Secure storage of confidential medical information is critical to healthcare organizations seeking to protect patient's privacy and comply with regulatory requirements. This paper presents a new scheme for secure storage of medical data using Chaskey cryptography and blockchain technology. The system uses Chaskey encryption to ensure integrity and confidentiality of medical data, blockchain technology to provide a scalable and decentralized storage solution. The system also uses Bflow segmentation and vertical segmentation technologies to enhance scalability and manage the stored data. In addition, the system uses smart contracts to enforce access control policies and other security measures. The description of the system detailing and p
... Show MoreThe research problem lies in the fundamental questions that revolve around the role of each of the tools of promotion, namely advertising, personal sale, public relations, sales promotion, and direct marketing in achieving leadership for business organizations. Research to know the role of promoting the service in the researched company and whether the promotion of the service is qualified to lead the researched company to leadership, and for this purpose formulated research hypotheses of three hypotheses, the first hypothesis says that there is a significant impact relationship between promotion and entrepreneurship. The second hypothesis aimed to determine the role played by promotion in the researched company to achieve unique
... Show MoreMarriage is considered one of the strongest ties that links between two human beings , but after the evolutions that happened in our Arab communities and specifically in the Iraqi community , marriage through the internet websites appeared . this kind of marriage is considered one of the new phenomena that appeared in the present time in many societies. That was through internet websites like yahoo , Facebook and other websites that have chat features.
The Islamic sharia looks negatively at marriage through the internet announcing that this way is harmful for both the man and the woman
The migration from IPv4 to IPv6 can not be achieved in a brief period, thus both protocols co-exist at certain years. IETF Next Generation Transition Working Group (NGtrans) developed IPv4/IPv6 transition mechanisms. Since Iraq infrastructure, including universities, companies and institutions still use IPv4 protocol only. This research article tries to highlight, discuss a required transition roadmap and extend the local knowledge and practice on IPv6. Also, it introduces a prototype model using Packet tracer (network simulator) deployed for the design and implementation of IPv6 migration. Finally, it compares and evaluates the performance of IPv6, IPv4 and dual stack using OPNET based on QoS metrics such as throughput, delay and point to
... Show MoreThe thermal performance of a flat-plate solar collector (FPSC) using novel heat transfer fluids of aqueous colloidal dispersions of covalently functionalized multi-walled carbon nanotubes with β-Alanine (Ala-MWCNTs) has been studied. Multi-walled carbon nanotubes (MWCNTs) with outside diameters of (< 8 nm) and (20–30 nm) having specific surface areas (SSAs) of (500 m2/g) and (110 m2/g), respectively, were utilized. For each Ala-MWCNTs, waterbased nanofluids were synthesized using weight concentrations of 0.025%, 0.05%, 0.075%, and 0.1%. A MATLAB code was built and a test rig was designed and developed. Heat flux intensities of 600, 800, and 1000 W/m2; mass flow rates of 0.6, 1.0, and 1.4 kg/min; and inlet fluid temperatures of 30, 40, an
... Show MoreThe problem of the paper focused on the role of the learning organization in the crisis management strategy, and the extent of the actual interest in both the learning organization and the crisis management and aimed at diagnosing and analyzing that and surrounding questions. The Statistical Package for the Social Sciences (SPSS) program was used to calculate the results and the correlation coefficient between the two main variables. The methodology was descriptive and analytical. The case study was followed by a questionnaire that was distributed to a sample of 31 teachers. The paper adopted a seven-dimensional model of systemic thinking that encourages questioning, empowerment, provision of advanced technologies, and strategic lea
... Show MoreBackground: Insufficient sleep due to excessive media use is linked to decrease physical activity, poor nutrition, obesity, and decreased overall health-related quality of life.
Objectives: To assess the effect of using the internet and social media on the sleep of 4th-stage secondary school students.
Subjects and Methods: Cross-sectional study with the analytic element; for 500 secondary school students, obtained by choosing two schools randomly from each of the six educational directorates, by using a structured questionnaire.
Result: Secondary scho
... Show MoreIn the presence of deep submicron noise, providing reliable and energy‐efficient network on‐chip operation is becoming a challenging objective. In this study, the authors propose a hybrid automatic repeat request (HARQ)‐based coding scheme that simultaneously reduces the crosstalk induced bus delay and provides multi‐bit error protection while achieving high‐energy savings. This is achieved by calculating two‐dimensional parities and duplicating all the bits, which provide single error correction and six errors detection. The error correction reduces the performance degradation caused by retransmissions, which when combined with voltage swing reduction, due to its high error detection, high‐energy savings are achieved. The res
... Show More