Cloud-based Electronic Health Records (EHRs) have seen a substantial increase in usage in recent years, especially for remote patient monitoring. Researchers are interested in investigating the use of Healthcare 4.0 in smart cities. This involves using Internet of Things (IoT) devices and cloud computing to remotely access medical processes. Healthcare 4.0 focuses on the systematic gathering, merging, transmission, sharing, and retention of medical information at regular intervals. Protecting the confidential and private information of patients presents several challenges in terms of thwarting illegal intrusion by hackers. Therefore, it is essential to prioritize the protection of patient medical data that is stored, accessed, and shared on the cloud to avoid unauthorized access or compromise by the authorized components of E-healthcare systems. A multitude of cryptographic methodologies have been devised to offer safe storage, exchange, and access to medical data in cloud service provider (CSP) environments. Traditional methods have not been effective in providing a harmonious integration of the essential components for EHR security solutions, such as efficient computing, verification on the service side, verification on the user side, independence from a trusted third party, and strong security. Recently, there has been a lot of interest in security solutions that are based on blockchain technology. These solutions are highly effective in safeguarding data storage and exchange while using little computational resources. The researchers focused their efforts exclusively on blockchain technology, namely on Bitcoin. The present emphasis has been on the secure management of healthcare records through the utilization of blockchain technology. This study offers a thorough examination of modern blockchain-based methods for protecting medical data, regardless of whether cloud computing is utilized or not. This study utilizes and evaluates several strategies that make use of blockchain. The study presents a comprehensive analysis of research gaps, issues, and a future roadmap that contributes to the progress of new Healthcare 4.0 technologies, as demonstrated by research investigations.
This research entitled: "Artistic processing of Emotional Scenes in the Narrative Film" deals with how to process and embody those emotional scenes. As there are certain filmic elements that play an effective role in deepening the viewer's sense of the importance of those scenes, and that their presence in the film is necessary and inevitable, and cannot be dispensed because it forms an interconnected connection with the rest of the film's scenes, in addition to its dramatic and aesthetic value in the film in crystallizing the viewer's feelings and integrating him/her into the scene.
The research was divided into four chapters, the first chapter includes: the methodological framework, which represented the research problem, and brin
Arabic language is a highly inflectional language where a single word can have different forms using a single root with different interpretations. Arabic does not have a standard way to find roots, the reasons for having inflectional language: suffix, prefix and infix Vowels, which built in complex processes. That is why, words require good processing for information retrieval solutions, until now, and there has been no standard approach to attaining the fully proper root. The applications on Arabic words show around 99% are derived from a combination of bilateral, Trilateral and quad lateral roots.
Processing word- stemming levels in order to extract a root is the process of removing all additional affixes. In case the process of mat
The character table or the table of eigen values for the D7h point group, which is not found in the literature was constructed. The constructed table is used to classify all modes of the vibrational frequencies of the IR and Raman spectra for any compound or molecule that has the D7h symmetry in the Point Group. For that, it was used for classifying all the modes of vibrational frequencies of the [7] cyclacene (linear) monitoring molecule, possessing D7h symmetry. The constructed table was used to classify the symmetry species for the total degrees of freedom, total degrees of transition, total degrees of rotation and for the total degrees of modes of vibration (3N-6) for this tube. The character table wa
... Show MoreElectronic Health Record (EHR) systems are used as an efficient and effective method of exchanging patients’ health information with doctors and other key stakeholders in the health sector to obtain improved patient treatment decisions and diagnoses. As a result, questions regarding the security of sensitive user data are highlighted. To encourage people to move their sensitive health records to cloud networks, a secure authentication and access control mechanism that protects users’ data should be established. Furthermore, authentication and access control schemes are essential in the protection of health data, as numerous responsibilities exist to ensure security and privacy in a network. So, the main goal of our s
... Show MoreWorld statistics declare that aging has direct correlations with more and more health problems with comorbid conditions. As healthcare communities evolve with a massive amount of data at a faster pace, it is essential to predict, assist, and prevent diseases at the right time, especially for elders. Similarly, many researchers have discussed that elders suffer extensively due to chronic health conditions. This work was performed to review literature studies on prediction systems for various chronic illnesses of elderly people. Most of the reviewed papers proposed machine learning prediction models combined with, or without, other related intelligence techniques for chronic disease detection of elderly patie
... Show MoreValue Engineering is an analytical study on projects or services using a specific procedure and a multidisciplinary working group, works for the identification and classification of the project functions; either for a better perfuming of these functions or to lessen the total project cost or the two together. Value Engineering main aim is on finding innovative alternatives, without effecting the basic requirements of the project, its methodology based on the functional balancing between the three elements of production "performance, quality and cost". This methodology based on the "functional analysis", had shown high possibilities in solving any problem facing the production procedure , achieve better investment for available re
... Show MoreThe sports institutions in general are affected and contact with sport in particular the environmental factor, whether political or economic, which makes them in constant need to consider their administrative applications to increase the confidence of their employees because of their suitability or consistency with the new reality according to the sports activities that relate to it, The stalemate in administrative and technical aspects of the administrative work method in the majority of the Olympic sports federations makes the achievement of most of the goals far from the present reality, and the selection of suitable alternatives to achieve the objectives by those who disagree with the concepts of modern dictatorial standards It leads to
... Show MorePlentiful of healthcare practice is based on a disease/treatment approach rather than a prevention one. That is, the predominant focus is on treating existing symptoms and conditions that bring the patient to healthcare setting. There is no doubt about the significance of this approach for acute conditions, but there is some question whether this is the most efficient and effective way of distributing healthcare for increasing number of diseases and limited resources.
The evidences from everywhere have showed the profound cost benefit of prevention in healthcare practice. Healthy community, therefore, is the ultimate aim in any health services planning. The priority of care giver is shifted now to promote health and prevent
... Show MoreThe concealment of data has emerged as an area of deep and wide interest in research that endeavours to conceal data in a covert and stealth manner, to avoid detection through the embedment of the secret data into cover images that appear inconspicuous. These cover images may be in the format of images or videos used for concealment of the messages, yet still retaining the quality visually. Over the past ten years, there have been numerous researches on varying steganographic methods related to images, that emphasised on payload and the quality of the image. Nevertheless, a compromise exists between the two indicators and to mediate a more favourable reconciliation for this duo is a daunting and problematic task. Additionally, the current
... Show More