Attacking a transferred data over a network is frequently happened millions time a day. To address this problem, a secure scheme is proposed which is securing a transferred data over a network. The proposed scheme uses two techniques to guarantee a secure transferring for a message. The message is encrypted as a first step, and then it is hided in a video cover. The proposed encrypting technique is RC4 stream cipher algorithm in order to increase the message's confidentiality, as well as improving the least significant bit embedding algorithm (LSB) by adding an additional layer of security. The improvement of the LSB method comes by replacing the adopted sequential selection by a random selection manner of the frames and the pixels with two secret random keys. Therefore, the hidden message remains protected even if the stego-object is hacked because the attacker is unable to know the correct frames and pixels that hold each bit of the secret message in addition to difficulty to successfully rebuild the message. The results refer to that the proposed scheme provides a good performance for evaluation metric that is used in this purpose when compared to a large number of related previous methods.
Background: Medication reconciliation can include medication reviewing and providing counseling and a list of all the medications during every transition of care. Objectives: to explore in-depth the perspectives of Iraqi physicians and pharmacists regarding the necessity of medication reconciliation at hospital discharge and identify the possible benefits and challenges that could face its implementation. Subjects and Methods: A qualitative study included semi-structured interviews with pharmacists and physicians working at a public teaching hospital in Iraq. The interviews were conducted face-to-face from February to March 2023. Thematic analysis was used to analyze the qualitative data generated from the interviews. Results: In th
... Show MoreThe most significant water supply, which is the basis of agriculture, industry and human and wildlife needs, is the river. In order to determine its suitability for drinking purposes, this study aims to measure the Water Quality Index (WQI) of the Tigris River in the Salah Al-Din Province (center of Tikrit), north of Baghdad. For ten (9) physio-chemical parameters, namely turbidity, total suspended sediments, PH, electrical conductivity, total dissolved solids, alkalinity, chloride, nitrogen as nitrate, sulphate, and then transported for examination to the laboratory, water samples were collected from 13 locations along the Tigris river. Using the weighted arithmetic index method, the WQI was measured and found to be 105,87 in up-stream, wh
... Show MoreSurface electromyography (sEMG) and accelerometer (Acc) signals play crucial roles in controlling prosthetic and upper limb orthotic devices, as well as in assessing electrical muscle activity for various biomedical engineering and rehabilitation applications. In this study, an advanced discrimination system is proposed for the identification of seven distinct shoulder girdle motions, aimed at improving prosthesis control. Feature extraction from Time-Dependent Power Spectrum Descriptors (TDPSD) is employed to enhance motion recognition. Subsequently, the Spectral Regression (SR) method is utilized to reduce the dimensionality of the extracted features. A comparative analysis is conducted between the Linear Discriminant Analysis (LDA) class
... Show MoreGas and downhole water sink-assisted gravity drainage (GDWS-AGD) is a new process of enhanced oil recovery (EOR) in oil reservoirs underlain by large bottom aquifers. The process is capital intensive as it requires the construction of dual-completed wells for oil production and water drainage and additional multiple vertical gas-injection wells. The costs could be substantially reduced by eliminating the gas-injection wells and using triple-completed multi-functional wells. These wells are dubbed triple-completion-GDWS-AGD (TC-GDWS-AGD). In this work, we design and optimize the TC-GDWS-AGD oil recovery process in a fictitious oil reservoir (Punq-S3) that emulates a real North Sea oil field. The design aims at maximum oil recovery us
... Show MoreIn this research, the Williamson-Hall method and of size-strain plot method was employed to analyze X- ray lines for evaluating the crystallite size and lattice strain and of cadmium oxide nanoparticles. the crystallite size value is (15.2 nm) and (93.1 nm) and lattice strain (4.2 x10−4 ) and (21x10−4) respectively. Also, other methods have been employed to evaluate the crystallite size. The current methods are (Sherrer and modified Sherrer methods ) and their results are (14.8 nm) and (13.9nm) respectively. Each method of analysis has a different result because the alteration in the crystallite size and lattice strain calculated according to the Williamson-Hall and size-strain plot methods shows that the non-uniform strain in nan
... Show MoreAsthma is a chronic inflammatory disease of airways mediated by T-helper 2 (Th2) cells involving complex signaling pathways. Although resveratrol has previously been shown to attenuate allergic asthma, the role of miRNA in this process has not been studied. We investigated the effect of resveratrol on ovalbumin-induced experimental allergic asthma in mice. To that end, BALB/c mice were immunized with ovalbumin (OVA) intraperitoneally followed by oral gavage of vehicle (OVA-veh) or resveratrol (100 mg/kg body) (OVA-res). On day 7, the experimental groups received intranasal challenge of OVA followed by 7 days of additional oral gavage of vehicle or resveratrol. At day 15, all mice were euthanized and bronchioalveolar fluid (BALF), se
... Show MoreElectronic Health Record (EHR) systems are used as an efficient and effective method of exchanging patients’ health information with doctors and other key stakeholders in the health sector to obtain improved patient treatment decisions and diagnoses. As a result, questions regarding the security of sensitive user data are highlighted. To encourage people to move their sensitive health records to cloud networks, a secure authentication and access control mechanism that protects users’ data should be established. Furthermore, authentication and access control schemes are essential in the protection of health data, as numerous responsibilities exist to ensure security and privacy in a network. So, the main goal of our s
... Show MoreNegotiation is considered as one of the most important kinds of communication in the contemporary organizations, which depend on the important role of managerial information systems in providing necessary and suitable information for success of the negotiation process.
Accordingly, this study aims at measuring the extent of the variables effect of managerial information system in the negotiation process.
To achieve this study, two hypotheses were chosen; the first is the correlation relation and the second is the effect, and statistical means represented by correlation coefficient "Spearman" and (R2) were used.
A Number of conclusions were
... Show MoreIn this paper,we estimate the parameters and related probability functions, survival function, cumulative distribution function , hazard function(failure rate) and failure (death) probability function(pdf) for two parameters Birnbaum-Saunders distribution which is fitting the complete data for the patients of lymph glands cancer. Estimating the parameters (shape and scale) using (maximum likelihood , regression quantile and shrinkage) methods and then compute the value of mentioned related probability functions depending on sample from real data which describe the duration of survivor for patients who suffer from the lymph glands cancer based on diagnosis of disease or the inter of patients in a hospital for perio
... Show More