Great Deal! Get Instant $10 FREE in Account on First Order + 10% Cashback on Every Order Order Now

Sample 1_Augmented Reality Reference in APA format Penza, V., Ortiz, J., Mattos, L. S., Forgione, A., & Momi, E. D XXXXXXXXXXDense soft tissue 3D reconstruction refined with super-pixel segmentation...

1 answer below »

Sample 1_Augmented Reality
    Reference in APA format
    Penza, V., Ortiz, J., Mattos, L. S., Forgione, A., & Momi, E. D XXXXXXXXXXDense soft tissue 3D reconstruction refined with super-pixel segmentation for robotic abdominal surgery. International Journal of Computer Assisted Radiology and Surgery, Volum 3, Issue 2, XXXXXXXXXX.
    URL of the Reference
    Level of Journal (Q1, Q2, …Qn)
    Keywords in this Reference
    DOI XXXXXXXXXX/s XXXXXXXXXX
    Journal Level: Q2
    Augmented reality, 3D surface reconstruction, Visualization, Depth estimation, Super pixel Segmentation
    The Name of the Cu
ent Solution (Technique/ Method/ Scheme/ Algorithm/ Model/ Tool/ Framework/ ... etc )
    The Goal (Purpose) of this Solution & What is the Problem that need to be solved
    What are the components of it?
     Techniques:
· Stereoscopic imaging
· 3D reconstruction
· Non-parametric modified census transformation
· Simple Linear Iterative Clustering (SLIC)
· (super pixel segmentation)
Tools:
CT Scan
OpenCV
Stereoscopic Cameras (288x360)
Applied Area:
Liver Surgery
    Problem: the author identified the problem in the complexity of minimally invasive surgery where surgeons are limited to movements and visualization of dense soft tissues accurately.
Purpose (Goal): to propose a system that will enhance intra-operative visualization by exploiting 3D information about the surgical site using SLIC refinement.
    Pre-Operation:
· CT Scan
· Extraction of organ models
· Creation of virtual environment
· Real-virtual camera cali
ation
During Surgery:
· Real-virtual patient registration
· Dense 3D reconstruction
    The Process (Mechanism) of this Work; Means How the Problem has Solved & Advantage & Disadvantage of Each Step in This Process
        
    Process Steps - Pre Operation
    Advantage
    Disadvantage (Limitation)
    1
    CT Scan
    
    
    2
    Extraction of 3D surface models
    
    
    3
    Real-virtual camera cali
ation
    Cali
ated using OpenCV Li
ary
It is able to remove artifacts from the images; thus enhancing quality.
    
    
    Process Steps - During Surgery
    Advantage
    Disadvantage (Limitation)
    1
    Semi-automatic registration of virtual environment on the real patient (not stated if uses machine learning). They use “virtual assistance system”
This semi-automatic registration is done using real-virtual camera plane and the view of the abdomen where it is possible to run the visualization.
    Produces the view of the model for visualization
    
    2
    Soft tissue 3D surface reconstruction
Composed of 2 different approaches in which the author called it “Method 1” and “Method 2”
    
    
    3
    Equalization
Histogram Equalization
Used as (equalizedHist) in OpenCV Li
ary.
Reconstruction Method 1 (Consists of 3 steps)
1. Matching Computation Cost
Absolute intensity Difference (AD)
Matching is done to determine the similarity of the intensity of the pixels of the left and right images to detect and eliminate e
ors.
2. Aggregation Cost Computation
Sum of Absolute Difference (SAD)
A function to combine these pixels into a more meaningful data set using sum of absolute difference.
3. Disparity Computation
Winner takes all strategy computation (WTA)
The disparity computation is responsible for validating the matched pixels on the surface by using winner takes all from the values.
Method 1 is a surface reconstruction technique which uses equalizations to improve the details within the surface area.
    Histogram Equalization – improves the contrast and enhances the details that are over or under exposed.
AD – To calculate the similarity between two pixels.
SAD – the sum of Absolute difference from the computed value in matching cost
WTA – used to find the minimum aggregation cost value at each pixel. Helps validate the co
ect pixels.
    Problems in disparity refinement can arise if the motion and tissue deformation is not identified.
    4
    Reconstruction Method 2 (3 main steps without equalization)
1. Matching cost computation
Non parametric census transform
Matching is done to determine the similarity of pixels of the images in a moving window for comparison.
2. Aggregation cost computation
Sum of Hamming Distance (SHD)
A function to combine these pixels into a more meaningful data set using sum of Hamming Distance.
3. Disparity Computation
The disparity computation is responsible for validating the matched pixels on the surface by using winner takes all from the values.
Method 2 is also a surface reconstruction which does not use equalization like method 1, but it uses NCT to track the moving pixels within the surface area.
    NCT – converts each pixel inside a moving window into a string of bits that represents neighbour pixels for comparison with central pixel and mean pixels within.
SHD – compares the bit of strings that represents the pixels and identifies the position to decrease the computational time of the algorithm.
    Problems in disparity refinement can arise if the motion and tissue deformation is not identified.
    5
    
The SLIC refinement is a Superpixels segmentation process where it fills the holes disparity map and produces better reconstructed images.
This method is applied after the initial disparity map is constructed then will be refined through this algorithm to fill the holes and create a more dense disparity map.
    SLIC provides better matched pixels because the disparity map will have less holes; thus, will provide better output for visualization in the AR.
    There is a trade-off between accuracy and computation time. SLIC adds about 0.1s in computation time but will increase the accuracy of matched pixels providing a dense disparity map.
    Major Impact Factors in this Work
    
    Dependent Variable
    Independent Variable
    Accuracy of e
or mapping
    Using 2 heart phantoms(Method 2 with SLIC refinement which is most accurate), it was able to achieve an accuracy in disparity e
or mapping of :
Heart 1 – 1.75mm
Heart 2 – 1.79mm
    Processing time (computational time)
    1.29s / frame and 1.30s / frame (using image resolution of 288x360)
SLIC refinement adds about 0.1s for both heart phantoms.
    Depth Perception (pixels matching)
    Using 2 heart phantoms(Method 2 with SLIC refinement), it was able to match pixels with the percentage of :
Heart 1 – 72.6% matched pixels
Heart 2 – 66.5% matched pixels
    
    Input and Output
    Feature of This Solution
    Contribution & The Value of This Work
    
    Input - Pre Operation
    Output - Pre Operation
    CT Scan Data
    Preoperative 3D model

    Input - During Surgery
    Output - During Surgery
    3D model
    AR view
    
This proposed enhanced system was able to provide accurate results which was able to address, instrument interaction with tissue,
eathing, heartbeat using depth estimation methods (real-time 3D reconstruction with Superpixels refinements).
The most notable feature in this system is the ability to create a 3D reconstruction of the preoperative model while in the intraoperative considering other factors such movements, and deformations. This enables better visualizations for the surgeon as they are aware of real-time happenings within the surgery as there are always uncertainty that can happen which are not planned.
    
The main contribution of this method is to be able to provide a “virtual assistive system” in which it is able to do 3D reconstructions which overcomes the limitations of the state of the arts limitation. Reconstructing the soft tissues in real-time will provide better visualization for the surgeons as they will see deformations happening and will update based from the previous frame and not the original CT data. Though the main contribution of the paper is within the segmentations refinement method which is SLIC refinements where it fills the holes of the disparity map by matching the pixels to form a better disparity map that will be inserted in the virtual environment.
    1. what in the method could have been better?
    2. what in the author analyses were missed?
    3. was there a technique that could have been used, or a question that could have been asked, that the researchers did not use or ask?
    
Based on the proposed method, the segmentation phase that does the disparity map refinement added on the computational time. There have been modifications within the SLIC algorithm that increases computational speed and accuracy with pixel matching; thus would improve the overall refinement and the accuracy of the system.
    Surgical tools may be a hindrance to this proposed solution since large occlusions may cause the 3D reconstruction not to identify the soft tissue or deformation accurately since it relies on the previous data and not the preoperative data.
     Occlusion handling could be addressed in a form of additional technique or integrate a system that would address the tools such as geometric aware systems where in would register the tools in the preoperative phase.
    4. were the conclusion justified and How?
    Analyse This Work By Critical Thinking
    The Tools That Assessed this Work
    The conclusions were justified since the main goal of the proposed system is to enhance visualization of the state of the art by proposing 3D reconstruction methods to defeat the static nature of preoperative CT scans. The used a novel SLIC refinement algorithm to enhance the accuracy of the images in terms of disparity maps that will be used in the virtual environment. They were also able to provide suggestions to improve their system, such stating that they would use a GPU based workstation.
    The proposed system was able to overcome common problems of AR systems in which it relies heavily on pre-operative data. This solution uses dense 3D reconstruction so that it is able to handle soft tissue deformations happening in real-time. They also use SLIC refinement to improve the accuracy which increased the matched pixels of the disparity map outputs by up to 70% compared to the non-refined disparity maps(images).
However, there are still limitations to this system. It focuses mainly on reconstructing the soft tissue deformations but given if there are large occlusions(tools) within the area of the reconstructions, it will not be able to accurately reconstruct the tissue which is changing. This can be solved by using geometrically aware systems which seen in other proposed methods within AR.
     The experiment was ca
ied out using phantoms hearts where there are 2 methods involved that uses 3D reconstructions. Method 1 with SLIC refinement was able to provide 3.11mm and 72.6% matched pixels within 1.21s.
Method 2 with SLIC refinement was able to achieve even better results with 1.75mm and 72.6% matched pixels within 1.29s.
Sample 2_Networking
    Reference in APA format
    Wu, J., Cheng, B., Wang, M., & Chen, J XXXXXXXXXXPriority-Aware FEC Coding for High-Definition Mobile Video Delivery Using TCP. IEEE Transactions On Mobile Computing, 16(4), XXXXXXXXXX.
    URL of the Reference
    Level of Journal (Q1, Q2, …Qn)
    Keywords in this Reference
    http:
ieeexplore.ieee.org.ezproxy.csu.edu.a u/stamp/stamp.jsp?amumber=7498667 
    Q2
    · High definition mobile video 
· TCP
· Stringent delay constraint
· Forward e
or co
ection
· Priority-awareness
· Wireless networks
    The Name of the Cu
ent Solution (Technique/ Method/ Scheme/ Algorithm/ Model/ Tool/ Framework/ ... etc )
    The Goal (Purpose) of this Solution & What is the Problem that need to be solved
    What are the components of it?
    Techniques:
Priority Aware and TCP Oriented coding (PATON)
    Problem: delivering HD video using TCP over wireless network seems challenging because of high transmission rate and stringent delay constraint of HD video, bandwidth limited and e
or prone wireless network, and the retransmission scheme of TCP that causes delay.
Goal:
Answered Same Day Aug 12, 2020

Solution

Amit answered on Aug 14 2020
140 Votes
cloud computing with AES encryption for Health secto
(
18
cloud
computing with AES encryption for Health secto
)
Table of contents
1) Journal 1
2) Journal 2
3) Journal3
4) Journal 4
5) Journal 5
6) Journal 6
7) Journal 7
8) Journal 8
9) Journal 9
10) Journal 10
11) Journal 11
12) Journal12
13) Journal 13
14) Journal 14
15) Journal15
16) Journal 16
17) Journal 17
18) Journal 18
19) Journal 19
20) Journal 20
    Version 1.0 _ Week 1 (5 Journal Papers from CSU Li
ary)
    1.
    Reference in APA format that will be in 'Reference List'
    Babitha,M.P. & Babu Ramesh, K.R.(2016). Secure cloud storage using AES encryption
    Citation that will be in the content
    
    URL of the Reference
    Level of Journal (Q1, Q2, …Qn)
    Keywords in this Reference
    
https:
ieeexplore.ieee.org/document/7877709/keywords
     Q1
    Cloud Computing
AES Encryption
Data security
    The Name of the Cu
ent Solution (Technique/ Method/ Scheme/ Algorithm/ Model/ Tool/ Framework/ ... etc )
    The Goal (Objective) of this Solution & What is the Problem that need to be solved
    What are the components of it?
    Technique/Algorithm name:
Secure cloud storage using AES encryption
Tools:
Advanced Encryption standard
Applied Area:
La
Medical
Hospital
    Problem: due to the multiple users and multiple user, data accessibility and privacy is very crucial. So there is a need to cloud data before encrypted.
Goal: data is secured by encryption. The advanced encryption standard performed both encryption and decryption process. The main goal is to make data secure and scalable while patient centric.
    
Cloud serve
Personal Health Records
Personal Doctor, Family, Friends
Emergency department
    The Process (Mechanism) of this Work; The process steps of the Technique/system
    
    
    Process Steps
    Advantage (Purpose of this step)
    Disadvantage (Limitation/Challenge)
    1
    Initially attribute is selected by owner and then provide access right in public domain. File encrypted with AES and ABS and data stored on cloud server. User request data from cloud server. After that access key is provide to emergency department by owner.
    Data encrypted: specific data of a patient share with doctor but others are not able to see information
    Security issue: the uploaded data in the cloud can be modified and tempered.
    2
    AES is more suitable in encryption. ABS is more expensive. So data encrypted with AES 128 key and again data decrypted with AES 128.
    Improved Processing time.
    
    3
    The encrypted data and encrypted data key both are stored on cloud server.
    Improved performance.
    
    4
    Data of patient records stored on cloud server by using AES technique. Data is more secure and privte.
    Secured privacy
    
    5
    
    
    
    Validation Criteria (Measurement Criteria)
    
    Dependent Variable
    Independent Variable
    Attributes
    Access keys
    
    Delegates Keys
    
     Encrypted data using AES
    
    Processing time
    
    
    
    
    
    Input and Output
    Critical Thinking: Feature of this work, and Why (Justify)
    Critical Thinking: Limitations of the research cu
ent solution, and Why (Justify)
        Input (Data)
    Output (View)
    AES encrypted data
    X-RAy
     It have Data Privacy and security of Electronic health records(EHR) on cloud server.
    Data hacking is the main limitation of this research.
    (Describe the research/cu
ent solution)
    Evaluation Criteria
    How this research/cu
ent solution is valuable for your project
    There are several cryptographic algorithm are used for encryption of data. The privacy of data is secured by using AES. These algorithms are symmetric and asymmetric.
    AES technique
    This solution is more useful in Health sector. Data privacy and security on cloud by using AES. Cloud computing is used for control, manage and access data.
    Diagram/Flowchart
    
    2.
    Reference in APA format that will be in 'Reference List'
    Bouchti, A.E., Bahsani,S. & Nahhal,T.(2016). Encryption as a service for data healthcare cloud security.  2016 Fifth International Conference on Future Generation Communication Technologies (FGCT)
    Citation that will be in the content
    Bouchti,2016
    URL of the Reference
    Level of Journal (Q1, Q2, …Qn)
    Keywords in this Reference
    
https:
ieeexplore.ieee.org/document/7605072
    Q1
    Data healthcare cloud security services
Encryption algorithm
    The Name of the Cu
ent Solution (Technique/ Method/ Scheme/ Algorithm/ Model/ Tool/ Framework/ ... etc )
    The Goal (Objective) of this Solution & What is the Problem that need to be solved
    What are the components of it?
    Technique/Algorithm name:
Encryption as a service for data healthcare cloud security
Tools:
Cryptography
Attributes based encryption
Applied Area:
Health secto
    Problem: the main problem is privacy. Patients do not want to share data to any other accepts doctor.
Goal: the main goal is data privacy and security. The heath information of patient is stored on cloud.
    
Personal domain
Public domain
Cloud serve
Emergency staff
Public health records
Emergency department
    The Process (Mechanism) of this Work; The process steps of the Technique/system
    
    
    Process Steps
    Advantage (Purpose of this step)
    Disadvantage (Limitation/Challenge)
    1
    Initially attributes are selected by PHR owner. Access key is provided the user by owner then file are encrypted with AES and after that data store on cloud server. Then data is access by user from cloud server. For future purpose, the access key is assigned to emergency department by PHR owner.
    Improved performance
    Security issue
    2
    AES(Advance Encryption standarad) is algorithm to encrypted and decrypt information. In encryption process, the number of rounds are:
For AES128 is 10
ForAES192 is 12
For AES256 is 14
    Improved privacy
    Lengthy process
    3
    The functions are executed by major loop of AES. The function of AES:
SubBytes()
ShiftRows()
MixColumns()
AddRoundKey()
After repeated transformation rounds, it makes data secure on cloud.
    
    Technical issues
    4
    
    
    
    5
    
    
    
    Validation Criteria (Measurement Criteria)
    
    Dependent Variable
    Independent Variable
    Attributes
    Access keys
    
    Data request from cloud
    
    Data access from cloud
    
    
    
    
    
    
    
    Input and Output
    Critical Thinking: Feature of this work, and Why (Justify)
    Critical Thinking: Limitations of the research cu
ent solution, and Why (Justify)
        Input (Data)
    Output (View)
    Encrypted data
    DNA
    It provides security and privacy to data and stored on cloud by AES technique in health sector.
    Data security and data privacy
    (Describe the research/cu
ent solution)
    Evaluation Criteria
    How this research/cu
ent solution is valuable for your project
    
Here data is encrypted by cryptographic algorithms. These algorithms are symmetric or asymmetric. AES and DES are symmetric. Performances of these algorithms are different.
     Attribute based Encryption
Advanced Encryption standard
    This research provides privacy and security to the data in heath sector. Technique may be different but data stored and accessed from cloud.
    Diagram/Flowchart
    
    3.
    Reference in APA format that will be in 'Reference List'
    Josephius Arunkumar,R. & Anbuselvi, R.(2017). Eahancement of cloud computing security in healthcare sector. IJCSMC, Vol. 6, Issue. 8, August 2017, pg.23 – 31
    Citation that will be in the content
    Josephius,2017
    URL of the Reference
    Level of Journal (Q1, Q2, …An)
    Keywords in this Reference
    
https:
www.ijcsmc.com/docs/papers/August2017/V6I8201705.pdf
    Q2
    Electronic Health record
Cloud environment
    The Name of the Cu
ent Solution (Technique/ Method/ Scheme/ Algorithm/ Model/ Tool/ Framework/ ... etc )
    The Goal (Objective) of this Solution &What is the Problem that need to be solved
    What are the components of it?
    Technique/Algorithm name: Eahancement of cloud computing security in healthcare secto
Tools: AES
Applied Area:
Patients Health
Hospital
    Problem: the problem of data privacy and data security. Now data is centralised due to cloud computing technology.
Goal: the key facility of cloud computing provide the security to data. Three main points are covered by data security’s goal: Integrity, availability and confidentially.
    Electronic Health record
Data owne
Data use
Encrypted data
Cloud storage
Sequence key
    The Process (Mechanism) of this Work; The process steps of the Technique/system
    
    
    Process Steps
    Advantage (Purpose of this step)
    Disadvantage (Limitation/Challenge)
    1
    Cloud computing architecture divided into two sections: back end and front end. Client application and computer comprises in front end. Server and data storage at back end. Network computer communicates each other through middleware and protocols.
    Reduced cost
    Security issues
    2
    Patient complete healthcare report stored on cloud computing. Some private data stored in image form. For extra care image converted into pixels and encrypted into pixels.
    Improved performance
    Technical issues
    3
    Encryption is done through technique advance encryption standard (AES). Cryptography is important method to secure data on cloud
    Increased processing time
    
    4
    Symmetric and asymmetric algorithm is providing by cryptography to secure data.
    Provide privacy
    
    5
    Symmetric cryptography algorithm is known as AES.
    
    
    Validation Criteria (Measurement Criteria)
    
    Dependent Variable
    Independent Variable
    Hy
id cloud
    Central serve
    
    Protocols
    
    Data encryption
    
    
    
    
    
    
    
    Input and Output
    Critical Thinking: Feature of this work, and Why (Justify)
    Critical Thinking: Limitations of the research cu
ent solution, and Why (Justify)
        Input (Data)
    Output (View)
    3D Model
    CT Scan
    Feature of this work is mainly provided security and privacy to the data which is related to patients’ health and stored that data on cloud.
    There is a chance of data hacking in this research cu
ent solution. This is limitation of it.
    (Describe the research/cu
ent solution)
    Evaluation Criteria
    How this research/cu
ent solution is valuable for your project
     Cloud service models include platform as a service, software as a service and infrastructure as a service. There is no need of direct communication for health records’ transfers.
    Technique:AES
    The importance of this research to encrypting important data and centralized data in heath sector.
    Diagram/Flowchart
    
    4.
    Reference in APA format that will be in 'Reference List'
    Luxton, D. D., Kayl, R. A., & Mishkind, M. C. (2012). mHealth data security: The need for HIPAA-compliant standardization. Telemedicine and e-Health, 18(4), 284-288.
    Citation that will be in the content
    Luxton, 2012
    URL of the Reference
    Level of Journal (Q1, Q2, …An)
    Keywords in this Reference
    
https:
www.liebertpub.com/doi/abs/10.1089/tmj.2011.0180
    Q2
    mHealth record
HIPPA
    The Name of the Cu
ent Solution (Technique/ Method/ Scheme/ Algorithm/ Model/ Tool/ Framework/ ... etc )
    The Goal (Objective) of this Solution &What is the Problem that need to be solved
    What are the components of it?
    Technique/Algorithm name: Eahancement the security of health record by making use of HIPPA
Tools: HIPPA
Applied Area:
mPatients Health
Health insurance
    Problem: The use of wireless devices can cause data privacy issues. The implementation of HIPPA with cloud can solve this issue.
Goal: The security of wireless devices used on cloud is main goal. For archiving this goal HIPPA is being implemented.
    mHealth record
HIPPA
Security requirements in wireless cloud storage
Sequence key
    The Process (Mechanism) of this Work; The process steps of the Technique/system
    
    
    Process Steps
    Advantage (Purpose of this step)
    Disadvantage (Limitation/Challenge)
    1
    Cloud computing architecture can be used on wireless mobile devices for accessing the health care records. The cloud services can be used for storing and accessing the records. Network mobile device communicates each other through middleware and protocols.
    Reduced data accessing cost
    Security issues to mdata
    2
    Complete records of healthcare report stored on cloud computing. Encryption is implemented on cloud stored data.
    Overall performance is increased
    Technical issues
    3
    The advance encryption standard (AES) and HIPPA are used for mobile data encryption. HIPPA is providing support to AES.
    Increased processing time
    
    4
    For secure mdata HIPPA is best solution to cloud.
    Provide improved security
    
    5
    Cloud data access on mobile devices is known as mdata.
    
    
    Validation Criteria (Measurement Criteria)
    
    Dependent Variable
    Independent Variable
    Mobile devices
    mdata
    
    HIPPA
    
    Data encryption
    
    
    
    
    
    
    
    Input and Output
    Critical Thinking: Feature of this work, and Why (Justify)
    Critical Thinking: Limitations of the research cu
ent solution, and Why (Justify)
        Input (Data)
    Output (View)
    3D Model
    Secured data on wireless devices
    The implementation of HIPPA provides additional security to hy
id cloud which increases the overall security of mdata.
    The increased cost due to implementation of HIPPA is its limitation.
    (Describe the research/cu
ent solution)
    Evaluation Criteria
    How this research/cu
ent solution is valuable for your project
    The hy
id Cloud service models include HIPPA and mobile data on wireless devices. The patient records can be accessed from any wireless devices at anywhere.
    Technique: AES and HIPPA
    The importance of this research to implement HIPPA to increase security of mobile data of health care area stored on hy
id cloud.
    Diagram/Flowchart
    
    5.
    Reference in APA format that will be in 'Reference List'
    Yang, J. J., Li, J. Q., & Niu, Y. (2015). A hy
id solution for privacy preserving medical data sharing in the cloud environment. Future Generation Computer Systems, 43, 74-86..
    Citation that will be in the content
    Yang, 2015
    URL of the Reference
    Level of Journal (Q1, Q2, …An)
    Keywords in this Reference
    https:
www.sciencedirect.com/science/article/pii/S0167739X14001253
    Q2
    Medical records
Cloud storage
    The Name of the Cu
ent Solution (Technique/ Method/ Scheme/ Algorithm/ Model/ Tool/ Framework/ ... etc )
    The Goal (Objective) of this Solution &What is the Problem that need to be solved
    What are the components of it?
    Technique/Algorithm name: Eahancement the security of medical records by making use of integrity check.
Tools: AES
Applied Area:
Medical records
Data sharing for medical records
    Problem: The use of hy
id cloud for sharing the medical records can cause data privacy issues. The implementation of cryptography with cloud can solve this issue.
Goal: The security of medical data stored on hy
id cloud is main goal. For archiving this goal encryption is being implemented.
    Medical records
Integrity checks
Security requirements on hy
id cloud for medical records
Statistical analysis
    The Process (Mechanism) of this Work; The process steps of the Technique/system
    
    
    Process Steps
    Advantage (Purpose of this step)
    Disadvantage (Limitation/Challenge)
    1
    The policy, privacy statics and privacy cryptography are the main process steps for implementing Cloud computing architecture and encryption protocols on health care records.
    Reduced operational cost
    Security issues to health care databases stored on hy
id cloud.
    2
    Complete records of healthcare report are merged and integrity checks are ca
ied out.
    Overall performance is increased
    Technical issues
    3
    The hy
id search of plan text in cipher text is completed.
    Increased data accessing time.
    
    4
    A protocol based system for improved security on medical data is implemented.
    Provide improved security
    
    5
    An effective extensive experiment is ca
ied out.
    
    
    Validation Criteria (Measurement Criteria)
    
    Dependent Variable
    Independent Variable
    Hy
id cloud
    Health care data.
    
    integrity checks
    
    Data encryption
    
    Protocol based system implementation
    
    
    
    
    
    Input and Output
    Critical Thinking: Feature of this work, and Why (Justify)
    Critical Thinking: Limitations of the research cu
ent solution, and Why (Justify)
        Input (Data)
    Output (View)
    Health care data for merging on hy
id cloud.
    Protocol based secured data as output.
    The implementation of protocol based system on hy
id cloud for medical databases provides additional security to hy
id cloud which increases the overall security of medical data.
    The implementation cost is increased due to implementation of protocol based system, is its limitation.
    (Describe the research/cu
ent solution)
    Evaluation Criteria
    How this research/cu
ent solution is valuable for your project
    The hy
id Cloud service models include protocol based system and merged health care data on hy
id cloud. The patient records can be accessed by providing the decryption key only.
    Technique: AES
    The importance of this research to implement protocol based system to increase security of health care data stored on hy
id cloud.
    Diagram/Flowchart
    
    6.
    Reference in APA format that will be in 'Reference List'
    Fabian, B., Ermakova, T., & Junghanns, P. (2015). Collaborative and secure sharing of healthcare data in multi-clouds. Information Systems, 48, 132-150.
    Citation that will be in the content
    Fabian, 2015
    URL of the Reference
    Level of Journal (Q1, Q2, …An)
    Keywords in this Reference
    https:
www.sciencedirect.com/science/article/pii/S030643791400088X
    Q2
    Collaborative Medical records with improved security
Multi-Cloud storage
    The Name of the Cu
ent Solution (Technique/ Method/ Scheme/ Algorithm/ Model/ Tool/ Framework/ ... etc )
    The Goal (Objective) of this Solution &What is the Problem that need to be solved
    What are the components of it?
    Technique/Algorithm name: Eahancement the security of medical records by implementation of big data with multi-cloud storage.
Tools: AES
Applied Area:
Big data
Multi-cloud for health records.
    Problem: The use of multi-cloud for implementing big data on the medical records can cause data privacy issues. The implementation of cryptography on big data and multi-cloud can solve this issue.
Goal: The security of medical data stored on big data and multi-cloud is main goal. For archiving this goal encryption is being implemented.
    Medical records
Big data
Secret sharing of health care records
Multi-cloud
    The Process (Mechanism) of this Work; The process steps of the Technique/system
    
    
    Process Steps
    Advantage (Purpose of this step)
    Disadvantage (Limitation/Challenge)
    1
    The big data like HADOOP is implemented on multi-clouds for storing health care records.
    Improves data storage capabilities.
    Security issues to health care databases stored on multi-clouds and big data.
    2
    Complete records of healthcare report are placed on big data and integrity checks on multi-clouds are ca
ied out.
    Overall performance is increased
    
    3
    Architecture for big data sharing for improved security is implemented.
    Increased data accessing time.
    
    4
    A secret sharing system for improved security on medical data is implemented.
    Provide improved security
    
    5
    A demonstration of physical feasibility is ca
ied out.
    
    
    Validation Criteria (Measurement Criteria)
    
    Dependent Variable
    Independent Variable
    Multi-cloud
    Health care data.
    Big data
    Secret sharing
    
    Data encryption architecture on big data
    
    Architecture based system implementation
    
    
    
    
    
    Input and Output
    Critical Thinking: Feature of this work, and Why (Justify)
    Critical Thinking: Limitations of the research cu
ent solution, and Why (Justify)
        Input (Data)
    Output (View)
    Health care data on big data and multi-clouds.
    Architecture based secured data as output.
    The implementation of architecture based system on multi-cloud...
SOLUTION.PDF

Answer To This Question Is Available To Download

Related Questions & Answers

More Questions »

Submit New Assignment

Copy and Paste Your Assignment Here