Secure storage of confidential medical information is critical to healthcare organizations seeking to protect patient's privacy and comply with regulatory requirements. This paper presents a new scheme for secure storage of medical data using Chaskey cryptography and blockchain technology. The system uses Chaskey encryption to ensure integrity and confidentiality of medical data, blockchain technology to provide a scalable and decentralized storage solution. The system also uses Bflow segmentation and vertical segmentation technologies to enhance scalability and manage the stored data. In addition, the system uses smart contracts to enforce access control policies and other security measures. The description of the system detailing and provide an analysis of its security and performance characteristics. The resulting images were tested against a number of important metrics such as Peak Signal-to-Noise Ratio (PSNR), Mean Squared Error (MSE), bit error rate (BER), Signal-to-Noise Ratio (SNR), Normalization Correlation (NC) and Structural Similarity Index (SSIM). Our results showing that the system provides a highly secure and scalable solution for storing confidential medical data, with potential applications in a wide range of healthcare settings.
Albizia lebbeck biomass was used as an adsorbent material in the present study to remove methyl red dye from an aqueous solution. A central composite rotatable design model was used to predict the dye removal efficiency. The optimization was accomplished under a temperature and mixing control system (37?C) with different particle size of 300 and 600 ?m. Highest adsorption efficiencies were obtained at lower dye concentrations and lower weight of adsorbent. The adsorption time, more than 48 h, was found to have a negative effect on the removal efficiency due to secondary metabolites compounds. However, the adsorption time was found to have a positive effect at high dye concentrations and high adsorbent weight. The colour removal effi
... Show MoreAlbizia lebbeck biomass was used as an adsorbent material in the present study to remove methyl red dye from an aqueous solution. A central composite rotatable design model was used to predict the dye removal efficiency. The optimization was accomplished under a temperature and mixing control system (37?C) with different particle size of 300 and 600 ?m. Highest adsorption efficiencies were obtained at lower dye concentrations and lower weight of adsorbent. The adsorption time, more than 48 h, was found to have a negative effect on the removal efficiency due to secondary metabolites compounds. However, the adsorption time was found to have a positive effect at high dye concentrations and high adsorbent weight. The colour removal effi
... Show MoreGas adsorption phenomenon on solid surface has been used as a mean in separation and purification of gas mixture depending on the difference in tendencies of each component in the gas mixture to be adsorbed on the solid surface according to its behaviour. This work concerns to study the possibilities to separate the gas mixture using adsorption-desorption phenomenon on activated carbon. The experimental results exhibit good separation factor at temperature of -40 .
This study discussed a biased estimator of the Negative Binomial Regression model known as (Liu Estimator), This estimate was used to reduce variance and overcome the problem Multicollinearity between explanatory variables, Some estimates were used such as Ridge Regression and Maximum Likelihood Estimators, This research aims at the theoretical comparisons between the new estimator (Liu Estimator) and the estimators
This research was conduct to evaluate the cytotoxic effect of exotoxin A (ETA) produced by Pseudomonas aeruginosa on mice in comparison with (phosphate buffer saline (PBS) as a negative control. The effect of the toxin was measured by employing the cytogenetic analysis which included (the mitotic index (MI), chromosomal aberrations (CAs), micronucleus (MN) and sperm abnormalities) parameters. In order to specify the cytotoxic effect of the toxin, three doses of ETA (125, 250 and 500 ng/ml) were used. Results showed that ETA was found to cause a significant decrease in mitotic index (MI) percentage, while significant increase in micronucleus (MN), chromosomal aberrations (CAs) and sperm abnormalities parameters in compression with control wa
... Show MoreHedging is a linguistic phenomenon used to convey interpersonal messages in spoken interaction. It is a communicative strategy which enables speakers to soften the force of utterances or moderate the assertive force of utterances. It is resulted from different features such as uncertainty, doubt, tentativeness, ambiguity, neutrality, mitigation, and subjectivity. Hedging is used widely in TV debates to make utterances more acceptable to the interlocutors. Hedges are expressions used to communicate the speaker's weak commitment to information conveyed. The utterances in debates are often hedged because in an unhedged form might sound threatening to the addressees, and, therefore, be likely to be rejected.
&
... Show MoreThis research dealt with the impact of internal control on tax performance using balanced scorecard indicators because of its special importance in improving tax performance and reform. The internal control system is a safety valve for senior management in all organizations, it plays an important role in the regularity and development of work and the fight against corruption To provide reliable and accurate data and information, follow up on compliance with laws, regulations and instructions. The aim of this research is to demonstrate how control affects tax performance and how to adapt internal control components to improve tax performance. In the General Authority for taxes and its branches,. The research resulted in a number of conclu
... Show MoreMobile ad hoc network security is a new area for research that it has been faced many difficulties to implement. These difficulties are due to the absence of central authentication server, the dynamically movement of the nodes (mobility), limited capacity of the wireless medium and the various types of vulnerability attacks. All these factor combine to make mobile ad hoc a great challenge to the researcher. Mobile ad hoc has been used in different applications networks range from military operations and emergency disaster relief to community networking and interaction among meeting attendees or students during a lecture. In these and other ad hoc networking applications, security in the routing protocol is necessary to protect against malic
... Show More