Secure storage of confidential medical information is critical to healthcare organizations seeking to protect patient's privacy and comply with regulatory requirements. This paper presents a new scheme for secure storage of medical data using Chaskey cryptography and blockchain technology. The system uses Chaskey encryption to ensure integrity and confidentiality of medical data, blockchain technology to provide a scalable and decentralized storage solution. The system also uses Bflow segmentation and vertical segmentation technologies to enhance scalability and manage the stored data. In addition, the system uses smart contracts to enforce access control policies and other security measures. The description of the system detailing and provide an analysis of its security and performance characteristics. The resulting images were tested against a number of important metrics such as Peak Signal-to-Noise Ratio (PSNR), Mean Squared Error (MSE), bit error rate (BER), Signal-to-Noise Ratio (SNR), Normalization Correlation (NC) and Structural Similarity Index (SSIM). Our results showing that the system provides a highly secure and scalable solution for storing confidential medical data, with potential applications in a wide range of healthcare settings.
74 fanners were randomily selected from the Lc:ital. of 406 fanners using the Modern Irrigation System up to November , 2000 , for the purpose of wide adoptation of such system. Rcsults indicated according to the data which has been obtained and statistically analysed by the statistical package for the Social Sciences (SPSS) program showed that the majority of the farmers adopted this new system of irrigation due to the increase in the yield up to 5" .
?Natural Occurrence of aflatoxin Bi and B2 was investigated monthly in paddy rice stored for duration of six months. Aflatoxin B| was detected at the beginning of storage. The concentration of aflatoxin Bi in paddy and polished rice was found to be (0.3 and ()) ppb respectively while aflatoxin B2 W'as not detected in both paddy and polished rice afler six months of storage, concentration of aflatoxin Bi ‘ ’ ' reached 3 ppb in paddy rice and 0.9 ppb in polished rice, while the study proved that the concentration of aflatoxin in paddy rice was higher than polished rice as a result of processing which reduce the toxin
Periodontal disease is typically treated with mechanical debridement of the tooth surface. It may, however, be insufficient to eradicate pathogenic microorganisms on its own. Because of the microbial etiology of periodontitis, systemic or local antibiotic therapy is used as an adjunct treatment. The present study aimed to determine the effects of curcumin gel on Porphyromonas gingivalis. Eleven patients with stage II and III periodontitis were registered in the study. A double-blinded split-mouth design followed. Periodontal pockets were distributed into 2 groups; the test group received scaling and root planing along with curcumin gel, while the control group received scaling and root planing along with a placebo gel. Plaque index,
... Show MoreRice is a major staple food for more than two thirds of the world population. Pathogenesis-related proteins-10 (PR10) have a range of 154 to 163 amino acid with molecular weight ~ 17 kDa. They are acidic and generally intracellular and cytosolic proteins accumulate in plants in response to biotic and abiotic stresses. In the present study, a PR10 gene and its corresponding protein were characterized in O. sativa, O. barthii, O. glaberrima, O. glumipatula, O. meridionalis, O. nivara, O. rufipogon and O. punctata. The results revealed a narrow range of variation at both DNA and protein levels in all examined species except O. glumipatula. The latter showed a relatively
... Show MoreRecently Tobit Quantile Regression(TQR) has emerged as an important tool in statistical analysis . in order to improve the parameter estimation in (TQR) we proposed Bayesian hierarchical model with double adaptive elastic net technique and Bayesian hierarchical model with adaptive ridge regression technique .
in double adaptive elastic net technique we assume different penalization parameters for penalization different regression coefficients in both parameters λ1and λ2 , also in adaptive ridge regression technique we assume different penalization parameters for penalization different regression coefficients i
... Show MoreCNC machines are widely used in production fields since they produce similar parts in a minimum time, at higher speed and with possibly minimum error. A control system is designed, implemented and tested to control the operation of a laboratory CNC milling machine having three axes that are moved by using a stepper motor attached to each axis. The control system includes two parts, hardware part and software part, the hardware part used a PC (works as controller) connected to the CNC machine through its parallel port by using designed interface circuit. The software part includes the algorithms needed to control the CNC. The sample needs to be machined is drawn by using one of the drawing software like AUTOCAD or 3D MAX and is saved in a we
... Show Moreالنظام السياسي اليمني : دراسة في المتغيرات الداخلية
<p>Photovoltaic (PV) systems are becoming increasingly popular; however, arc faults on the direct current (DC) side are becoming more widespread as a result of the effects of aging as well as the trend toward higher DC voltage levels, posing severe risk to human safety and system stability. The parallel arc faults present higher level of current as compared with the series arc faults, making it more difficult to spot the series arc. In this paper and for the aim of condition monitoring, the features of a DC series arc fault are analyzed by analysing the arc features, performing model’s simulation in PSCAD, and carrying out experimental studies. Various arc models are simulated and investigated; for low current arcs, the heur
... Show MoreThis paper proposes two hybrid feature subset selection approaches based on the combination (union or intersection) of both supervised and unsupervised filter approaches before using a wrapper, aiming to obtain low-dimensional features with high accuracy and interpretability and low time consumption. Experiments with the proposed hybrid approaches have been conducted on seven high-dimensional feature datasets. The classifiers adopted are support vector machine (SVM), linear discriminant analysis (LDA), and K-nearest neighbour (KNN). Experimental results have demonstrated the advantages and usefulness of the proposed methods in feature subset selection in high-dimensional space in terms of the number of selected features and time spe
... Show MoreWith the development of communication technologies for mobile devices and electronic communications, and went to the world of e-government, e-commerce and e-banking. It became necessary to control these activities from exposure to intrusion or misuse and to provide protection to them, so it's important to design powerful and efficient systems-do-this-purpose. It this paper it has been used several varieties of algorithm selection passive immune algorithm selection passive with real values, algorithm selection with passive detectors with a radius fixed, algorithm selection with passive detectors, variable- sized intrusion detection network type misuse where the algorithm generates a set of detectors to distinguish the self-samples. Practica
... Show More