Preferred Language
Articles
/
4RjNspQBVTCNdQwC5h4P
The Blockchain for Healthcare 4.0 Apply in Standard Secure Medical Data Processing Architecture
...Show More Authors

Cloud-based Electronic Health Records (EHRs) have seen a substantial increase in usage in recent years, especially for remote patient monitoring. Researchers are interested in investigating the use of Healthcare 4.0 in smart cities. This involves using Internet of Things (IoT) devices and cloud computing to remotely access medical processes. Healthcare 4.0 focuses on the systematic gathering, merging, transmission, sharing, and retention of medical information at regular intervals. Protecting the confidential and private information of patients presents several challenges in terms of thwarting illegal intrusion by hackers. Therefore, it is essential to prioritize the protection of patient medical data that is stored, accessed, and shared on the cloud to avoid unauthorized access or compromise by the authorized components of E-healthcare systems. A multitude of cryptographic methodologies have been devised to offer safe storage, exchange, and access to medical data in cloud service provider (CSP) environments. Traditional methods have not been effective in providing a harmonious integration of the essential components for EHR security solutions, such as efficient computing, verification on the service side, verification on the user side, independence from a trusted third party, and strong security. Recently, there has been a lot of interest in security solutions that are based on blockchain technology. These solutions are highly effective in safeguarding data storage and exchange while using little computational resources. The researchers focused their efforts exclusively on blockchain technology, namely on Bitcoin. The present emphasis has been on the secure management of healthcare records through the utilization of blockchain technology. This study offers a thorough examination of modern blockchain-based methods for protecting medical data, regardless of whether cloud computing is utilized or not. This study utilizes and evaluates several strategies that make use of blockchain. The study presents a comprehensive analysis of research gaps, issues, and a future roadmap that contributes to the progress of new Healthcare 4.0 technologies, as demonstrated by research investigations.

Scopus Clarivate Crossref
View Publication
Publication Date
Sat Jan 05 2019
Journal Name
Iraqi Journal Of Physics
The study of the bending property of the epoxy (Ep / MgO) and (Ep/SiO2) composites in natural conditions and after immersion in chemical solution
...Show More Authors

In this paper, a polymer-based composite material was prepared by hand Lay-up method consisting of epoxy resin as a base material reinforced by magnesium oxide powder once and silicon dioxide powder again and with different weight ratios (3, 6, 9 and 12) wt %. The three-point bending test was performed in normal conditions and after immersion in sulfuric acid. The results showed that the bending value decreased with the increase of the weighted ratio of the reinforcement material (MgO, SiO2). The Bending of samples reinforced by SiO2 was found to be less than the bending of samples reinforced by particles (MgO). For example, the bending of the SiO2 sample (0.32 mm) at the weighted ratio (3%) and for the MgO (0.18mm) sample at the weight

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Tue Jun 30 2020
Journal Name
Journal Of Economics And Administrative Sciences
(Quality and originality in scientific research from the point of view of the participants in the course (qualification of scholars of Bayt al-Hikma)
...Show More Authors

Research aims (Quality and originality in scientific research from the point of view of the participants in the course (qualification of scholars of Bayt al-Hikma) To find out how satisfied the participants about the training course held by the house of wisdom (research community), To develop and maximize the capacity of researchers in the field of writing scientific research, As well as establishing frameworks and concepts and standards related to quality and authenticity scientific research, The role played by this kind of research in the service of the movement of the human journey towards progress and prosperity.

On this basis was the research community, their number was (23) common t

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun Jun 01 2014
Journal Name
Journal Of Accounting And Financial Studies ( Jafs )
Performance evaluation of vocational and administrative institutions in the media using the bench-marking of new media: analytical study in the Journal of time
...Show More Authors

Provides the style of benchmarking the best possible use whenevaluating the performance and evaluation, as well as improved performance,due to its consistency with the principles of good evaluation of theperformance, an extension of the completion of several functions of the timeand cost less, thereby increasing the efficiency of the management of theinstitutions, especially institutions, the media, as it became public the future ofthe message sender to the same time Zaorosaúl new media is challenging thetraditional media of what distinguishes this new interactive media and mass ledto this transition . However, the media Aljdidhoosaúl traditional mediacontinue to coexist and reinforce each Menhmaalakhr, for his wealth offreedom of opin

... Show More
View Publication Preview PDF
Publication Date
Thu Feb 09 2023
Journal Name
Journal Of Educational And Psychological Researches
Measuring the Effect of Reinforcement (Regular-Irregular) in Gamification upon Developing the Computer Skills among Secondary Education Students in the Kingdom Of Saudi Arabia
...Show More Authors

Abstract

This research aims to identify the effect of measuring reinforcement (regular - irregular) in gamification upon developing computer skills among secondary education students in the Kingdom of Saudi Arabia. The research experiment was applied on two samples of (68) secondary education students in the Kingdom of Saudi Arabia in the Aurar region. The results revealed there is a significant difference between the experimental group that used (irregular) reinforcement and the control group used (regular) reinforcement in gamification through the post-application of the electronic programming test and through the programming, language skills observing card (Visual Basic Studio).

View Publication Preview PDF
Publication Date
Wed Sep 11 2024
Journal Name
Edelweiss Applied Science And Technology
The effectiveness of a proposed strategy according to the Fraunhofer model of knowledge management in the achievement of second intermediate female students in mathematics
...Show More Authors

The goal of the research is to identify the effectiveness of using a proposed strategy according to the Fraunhofer model of knowledge management in mathematics achievement for second-grade female students in middle and high schools affiliated with the General Directorate of Education in Baghdad / Al-Karkh II. The objective was to prove the following null hypothesis: "The average scores of the experimental group who will study with the proposed strategy according to the Fraunhofer model and the scores of the control group students who will study in the usual way in the mathematics achievement test are not statistically significant different at the significance level (0.05)." The General Directorate of Education of Baghdad / Al-Karkh

... Show More
View Publication
Scopus Crossref
Publication Date
Sun Jul 03 2011
Journal Name
Journal Of Educational And Psychological Researches
Effect of using the active learning in the achievement of third grade intermediate students in mathematics and them tendency towards the study of its
...Show More Authors

Current research aims to find out:

  1. Effect of using the active learning in the achievement of third grade intermediate students in mathematics.
  2. Effect of using of active learning in the tendency towards the study of mathematics for students of third grade intermediate.

In order to achieve the goals of the research, the researcher formulated the following two hypotheses null:

  1. There is no difference statistically significant at the level of significance (0.05) between two average of degrees to achievement

... Show More
View Publication Preview PDF
Publication Date
Sat Jun 01 2019
Journal Name
Journal Of Economics And Administrative Sciences
The usage of accounting information according to (Demerjian.et.al) model in order to measure the efficiency of industrial companies listed in the Iraqi Stock Exchange
...Show More Authors

   The aim of the research is to measure the efficiency of the companies in the industrial sector listed in the Iraqi Stock Exchange , by directing these companies to their resources (inputs) towards achieving the greatest possible returns (outputs) or reduce those resources while maintaining the level of returns to achieve the efficiency of these companies, therefore, in order to achieve the objectives of the research, it was used (Demerjian.et.al) model to measure the efficiency of companies and the factors influencing them. The researchers had got a number of conclusions , in which the most important of them is that 66.6% of the companies in the research sample do no

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sat Jun 01 2019
Journal Name
Journal Of Economics And Administrative Sciences
The usage of accounting information according to (Demerjian.et.al) model in order to measure the efficiency of industrial companies listed in the Iraqi Stock Exchange
...Show More Authors

The aim of the research is to measure the efficiency of the companies in the industrial sector listed in the Iraqi Stock Exchange , by directing these companies to their resources (inputs) towards achieving the greatest possible returns (outputs) or reduce those resources while maintaining the level of returns to achieve the efficiency of these companies, therefore, in order to achieve the objectives of the research, it was used (Demerjian.et.al) model to measure the efficiency of companies and the factors influencing them. The researchers had got a number of conclusions , in which the most important of them is that 66.6% of the companies in the research sample do not possess relatively high efficiency and that the combined factors (the nat

... Show More
View Publication
Publication Date
Mon May 23 2016
Journal Name
Iraqi Journal Of Market Research And Consumer Protection
Iraqi Pharmaceutical Formula for Clonazepam Oral Drop 2.5 mg/ ml to Treat Seizure Epilepsy in Infants and Children with its Stability Study.: Iraqi Pharmaceutical Formula for Clonazepam Oral Drop 2.5 mg/ ml to Treat Seizure Epilepsy in Infants and Children with its Stability Study.
...Show More Authors

This work has been carried out to develop national drug product contains 2.5mg/ml clonazepam as oral drop; it is used for the treatment of epilepsy in infants and children.
Several formulations were prepared using oral drop base, flavor, buffer, sweeteners and preservatives. Selection of best formula relied solely on physic-chemical testing of samples.
Stability study was conducted on the product for six months at different temperatures to determine the expiration date and the best storage conditions.
From the study we obtained an oral drop of good clear solution. The expiry date calculated to be not less than 2 years.

View Publication Preview PDF
Publication Date
Wed Apr 01 2015
Journal Name
Ibn Al-haitham Journal For Pure And Applied Science
Security For Three -Tired Web Application
...Show More Authors

Web application protection lies on two levels: the first is the responsibility of the server management, and the second is the responsibility of the programmer of the site (this is the scope of the research). This research suggests developing a secure web application site based on three-tier architecture (client, server, and database). The security of this system described as follows: using multilevel access by authorization, which means allowing access to pages depending on authorized level; password encrypted using Message Digest Five (MD5) and salt. Secure Socket Layer (SSL) protocol authentication used. Writing PHP code according to set of rules to hide source code to ensure that it cannot be stolen, verification of input before it is s

... Show More
Preview PDF