Cloud computing for mobile trauma care
Journal Title: International Journal of Computer Science & Engineering Technology - Year 2014, Vol 5, Issue 3
Abstract
Cloud computing is the newly evolved next generation’s technology , emphasizes on sharing and virtualization concept, caries a solution for providing more secured, economic on air services. Involves software, platform, infrastructure, testing etc, it is to help small medium corporate, government, somehow large enterprises for their short term temporary projects. It’s a better solution for distributed services. This paper is about use of cloud computing in the field of trauma care as a mobile trauma care ambulance, maintaining the doctor’s facilities for that as well as Datacenter and databases regarding patients. First, the paper describes the cloud computing, its structure and advantages, and then the trauma care solution
Authors and Affiliations
Shalini Verma
Enhancing The Security of Caesar Cipher Using Double Substitution Method
Cryptography comes from the Greek words for “secret writing”. The plain text is encrypted into the corresponding cipher text, using an algorithm and a key. Substitution and Transposition are two techniques used for conve...
An Efficient Node Authentication Scheme based on Elliptic Curve Cryptography for Wireless Sensor Networks
Recent technology advances in low-cost, low-power chip design have made the deployment of large-scale sensor networks economically feasible. Data forwarding algorithms and protocols have been among the first set of issue...
Security Scheme for Data Authentication Based on Elliptic Curve Cryptography
An encryption is providing authentication and security for illicit manipulation of digital data. In this paper the security scheme for authentication and secrecy of digital data through ElGamal public key cryptographic a...
A Review of various statestical methods for Outlier Detection
Outlier Detection has many applications. Outlier is instance of the data set which has exceptional characteristics compare to other instance of data and exhibits unusual behavior of the system. There are many methods use...
A Novel Authentication Protocol Based on Elliptic Curves
Authentication is the process of determining whether someone or something is, in fact, who or that it is declared to be. It is a client-server based protocol by which a server identifies the identity of a remote client w...