Electronic Health Record (EHR) systems are used as an efficient and effective method of exchanging patients’ health information with doctors and other key stakeholders in the health sector to obtain improved patient treatment decisions and diagnoses. As a result, questions regarding the security of sensitive user data are highlighted. To encourage people to move their sensitive health records to cloud networks, a secure authentication and access control mechanism that protects users’ data should be established. Furthermore, authentication and access control schemes are essential in the protection of health data, as numerous responsibilities exist to ensure security and privacy in a network. So, the main goal of our s
... Show More: Partial purification of phosphoenolpyruvate carboxykinase (PEPCK) from type 2 diabetic patients sera take place using some purification steps such as participation with ammonium sulphate (55-80%) and filtered through dialysis, then ion exchange chromatography by DEAE sepharose anion column, gel filtration chromatography by sephadex G-100 column. In ion exchange step, there are four peak are obtained, the highest enzyme activity obtained by (0.4 M Nacl) with purification fold (2.18), yield (44.3) of enzyme and specific activity (13.5) mg/ng, which obtained a single peak by gel filtration chromatography, the degree of purification (5.34) fold, yield of enzyme (20%) with specific activity (33.109mg/ng). The purified enzyme had an optimum tem
... Show MoreThe study aimed to purification of acid phosphatase (ACP) from sera of obesetype 2 diabetes mellitus patients, this study included from thirty T2DM patients and thirty control, purification process was done with several steps included precipitation with inorganic salt (NH4 ) 2SO4 30%-80%, dialysis, ion exchange chromatography by DEAE sepharose anion column and size exclusion chromatography by Sepharose 6B.ACP, BMI, FBS, HbA1c, Lipid profile, Urea, Creatinie, Insuline, Homa-IR were determined. Results showed the precipitate and concentrated protein appeared four peaks in ion exchange column. ACP located in the first and second peak with purification fold (21.1), (37.2) yield of enzyme and specific activity (173.3) IU/ml, which obtained a si
... Show MoreIn this paper, several types of space-time fractional partial differential equations has been solved by using most of special double linear integral transform â€double Sumudu â€. Also, we are going to argue the truth of these solutions by another analytically method “invariant subspace methodâ€. All results are illustrative numerically and graphically.
This research discussed, the process of comparison between the regression model of partial least squares and tree regression, where these models included two types of statistical methods represented by the first type "parameter statistics" of the partial least squares, which is adopted when the number of variables is greater than the number of observations and also when the number of observations larger than the number of variables, the second type is the "nonparametric statistic" represented by tree regression, which is the division of data in a hierarchical way. The regression models for the two models were estimated, and then the comparison between them, where the comparison between these methods was according to a Mean Square
... Show MoreThis paper aims to decide the best parameter estimation methods for the parameters of the Gumbel type-I distribution under the type-II censorship scheme. For this purpose, classical and Bayesian parameter estimation procedures are considered. The maximum likelihood estimators are used for the classical parameter estimation procedure. The asymptotic distributions of these estimators are also derived. It is not possible to obtain explicit solutions of Bayesian estimators. Therefore, Markov Chain Monte Carlo, and Lindley techniques are taken into account to estimate the unknown parameters. In Bayesian analysis, it is very important to determine an appropriate combination of a prior distribution and a loss function. Therefore, two different
... Show MoreThis paper presents a study of a syndrome coding scheme for different binary linear error correcting codes that refer to the code families such as BCH, BKLC, Golay, and Hamming. The study is implemented on Wyner’s wiretap channel model when the main channel is error-free and the eavesdropper channel is a binary symmetric channel with crossover error probability (0 < Pe ≤ 0.5) to show the security performance of error correcting codes while used in the single-staged syndrome coding scheme in terms of equivocation rate. Generally, these codes are not designed for secure information transmission, and they have low equivocation rates when they are used in the syndrome coding scheme. Therefore, to improve the transmiss
... Show MoreThe study consists of video clips of all cars parked in the selected area. The studied camera height is1.5 m, and the video clips are 18video clips. Images are extracted from the video clip to be used for training data for the cascade method. Cascade classification is used to detect license plates after the training step. Viola-jones algorithm was applied to the output of the cascade data for camera height (1.5m). The accuracy was calculated for all data with different weather conditions and local time recoding in two ways. The first used the detection of the car plate based on the video clip, and the accuracy was 100%. The second is using the clipped images stored in the positive file, based on the training file (XML file), where the ac
... Show More