System design and architecture
-
Blood pressure (BP) is an important and commonly used vital sign to monitor a patient’s health. Current methods for monitor blood pressure are unsuitable for continuous, uninterrupted measurement of blood pressure outside of a hospital setting as such methods are invasive and could pose risks if complications occur. This research has investigated the possibility of using two photoplethysmography (PPG) sensors to monitor a patient’s pulse at two sites; the ear and the finger.
149p runthenight04 02-02-2023 13 3 Download
-
Main objective: Building the model on the effect of knowledge management system on the SME’s toward competitive advantage. Detail objective: Identifying the model and level of development on knowledge management in the SME’s in Vietnam; Design enterprise architecture for enterprise knowledge management system. Building the influence model of Enterprise knowledge management system to competitive advantage in the SME’s.
0p ngocmai222 11-06-2018 58 6 Download
-
Security Attack: Any action that compromises the security of information. Security Mechanism: A mechanism that is designed to detect, prevent, or recover from a security attack. Security Service: A service that enhances the security of data processing systems and information transfers. A security service makes use of one or more security mechanisms.
14p muathu_102 28-01-2013 78 6 Download
-
In today’s busy world, people find it hard to find the time for entertainment. It is really pretty time consuming to find out the various entertainment shows/movies and any other such shows in and around the city. And on the top of it is more irritating to go physically and book the ticket. E-commerce can be thought as the best solution for this. Due to which the people can buy the tickets right from home. No more buying in black. Moreover one can find the information just with a click and get the booking done....
51p hungdt138 16-01-2013 66 18 Download
-
Multiprotocol Label Switching Multiprotocol Label Switching (MPLS) is a standards-approved technology for speeding up network traffic flow and making it easier to manage. MPLS involves setting up a specific path for a given sequence of packets, identified by a label put in each packet, thus saving the time needed for a router to look up the address to the next node to forward the packet to. MPLS is called multiprotocol because it works with the Internet Protocol (IP), Asynchronous Transport Mode (ATM), and frame relay network protocols....
78p greenwind007 13-09-2012 154 44 Download
-
EURASIP Journal on Applied Signal Processing 2003:7, 617–619 c 2003 Hindawi Publishing Corporation Editorial Shihab A. Shamma Department of Electrical and Computer Engineering and Center for Auditory and Acoustic Research, Institute for Systems Research, University of Maryland, College Park, MD 20742, USA Email: sas@eng.umd.edu ´ Andre van Schaik School of Electrical and Information Engineering, University of Sydney, Sydney, NSW 2006, Australia Email: andre@ee.usyd.edu.
3p sting12 10-03-2012 41 5 Download