Author of the publication

Implementation of u-RPMS Using Google Chart in Hybrid Application for Visualization of Patient's Biometric Information.

, , , , , and . ICISA, page 1-4. IEEE, (2013)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Implementation of u-RPMS Using Google Chart in Hybrid Application for Visualization of Patient's Biometric Information., , , , , and . ICISA, page 1-4. IEEE, (2013)Hybrid app security protocol for high speed mobile communication., , , and . J. Supercomput., 72 (5): 1715-1739 (2016)Designing a Video Control System for a Traffic Monitoring and Controlling System of Intelligent Traffic Systems., , , and . UCMA (1), volume 150 of Communications in Computer and Information Science, page 91-99. (2011)Kinect-Based Monitoring System to Prevent Seniors Who Live Alone from Solitary Death., , , , , and . ICCSA (4), volume 8582 of Lecture Notes in Computer Science, page 709-719. Springer, (2014)SSL Application for Managed Security between the Mobile and HIS Biometric Information Collection Client., , and . AINA Workshops, page 55-60. IEEE Computer Society, (2014)Design of Disaster Collection and Analysis System Using Crowd Sensing and Beacon Based on Hadoop Framework., , , , , and . ICCSA (4), volume 9158 of Lecture Notes in Computer Science, page 106-116. Springer, (2015)Mobile Based HIGHT Encryption for Secure Biometric Information Transfer of USN Remote Patient Monitoring System., , and . ICCSA (5), volume 6786 of Lecture Notes in Computer Science, page 83-95. Springer, (2011)Development of Mobile Hybrid MedIntegraWeb App for Interoperation between u-RPMS and HIS., , , , and . ICCSA (3), volume 7335 of Lecture Notes in Computer Science, page 248-258. Springer, (2012)Study on Encryption of Wireless Network-Based Mobility Energy-Enterprise Security Management., , , , , and . FCC, volume 301 of Lecture Notes in Electrical Engineering, page 221-227. Springer, (2014)Comparison & Analysis of HIGHT and SEED for the Protection of Biometric Information at U-Wellness Healthcare System., , , , , and . ICISA, page 1-4. IEEE, (2013)