A medical- service platform is a mobile application through which patients are provided with doctor’s diagnoses based on information gleaned from medical images. The content of these diagnostic results must not be illegitimately altered during transmission and must be returned to the correct patient. In this paper, we present a solution to these problems using blind, reversible, and fragile watermarking based on authentication of the host image. In our proposed algorithm, the binary version of the Bose_Chaudhuri_Hocquengham (BCH) code for patient medical report (PMR) and binary patient medical image (PMI) after fuzzy exclusive or (F-XoR) are used to produce the patient's unique mark using secret sharing schema (SSS). The patient’s unique mark is used later as a watermark to be embedded into host PMI using blind watermarking-based singular value decomposition (SVD) algorithm. This is a new solution that we also proposed to applying SVD into a blind watermarking image. Our algorithm preserves PMI content authentication during the transmission and PMR ownership to the patient for subsequently transmitting associated diagnosis to the correct patient via a mobile telemedicine application. The performance of experimental results is high compare to previous results, uses recovered watermarks demonstrating promising results in the tamper detection metrics and self-recovery capability, with 30db PSNR, NC value is 0.99.
Information hiding strategies have recently gained popularity in a variety of fields. Digital audio, video, and images are increasingly being labelled with distinct but undetectable marks that may contain a hidden copyright notice or serial number, or even directly help to prevent unauthorized duplication. This approach is extended to medical images by hiding secret information in them using the structure of a different file format. The hidden information may be related to the patient. In this paper, a method for hiding secret information in DICOM images is proposed based on Discrete Wavelet Transform (DWT). Firstly. segmented all slices of a 3D-image into a specific block size and collecting the host image depend on a generated key
... Show MoreThis paper exclusively deals with medical encounters. . Structurally and thematically, it manifests itself in five parts. The First part deals with medical encounters as well as essential speech activities which cover (a) frames (certain types of talk) (b) the patient’s account and the patient’s story or more precisely the patient telling his story and (c) the act of questioning the patient. The Second part revolves round genre and register. The former, in most cases, suggests that the format of medical encounters is conversational. With register; we have a converse reality that restrictively tries to narrow things and give them a certain flavor. The Third part realizes the technicalities of medical encounters (a) the setting of an inte
... Show MoreCyber security is a term utilized for describing a collection of technologies, procedures, and practices that try protecting an online environment of a user or an organization. For medical images among most important and delicate data kinds in computer systems, the medical reasons require that all patient data, including images, be encrypted before being transferred over computer networks by healthcare companies. This paper presents a new direction of the encryption method research by encrypting the image based on the domain of the feature extracted to generate a key for the encryption process. The encryption process is started by applying edges detection. After dividing the bits of the edge image into (3×3) windows, the diffusions
... Show MoreAccountancy unit is looked is upon as unit that established for the purpose achieve it goals and programmers for unlimited time. Unless otherwise take place such as liquation whether voluntary or mandatory. Thus going concern logic is considered to be the logical foundation witch the familiar accounting principles are based upon. The future of a Company real its financial statues and position and the extent of it ability to face events in future. Hence the success and continuity its activities depend on the extent of the company activity to generate profits. And its ability to retain appropriate liquidity to serve its debts.
Therefore financial statements of the company consider to be on
... Show MoreThis work addressed the assignment problem (AP) based on fuzzy costs, where the objective, in this study, is to minimize the cost. A triangular, or trapezoidal, fuzzy numbers were assigned for each fuzzy cost. In addition, the assignment models were applied on linguistic variables which were initially converted to quantitative fuzzy data by using the Yager’sorankingi method. The paper results have showed that the quantitative date have a considerable effect when considered in fuzzy-mathematic models.
The design and implementation of an active router architecture that enables flexible network programmability based on so-called "user components" will be presents. This active router is designed to provide maximum flexibility for the development of future network functionality and services. The designed router concentrated mainly on the use of Windows Operating System, enhancing the Active Network Encapsulating Protocol (ANEP). Enhancing ANEP gains a service composition scheme which enables flexible programmability through integration of user components into the router's data path. Also an extended program that creates and then injects data packets into the network stack of the testing machine will be proposed, we will call this program
... Show MoreThe communication networks (mobile phone networks, social media platforms) produce digital traces from their usages. This type of information help to understand and analyze the human mobility in very accurate way. By these analyzes over cities, it can give powerful data on daily citizen activities, urban planners have in that way, relevant indications for decision making on design and development. As well as, the Call detail Records (CDRs) provides valuable spatiotemporal data at the level of citywide or even nationwide. The CDRs could be analyzed to extract the life patterns and individuals mobility in an observed urban area and during ephemeral events. Whereas, their analysis gives conceptual views about human density and mobility pattern
... Show MoreThere are different types of corruptions such as administrative, political, economic and financial corruption. The corruption forms also varied such as bribery, nepotism and extortion. All types and forms of corruption play significant role in the all economic variables generally and on investments in particular, and the corruption used to be an intermediate means in reducing the rate of economic growth. The corruption contributes in reducing the domestic investments via pay bribery by investors to officials’ persons for supplemental contracts and tenders which finally leads to reduction in the investment efficiency. The corruption also contributes in rise of operational costs for the investment projects. In additio
... Show MoreAbstract
Objective(s): To evaluate housekeeping services staff work environment and their health status, as well as to determine the impact of the work environment upon their health status.
Methodology: A descriptive design is employed throughout the present study to evaluate housekeeping services staff work environment and their health status, as well as to determine the impact of the work environment upon their health status from November 3rd 2017 to June 30th 2018. A purposive “nonprobability” sample of (101) housekeeping staff is selected for the present study. An instrument is constructed for the purpose of the study and it is consists of (2) parts: (I) Evaluation of work environment, and (II) Evaluation of housekeeping st