Cloud-based Electronic Health Records (EHRs) have seen a substantial increase in usage in recent years, especially for remote patient monitoring. Researchers are interested in investigating the use of Healthcare 4.0 in smart cities. This involves using Internet of Things (IoT) devices and cloud computing to remotely access medical processes. Healthcare 4.0 focuses on the systematic gathering, merging, transmission, sharing, and retention of medical information at regular intervals. Protecting the confidential and private information of patients presents several challenges in terms of thwarting illegal intrusion by hackers. Therefore, it is essential to prioritize the protection of patient medical data that is stored, accessed, and shared on the cloud to avoid unauthorized access or compromise by the authorized components of E-healthcare systems. A multitude of cryptographic methodologies have been devised to offer safe storage, exchange, and access to medical data in cloud service provider (CSP) environments. Traditional methods have not been effective in providing a harmonious integration of the essential components for EHR security solutions, such as efficient computing, verification on the service side, verification on the user side, independence from a trusted third party, and strong security. Recently, there has been a lot of interest in security solutions that are based on blockchain technology. These solutions are highly effective in safeguarding data storage and exchange while using little computational resources. The researchers focused their efforts exclusively on blockchain technology, namely on Bitcoin. The present emphasis has been on the secure management of healthcare records through the utilization of blockchain technology. This study offers a thorough examination of modern blockchain-based methods for protecting medical data, regardless of whether cloud computing is utilized or not. This study utilizes and evaluates several strategies that make use of blockchain. The study presents a comprehensive analysis of research gaps, issues, and a future roadmap that contributes to the progress of new Healthcare 4.0 technologies, as demonstrated by research investigations.
Let be an n-Banach space, M be a nonempty closed convex subset of , and S:M→M be a mapping that belongs to the class mapping. The purpose of this paper is to study the stability and data dependence results of a Mann iteration scheme on n-Banach space
The importance of this study stems from the importance of preserving the environment and creating a clean sustainable environment from waste and emissions and all the operations of industrial companies in general and cement companies in particular by activating sustainability accounting standards. The research aims to identify and diagnose deviations in violation of sustainability standards by employing the non-renewable resources standard (NR0401) For the construction industries to create a sustainable audit environment, the deductive approach was followed in the theoretical side and the inductive and descriptive approach to the practical side. The most important results of the research were the possibility of applying sustainab
... Show MoreThe Accounting Disclosure for non-current intangible assets is necessary to rely on accounting information by decision makers in the economic unity, two international accounting standards issued (IAS16,36), which aims to provide the foundations of the recognition, measurement and disclosure of appropriate assets Non-current tangible. (IAS16) allowed to use re-evaluation approach to measure assets entrance due to the inadequacy of the accounting information resulting from the application of the historical cost of the entrance under increasing technical developments and continuing that leave clear their effects on non-current intangible assets, As well as the requirements of what came (IAS36) the importance of accounting for the impairment
... Show MoreIn this paper, a Monte Carlo Simulation technique is used to compare the performance of MLE and the standard Bayes estimators of the reliability function of the one parameter exponential distribution.Two types of loss functions are adopted, namely, squared error loss function (SELF) and modified square error loss function (MSELF) with informative and non- informative prior. The criterion integrated mean square error (IMSE) is employed to assess the performance of such estimators .
Background: Medication reconciliation can include medication reviewing and providing counseling and a list of all the medications during every transition of care. Objectives: to explore in-depth the perspectives of Iraqi physicians and pharmacists regarding the necessity of medication reconciliation at hospital discharge and identify the possible benefits and challenges that could face its implementation. Subjects and Methods: A qualitative study included semi-structured interviews with pharmacists and physicians working at a public teaching hospital in Iraq. The interviews were conducted face-to-face from February to March 2023. Thematic analysis was used to analyze the qualitative data generated from the interviews. Results: In th
... Show MoreTamoxifen citrate (TAM) is one of the most regularly used therapy in hormone receptor-positive breast cancer. Although it is a successful treatment, there is a problem with its bioavailability, accordingly this study was designed to improve TAM solubility and reduce its associated toxicity. TAM-Loaded poly (D, L-lactide –co- glycolide) nanostructure (TAM-loaded PLGA) has been synthesized and employed both in vitro and in vivo experiments. The blood hemolysis induced by TAM- loaded PLGA was 4.6 % at 200 µg mL-1, indicating that this nano-construct led to increased red blood cell protection. DNA molecule integrity was assessed and results indicated that DNA strands were protected from destruction at 200 µg mL-1. T
... Show MoreBeyond the immediate content of speech, the voice can provide rich information about a speaker's demographics, including age and gender. Estimating a speaker's age and gender offers a wide range of applications, spanning from voice forensic analysis to personalized advertising, healthcare monitoring, and human-computer interaction. However, pinpointing precise age remains intricate due to age ambiguity. Specifically, utterances from individuals at adjacent ages are frequently indistinguishable. Addressing this, we propose a novel, end-to-end approach that deploys Mozilla's Common Voice dataset to transform raw audio into high-quality feature representations using Wav2Vec2.0 embeddings. These are then channeled into our self-attentio
... Show MoreCloud computing represents the most important shift in computing and information technology (IT). However, security and privacy remain the main obstacles to its widespread adoption. In this research we will review the security and privacy challenges that affect critical data in cloud computing and identify solutions that are used to address these challenges. Some questions that need answers are: (a) User access management, (b) Protect privacy of sensitive data, (c) Identity anonymity to protect the Identity of user and data file. To answer these questions, a systematic literature review was conducted and structured interview with several security experts working on cloud computing security to investigate the main objectives of propo
... Show More