Zobrazeno 1 - 10
of 13
pro vyhledávání: '"Edward Paul Guillen"'
Publikováno v:
Journal of King Saud University: Computer and Information Sciences, Vol 34, Iss 7, Pp 4122-4134 (2022)
The increase of cyberattacks by using the Internet of Things devices has exposed multiple vulnerabilities not only on devices but also on IoT infrastructures. Now, small devices can affect different networks and their services. This paper presents a
Externí odkaz:
https://doaj.org/article/cd5265c899224bbb8b9b2219befca77d
Publikováno v:
Healthcare Informatics Research, Vol 24, Iss 4, Pp 276-282 (2018)
ObjectivesDue to the uncontrolled increase of the mobile health applications and their scarce use by elderly for reason of absence credibility of measurements by lack scientific support, the aim of this study was to evaluate the differences between t
Externí odkaz:
https://doaj.org/article/af20a8ebd888479180ff38c934f7f145
Publikováno v:
Universidad y Salud, Vol 19, Iss 2, Pp 280-292 (2017)
Introduction: The development of mobile technologies has facilitated the creation of mHealth applications, which are considered key tools for safe and quality care for patients from remote populations and with lack of infrastructure for the provision
Externí odkaz:
https://doaj.org/article/ac4749a3fc4d44209dc1444a4cdd1163
Evaluación del rendimiento de redes ópticas para aplicaciones de telemedicina en ambientes simulados
Publikováno v:
Tecnura, Vol 17, Iss 36, Pp 21-40 (2013)
Telemedicine networks allow remote delivery of medical services. Each service uses some applications, such as vidéoconférence or audio-conference in order to conduct medical procedures. These services imply certain minimum requirements to ensure ap
Externí odkaz:
https://doaj.org/article/a014226a5ba341e6813b7d273105846b
Publikováno v:
2020 International Conference on Computational Science and Computational Intelligence (CSCI).
The use of multiple social media platforms is a common practice on more than two-third of all Internet users, according to OurWorld In Data. From this perspective, the verification of a real profile is a matter of growing interest, because false virt
Publikováno v:
Universidad y Salud, Volume: 19, Issue: 2, Pages: 280-292, Published: 02 AUG 2017
Universidad y Salud, Vol 19, Iss 2, Pp 280-292 (2017)
Universidad y Salud, Vol 19, Iss 2, Pp 280-292 (2017)
Resumen Introducción: El desarrollo de tecnologías móviles ha facilitado la creación de aplicaciones mHealth, las cuales son consideradas herramientas clave para la atención segura y de calidad a los pacientes de poblaciones apartadas y con care
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=dedup_wf_001::147c49695057c951a12ffe6eff28b206
http://www.scielo.org.co/scielo.php?script=sci_arttext&pid=S0124-71072017000200280&lng=en&tlng=en
http://www.scielo.org.co/scielo.php?script=sci_arttext&pid=S0124-71072017000200280&lng=en&tlng=en
The VoIP networks as alternative method to traditional PSTN system has been implemented in a wide variety of structures with multiple protocols, codecs, software and hardware–based distributions. The use of cryptographic techniques let the users to
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::0687391764591892e86e45234d38d7c8
Publikováno v:
AIP Conference Proceedings.
Information security has a wide variety of solutions including security policies, network architectures and technological applications, they are usually designed and implemented by security architects, but in its own complexity this solutions are dif
Autor:
Guillen Pinto, Edward Paul1 Edward.guillen@unimilitar.edu.co, Aragón Monroy, José Daniel1 u1401134@unimilitar.edu.co, Martinez Quintero, Juan Carlos1 juan.martinezq@unimilitar.edu.co
Publikováno v:
INGENIARE - Revista Chilena de Ingeniería. 2023, Vol. 31, p1-11. 11p.
Publikováno v:
2013 International Conference on Computing, Electrical & Electronic Engineering (ICCEEE); 2013, p686-691, 6p