Knowledge Based Systems for Ubiquitous e-Healthcare

被引:0
|
作者
Ahmed, Shaftab [1 ]
机构
[1] Bahria Univ, Software Engn Dept, Islamabad, Pakistan
来源
2014 INTERNATIONAL CONFERENCE ON WEB AND OPEN ACCESS TO LEARNING (ICWOAL) | 2014年
关键词
KBS; m-Health; u-Health; DSS; Cloud; EMR; Sky-computing;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
ICT developers have been able to make significant progress in achieving the goal to deliver ubiquitous solutions in internet domain through cloud services architecture. Social networking through mobiles, PDAs, Laptops and other systems has become a norm of modern culture. Knowledge based systems available over the internet have assumed importance for data mining and presentation services for decision support systems. E-Healthcare solutions supported by KBS are often desired by medical professionals and the patients; hence the developers eye an important software development opportunity. A model KBS system for development and testing of evolving m-Health and u-Health paradigms has been presented. The location aware applications acceptable for social networking with access to CSPs and home offices has become a market niche; we have discussed ongoing and projected future developments in ICT industry to cater for mobility of users and desire to remain connected all the time, anywhere. The growing industry towards a collaborative cloud architecture called Sky computing has been discussed. The key to wide acceptability of these developments is the growing confidence of end user through credible service level agreements being offered with guarantees of major ICT players. However a lot has to be done to include provenance and verifiability of service provider to the client satisfaction.
引用
收藏
页数:5
相关论文
共 50 条
  • [1] Blind Signatures Based Secured E-Healthcare System
    Vora, Jayneel
    Devmurari, Parth
    Tanwar, Sudeep
    Tyagi, Sudhanshu
    Kumar, Neeraj
    Obaidat, M. S.
    2018 INTERNATIONAL CONFERENCE ON COMPUTER, INFORMATION AND TELECOMMUNICATION SYSTEMS (IEEE CITS 2018), 2018, : 177 - 181
  • [2] Detection of Insider Attacks in Cloud based e-Healthcare Environment
    Garkoti, Gaurav
    Peddoju, Sateesh K.
    Balasubramanian, R.
    2014 INTERNATIONAL CONFERENCE ON INFORMATION TECHNOLOGY (ICIT), 2014, : 195 - 200
  • [3] A robust and lightweight secure access scheme for cloud based E-healthcare services
    Mehedi Masud
    Gurjot Singh Gaba
    Karanjeet Choudhary
    Roobaea Alroobaea
    M. Shamim Hossain
    Peer-to-Peer Networking and Applications, 2021, 14 : 3043 - 3057
  • [4] A robust and lightweight secure access scheme for cloud based E-healthcare services
    Masud, Mehedi
    Gaba, Gurjot Singh
    Choudhary, Karanjeet
    Alroobaea, Roobaea
    Hossain, M. Shamim
    PEER-TO-PEER NETWORKING AND APPLICATIONS, 2021, 14 (05) : 3043 - 3057
  • [5] Prototype Design and Experimental Evaluation e-Healthcare System based on Molecular Analysis Devices
    Zakharov, Maxim
    Paramonov, Alexander
    Muthanna, Ammar
    Kirichek, Ruslan
    INTERNATIONAL JOURNAL OF ADVANCED COMPUTER SCIENCE AND APPLICATIONS, 2021, 12 (08) : 52 - 59
  • [6] Privacy Preservation in e-Healthcare Environments: State of the Art and Future Directions
    Sahi, Muneeb Ahmed
    Abbas, Haider
    Saleem, Kashif
    Yang, Xiaodong
    Derhab, Abdelouahid
    Orgun, Mehmet A.
    Iqbal, Waseen
    Rashid, Imran
    Yaseen, Asif
    IEEE ACCESS, 2018, 6 : 464 - 478
  • [7] Assessment of Ubiquitous Healthcare Information Systems Benefits
    Montazemi, Ali Reza
    Pittaway, Jeff J.
    Qahri-Saremi, Hamed
    AMCIS 2010 PROCEEDINGS, 2010,
  • [8] Remote Pain Monitoring Using Fog Computing for e-Healthcare: An Efficient Architecture
    Hassan, Syed Rizwan
    Ahmad, Ishtiaq
    Ahmad, Shafiq
    Alfaify, Abdullah
    Shafiq, Muhammad
    SENSORS, 2020, 20 (22) : 1 - 21
  • [9] Edge computing for Internet of Things: A survey, e-healthcare case study and future direction
    Ray, Partha Pratim
    Dash, Dinesh
    De, Debashis
    JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2019, 140 : 1 - 22
  • [10] Enhancing E-Healthcare Data Privacy Through Efficient Dual Signature on Twisted Edwards Curves Encryption Decryption
    Farhat, Suryya
    Kumar, Manoj
    Srivastava, Anshul
    Bisht, Shilpi
    Rishiwal, Vinay
    Yadav, Mano
    SECURITY AND PRIVACY, 2025, 8 (01):