Cloud-based Electronic Health Records (EHRs) have seen a substantial increase in usage in recent years, especially for remote patient monitoring. Researchers are interested in investigating the use of Healthcare 4.0 in smart cities. This involves using Internet of Things (IoT) devices and cloud computing to remotely access medical processes. Healthcare 4.0 focuses on the systematic gathering, merging, transmission, sharing, and retention of medical information at regular intervals. Protecting the confidential and private information of patients presents several challenges in terms of thwarting illegal intrusion by hackers. Therefore, it is essential to prioritize the protection of patient medical data that is stored, accessed, and shared on the cloud to avoid unauthorized access or compromise by the authorized components of E-healthcare systems. A multitude of cryptographic methodologies have been devised to offer safe storage, exchange, and access to medical data in cloud service provider (CSP) environments. Traditional methods have not been effective in providing a harmonious integration of the essential components for EHR security solutions, such as efficient computing, verification on the service side, verification on the user side, independence from a trusted third party, and strong security. Recently, there has been a lot of interest in security solutions that are based on blockchain technology. These solutions are highly effective in safeguarding data storage and exchange while using little computational resources. The researchers focused their efforts exclusively on blockchain technology, namely on Bitcoin. The present emphasis has been on the secure management of healthcare records through the utilization of blockchain technology. This study offers a thorough examination of modern blockchain-based methods for protecting medical data, regardless of whether cloud computing is utilized or not. This study utilizes and evaluates several strategies that make use of blockchain. The study presents a comprehensive analysis of research gaps, issues, and a future roadmap that contributes to the progress of new Healthcare 4.0 technologies, as demonstrated by research investigations.
From a group of 60 patients with dentoalveolar infections among which 10 were diabetic and 10 non-diabetic were elected as test group as well as 10 normal subjects as control group. Six Staphylococcus aureus and Streptococcus anginousus were diagnosed in the first and second group of the patients the immune status of the patients and control subject were tested by pathogen specific antibody titre, neotrophil NBT reduction phagocytosis and leukocyte inhibition LIF. Diabetic patients with dentoalveolar infection shows decreased specific antibody titers, subnormal neutrophil NBT phagocytic % as well as non significant LIF % in comparison non diabetic reveal high specific antibody titers against , high neutrophil NBT% and significant LIF% re
... Show MoreThis research studies the possibility of producing Bone China with available local and geological substitutes and other manufactured ones since it’s traditionally produced by Bone ash, Cornish stone, and China clay, while the substitutes are Kaolin instead of China clay and Feldspar potash instead of Cornish stone. Because of the unavailability of Feldspar in Iraq, it was substituted with the manufactured alternative Feldspar. Bone ash was prepared from cow bones with heating treatments, grinding and sifting. The alternative Feldspar was prepared by chemical analysis of the natural Feldspar potash with local materials that include Dwaikhla Kaolin, Urdhuma Silica sand, Potassium Carbonate, and Sodium Carbonate. The mixture was burned at
... Show MoreObjective: to assess the predictive value of Doppler imaging of the uterine artery in the identification of early intrauterine abnormal pregnancy as compared to a normal intrauterine pregnancy. Subjects and methods: one hundred and twenty pregnant ladies, at their 6-12 weeks of gestation, with a singleton pregnancy were included in this population-based case-control study. Thirty women with a missed miscarriage, 30 with hydatidiform mole, 30 with a blighted ovum, and 30 as a control group, without risk factors, underwent Doppler interrogation of the uterine arteries. Resistive index (RI), pulsatility index (PI), and the systolic/diastolic ratio (S/D) were measured for both sides. The t-test, or ANOVA test when appropriate, was
... Show MoreIn this paper we use Bernstein polynomials for deriving the modified Simpson's 3/8 , and the composite modified Simpson's 3/8 to solve one dimensional linear Volterra integral equations of the second kind , and we find that the solution computed by this procedure is very close to exact solution.
In this paper, an algorithm for binary codebook design has been used in vector quantization technique, which is used to improve the acceptability of the absolute moment block truncation coding (AMBTC) method. Vector quantization (VQ) method is used to compress the bitmap (the output proposed from the first method (AMBTC)). In this paper, the binary codebook can be engender for many images depending on randomly chosen to the code vectors from a set of binary images vectors, and this codebook is then used to compress all bitmaps of these images. The chosen of the bitmap of image in order to compress it by using this codebook based on the criterion of the average bitmap replacement error (ABPRE). This paper is suitable to reduce bit rates
... Show MoreAbstract
The current research aims to identify the analysis of the questions for the book of literary criticism for the preparatory stage according to Bloom's classification. The research community consists of (34) exercises and (45) questions. The researcher used the method of analyzing questions and prepared a preliminary list that includes criteria that are supposed to measure exercises, which were selected based on Bloom's classification and the extant literature related to the topic. The scales were exposed to a jury of experts and specialists in curricula and methods of teaching the Arabic language. The scales obtained a complete agreement. Thus, it was adapted to become a reliable instrument in this
... Show MoreThis paper aims to decide the best parameter estimation methods for the parameters of the Gumbel type-I distribution under the type-II censorship scheme. For this purpose, classical and Bayesian parameter estimation procedures are considered. The maximum likelihood estimators are used for the classical parameter estimation procedure. The asymptotic distributions of these estimators are also derived. It is not possible to obtain explicit solutions of Bayesian estimators. Therefore, Markov Chain Monte Carlo, and Lindley techniques are taken into account to estimate the unknown parameters. In Bayesian analysis, it is very important to determine an appropriate combination of a prior distribution and a loss function. Therefore, two different
... Show More
Abstract
This research studies Abu Baker Al-Siddiq’s commandments to the leaders of his armies. The research is organized into an Introduction, three sections, and a Conclusion.
The Introduction presents a definition of Style and Commandment terminologies. It also presents a brief biography of Abu Baker Al-Siddiq may Allah be pleased with him.
The first section explains the characteristics of the Composition and its rhetorical significance. In this Section, I study the types of predicate and the methods of construction in Abu Baker’s commandments and the rhetoric in using the connection and disconnection modifiers in his expressions.
The second section e
... Show MoreThis work, deals with Kumaraswamy distribution. Kumaraswamy (1976, 1978) showed well known probability distribution functions such as the normal, beta and log-normal but in (1980) Kumaraswamy developed a more general probability density function for double bounded random processes, which is known as Kumaraswamy’s distribution. Classical maximum likelihood and Bayes methods estimator are used to estimate the unknown shape parameter (b). Reliability function are obtained using symmetric loss functions by using three types of informative priors two single priors and one double prior. In addition, a comparison is made for the performance of these estimators with respect to the numerical solution which are found using expansion method. The
... Show MoreObjective: to assess the predictive value of Doppler imaging of the uterine artery in the identification of early intrauterine abnormal pregnancy as compared to a normal intrauterine pregnancy.
Subjects and methods: one hundred and twenty pregnant ladies, at their 6-12 weeks of gestation, with a singleton pregnancy were included in this population-based case-control study. Thirty women with a missed miscarriage, 30 with hydatidiform mole, 30 with a blighted ovum, and 30 as a control group, without risk factors, underwent Doppler interrogation of the uterine arteries. Resistive index (RI), pulsatility index (PI), and the systolic/diastolic ratio (S/D) were measured for both sides. The t-test, or ANOVA test when a
... Show More