The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Intelligent networks have developed rapidly in various fields of the world today. As a popular network technology, they have broad application prospects in the fields of telemedicine and health monitoring. The application of this technology has important practical significance for solving many aspects of medical treatment. Aiming at the encryption scheme of fuzzy keyword search and the verifiable...
Outlier detection is an important research problem in data mining and image analysis. In this paper, the ideas in the PageRank algorithm are borrowed to construct a novel outlier detection method. In this method, three detecting stages are performed to detect three different types of outliers by using different detecting strategies. The whole process is called tri-stage detection. Effectiveness of...
With the fast development of information and communication technologies over the past decade, Healthcare Information Technology (HIT) has been widely implemented for health stakeholders to access, modify, share Electronic Health Records (EHR) with a low cost of the facility, data and application maintenance. Due to the high value of healthcare data and lack of investment in cyber security, vulnerabilities...
This paper introduces an autonomic model-based cyber security management approach for the Internet of Things (IoT) ecosystems. The approach aims at realizing a self-protecting system, which has the ability to autonomously estimate, detect, and react to cyber attacks at an early stage. Our approach integrates various model-based techniques including: 1) real-time estimation and baseline security controls...
Data centers and computing service providers are striving to improve the utilization of their computing resources. This is primarily due to the need of resources to be more economical and power efficient. Virtualization is one of the concepts that provide flexibility to host multiple operating system stacks on a single hardware. By effectively partitioning the computing resources, it reduces the total...
The reform and exploration of the new rural social pension insurance system, have promoted the improvement of social pension insurance system. In the process to policy implementation, regional economic and cultural differences make policy implementation different. This comparative analysis will be used to the new rural social pension insurance system of the central regions. Western regions and East...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.