Secure storage of confidential medical information is critical to healthcare organizations seeking to protect patient's privacy and comply with regulatory requirements. This paper presents a new scheme for secure storage of medical data using Chaskey cryptography and blockchain technology. The system uses Chaskey encryption to ensure integrity and confidentiality of medical data, blockchain technology to provide a scalable and decentralized storage solution. The system also uses Bflow segmentation and vertical segmentation technologies to enhance scalability and manage the stored data. In addition, the system uses smart contracts to enforce access control policies and other security measures. The description of the system detailing and provide an analysis of its security and performance characteristics. The resulting images were tested against a number of important metrics such as Peak Signal-to-Noise Ratio (PSNR), Mean Squared Error (MSE), bit error rate (BER), Signal-to-Noise Ratio (SNR), Normalization Correlation (NC) and Structural Similarity Index (SSIM). Our results showing that the system provides a highly secure and scalable solution for storing confidential medical data, with potential applications in a wide range of healthcare settings.
A total of 247 Mallard ( Anas platyrhynchos platyrhynchos L.) from Baghdad and Kut were examined for the Cestodes Diorchis stefanskii Sobolevicanthes gracilis; Hymenolepis mastigopraditae and the Nematode Amidostomum acutum in the first time in Iraq . Among these , 151 birds were found infected by these helminthes It has been found small nodules on the external surface of the intestine , Ulceration of mucosa inflammatory infiltrate , Oedemats changes and hyperplasia in the section of infected intestine were noticed.
The study aims at knowing the actual uses of instructional technology in teaching history subject in the colleges of education for humanities from the college staff members' perspectives and their attitudes towards it. The sample of the study consisted of (24) instructors from the Colleges of Education for the Humanities, the College of Basic Education- Haditha and the College of Education for Women, the study used the descriptive method, and the questionnaire was consisted of (50) items, and the psychometric properties of the instrument of the study were extracted. The researchers used the appropriate statistical means to analyze the data, and the results of the study showed the following: the teaching staff attitudes towards the use of
... Show MoreThe reaction of poly (vinyl alcohol) (PV A) with Urea in (DMSO) resulted in uerthanised oxim, wr,ich reacted with diacetylmonoxime in a (DY.ISOfmethanol) to give anew type (N2) polymeric bidentate imine oxime ligand [HL], The ligand was reacted with MCh (where M= Co, Cu, and Hg). Under reflux in a (DMF/Methanol) mixture with (I:1) ratio to give Complexes of the general formula [M (T.)2]X, (where M= Co,Hg, Cu). All .:ompouncs have been characterized by spectroscopic methods [IR, U.V.-Vis, A tomi<;absorption] microanalysis along with conductivity measurements, from the above:: data the proposed molecular structure for Co,Cu, and Hg is a distorted. Tetrahedml
In present work an investigation for precise hole drilling via continuous wave (CW) CO2 laser at 150 W maximum output power and wavelength 10.6 μm was achieved with the assistance of computerized numerical controlled (CNC) machine and assist gases. The drilling process was done for thin sheets (0.1 – 0.3 mm) of two types of metals; stainless steel (sst) 321H, steel 33 (st). Changing light and process parameters such as laser power, exposure time and gas pressure was important for getting the optimum results. The obtained results were supported with computational results using the COMSOL 3.5a software code.
The biometric-based keys generation represents the utilization of the extracted features from the human anatomical (physiological) traits like a fingerprint, retina, etc. or behavioral traits like a signature. The retina biometric has inherent robustness, therefore, it is capable of generating random keys with a higher security level compared to the other biometric traits. In this paper, an effective system to generate secure, robust and unique random keys based on retina features has been proposed for cryptographic applications. The retina features are extracted by using the algorithm of glowworm swarm optimization (GSO) that provides promising results through the experiments using the standard retina databases. Additionally, in order t
... Show MoreThe purpose of this paper is to find the best multiplier approximation of unbounded functions in –space by using some discrete linear positive operators. Also we will estimate the degree of the best multiplier approximation in term of modulus of continuity and the averaged modulus.
The challenges facing today's multi-customer and this is due to the multiplicity of products and speed in launching new products so search came to reveal the reveal the of the new product classification standards through a relationship (good products, low interest products, useful products and products desired) and the customer emotionally blackmail through deportation (fear, obligation and guilt). dentified the problem of the research in several questions focused on the nature of the relationship between the variables of research, and for that outline supposedly to search it expresses the head of one hypothesis and branched out of which four hypotheses subset, but in order to ensure the validity of the ass
... Show More