Zobrazeno 1 - 10
of 329
pro vyhledávání: '"Leonardo, Juan"'
Autor:
Leonardo, Juan, Putra, Purnawan Pontana, Tallei, Trina Ekawati, Fatimawali, Fatimawali, Taslim, Nurpudji Astuti, Tjandrawinata, Raymond Rubianto, Lau, Vincent, Mustafa, Saad, Prieto, Miguel A, Nurkolis, Fahrul
Publikováno v:
In Pharmacological Research - Modern Chinese Medicine December 2024 13
Autor:
Ramirez Lopez, Leonardo Juan, Buitrago Pineda, Paula Alejandra, Perez Rincon, Juan Manuel, Rojas Reales, Wilson Mauro
Publikováno v:
In Informatics in Medicine Unlocked 2024 50
Autor:
Leonardo Juan Ramirez Lopez, Paula Alejandra Buitrago Pineda, Juan Manuel Perez Rincon, Wilson Mauro Rojas Reales
Publikováno v:
Informatics in Medicine Unlocked, Vol 50, Iss , Pp 101525- (2024)
This study offers a comprehensive review of the impact of blockchain technology on healthcare, focusing on electronic medical records, electronic prescriptions, and the issue of medication errors. The implementation of blockchain guarantees the trace
Externí odkaz:
https://doaj.org/article/b022580a05f94739a654ea9e602fe2df
Akademický článek
Tento výsledek nelze pro nepřihlášené uživatele zobrazit.
K zobrazení výsledku je třeba se přihlásit.
K zobrazení výsledku je třeba se přihlásit.
Autor:
Leonardo Juan Ramirez Lopez, David Millan Mayorga, Luis Hernando Martinez Poveda, Andres Felipe Carbonell Amaya, Wilson Rojas Reales
Publikováno v:
Computers, Vol 13, Iss 6, p 152 (2024)
The management of large medical files poses a critical challenge in the health sector, with conventional systems facing deficiencies in security, scalability, and efficiency. Blockchain ensures the immutability and traceability of medical records, wh
Externí odkaz:
https://doaj.org/article/7f293f9c0f50475a9144bdc714ba9c47
Publikováno v:
In Results in Engineering September 2023 19
Publikováno v:
Results in Engineering, Vol 19, Iss , Pp 101243- (2023)
Context: Currently, a wide variety of cars use Remote Keyless Entry (RKE) to activate the security system by radio frequency. Problem: RKE systems have security vulnerabilities with attacks such as brute force, replay, spoofing, and replay. Objective
Externí odkaz:
https://doaj.org/article/630c6a74624a4afd98fa759bb6a71832
Publikováno v:
Electronics (2079-9292); Nov2024, Vol. 13 Issue 22, p4365, 21p
Publikováno v:
In Informatics in Medicine Unlocked 2022 33