Secure storage of confidential medical information is critical to healthcare organizations seeking to protect patient's privacy and comply with regulatory requirements. This paper presents a new scheme for secure storage of medical data using Chaskey cryptography and blockchain technology. The system uses Chaskey encryption to ensure integrity and confidentiality of medical data, blockchain technology to provide a scalable and decentralized storage solution. The system also uses Bflow segmentation and vertical segmentation technologies to enhance scalability and manage the stored data. In addition, the system uses smart contracts to enforce access control policies and other security measures. The description of the system detailing and provide an analysis of its security and performance characteristics. The resulting images were tested against a number of important metrics such as Peak Signal-to-Noise Ratio (PSNR), Mean Squared Error (MSE), bit error rate (BER), Signal-to-Noise Ratio (SNR), Normalization Correlation (NC) and Structural Similarity Index (SSIM). Our results showing that the system provides a highly secure and scalable solution for storing confidential medical data, with potential applications in a wide range of healthcare settings.
A free convective heat transfer from the inside surface of a uniformly heated vertical circular tube has been experimentally investigated under a constant wall heat flux boundary condition for laminar air flow in the ranges of RaL from 6.9108 to 5109. The effect of the different sections (restrictions) lengths placed at the exit of the heated tube on the surface temperature distribution, the local and average heat transfer coefficients were examined. The experimental apparatus consists of aluminum circular tube with 900 mm length and 30 mm inside diameter (L/D=30). The exit sections (restrictions) were included circular tubes having the same inside diameter as the heated tube but with different lengths of
... Show MoreThe aerodynamic and elastic forces may cause an oscillation of the structure such as the high frequency of the airfoil surfaces and the dynamic instability occurring in an aircraft in flight and failure may occur at a speed called flutter speed. In this work, analytical and numerical investigations of flutter limits of thin plates have been carried out. The flutter speed of rectangular plates were obtained and compared with some published results. Different design parameters were investigated such as aspect ratio, thickness and their effects on flutter velocity. It was found that the structural mode shape plays an important role in the determination of the flutter speed and the coupling between the bending and torsional mode is the main
... Show MoreIn this communication, introduce the split Mersenne and Mersenne-Lucas hybrid quaternions, also obtaining generating functions and Binet formulas for these hybrid quaternions and investigating some properties among them.
Is the subject of the mind took a dimension in philosophy and psychology , and has cared psychologists this topic to a large extent , I started education institutions interest in the capabilities of intelligence since the early twentieth century , and the development of interest in them until he arrived to find Standards and Criteria to identify the degree IQ of any individual , and began to educational institutions interested in mental talent and talented .
The United States is the country chock first of these research projects , but they devoted all their attention on the wish talent mental and Gifted , until I got to the projects, the so-called time ( ( wars of the mind ) ) and projects Schools gifted
... Show Moreفي هذا البحث تم تحضير المركبات المعدنية النانوية الجديدة لأيونات البلاتين 4+و الذهب 3+ مع ليكاند قاعدة مانخ جديد مشتق من السيبروفلوكساسين بطريقة الموجات فوق الصوتية. تم تشخيص المعقدات النانوية والليكاند الجديد بأستخدام تقنيات فيزيائية و كيميائية مختلفة مثل أطياف الاشعة تحت الحمراء، حيود الاشعة السينية ، المجهر الالكتروني الماسح ، المجهر الالكتروني النافذ و مجهر القوة الذرية. تم تحديد نشاط مضادات الأك
... Show MoreA new Macrocyclic Schiff base ligand Bis[4-hydroxy(1,2-ethylene-dioxidebenzylidene) pheylenediamine] [H2L] and its complexes with (Co(II) , Ni(II) , Cu(II) , Zn(II) and Cd(II)) are reported . The ligand was prepared in two steps,in the first step a solution of (o-phenylene diamine) in methanol react under reflux with (2,4-dihydroxybenzylaldeyed) to give an (intermediatecompound) [Bis-1,2 (2,4-dihydroxybenzylediene)pheylinediamine] which react in the second step with (1,2- dichloro ethane) giving the mentioned ligand.Then the complexes were synthesis of adding of corresponding metal salts to the solution of the ligand in methanol under reflux with 1:1 metal to ligand ratio. On the basis of, molar conductance, I.R., UV-Vis, chloride content a
... Show More
The paper exposes a discourse taxonomy of language clichéd units in English and Russian, and presents some definitions of what is a cliché as being a semioticform of perceiving language and discourse. Also, it deals with language clichés as being units of structure reflecting a scheme of stereotypical situations of dialogue, whether among individuals of one culture, or in relation to cross-cultural communication. The paper proposes a taxonomy of units in language clichés in English and Russian by tackling clichés of daily use, such as professional, cultural, artistic, and scientific clichés.
Аннотация
... Show MoreVideo steganography has become a popular option for protecting secret data from hacking attempts and common attacks on the internet. However, when the whole video frame(s) are used to embed secret data, this may lead to visual distortion. This work is an attempt to hide sensitive secret image inside the moving objects in a video based on separating the object from the background of the frame, selecting and arranging them according to object's size for embedding secret image. The XOR technique is used with reverse bits between the secret image bits and the detected moving object bits for embedding. The proposed method provides more security and imperceptibility as the moving objects are used for embedding, so it is difficult to notice the
... Show More