An Overview of the Studies of Health Information Systems in Turkey
Review Paper | Journal Paper
Vol.4 , Issue.8 , pp.100-106, Aug-2016
Abstract
This paper presented a literature review about health information systems. Health information technology gives information about health section data and data generation, compilation, analyses and gives reliable information for policy and system development. Health information technology is based on efficiency, quality and cost of healthcare. There are positive influences of health information technologies on healthcare, but also some difficulties and failures that need more detail investigations in the future. The aim of this paper is given literature information for overview of health information systems in Turkey and other countries’ systems. The results would provide a useful approach for evaluating the positive and negative factors and give ideas for the health information system users and researcher in Turkey.
Key-Words / Index Term
Health Information systems, Hospital information systems, healthcare, Turkey, Health information technology, Information Technology
References
[1] Turkish Demographic and Health Survey. Turkey DHS final report. Ankara, Hacettepe University Institute of Population Studies, 2011.
[2] T. Thompson, D. Brailer, “Health IT strategic frameworkâ€, DHHS, Washington, DC, 2004.
[3] F.P. Akbulut, E. Akkur, A. Akan, B.S. Yarman, “A decision support system to determine optimal ventilator settingsâ€, BMC Medical Informatics and Decision Making, Vol. 14, No.3, pp (1-11), 2014.
[4] E. Ammenwerth,G. Duftschmid, W. Gall, W. Hackl, A. Hoerbst, S. Janzek-Hawlat, M. Jeske, M. Jung, K. Woertz, W. Dordaba, "A nationwide computerized patient medication history: Evaluation of the Austrian pilot Project “e-Medikationâ€, International journal of medical informatics, Vol. 83 pp(655–669), 2014.
[5] D. O’Sullivan, P. Fraccaro, E. Carson, P. Weller, "Decision time for clinical decision support systems", Clinical Medicine , Vol. 14, Issue-4, pp(338–341), 2014.
[6] P.G. Goldshmidt, "HIT and MIT: Implications of health information technology and medical information systems", Communications of the ACM, Vol. 48, Issue-10, pp(69-74), 2005.
[7] S. Sarker, "Understanding Mobile Handheld Device Use and Adoption", CommunACM, Vol. 46(12), pp(35–40), 2003.
[8] F.F.H Nah, K. Siau, H. Sheng, "The value of mobile applications: a utility company study", CommunACM, Vol.48(2), pp(85–90), 2005.
[9] S. Tachakra, X.H. Wang, R.S. Istepanian, Y.H. Song, "Mobile e-health: the unwired evolution of telemedicine", Telemedicine Journal of E-Health, Vol.9(3), pp(247–257), 2003.
[10] S. Celik, G. Cosansu, S. Erdogan, A. Kahraman, S. Isik, G. Bayrak, B. Bektas, N. Olgun, "Using mobile phone text messages to improve insulin injection technique and glycaemic control in patients with diabetes mellitus: a multi-centre study in Turkey", Journal of Clinical Nursing, Vol. 24(11-12), pp(1525-1533), 2015.
[11] E. Sezgin, S.O. Yıldırım, "A literature review on attitudes of health professionals towards health information systems: from e-health to m-health", Procedia Technology, Vol. 16, pp(1317 – 1326), 2014.
[12] M. Emmanouilidou, M. Burke, "A Thematic review and a policy-analysis agenda of Electronic Health Records in the Greek National Health System", Health Policy, Vol. 109(1), pp(31– 37), 2013.
[13] Y. Goksen, M. Eminagaoglu, O. Dogan, "Data mining in medical records for the enhancement of strategic decisions: a case study", Scientific Bulletin – Economic Sciences, Vol. 10(1), pp(135-45), 2011.
[14] B. Chaudhry, J. Wang, S. Wu, M. Maglione, W. Mojica, E. Roth, S.C. Morton, P.G. Shekelle, "Systematic Review: Impact of Health Information Technology on Quality, Efficiency, and Costs of Medical Care", Annals of Internal Medicine, Vol. 144(10), pp(742-752), 2006.
[15] J.L. Fernández-Alemán, A. Sánchez-Henarejos, A. Toval, A.B. Sánchez-GarcÃa, I. Hernández-Hernández, L. Fernandez-Luque, "Analysis of health professional security behaviors in a real clinical setting: An empirical study", International journal of medical informatics, Vol. 84(6), pp(454-467), 2015.
[16] G. Gursel, N. Zayim, K.H. Gulkesen, A. Arifoglu, O. Saka, "A new approach in the evaluation of hospital information systems", Turkish Journal of Electrical Engineering & Computer Sciences, Vol. 22(1), pp(214-222), 2014.
[17] H. Sulaiman, N. Wickramasinghe, "Assimilating health care information systems in a Malaysian hospital", Communications of the Association for Information Systems, Vol. 34(1), pp(1291-1318), 2014.
[18] J. Zhang, V.L. Patel, T.R. Johnson, "Medical error: is the solution medical or cognitive?", Journal of American Medical Informatical Association, Vol.9(6), pp(75–77), 2002.
[19] C.Y. Kim, J.S. Lee, Y.I. Kim, "Early stage evolution of a hospital information system in a middle income country:a case study of Korea", International Journal of Healthcare Technology Management, Vol. 4(4), pp(514–524), 2002.
[20] A.K. Jha, D. Doolan, D. Grandt, T. Scott, D.W. Bates, "The use of health information technology in seven nations", International Journal of Medical Information, Vol. 77(12), pp(848–854), 2008.
[21] T.B. Richards, C.M. Croner, G. Rushton, C.K. Brown, L. Fowler, "Geographic Information Systems and Public Health: Mapping the Future", Public health records, Vol. 114(4), pp(359-373), 1999.
[22] O. Terzi, A. Sisman, S. Canbaz, C. Dundar, Y. Peksen, "A geographic information system-based analysis of ambulance station cover age area in Samsun, Turkey", Singapore Med J, Vol. 54(11), pp(653-658), 2013.
[23] N.F. Keizer, E. Ammenwerth, "The quality of evidence in health informatics: how did the quality of healthcare IT evaluation publications develop from 1982 to 2005", International Journal of Medical Informatics, Vol. 77(1), pp(41-49), 2008.
[24] E. Ammenwerth, C. Iller, C. Mahler, "IT-adoption and the interaction of task, technology and individuals: at framework and a case study", BMC Medical Informatics and Decision Making, Vol. 6, pp(1-13), 2006.
[25] C. Despont-Gros, H. Mueller, C. Lovis, "Evaluating user interactions with clinical information systems: a model based on human-computer interaction models", Journal of Biomedical Informatics, Vol. 38(3), pp(244-255), 2005.
[26] R. Heeks, "Health information systems: Failure, success and improvisation", International Journal of Medical Informatics, Vol. 75(2), pp(125—137), 2006.
[27] A. Kankanhalli, H.H. Teo, B.C.Y. Tan, K.K. Wei, "An integrative study of information systems security effectiveness", Int. J. Inf. Manag, Vol. 23(2), pp(139–154), 2003.
[28] B.Y. Ng, A. Kankanhalli, Y. Xu, "Studying users’ computer security behavior: a health belief perspective", Decis. Support. Syst, Vol. 46(4), pp(815–825), 2009.
[29] S. Pahnila, M. Siponen, A. Mahmood, "Employees’ behavior towards IS security policy compliance", 40th Annual Hawaii International Conference on System Sciences, HICSS 2007.
[30] F. Hadasch, B. Mueller, A. Maedche, "Exploring an tesedent environmental and organizational factors to user-caused information leaks: a qualitative study", ECIS 2012 Proceedings, 2012.
[31] J. Zhang, B.J. Reithel, H. Li, "Impact of perceived technical protection on security behaviors", Information Management & Computer Security, Vol. 17(4), pp(330–340), 2009.
[32] B. Bulgurcu, H. Cavusoglu, I. Benbasat, "Information security policy compliance: an empirical study of rationality-based beliefs and information security awareness", MIS Q, Vol. 34(3), pp(523–548), 2010.
[33] J. D’Arcy, A. Hovav, "Towards a Best Fit Between Organizational Security Countermeasures and Information Systems Misuse Behaviors", Journal of Information System Security, Vol. 3(2), pp(3–30), 2007.
[34] N. Basoglu, T.U. Daim, U. Topacan, "Determining Patient Preferences for Remote Monitoring", Journal of Medical Systems, Vol. 36(3), pp(1389–1401), 2012.
[35] C.E. Kuziemsky, F. Laul, R.C. Leung, "A review on diffusion of personal digital assistants in healthcare", Journal of Medical Systems, Vol. 29(4), pp(335–342), 2005.
[36] L.T. Peterson, E.W. Ford, J. Eberhardt, T.R. Huerta, N. Menachemi, "Assessing differences between physicians’realizedand anticipated gains from electronic health record adoption", Journal of Medical Systems, Vol. 35(2), pp(151-161), 2011.
[37] G. Demiris, S.M. Speedie, L.L. Hicks, "Assessment of patients’ acceptance of and satisfaction with teledermatology", Journal of Medical Systems, Vol. 28(6), pp(575–579), 2004.
[38] C.Y. Chen, R.E. Chang, M.C. Hung, M.H. Lin, "Assessing the quality of a web-based learning system for nurses", Journal of Medical Systems, Vol. 33(4), pp(317–325), 2009.
[39] T. Vuononvirta, M. Timonen, S. Keinänen-Kiukaanniemi, O. Timonen, K. Ylitalo, O. Kanste, A. Taanila, "The attitudes of multi professional teams to telehealth adoption in northern Finland health centres", Journal of Telemedicine and Telecare, Vol. 15(6), pp(290–296), 2009.
[40] G. King, H. Richards, D. Godden, "Adoption of telemedicine in Scottish remote and rural general practices: a qualitative study", Journal of Telemedicine and Telecare, Vol. 13(8), pp(382–386), 2007.
[41] R.J. Spaulding, T. Russo, D.J. Cook, G.C. Doolittle, "Diffusion theory and telemedicine adoption by Kansas health-care providers: Critical factors in telemedicine adoption for improved patient access", Journal of Telemedicine and Telecare, Vol. 11, pp(107–109), 2005.
[42] R. Gururajan, "Factors influencing the intention to use wireless technology in health care: a study in India", Journal of Telemedicine and Telecare, Vol. 13, pp(40–41), 2007.
[43] D. Almir, H. Chang, “A Survey of Wireless Sensor Network Architecturesâ€, International Journal of Computer Science & Engineering Survey. Vol.3, No.6, pp (1-22), 2012.
[44] L.L. Leape, D.M. Berwick, "Five years after to err is human: What have we learned", Journal of American Medical Association, Vol. 293(19), pp(2384–2390), 2005.
[45] K.A. Wager, F.W. Lee, J.P. Glaser, "Managing Health Care Information Systems: A Practical Approach for Health Care Executives", John Wiley and Sons, 2005.
[46] C.Y. Huang, J.Z. Shyu, G.H. Tzeng, "Reconfiguring the innovation policy portfolios for Taiwans SIP mallindustry", Technovation, Vol. 27(12), pp(744–765), 2007.
[47] A.H. Turan, C.P. Palvia, "Critical information technology issues in Turkish healthcare", Information & Management, Vol. 51(1), pp(57–68), 2014.
[48] I. Aslan, U. Özen, "Getting Strategic Advantage by Measuring Resistance Developed against E-Prescription in Turkey", Procedia-Social and Behavioral Sciences, Vol. 150, pp(465–474), 2014.
[49] O. Tutuncu, A.A. Cobaner, O. Guzelgoz, A. Cetin, M. Malkoc, S. Mollahaliloglu, "The effects of health transformation program on patient–healthcare personnel communication and interaction in Turkey", Quality and Quantity, Vol. 48(6), pp(3433-3446), 2013.
[50] A. Dogac, M. Yuksel, G.L. Erturkmen, Y. Kabak, T. Namli, M.H. Yıldız, Y. Ay, B. Ceyhan, U. Hulur, H. Ozturk, E. Atbakan, "Healthcare Information Technology Infrastructures in Turkey", Yearb Med Inform, Vol. 9(1), pp(228-234), 2014.
[51] S. Bahtiyar, M.U. Caglayan, "Trust assessment of security for e-health systems", Electronic Commerce Research and Applications, Vol. 13(3), pp(164–177), 2014.
[52] D. Herand, F. Gürder, H. Taşkin, E.N. Yuksel, "A healthcare management system for Turkey based on a service-oriented architecture", Inform Health Soc Care, Vol. 38(3), pp(246-64), 2013.
[53] Y.G. Sahin, U. Celikkan, "MEDWISE: an innovative public health information system infrastructure", J Med Syst, Vol. 36(3), pp(1719-29), 2012.
[54] R. Haux, "Health information systems - past, present, future", Int J Med Inform, Vol. 75(3-4), pp(268-81), 2006.
[55] G. Gerçeklioğlu, "Cardiovascular and diabetes mortality trends in Turkey: 1988–2008", 13th National Public Health Congress, İzmir, Turkey, 18 October 2010.
[56] O. Arslan O, "Hemosoft: a new software for blood bank and apheresis management", Transfusion and Apheresis Science, Vol. 30(3), pp(193–196), 2004.
[57] A.Y. Alsabawy, A. Cater-Steel, J. Soar, "IT infrastructure services as a requirement for e-learning system success", Computers & Education, Vol. 69, pp(431–451), 2013.
[58] O. Alasehir, E. Sezgin, S. Ozkan, "The role of Gender in Pharmacists Attitudes towards E-pharmacy Application", Procedia - Social and Behavioral Sciences, Vol.83, pp(1111–1115), 2013.
[59] H.E. Zeren, O. Sebetci, Y. Kocak, "A research on determination e-government and e-municipal services within the framework of measurement sensitivity Aydın Public Participation", The Journal of KAU IIBF, Vol.6(9), pp(249-268), 2015.
[60] O. Sebetci, "A TAM Based Model for E-Government: A case for Turkey", International Journal of Electronic Governance, Vol.7(2), pp(113-135), 2015.
[61] O. Sebetci, G. Aksu, B. Onder, "Measuring the success of e-prescription system used by pharmacy personel", Electronic Journal of Social Sciences, Vol.13(49), pp(292-311), 2014.
[62] D.E. Detmer, "Information technology for quality healthcare: a summary of United Kingdom and United States experiences", Quality of HealthCare, Vol.9(3), pp(181–189), 2000.
[63] D. Protti, I. Johansen, F. Perez-Torres, "Comparing the application of Health Information Technology in primary care in Denmark and AndalucÃa, Spain", International Journal of Medical Informatics, Vol.78(4), pp(270–283), 2009.
[64] G.F. Anderson, B.K. Frogner, R.A. Johns, U.E. Reinhardt, "Health care spending and use of information technology in OECD countries", Health Aff, Vol.25(3), pp(819–831), 2006.
[65] K. Davenport, "Navigating American health care: how information technology can foster health care improvement", Center for American Progress 2007.
[66] K. Mercer, "Examining the impact of health information networks on health system integration in Canada", Leadersh. Health Serv, Vol.14(3), pp(1–30), 2001.
[67] Z.X. Pan, S. Pokharel, "Logistics in hospitals: a case study of some Singapore hospitals", Leadersh. Health Serv, Vol.20(3), pp(195–207), 2007.
[68] C.T. Liu, P.T. Yang, Y.T. Yeh, B.L. Wang, "The impacts of smart cards on hospital information systems—an investigation of the first phase of the national health insurance smart card project in Taiwan", International Journal of Medical Informatics, Vol.75(2), pp(173–181), 2006.
[69] G.O. Otieno, T. Hinako, A. Motohiro, K. Daisuke, N. Keiko, "Measuring effectiveness of electronic medical records systems: towards building a composite index for benchmarking hospitals", International Journal of Medical Informatics, Vol.77(10), pp(657–669), 2008.
[70] J. Mitchell, "Increasing the cost-effectiveness of telemedicine by embracing e-health", Journal of Telemedicine and Telecare, Vol.6, pp(16–19), 2000.
[71] R. Sulaiman, X. Huang, D. Sharma, "E-health Services with Secure Mobile Agent", 7th Annual Communication Networks and Services Research Conference, May 11st-13rd, 2009; Moncton, Canada; 2009:270-277.
[72] O. Sebetci, G. Aksu, "Evaluating e-government systems in Turkey: The case of the ‘e-movable system’", Information Polity, Vol.19, pp(225–243), 2014.
[73] H. Alemdar, C. Ersoy, "Wireless sensor networks for healthcare: A survey", Computer Networks, Vol.54(15), pp(2688-2710), 2010.
[74] V. Bal, "Bilgi Sistemlerinin Sağlik İşletmeleri Performansina Etkilerinin Veri Zarflama Analizi ile Ölçümü: Türkiye’ Deki Devlet Hastanelerinde Bir Araştirma", Phd thesis, Süleyman Demirel University Social Science Institute, Isparta 2010.
[75] C.O. Özoğul, E. Tolga, E. Karsak, "Real options approach for valuation of enterprise resource planning systems", ITU Journal Series D: Engineering, Vol.8(4), pp(71-82), 2009.
[76] J. Tan, "E-health care information systems: an introduction for students and professionals", Jossey-Bass, San Francisco 2005.
[77] S.B. Ransom, M. Joshi, D. Nash, "The healthcare quality book: Vision, strategy, and tools", Health Administration Press, Illinois 2004.
Citation
O. Sebetci and M. Aksel, "An Overview of the Studies of Health Information Systems in Turkey," International Journal of Computer Sciences and Engineering, Vol.4, Issue.8, pp.100-106, 2016.
A Modified MapReduce-K-Means Clustering Based Load Distribution Method for Wireless Sensor Network in Mobile Cloud computing
Review Paper | Journal Paper
Vol.4 , Issue.8 , pp.107-110, Aug-2016
Abstract
With the rising popularity of Cloud computing and Mobile computing, different field, such as individuals, enterprises and research centers have started outsourcing their IT and computational requirement to on-demand cloud services. Many research works have been done on the load balanced issue for wireless sensor network or WSN in Mobile Cloud Computing. For supplying fast, reliable, secure data, collected by WSN to users through cloud is an important issue in Mobile Cloud Computing. Main limitation of WSN is it has limited energy resources, thus maximizing the lifetime of the sensor node; it is required to distribute the energy dissipated throughout the wireless sensor network, which is a critical problem. There are several existing clustering based algorithm in case of load distribution such as, K-means clustering, random clustering etc. In order to minimize maintenance and maximize overall system performance distribution of load to all sensor nodes not only cluster head node is preferable job. Here we present MapReduce based K-means clustering for load distribution equally to all sensor nodes for avoiding overload condition and optimized energy consumption in WSN. MapReduced based clustering method is desirable due to its scalability and fault tolerant property. In our approach, it reads data from and writes the output back to the sensor nodes once. We also show that our proposed algorithm gives better performance in comparison with other existing load distribution approach for WSN by optimizing overload condition from cluster head node [CH] in case of wireless sensor network.
Key-Words / Index Term
Mobile Cloud Computing, Wireless Sensor Network, load distribution, Clustering, MapReduce, K-means
References
[1]. Abolfazli, Saeid; Sanaei, Zohreh; Ahmed, Ejaz; Gani, Abdullah; Buyya, Rajkumar (1 July 2013). "Cloud-Based Augmentation for Mobile Devices: Motivation, Taxonomies, and Open Challenges". IEEE Communications Surveys & Tutorials 99 (pp): 1–32. doi:10.1109/SURV.2013.070813.00285.
[2]. Fangming Liu, Peng Shu, Hai Jin, Linjie Ding, Jie Yu, Di Niu, Bo Li, "Gearing Resource-Poor Mobile Devices with Powerful Clouds: Architecture, Challenges and Applications";, IEEE Wireless Communications Magazine, Special Issue on Mobile Cloud Computing, vol. 20, no. 3, pp.14-22, June, 2013.
[3]. Abolfazli, Saeid; Sanaei, Zohreh; Gani, Abdullah; Xia, Feng; Yang, Laurence T. (1 September 2013). "Rich Mobile Applications: Genesis, taxonomy, and open issues". Journal of Network and Computer Applications. doi:10.1016/j.jnca.2013.09.009.
[4]. A survey of mobile cloud computing: architecture, applications, and approaches, Hoang T. Dinh, Chonho Lee, Dusit Niyato andPing Wang , “Wiley online Libraryâ€, inWireless communication and Mobile Computing.
[5]. Raicu, Ioan, et al. "Local load balancing for globally efficient routing in wireless sensor networks." International Journal of Distributed Sensor Networks 1.2 (2005): 163-185.
[6]. Coulouris G, Dollimore J., and Kindberg T., Distributed Systems,Concept and Design. AddisonWesley, 2001, pp. 116–119.
[7]. Raicu I., Richter O., Schwiebert L., and Zeadally S., “Using Wireless Sensor Networks to Narrow the Gap between Low-Level Information and Context-Awareness,†ISCA Seventeenth International Conference on Computers and their Applications, 2002.
[8]. A novel MapReduced based K-Means Clustering†by Ankita Sinha and Prasanta K.Jana IEEE Senior Member, Department of Computer Science and Engineering, Indian School of Mines, Dhanbad.
[9]. Anchalia, Prajesh P. "Improved MapReduce k-Means Clustering Algorithm with Combiner." Computer Modelling and Simulation (UKSim), 2014 UKSim-AMSS 16th International Conference on. IEEE, 2014.
[10]. Jin, Chao, and Rajkumar Buyya. "Mapreduce programming model for. net-based cloud computing." Euro-Par 2009 Parallel Processing. Springer Berlin Heidelberg, 2009. 417-428.
Citation
Enakshmi Nandi and Debabrata Sarddar, "A Modified MapReduce-K-Means Clustering Based Load Distribution Method for Wireless Sensor Network in Mobile Cloud computing," International Journal of Computer Sciences and Engineering, Vol.4, Issue.8, pp.107-110, 2016.
A Review: Various Data De-Duplication Techniques to reduce memory consumption over Cloud Storage
Review Paper | Journal Paper
Vol.4 , Issue.8 , pp.111-116, Aug-2016
Abstract
The growth amount of data, it has converted an important problem to minimize the storing space that form information conquers and the bandwidth ingestion through system broadcast. To attain advanced de-duplication elimination proportion, the out-dated way is to extend the variety of information for data de-duplication, but that would make meta-data areas larger and increase the several of meta-data objects. When identifying the redundant information meta-data needs to continuously introduced and transferred into the recollection and access block will be process. Data de-duplication is most significant methods for removing identical copies of frequent records. It has been mostly used in cloud storing to minimize the quantity of storing space. To defend the confidential approved identical check is used. Dissimilar from the out-dated duplicate scheme, dissimilar rights of consumer are measured also the records itself. We study this approved duplicate check in mixture cloud architecture. The crossbreed architecture suggests about together the Private and Public Cloud. The private cloud plays a significant role in this system, moreover the security of this system is less and the private cloud of this apparatus is not secure, unofficial data subsequent in fail in security. Basically, it provides more safety, the isolated cloud is providing with multilevel verification. We have showed that our system is providing privacy to data and more secure. This paper, brief study of existing scheme has been described along with the construction and algorithms.
Key-Words / Index Term
Data De-duplication, Hybrid Cloud,Private and Public Cloud,Secure Data Architecture and Algorithms
References
[1] Kaushik, Vandna Dixit, Amit Bendale, Aditya Nigam, and Phalguni Gupta. "Certain Reduction Rules Useful for De-Duplication Algorithm of Indian Demographic Data." In 2014 Fourth International Conference on Advanced Computing & Communication Technologies, pp. 79-84. IEEE, 2014.
[2] Li, Min, Shravan Gaonkar, Ali R. Butt, Deepak Kenchammana, and Kaladhar Voruganti. "Cooperative storage-level de-duplication for I/O reduction in virtualized data centers." In 2012 IEEE 20th International Symposium on Modeling, Analysis and Simulation of Computer and Telecommunication Systems, pp. 209-218. IEEE, 2012.
[3] Backialakshmi, N., and M. Manikandan. "Data de duplication using N0SQL Databases in Cloud." In Soft-Computing and Networks Security (ICSNS), 2015 International Conference on, pp. 1-4. IEEE, 2015.
[4] Nagarajaiah, Harsha, Shambhu Upadhyaya, and Vinodh Gopal. "Data De-duplication and Event Processing for Security Applications on an Embedded Processor." In Reliable Distributed Systems (SRDS), 2012 IEEE 31st Symposium on, pp. 418-423. IEEE, 2012.
[5] Saritha, K., and S. Subasree. "Analysis of hybrid cloud approach for private cloud in the de-duplication mechanism." In Engineering and Technology (ICETECH), 2015 IEEE International Conference on, pp. 1-3. IEEE, 2015.
[6] VasiliosAndrikopoulos, Zhe Song, Frank Leymann, “Supporting the Migration of Applications to the Cloud through a Decision Support Systemâ€, Institute of Architecture of Application Systems, IEEE, pp. 565-672, 2013.
[7] Haitao Li, LiliZhong, Jiangchuan Li, , Bo Li, KeXu, “ Cost-effective Partial Migration of VoD Services toContent Cloudsâ€, 2011 IEEE 4th International Conference on Cloud Computing, pp. 203-110, 2011.
[8] C. Ward, N. Aravamudan, K. Bhattacharya, K. Cheng, R. Filepp, R. Kearney, B. Peterson, L. Shwartz, C. C. Young, “Workload Migration into Clouds – Challenges, Experiences, Opportunitiesâ€, 2010 IEEE 3rd International Conference on Cloud Computing, pp. 164-171, 2010.
[9] Kangkang Li, HuanyangZheng, & JieWu . “Migration-based Virtual Machine Placement in Cloud Systemsâ€, 2013 IEEE 2nd International Conference on Cloud Networking (CloudNet, IEEE, pp. 83-90, 2013.
[10] Andoni, Alexandr, and Piotr Indyk. "Near-optimal hashing algorithms for approximate nearest neighbor in high dimensions." In 2006 47th Annual IEEE Symposium on Foundations of Computer Science (FOCS06), pp. 459-468. IEEE, 2006.
[11] Venkatesan, Ramarathnam, S-M. Koon, Mariusz H. Jakubowski, and Pierre Moulin. "Robust image hashing." In Image Processing, 2000. Proceedings. 2000 International Conference on, vol. 3, pp. 664-666. IEEE, 2000.
[12] Swaminathan, Ashwin, Yinian Mao, and Min Wu. "Robust and secure image hashing." IEEE Transactions on Information Forensics and Security 1, no. 2 (2006): 215-230.
[13] Sengar, Seetendra Singh, and Manoj Mishra. "E-DAID: an efficient distributed architecture for in-line data de-duplication." In Communication Systems and Network Technologies (CSNT), 2012 International Conference on, pp. 438-442. IEEE, 2012.
[14] Rivest, Ronald L. "The RC5 encryption algorithm." In International Workshop on Fast Software Encryption, pp. 86-96. Springer Berlin Heidelberg, 1994.
[15] Barrett, Paul. "Implementing the Rivest Shamir and Adleman public key encryption algorithm on a standard digital signal processor." In Conference on the Theory and Application of Cryptographic Techniques, pp. 311-323. Springer Berlin Heidelberg, 1986.
Citation
Faheem Ahmad Reegu, "A Review: Various Data De-Duplication Techniques to reduce memory consumption over Cloud Storage," International Journal of Computer Sciences and Engineering, Vol.4, Issue.8, pp.111-116, 2016.