Monday, December 30, 2019

A Report On The City Of Pakistan - 1459 Words

After gazing on Mughal monuments and feeling the beat of pounding drums at Sufi shrines in Lahore, many travelers choose to head south to Pakistan s financial capital, Karahi for some fun in the sun, upscale nightclubs, and modern skyscrapers. From rambling through the ramparts of Old Lahore to an all night beach rave in Karachi, you might be in for a culture shock, but here s how to get there. Train The cheapest option is the train. The Fareed Express #38DN leaves Lahore every morning at 10:00am and arrives in Karachi at 12:35pm the next day. That means your train journey will be at least 26 1/2 hours if the train is running on time. Trains in Pakistan are not known to be exceptionally punctual or safe. There are 5 possible classes for this train, including the full berth AC class for 1810 rupees ($23), the full berth EC (Economy) for 790 rupees ($10), a full seat in economy for 710 rupees ($8.90), a half-berth for 480 rupees ($6) and a half seat for 400 rupees ($5). Sitting on ha lf of a seat for 26 hours is certainly not the most comfortable way to travel to Karachi, but it is the cheapest. To see fares, timetables, and addresses of booking agents, you can check out Pakistan Railways online. Tickets are usually booked through a travel agent in order to avoid the inevitable chaos on the station. Bus A safer, more comfortable, and faster option is to the take the bus. There are many different bus companies that ply the route from Lahore to Karachi, but Daewoo is byShow MoreRelatedPakistan And The Climate Of Pakistan1369 Words   |  6 PagesPakistan is located in the temperate area on the planet. The climate of Pakistan is generally divided by two main seasons of cold winter and hot summer. Pakistan has a huge variation among extremes of the temperature. A little rainfall also takes place in Pakistan’s different parts of the country. Pakistan has four seasons; winter, summer, spring and autumn. The winter season or cool winter starts from December and ends in February, the dry spring starts from march through may, the summer or rainyRead MoreThe Effects of HIV Related Stigma 790 Words   |  3 Pageswhere the PLWHA discover their HIV status, can get information about the prevention and care, and receive treatment. Therefore, it is particularly important to study HIV/AIDS related stigma and discrimination faced by PLWHA in this setting. Studies report that SD predominantly occurs in the healthcare sector and is the most commonly reported by PLWHA (Mbwambo, 2003). Health care settings are reported to be the most significant contexts for stigma and discrimination in India() Studies have reportedRead MoreInclusive Study to Know the Prospective of Askari Bank Essay1537 Words   |  7 Pagesand teamwork to achieve constant growth and profitability in all areas of business. This report is an inclusive study to know the prospective of Askari bank. Askari Commercial Bank is one of the leading banks in Pakistan, which is growing rapidly. Economy of Pakistan specially banking sector is developing very fast, so there are opportunities in banking sector. Askari bank was incorporated in Pakistan on October 9, 1991, as a public limited company. It started its operations on April 1, 1992,Read MoreKfc, A Spot Light And Taste Of Food Restaurants Essay1615 Words   |  7 Pagestrend is quite newin Pakistan yet it is growing very fast, this indicate that such type of fast food restaurant have avery bright future in Pakistan .The two major fast food restaurants that have their outlets in thewhole world, are giving tough competition to each other in Pakistan. Our research is based onthe hypothesis that why people in Pakistan prefer KFC over Macdonald and we found that due togood quality and taste of food people prefer KFC .When KFC was introduced in Pakistan the pric es was notRead MoreWhy I Being A Pakistani Citizen844 Words   |  4 PagesAccording to tribune newspaper report, Pakistan has received 49 billion dollars from 2005 to 2015. I being a Pakistani citizen can see that the poverty stricken masses are still living in impoverished conditions. There is a less effective taxation system and rampant corruption, fueled with incompetent institutions ranging from legal, financial, educational and so forth exacerbates the problem. The issues are on an almost standstill. The current PML-N government has failed to bring down the debt-to-GrossRead MorePakistan, Like Many International Countries814 Words   |  4 PagesPakistan, like many international countries, contains a plethora of healthcare delivery complications when providing services to its citizens. This is immensely concerning for the international community because Pakistan is the 5th most populous country in the world, and the largest land mass in the Eastern Mediterranean. Littered with an array of different terrains, climates, and features, Pakistan’s land mass is approximate 800,000 square km. Geographically, Pakistan divides its providences intoRead MorePrevention Strategies And Mass Screening Programs1119 Words   |  5 Pagescause of deaths worldwide. In Pakistan, there are no central population-based cancer registries, few sporadic institution-based data sources are not reliable. According to Data from IARC GlobalCan (2012): Population in 2012: 179.9m People newly diagnosed with cancer (excluding NMSC) / yr: 148,000 Age-standardized rate, incidence per 100,000 people/yr: 111.8 Risk of getting cancer before age 75: 11.8% People dying from cancer /yr.: 101,000 Few other reports indicate that fatality from lungRead MoreA CASE STUDY OF THE INFLUENCE OF FAMILY ON FIRST- GENERATION COLLEGE STUDENTS‚Äà ´ EDUCATIONAL ASPIRATIONS POST HIGH SCHOOL1560 Words   |  7 Pagesï » ¿Impact of Social Networking Sites Usage on Student’s Academic Performance in Pakistan Abstract Purpose – This research paper examines the impact of the usage of social networking sites (SNS) on the academic performance of the students in universities. The impact has been studied in relation to three variables acting as moderators to the usage of social networking sites which in turn helps to enquire the variation of academic performance of the students regarding that usage. The Independent variableRead MoreCruelty to Animals in Pakistan931 Words   |  4 Pagesis so common in Pakistan that very few notice it. Bear baiting, practiced in Punjab, Sindh and Balochistan, is arranged by wealthy landlords. It involves the detoothing of bears and letting 2-6 dogs attack them. This practice has been common ever since the British began their rule, but escalated due to widespread ownership of firearms. The bears are usually illegally imported. The capture of bear cubs is prohibited across three provinces of Punjab. It was banned by the Pakistan Legislature underRead MoreSelection and Implementation of an Enterprise Maturity Model for Companies in Pakistan1730 Words   |  7 Pagesoptions as enterprise maturity models for software houses in Pakistan. Some characteristics of small Pakistani software houses are provided which affect implementation of a maturity model. Some possible problems are identified in the implementation of the best maturity model and some solutions are also provided. I. INTRODUCTION In last 15 years, information technology has developed at an outstanding rate throughput the world including Pakistan. This development of information technology also requires

Sunday, December 22, 2019

Law Enforcement Today - 763 Words

Law Enforcement Today Paper Chelsea Berry Foundations of the Criminal Justice System June 2, 2013 Gary Lair Many police departments are facing budget problems, forcing them to cut their police force down. Many officers are being asked to do things they normally dont do such as patrolling. Police departments are also facing increasing crimes due to the poor economy. More people are engaging in criminal activities. Local and small agencies interact with the communities that they patrol on a daily basis. Sharing information between agencies are important not only for Home Land Security but for the public’s†¦show more content†¦This CONOPS will be periodically reviewed and modified as additional processes are implemented and refinements identified The CONOPS provides transparency into DHS support to SLFCs. The CONOPS also: - Furthers the goals of the Director of National Intelligence (DNI) and the Program Manager Information Sharing Environment (PM-ISE) to develop and support a national information sharing environment and network of fusion centers. - Underscores the role of the Under Secretary for Intelligence and Analysis as the Executive Agent for DHS SLFC Program and DHS’s representative to various Federal Senior-level advisory groups providing guidance and support to fusion centers. - Defines the roles and responsibilities of the State and Local Program Management Office (SLPO) to execute the DHS SLFC Implementation Plan and to lead DHS outreach to SLFCs which includes, but is not limited to, the assignment of DHS intelligence analysts and officers and the provision of tools to the fusion centers nationwide. The SLPO serves in the centralShow MoreRelatedLaw Enforcement Today773 Words   |  4 PagesAssignment Law Enforcement Today CJS/200 May 20, 2012 Ryan A. Conti Law Enforcement Today Today’s law enforcement officers are faced with difficult challenging issues. Being trained efficiently is most important so they know how to respond to the many different issues. According to Schmalleger (2011), corruption, on duty dangers, deadly force, and racial profiling are just some issues today’s law enforcement has to deal with. Multicultural society is one of the main challengesRead MoreLaw Enforcement Today Paper1056 Words   |  5 PagesAngeles Police Department, more and more law enforcement administrators are faced with the task of reforming police department, with little guidance on how to bring about the necessary changes. This is not the first time in our country’s history that corruption and brutality have been front page news. Part of our current problems stem from the unprecedented level of drugs, gangs and guns in our cities. Systemically, the problems are caused by law enforcement agencies that continue to hire the wrongRead MoreLaw En forcement Today s Society978 Words   |  4 Pages Law Enforcement Today Paper Lorie Daniels CJS/200 SUNDAY JULY 26, 2015 Scott Smith Law Enforcement Today Paper The police roles in today’s society are to try to maintain the order as well as to control to keep the public safe. I will describe the issues that police departments are experiences in today society. The police departments are facing from today’s society are corruption, as well as danger on the job, and most of all the use of deadly force. For the police when things start toRead MoreSurveillance Cameras Essay1254 Words   |  6 PagesSurveillance Cameras How are kids safe at night? Do they roam the streets without adult supervision? Are drug dealers taking over the streets? Are drivers nervous of everyone else’s bad driving habits? Although some believe law enforcement cameras invade privacy and disrupt everyday lives, cameras help keep citizens safe. â€Å"Police departments across Great Britain credit cameras with dramatic crime reduction, citing such impressive results as 75 percent drop in Airdrie, Scotland, a 68 percent reductionRead MoreEssay on Sir Robert Peel863 Words   |  4 Pagesformed the Metropolitan Police while serving as Secretary of England. Peel stated â€Å"The key to policing is that the police are the people and that the people are the police† (Law Enforcement: Robert Peels Concept, 1829). Community policing is derived from Peel’s concept of prevention and has been clung to by many law enforcement organizations across the United States. Community policing requires investing in training wi th special regard to problem analysis and problem solving, facilitation, communityRead MoreTheories Of Crime Analysis Spring1300 Words   |  6 PagesMarshawn Walker Theories of Crime Analysis Spring August 30, 2015 Types of Policing Policing is to regulate, control, or keep in order with a law enforcement agency or other official group. It is a job done every minute of every hour of everyday by men and women willing to risk their health and life. To make the job easier different styles or types of policing methods have been developed. Some of the most influential types of policing include community oriented policing, problemRead MorePolice Enforcement And Community Policing1444 Words   |  6 Pagespolice treated minorities more harshly than white citizens (Walker). In response to this civil unrest, the President s Commission on Law Enforcement and the Administration of Justice (1967) recommended that the police become more responsive to the challenges of a rapidly changing society. In response to civil unrest, the President s Commission on Law Enforcement and the Administration of Justice (1967) recommended that the police become more responsive to the challenges of a rapidly changing societyRead MoreLaw Enforcement Cameras an Invasion of Privacy1083 Words   |  5 PagesThe past decade has seen a proliferation of law enforcement security cameras in public areas, with central London having more cameras than any other city. In cities like New York, Los Angeles, and central London, cameras can be found at almost every intersection. Terrorist attacks have been a major basis for this significant increase in law enforcement security cameras; however, privacy advocates, along with many of the public, feel that it’s an invasion of privacy. People are concerned that allRead MoreCommunity Policing and Problem Solving1135 Words   |  5 PagesForrest II CJS/210 August 15, 2010 Travis Coldwell Community Policing and Problem Solving Policing When police departments and crime rates of the past are examined there are some apologist who believe that America would be in a better law enforcement situation provide the policies of the past we put back into use. With the public becoming more technologically advanced and criminal’s awareness of prosecution avoidance, community policing is the best solution for the modern community. The introductionRead MoreCriminal Justice Interrogation Techniques Have Evolved From A Crude Abusive Practice1193 Words   |  5 PagesBody: Criminal justice interrogation techniques have evolved from a crude, abusive practice to a discipline reinforced by scientific research. There are several methods in investigators’ toolkits. Law enforcement officers who train in these techniques have shown increased accuracy when determining if a subject is telling the truth; however, these highly trained officers are sometime too efficient, causing innocent subjects to believe they have perpetrated a crime. Legislators are working to combat

Saturday, December 14, 2019

Time and time again he practices his moves until Free Essays

He kneels down, trying to lay low to avoid detection.   He has stalked his prey all day.   He has studied â€Å"the kill† from every conceivable angle. We will write a custom essay sample on Time and time again he practices his moves until or any similar topic only for you Order Now    He replayed every scenario in his mind. Time and time again he practices his moves until he is sure that there are no mistakes.   There can be no letting go of this one.   This is the big one that will make everything else seem so insignificant. This will be the last hunt.   It is as if his eyes are glued to this target.   Nothing will deny him this.   It is his birthright.   It is his destiny.   He approaches his prey confidently as his prey stares at him unaware of what will happen next.   As the first words are spoken, he knows that the game is afoot.   The mark has been engaged and the â€Å"con† shall now begin to unfold. It was a very simple transaction.   Legitimate on its face and humanitarian in character.   The young man’s life had taken on the most unfortunate of all turns.   In a span of one month, he had lost everything to the financial crisis. Formerly a successful trader on wall street, one error had cost him his entire life savings and even now threatened to ruin the futures of his daughters, whose pictures he was not slow to show.   â€Å"They are honor students in high school but I don’t know if I can afford to send them to college†, he claims.   The mark looks at him with compassion, reflecting a hint of suspicion. â€Å"Kind sir, I understand your wary nature and I would like to say that I do not appeal to your generosity but as an honest and working man who has fallen on hard times, I would just like to beseech you for an opportunity for me to redeem my pride and rebuild my spirit,† the con man begins his speech and he knows it is only a few more moments before the job is done. â€Å"If you would indulge me for a moment of your time to enlighten you about my situation for you see, I was not like this.   In fact, I lived among the haves and looked down on the have nots.   As luck would have it, however, I have fallen on hard times and seek only a way to redeem myself in my eyes so that I may have the courage to face my family when I return home to tell them of my tragic failure.† It is the perfect pitch.   Not an appeal to generosity but rather an appeal to the pride of all men; the need to be able to bravely face his troubles.   It strikes a chord in everyone’s heart, for who could ever deny a little help to a person who wants nothing more than a chance to regain his pride.   There has been no mention of money except that which has been lost by the con man.   Neither will there be a mention of money until the con man is convinced that he has secured his mark. â€Å"Dear sir,† he continues, â€Å"thank you indeed for this time and as you have given me the chance to walk with my head up high again, allow me to repay your act of kindness with a generous gesture.   I was a trusted banker for a very wealthy family and as such, I am privy to many of their transactions.   If you are interested, I can invest your money in a few of their business that are already making so much money. The returns are not extraordinary but certainly better than normal bank rates.   I only offer this to you because you have been so kind.   Here is my card, please give me a call.   Have a nice day.† Game, set and match.   All he has to do is just sit and wait.   There is no cause for what he does.   It is simply just about the money.   For those who fall prey to the scam, the only cause is the money.   There is nothing more to it.   There are no deeper existential philosophies and moralities to wrestle with just the thought of having more cold hard cash or having none at all. Every con has an angle.   Every con plays on the emotions of people.   Logic never betrays its owner.   Every decision a person regrets in life can be traced back to a single strand of emotion that clouded solid judgment.   This is something that every con man understands.   This is something that every con man counts on.   The cause is simply just money, for after all, a con is about the dollars and sense! How to cite Time and time again he practices his moves until, Essays

Friday, December 6, 2019

Headspace Organization Cloud Based Solution

Question: Discuss about the Headspace Organization Cloud Based Solution. Answer: Introduction The cloud computing is a new way to which the computing resources and services are delivered. Many experts believe the use of these resources could help improve the health services, benefit the research in health, as well as change the face of the information technology of health. Nonetheless, just like any innovation the cloud computing should be evaluated before the widespread of its adoption (Krutz Vines, 2010). The cloud computing entails an on demand, self-service internet infrastructure which enables the users to have an access to the computing resources at anytime and in any place. It is a new model of delivering of the computing resources. There is no secret that the health care firms have lagged behind especially in the adaptation of new technologies, for the purpose of reference and information gathering for patience when they share their problem (Xu, 2012). The headspace organization has suffered since they do not have a system in place to record the story of the mental i ll patient on what is affecting them. The patient re-tell their stories to multiple professionals before they get help. This organization need a cloud based solution application to enable them to store critical patient information so that appropriate diagnosis could be provided to them. The use of the modernized IT infrastructure overhaul their paper based workflows and will provide an ease to handle each case efficiently in the headspace organization (Rodrigues, de la Torre, Fernndez Lpez-Coronado, 2013). The aim of the report is to provide a practical reference of a cloud base solution to their problem to enable them to analyze and consider the best course of action for the mental illness of the patient and consequently reduce on the number of suicide cases in regional NSW for the age groups between sixteen and twenty four years. The paper will include the non-functional requirements of the applications such as critical system qualities, the system interfaces, the user interface requirements, and the system constraints. The reference of the application is the use of FURPS + to ensure that the components such as usability, reliability, performance and the security are all covered. Additionally, it would be important to review the advantages and the disadvantages of the cloud dependent solutions taking into the contemplation the environment to which the solution could be integrated. Finally, it might look at the SDLC method pros and cons of the project utilizing the Predictive SDLC and Adaptive SDLC. Headspace company need to apply the mHealth mobile application, which utilizes internet along with solutions in order to improve on the access, efficiency, effectiveness and quality of the clinical as well as the enterprise procedures that might be used by the health care professionals. This really is to guarantee there is certainly enhanced health status of the patients (Rodrigues, de la Torre, Fernndez Lpez-Coronado, 2013). The utilization of the practical ap plication could help the delivery of the information of the patients, the supply of the health data services; it may help the facilitation of the interface between the providers and patients. Other features of the system could be facilitation of the integration of the health care business processes and the isolated access of the healthcare information (Talia, 2013). The third generation devices enable the application, which allows for the collection, the management as well as the processing of the data of the patient. The mobile health services ranges from recording of the medical sign of the patients and it synchronous communication to the health professionals through the mobile communications to the automatic diagnosis of the information recorded to personal sensors as well as the alarm notices in case the patients has an emergency. Non-functional requirements of the applications The non-functional requirements are the quality attributes, the design implementation constraints as well as the external interface that a products should be required to have. The qquality qualities is the general elements, which influence the run period behaviour, the model of the program and the end user experience. It signify on the regions of the issue that have the possibility of the software extensive impact across levels and tiers (Ryan, 2013). The scope to which the application might possess the preferred combination of the quality of the features for example the usability , the overall performance , dependability , along with the security that should display the success of the design and overall quality of the software . In cloud, computing the system interface is the shared boundary across various components such as the computer system exchange information. The exchange could be between the software, peripheral devices and the humans User interface requirements The user interface requirement for the system will display all the products, which can be configured. They can easily select on the products to configure (Padhy, Patra Satapathy, 2012). Additionally, the system shall allow the users to be able to update the configuration in order to be able to resolve any current configuration. It will be a user-friendly interface to the users, which will notify the user about any conflict to the current configuration. The functional requirement of this new system specify to what the proposed system will undertake. The constraints will highlights how the system will operate as well as how it will be built. The normal hour of operation for the system will be 24 hours per day since it is cloud-based solution (Padhy, Patra Satapathy, 2012). The system will not have more than four instances per month of the six minutes outages, and no more than three instances per year of more than one hour of outage. This is the maximum acceptable frequency of the unscheduled time of the unavailability. The usability entails how the application will meets on the requirements of the users as well as the consumer by being intuitive, good access for the disabled users and the result of overall users experience. The program will be carried usability inspection in order to identify the problems in UI design which will be evaluated and make recommendation to fix them (Kuo, 2011). The system will not have tolerance to the hang up against errors, the delays, and the unexpected behavior (Ryan, 2013). There will be a guidance for the correction of the errors as well as generating reminders. The system will have simple and natural dialogue, and speak the language of the user to enable ease use of the application. Additionally, it will have clearly marked exits, shortcuts as well as precise and constructive error message. This entails the ability of the system to be able to handle the increased in the load without actually affecting the performance of the system or perhaps the ability to be readily enlarged. The significance of the reliability of any cloud-based application is literacy of life and death aspect (Ryan, 2013). The health care providers should be able to have an access to the patient data as well decision support from other professionals. The application to enhance on its reliability it will be hosted on the private cloud infrastructure, which the organization will have the control over. They can be able to predict of its downtime or perhaps the outages that happen more often than it would. The software reliability requirements takes the form that the software will not have no more than the x bugs. The bebugging process will be based on the Monte Carlo technique for the statistical analysis of the event that is random. Before testing the software, a known number of bugs are inserted secretly and an estimate of the bugs in the system is done. The system will be operational overtime and it would not fail to perform its intended functions over a given time interval. The performance will look at the indication of the responsiveness of the system in order to execute action that are within the time interval. It has been measured through latency, which refers to the time taken to respond to the events. This system is a cloud-based solution, which will depend on the internet in order to deliver information more quickly as well as reliably. Nonetheless, the internet was not designed to provide a degree of the reliability and the performance as required by many service agreements. To enhance on the performance the delivery platforms will connect to the application to the end users in order to optimize to the end to end delivery thus ensuring a great deal of experience to all the users regardless to where they are located or perhaps the device they are using. The data security is the top most concern for headspace organization. The clinical data is highly valuable to any organization. In the development of the application, this has been taken into consideration to ensure the information of the patient is not compromised or stolen by the hackers. The application has an encrypting to all the sensitive data. It has been installed a password, with a fingerprint verification that is rechecked after every hour. The requirement for the privacy as well as security of the system apply to the remote data centres, through the transmission of the data between the remote data and to the end users. The user of this cloud-based application can improve the aspect of security as well as privacy of the client data. The system has been developed to absorb large cyber-attack without impacting on the performance of the application. The following are the pros of the cloud-based solutions. One of the strength is the cost reduction. The use of cloud computing solutions eliminates various conventional of costs such as paper work, hardware, as well as the information costs. Secondly, advantage is that scalability, an organization should only pay for the services and the resources they use, and no worry about the hardware as well as the software upgrades as the organization grows. Strategic edge is another advantage of computing cloud solution. As it increases it, give an organization a competitive edge over the competitors (Rodrigues, de la Torre, Fernndez Lpez-Coronado, 2013). The company could deploy on the mission that are vital application and deliver the important advantages of the business, without having upfront expenses along with the minimal provisioning time. Cloud computing enables you to overlook the technology and concentrate on the main business activities and objectives. One of the disadvantage of the cloud computing is security issue. Despite implementing, the best security standards by the service providers on storing data these services are always open to risks (Talia, 2013). The use of the cloud-powered technologies highlights that one need to provide the service provider with the access to the significant business data (Soman, 2011). Lastly, is the information ownership and mobility. The providers cannot really assure a hundred percent to have the ability to offer back in the stored data or maybe the solutions. Pros and Cons of Predictive SDLC the predictive models is used to examine the existing data as well as trends in order to understand better the customers and the product at the same time identifying the potential future opportunities for both the opportunities and the risks (Soman, 2011). This business model formulates a forecast through integrating the data mining and the statistical modeling and other technology information. This approach of the management methodology entails a detailed planning before commencement of any project starting. The solution for utilizing this method works best for the projects that have defined tasks as well as sequences. The advantage of this methodology technique is that it is easy to use; one can easily manage the project because it is rigid. The phases of the projects are usually completed at the specified phase intervals and lastly the requirements of the technique can be understood well. The disadvantage of this method is that the adjustment of the scope during the life cycle could kill the project (Xu, 2012). Another disadvantage is that the working of the software is not produce until the life cycle is complete and lastly the method could be inappropriate especially where the requirements are at the moderate to the high-risk changes. The use of this methodology focuses on the team ability to adapt to the rapidly changing customer requirements. The method is effective for the purpose of the service-oriented projects that entails continuous improvements. The advantages for using this management methodology is that it saves times, it promotes the consistency in the user interface design, and it allows an early involvement with the customer. Lastly, the use of the method reduces the time, which is required to create as well produce functional specification. The disadvantage for the methodology is that it usually does not produce reusable codes and it lacks a stopping point (Krutz Vines, 2010). Another disadvantage of the approach is that due to the innovative nature of the technique, the finished deliverable could be different from the original intended project. Recommendation The best method to use in the headspace organization is the use of the adaptive approach. The method is easy to use and the risks can be minimized easily as well as maximize the productivity by developing the system in short iteration as well as de-emphasizing the work on the secondary. Lastly, the method allows an early customer involvement in the development of the application. References Krutz, R. L., Vines, R. D. (2010). Cloud security: A comprehensive guide to secure cloud computing. Wiley Publishing. Kuo, M. H. (2011). Opportunities and challenges of cloud computing to improve health care services. Journal of medical Internet research, 13(3), e67. Padhy, R. P., Patra, M. R., Satapathy, S. C. (2012). Design and implementation of a cloud based rural healthcare information system model. Univers J Appl Comput Sci Technol, 2(1), 149-157. Rodrigues, J. J., de la Torre, I., Fernndez, G., Lpez-Coronado, M. (2013). Analysis of thesecurity and privacy requirements of cloud-based electronic health records systems. Journal of medical Internet research, 15(8), e186. Rolim, C. O., Koch, F. L., Westphall, C. B., Werner, J., Fracalossi, A., Salvador, G. S. (2010, February). A cloud computing solution for patient's data collection in health care I nstitutions. In eHealth, Telemedicine, and Social Medicine, 2010. ETELEMED'10. Second International Conference on (pp. 95-99). IEEE. Ryan, M. D. (2013). Cloud computing security: The scientific challenge, and a survey of solutions. Journal of Systems and Software, 86(9), 2263-2268. Soman, A. K. (Ed.). (2011). Cloud-Based Solutions for Healthcare IT. Science Publishers. Talia, D. (2013). Toward cloud-based big-data analytics. IEEE Computer Science, 98-101. Xu, X. (2012). From cloud computing to cloud manufacturing. Robotics and computer- integrated manufacturing, 28(1), 75-86.