Preferred Language
Articles
/
4RjNspQBVTCNdQwC5h4P
The Blockchain for Healthcare 4.0 Apply in Standard Secure Medical Data Processing Architecture
...Show More Authors

Cloud-based Electronic Health Records (EHRs) have seen a substantial increase in usage in recent years, especially for remote patient monitoring. Researchers are interested in investigating the use of Healthcare 4.0 in smart cities. This involves using Internet of Things (IoT) devices and cloud computing to remotely access medical processes. Healthcare 4.0 focuses on the systematic gathering, merging, transmission, sharing, and retention of medical information at regular intervals. Protecting the confidential and private information of patients presents several challenges in terms of thwarting illegal intrusion by hackers. Therefore, it is essential to prioritize the protection of patient medical data that is stored, accessed, and shared on the cloud to avoid unauthorized access or compromise by the authorized components of E-healthcare systems. A multitude of cryptographic methodologies have been devised to offer safe storage, exchange, and access to medical data in cloud service provider (CSP) environments. Traditional methods have not been effective in providing a harmonious integration of the essential components for EHR security solutions, such as efficient computing, verification on the service side, verification on the user side, independence from a trusted third party, and strong security. Recently, there has been a lot of interest in security solutions that are based on blockchain technology. These solutions are highly effective in safeguarding data storage and exchange while using little computational resources. The researchers focused their efforts exclusively on blockchain technology, namely on Bitcoin. The present emphasis has been on the secure management of healthcare records through the utilization of blockchain technology. This study offers a thorough examination of modern blockchain-based methods for protecting medical data, regardless of whether cloud computing is utilized or not. This study utilizes and evaluates several strategies that make use of blockchain. The study presents a comprehensive analysis of research gaps, issues, and a future roadmap that contributes to the progress of new Healthcare 4.0 technologies, as demonstrated by research investigations.

Scopus Clarivate Crossref
View Publication
Publication Date
Sat Dec 01 2018
Journal Name
Journal Of Hydrology
Complementary data-intelligence model for river flow simulation
...Show More Authors

View Publication
Crossref (90)
Crossref
Publication Date
Sat Sep 30 2023
Journal Name
Journal Of Accounting And Financial Studies ( Jafs )
The effect of applying assurance engagements according to the international standard IASE (3402) in enhancing the auditing action
...Show More Authors

Abstract:
                The research seeks to explain the role of the international auditing standard (3402) in the auditor's procedures, where the importance of the research stems from the adoption of international auditing standards in the Iraqi environment, including the standard (3402) of assurance engagements that the external auditor performs by submitting reports on the design of control tools and their operational effectiveness in a service facility that provides the beneficiaries with a service. To provide useful information for service organizations The control tools are of great benefit in rationalizing decisions, and many recommen

... Show More
View Publication Preview PDF
Publication Date
Sun Dec 01 2019
Journal Name
Journal Of Economics And Administrative Sciences
The adoption of ISO 45001: 2018 in the civil aviation establishment test and its accessibility to the standard
...Show More Authors

The current research aims to analyze the extent of the adoption of the standards of ISO 45001: 2018 for occupational safety and health management by the General Establishment of Civil Aviation. The research problem was the extent to which the General Establishment of Civil Aviation approved ISO 45001: 2018 for occupational safety and health management. The questionnaire was used as a primary data collection tool, the sample was distributed (50) form, they were selected from the category of employees of the establishment at different levels to represent the research community. Data were analyzed using the statistical package (SPSS), a number of vector statistical methods were used as well as arithmetic mean, standard deviation, an

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Sat Sep 30 2023
Journal Name
Journal Of Accounting And Financial Studies ( Jafs )
Enhancing audit procedures in accordance with the international assurance standard through the implementation of a proposed program
...Show More Authors

Abstract:             

                  The research seeks to identify the role of the International Assurance Standard (3402) in the auditor's procedures, as the importance of the research stems from providing assurance services for control tools through reports that are prepared according to this standard, which contribute to strengthening audit procedures through a proposed assurance program. Many conclusions were reached, the most important of which The assurance operations are considered among the operations with a special assignme

... Show More
View Publication Preview PDF
Publication Date
Fri Nov 01 2013
Journal Name
Radioelectronics And Communications Systems
Erratum to: “BER Performance Enhancement for Secure Wireless Communication Systems Based on DCSK-MIMO Techniques under Rayleigh Fading Channel”
...Show More Authors

There has been a growing interest in the use of chaotic techniques for enabling secure communication in recent years. This need has been motivated by the emergence of a number of wireless services which require the channel to provide low bit error rates (BER) along with information security. The aim of such activity is to steal or distort the information being conveyed. Optical Wireless Systems (basically Free Space Optic Systems, FSO) are no exception to this trend. Thus, there is an urgent necessity to design techniques that can secure privileged information against unauthorized eavesdroppers while simultaneously protecting information against channel-induced perturbations and errors. Conventional cryptographic techniques are not designed

... Show More
View Publication
Scopus Crossref
Publication Date
Wed Apr 01 2015
Journal Name
Journal Of Economics And Administrative Sciences
Evaluation of Drinking Waters’ projects in accordance with the standard Malcolm Baldrige Award for Excellence in the framework of total quality management / applied research in Water Department of Baghdad
...Show More Authors

The research aims to evaluate the selected projects from the water Department of Baghdad, according to a standard for total quality management and to achieve this goal , adopted the case study method to get to know how close or turn away those projects in the management of Standard Malcolm Baldrige Award for Excellence in Quality Management its comprehensive one scales the world's most famous in this area , in order to draw a general framework to evaluate how project management can benefit from this approach to modern management , input from the entrances of the comprehensive management reform and development.

Be standard Malcolm Baldrige Award of several elements: - leadership , strategic planning , foc

... Show More
View Publication Preview PDF
Crossref
Publication Date
Mon Apr 01 2024
Journal Name
Wasit Journal Of Engineering Sciences
Analysis attackers’ methods with hashing secure password using CSPRNG and PBKDF2
...Show More Authors

Using the Internet, nothing is secure and as we are in need of means of protecting our data, the use of passwords has become important in the electronic world. To ensure that there is no hacking and to protect the database that contains important information such as the ID card and banking information, the proposed system stores the username after hashing it using the 256 hash algorithm and strong passwords are saved to repel attackers using one of two methods: -The first method is to add a random salt to the password using the CSPRNG algorithm, then hash it using hash 256 and store it on the website. -The second method is to use the PBKDF2 algorithm, which salts the passwords and extends them (deriving the password) before being ha

... Show More
View Publication
Crossref (5)
Crossref
Publication Date
Wed Jun 11 2003
Journal Name
Iraqi Journal Of Laser
Modeling of Plasma Affected Thermal Profile in Solids During Laser Materials Processing
...Show More Authors

A new scheme of plasma-mediated thermal coupling has been implemented which yields the temporal distributions of the thermal flux which reaches the metal surface, from which the spatial and temporal temperature profiles can be calculated. The model has shown that the temperature of evaporating surface is determined by the balance between the absorbed power and the rate of energy loss due to evaporation. When the laser power intensity range is 107 to108 W/cm2 the temperature of vapor could increase beyond the critical temperature of plasma ignition, i.e. plasma will be ignited above the metal surface. The plasma density has been analyzed at different values of vapor temperature and pressure using Boltzmann’s code for calculation of elec

... Show More
View Publication Preview PDF
Publication Date
Fri Jul 01 2022
Journal Name
Iop Conference Series: Earth And Environmental Science
Computer Model Application for Sorting and Grading Citrus Aurantium Using Image Processing and Artificial Neural Network
...Show More Authors
Abstract<p>This study was conducted in College of Science \ Computer Science Department \ University of Baghdad to compare between automatic sorting and manual sorting, which is more efficient and accurate, as well as the use of artificial intelligence in automated sorting, which included artificial neural network, image processing, study of external characteristics, defects and impurities and physical characteristics; grading and sorting speed, and fruits weigh. the results shown value of impurities and defects. the highest value of the regression is 0.40 and the error-approximation algorithm has recorded the value 06-1 and weight fruits fruit recorded the highest value and was 138.20 g, Gradin</p> ... Show More
View Publication
Scopus (3)
Crossref (1)
Scopus Crossref
Publication Date
Sun Oct 29 2023
Journal Name
Iraqi Journal Of Agricultural Sciences
ROLE OF ORGANIC FERTILIZER AND BORON FOLIAR APPLICATION ON GROWTH AND PRODUCTIVITY OF POTATO FOR PROCESSING
...Show More Authors

This research was carried out at University of Baghdad - College of Agricultural Engineering Sciences during the fall season of 2020 and spring season of 2021 in order to evaluate the effect of organic fertilizer and the foliar application of boron on the growth and yield of industrial potatoes (Solanum tuberosum L.). Using factorial experiment (5*4) within Randomized Complete Block Design  with three replicates, the organic fertilizer (palm fronds peat) was applied at four levels (0, 12, 24, and 36 ton ha-1) in addition to the treatment of the recommended of chemical fertilizer. The foliar application of Boron was applied at four concentrations which were 0, 100, 150 and 200 mg (H3Bo3). L-1. The results Revealed a significant incr

... Show More
Scopus (11)
Crossref (4)
Scopus Crossref