A VEHICULAR HEALTHCARE SYSTEM USING ANYCAST AND PERVASIVE COMPUTING - One Pervasive Computing Application on Mobile Software and Services

2016 ◽  
Vol 7 (3) ◽  
Author(s):  
Danang Wahyu Utomo ◽  
Egia Rosi Subhiyakto

Abstract. Technology of pervasive computing can be applied in daily activities such as sport, education, game and public interest such as public health. In healthcare system, the issues about high cost and errors in reviewing of patient record are still a major topic for healthcare provider (hospital). The technology of pervasive computing was developed to address these issues. This study will discuss the technology to support healthcare system. The main purpose is that users need to know the technology and its characteristics in order to prevent fatal actions in its use. The integration of different kinds of technology such as mobile devices, wireless networks, sensors, and wearable technologies is able to give better healthcare service than the technology itself.  Keywords: Technology, Pervasive Healthcare System, Systematic Literature Review. Abstrak. Teknologi komputasi pervasif dapat diterapkan dalam aktifitas manusia mulai dari kebutuhan pribadi seperti olahraga, belajar, permainan dan kepentingan umum seperti kesehatan umum. Dalam sistem layanan kesehatan,isu tentang biaya yang tinggi, adanya kesalahan dalam review data pasien masih menjadi topik utama bagi penyedia layanan kesehatan (rumah sakit). Teknologi komputasi pervasif dikembangkan untuk mengatasi masalah tersebut. Dalam makalah ini akan dibahas mengenai teknologi dan karakteristiknya dalam mendukung sistem layanan kesehatan. Tujuan utama adalah pengguna harus mengetahui teknologi dan karakteristiknya agar tidak terjadi tindakan fatal dalam penggunaanya. Integrasi antar teknologi seperti mobile device, wireless network, sensor, dan wearable technologies mampu memberikan layanan kesehatan yang lebih baik dibanding teknologi itu sendiri.         Kata Kunci: Teknologi, Sistem Layanan Kesehatan Pervasif, Studi Literatur Sistematis.


2019 ◽  
Vol 1 (2) ◽  
pp. 25-33
Author(s):  
Mei Ling Phang ◽  
Swee Huay Heng

Information sharing has become prevalent due to the expansion of social networking in this 21st century. However, electronic devices are vulnerable to various kinds of attacks. Information might be disclosed, modified and accessed by an unauthorised third party which consequently leads to the breach of confidentiality, integrity and availability of the information. Therefore, it is of utmost importance to employ the technology of cryptography and steganography to protect information assets. Cryptography and steganography have weaknesses when they are working alone. Therefore, crypto-steganography, the combination of cryptography and steganography are introduced to overcome the weaknesses in order to provide a double layer of security and protection. This paper provides a general overview of steganography and cryptography as well as a comparison analysis of different crypto-steganographic schemes. A secure crypto-steganographic system for healthcare is then developed with the implementation and integration of the secure crypto-steganographic scheme proposed by Juneja and Sandhu. This healthcare system enables users to store and deliver message in a more secure way while achieving the main goals of both cryptography and steganography.


2017 ◽  
Author(s):  
Mohammed Shukur ◽  
Laith Fliah ◽  
Aram Abdulqadir
Keyword(s):  
Big Data ◽  

Sign in / Sign up

Export Citation Format

Share Document