. In this paper, comparing scrolling behavior of a normal user with an attacker, and simu...

متن کامل

Role of small size -Credits Regarding Empowerment of Rural Women Case Study: Lakestan Sub- District Salmas of County

The empowerment of rural women and their involvement in decision making process is being considered as one of the prerequisite for achieving sustainable development. Access to small credit could well facilitate the empowerment mechanism. This study tries to answer the following question: Could access to small credit be influential on economic and psychological empowerment of women? The research...

متن کامل

Privacy Preserving Dynamic Access Control Model with Access Delegation for eHealth

eHealth is the concept of using the stored digital data to achieve clinical, educational, and administrative goals and meet the needs of patients, experts, and medical care providers. Expansion of the utilization of information technology and in particular, the Internet of Things (IoT) in eHealth, raises various challenges, where the most important one is security and access control. In this re...

متن کامل

A Method for Protecting Access Pattern in Outsourced Data

Protecting the information access pattern, which means preventing the disclosure of data and structural details of databases, is very important in working with data, especially in the cases of outsourced databases and databases with Internet access. The protection of the information access pattern indicates that mere data confidentiality is not sufficient and the privacy of queries and accesses...

متن کامل

Comparing Two Sports Injury Surveillance Systems: A Novel Systematic Approach

Purpose: The present study aimed to compare two sports injury surveillance systems per the sports injury recording system of the sports medicine federation. Methods: A sports injury surveillance system was implemented to collect injury data. Athletic trainers recorded athletes’ sports injuries in soccer, volleyball, handball, taekwondo, and wrestling for 6 months in their user account via a sm...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2000