Socially Aware Device To Device Communications IJTSRD
Device to Device D2D correspondence is a basic part towards the appropriation of new ideal models, for example, edge and haze figuring. While a ton of work has shown the extraordinary capability of D2D correspondence, it is as yet vague whether the advantages of the D2D approach can truly be utilized by and by. It […]
Review on CDSS implementation with CDA generation and integration for health information exchange in cloud IJTSRD
Successful Deployment of EHR helps to improve patient safety and quality of care, but it has the prerequisite of interoperability between health information exchange at different hospital. The clinical document architecture developed HL7 is core document standard to ensure such interoperability and propagation of this document. Unfortunately, hospitals are reluctant to adopt interoperable HIS due […]
Implementation of Real-Time Taxi Ride Sharing IJTSRD
This Project is designed to create a Real-time taxi ride Sharing Application. It works by accepting a real-time ride requests from the passengers sent through smartphones and schedules proper taxis to pick them up via ridesharing. The monetary constraints of the application are to provide benefits for both passengers and taxi drivers, passengers pay less […]
A Review Paper on Leveraging Data Duplication to Improve the Performance of Storage System with CLD and EHD Image Matching in the Cloud IJTSRD
With the explosive growth in data volume, the I/O bottleneck has become an increasingly daunting challenge for big data analytics in the Cloud. In existing paper, propose POD, a performance-oriented deduplication scheme, to improve the performance of primary storage systems in the Cloud by leveraging data deduplication on the I/O path to remove redundant write […]
A Modified Method for Preventing Blackhole Attack in MANETS IJTSRD
Black hole attack is one of the security threat in which the traffic is redirected to such a node that actually does not exist in the network. It’s a real world analogy to the black hole in the universe in which things disappear. The node presents itself in such a way to the node that […]