Preferred Language
Articles
/
4RjNspQBVTCNdQwC5h4P
The Blockchain for Healthcare 4.0 Apply in Standard Secure Medical Data Processing Architecture
...Show More Authors

Cloud-based Electronic Health Records (EHRs) have seen a substantial increase in usage in recent years, especially for remote patient monitoring. Researchers are interested in investigating the use of Healthcare 4.0 in smart cities. This involves using Internet of Things (IoT) devices and cloud computing to remotely access medical processes. Healthcare 4.0 focuses on the systematic gathering, merging, transmission, sharing, and retention of medical information at regular intervals. Protecting the confidential and private information of patients presents several challenges in terms of thwarting illegal intrusion by hackers. Therefore, it is essential to prioritize the protection of patient medical data that is stored, accessed, and shared on the cloud to avoid unauthorized access or compromise by the authorized components of E-healthcare systems. A multitude of cryptographic methodologies have been devised to offer safe storage, exchange, and access to medical data in cloud service provider (CSP) environments. Traditional methods have not been effective in providing a harmonious integration of the essential components for EHR security solutions, such as efficient computing, verification on the service side, verification on the user side, independence from a trusted third party, and strong security. Recently, there has been a lot of interest in security solutions that are based on blockchain technology. These solutions are highly effective in safeguarding data storage and exchange while using little computational resources. The researchers focused their efforts exclusively on blockchain technology, namely on Bitcoin. The present emphasis has been on the secure management of healthcare records through the utilization of blockchain technology. This study offers a thorough examination of modern blockchain-based methods for protecting medical data, regardless of whether cloud computing is utilized or not. This study utilizes and evaluates several strategies that make use of blockchain. The study presents a comprehensive analysis of research gaps, issues, and a future roadmap that contributes to the progress of new Healthcare 4.0 technologies, as demonstrated by research investigations.

Scopus Clarivate Crossref
View Publication
Publication Date
Tue Mar 01 2016
Journal Name
Al-academy
Semantic Analogy of Quran Text Content Found in Ornamental Figures in Islamic Architecture: وسام كامل عبد الامير
...Show More Authors

This study aims at creating an analogy between Quran text Contents as meanings that have representations as visional shapes within ornamental figures in Islamic architecture. The theoretical framework of the study deals with the concept of semantics and its parts, artistic contents of Quran texts, and ornamental figures in Islamic architecture. The study procedures included a population of (69) figures, (5) of them were chosen deliberately for analysis in accordance with a form that had been presented to a number of experts to ensure its validity. The study reached a number of conclusions, the most significant among them are: adopting natural denotation of direct reference in order to link the ornamental figure to the source it was taken

... Show More
View Publication Preview PDF
Crossref
Publication Date
Wed Jul 01 2020
Journal Name
Journal Of Engineering
An Analytical Solution for the Maximum Tensile Stress and Stress Concentration Factor Investigations for Standard, Asymmetric fillets, Asymmetric Pressure Angle and Profile Shifted Helical and Spur Gears
...Show More Authors

This research introduces a developed analytical method to determine the nominal and maximum tensile stress and investigate the stress concentration factor. The required tooth fillets parametric equations and gears dimensions have been reformulated to take into account the asymmetric fillets radiuses, asymmetric pressure angle, and profile shifting non-standard modifications. An analytical technique has been developed for the determination of tooth weakest section location for standard, asymmetric fillet radiuses, asymmetric pressure angle and profile shifted involute helical and spur gears. Moreover, an analytical equation to evaluate gear tooth-loading angle at any radial distance on the involute profile of spur and hel

... Show More
View Publication Preview PDF
Crossref (2)
Crossref
Publication Date
Sat Jan 01 2011
Journal Name
International Journal Of Data Analysis Techniques And Strategies
A class of efficient and modified testimators for the mean of normal distribution using complete data
...Show More Authors

View Publication
Scopus (9)
Crossref (2)
Scopus Crossref
Publication Date
Mon Dec 03 2018
Journal Name
Journal Of Engineering
Similarity and Difference between Sustainable and Green Architecture (a Comparative Study)
...Show More Authors

The research is concerned with studying the characteristics of Sustainable Architecture and Green Architecture, as a general research methodology related to the specific field of architecture, based on the differentiation between two generic concepts, Sustainability and Greening, to form the framework of the research specific methodology, where both concepts seem to be extremely overlapping for research centers, individuals, and relevant organizations. In this regard, the research tend towards searching their characteristics and to clearly differentiates between the two terms, particularly in architecture, where the research seeks understanding sustainable and green architectures, how they are so close or so far, and the

... Show More
View Publication Preview PDF
Crossref (3)
Crossref
Publication Date
Mon Oct 01 2018
Journal Name
International Journal Of Electrical And Computer Engineering
Load balance in data center SDN networks
...Show More Authors

In the last two decades, networks had been changed according to the rapid changing in its requirements. The current Data Center Networks have large number of hosts (tens or thousands) with special needs of bandwidth as the cloud network and the multimedia content computing is increased. The conventional Data Center Networks (DCNs) are highlighted by the increased number of users and bandwidth requirements which in turn have many implementation limitations. The current networking devices with its control and forwarding planes coupling result in network architectures are not suitable for dynamic computing and storage needs. Software Defined networking (SDN) is introduced to change this notion of traditional networks by decoupling control and

... Show More
Publication Date
Fri Dec 30 2022
Journal Name
Iraqi Journal Of Chemical And Petroleum Engineering
Normalize and De-Normalize of Relative Permeability Data for Mishrif Formation in WQ1: An Experimental Work
...Show More Authors

In many oil-recovery systems, relative permeabilities (kr) are essential flow factors that affect fluid dispersion and output from petroleum resources. Traditionally, taking rock samples from the reservoir and performing suitable laboratory studies is required to get these crucial reservoir properties. Despite the fact that kr is a function of fluid saturation, it is now well established that pore shape and distribution, absolute permeability, wettability, interfacial tension (IFT), and saturation history all influence kr values. These rock/fluid characteristics vary greatly from one reservoir region to the next, and it would be impossible to make kr measurements in all of them. The unsteady-state approach was used to calculate the relat

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Wed Oct 17 2018
Journal Name
Journal Of Economics And Administrative Sciences
New Robust Estimation in Compound Exponential Weibull-Poisson Distribution for both contaminated and non-contaminated Data
...Show More Authors

Abstract

The research Compared two methods for estimating fourparametersof the compound exponential Weibull - Poisson distribution which are the maximum likelihood method and the Downhill Simplex algorithm. Depending on two data cases, the first one assumed the original data (Non-polluting), while the second one assumeddata contamination. Simulation experimentswere conducted for different sample sizes and initial values of parameters and under different levels of contamination. Downhill Simplex algorithm was found to be the best method for in the estimation of the parameters, the probability function and the reliability function of the compound distribution in cases of natural and contaminateddata.

 

... Show More
View Publication Preview PDF
Crossref
Publication Date
Mon Dec 31 2018
Journal Name
Journal Of Theoretical And Applied Information Technology (jatit)
Factors and Model for Sensitive Data Management and Protection in Information Systems’ Decision of Cloud Environment
...Show More Authors

Journal of Theoretical and Applied Information Technology is a peer-reviewed electronic research papers & review papers journal with aim of promoting and publishing original high quality research dealing with theoretical and scientific aspects in all disciplines of IT (Informaiton Technology

View Publication
Publication Date
Sun Mar 04 2012
Journal Name
Baghdad Science Journal
Using fuzzy logic for estimating monthly pan evaporation from meteorological data in Emara/ South of Iraq
...Show More Authors

Evaporation is one of the major components of the hydrological cycle in the nature, thus its accurate estimation is so important in the planning and management of the irrigation practices and to assess water availability and requirements. The aim of this study is to investigate the ability of fuzzy inference system for estimating monthly pan evaporation form meteorological data. The study has been carried out depending on 261 monthly measurements of each of temperature (T), relative humidity (RH), and wind speed (W) which have been available in Emara meteorological station, southern Iraq. Three different fuzzy models comprising various combinations of monthly climatic variables (temperature, wind speed, and relative humidity) were developed

... Show More
View Publication Preview PDF
Crossref
Publication Date
Fri Aug 05 2016
Journal Name
Wireless Communications And Mobile Computing
A comparison study on node clustering techniques used in target tracking WSNs for efficient data aggregation
...Show More Authors

Wireless sensor applications are susceptible to energy constraints. Most of the energy is consumed in communication between wireless nodes. Clustering and data aggregation are the two widely used strategies for reducing energy usage and increasing the lifetime of wireless sensor networks. In target tracking applications, large amount of redundant data is produced regularly. Hence, deployment of effective data aggregation schemes is vital to eliminate data redundancy. This work aims to conduct a comparative study of various research approaches that employ clustering techniques for efficiently aggregating data in target tracking applications as selection of an appropriate clustering algorithm may reflect positive results in the data aggregati

... Show More
View Publication
Scopus (31)
Crossref (23)
Scopus Clarivate Crossref