Skip to main content

and
  1. No Access

    Chapter and Conference Paper

    Methodologies to Ensure Security and Privacy of an Enterprise Healthcare Data Warehouse

    The power of data lies in the insights derived from it. We trace this journey as Data-Information-Knowledge-Wisdom and then come to the Insight (Rowley in J Inf Sci 33:163–180, 2007). A data warehouse is meant...

    Joseph George, M. K. Jeyakumar in Intelligent Data Communication Technologie… (2022)

  2. No Access

    Chapter and Conference Paper

    Heart Diseases Classification Using 1D CNN

    ECG is used to check the rhythm and electrical activity in the heart. The variation of the rhythm causes change in the ECG. Thus, by analyzing this it is possible to detect abnormalities of the heart. In this ...

    Jemia Anna Jacob, Jestin P. Cherian in Emerging Technologies in Data Mining and I… (2021)

  3. No Access

    Article

    Entropy generation in bypass transitional boundary layer flows

    The primary objective of this study is to evaluate the accuracy of using computational fluid dynamics (CFD) turbulence models to predict entropy generation rates in bypass transitional boundary layers flows un...

    Joseph George, Landon D. Owen, Tao **ng, Donald M. McEligot in Journal of Hydrodynamics (2014)

  4. No Access

    Chapter

    The Role of Logistics in E-commerce Transactions: An Exploratory Study of Customer Feedback and Risk

    Logistics plays an important role in e-commerce; while most part of the transactions happen electronically, physical products need to be shipped to customers using conventional transport means. We report in th...

    Ramakrishnan Ramanathan, Joseph George in Supply Chain Strategies, Issues and Models (2014)