Preferred Language
Articles
/
bsj-9203
A Novel System for Confidential Medical Data Storage Using Chaskey Encryption and Blockchain Technology
...Show More Authors

Secure storage of confidential medical information is critical to healthcare organizations seeking to protect patient's privacy and comply with regulatory requirements. This paper presents a new scheme for secure storage of medical data using Chaskey cryptography and blockchain technology. The system uses Chaskey encryption to ensure integrity and confidentiality of medical data, blockchain technology to provide a scalable and decentralized storage solution. The system also uses Bflow segmentation and vertical segmentation technologies to enhance scalability and manage the stored data. In addition, the system uses smart contracts to enforce access control policies and other security measures. The description of the system detailing and provide an analysis of its security and performance characteristics. The resulting images were tested against a number of important metrics such as Peak Signal-to-Noise Ratio (PSNR), Mean Squared Error (MSE), bit error rate (BER), Signal-to-Noise Ratio (SNR), Normalization Correlation (NC) and Structural Similarity Index (SSIM). Our results showing that the system provides a highly secure and scalable solution for storing confidential medical data, with potential applications in a wide range of healthcare settings.

Scopus Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Mon Jun 28 2021
Journal Name
Journal Of The College Of Education For Women
The Sources of Organizational Power Prevailing among Academic Leaders at University of Tabuk and its Relationship to Institutional Creativity from the Viewpoint of Faculty Members: شروق بنت عبد الخالق الأسمري , علي بن حسن القرني
...Show More Authors

This study aims to examine the sources of organizational power prevailing among the academic leaders at the University of Tabuk from the faculty members’ viewpoint. The purposes behind such an aim are: to reveal the level of administrative and technical institutional creativity, the nature of the relationship between the reality of organizational power and the level of institutional creativity, and to disclose statistically the significant differences between the averages of faculty members’ responses attributed to the demographic variables (gender,  years of experience, academic degree). The study used the descriptive approach, both survey and correlational. A questionnaire was used to collect data from a simple random sample o

... Show More
View Publication Preview PDF
Crossref
Publication Date
Thu Dec 31 2020
Journal Name
Political Sciences Journal
Constructivism Theory in International Relations (Case Study on the War on Terrorism)
...Show More Authors

        The topic of the research revolves around constructivist theory, which is one of the most important theories that added weight to the theoretical and epistemological field of international relations. The constructivist theory studies international relations from a completely different side of theories by focusing on the social aspects of international relations, and by looking at international relations as social constructs. Ideas, cultures, norms, standards and language play a major role in their formation. The study also examines the state of the war on terrorism as it represents one of the most international cases in which its composition and composition coincide with constructive ideas and a

... Show More
View Publication Preview PDF
Crossref
Publication Date
Wed Feb 19 2020
Journal Name
International Journal Of Innovation, Creativity And Change
Secure Image Steganography Through Multilevel Security
...Show More Authors

The concealment of data has emerged as an area of deep and wide interest in research that endeavours to conceal data in a covert and stealth manner, to avoid detection through the embedment of the secret data into cover images that appear inconspicuous. These cover images may be in the format of images or videos used for concealment of the messages, yet still retaining the quality visually. Over the past ten years, there have been numerous researches on varying steganographic methods related to images, that emphasised on payload and the quality of the image. Nevertheless, a compromise exists between the two indicators and to mediate a more favourable reconciliation for this duo is a daunting and problematic task. Additionally, the current

... Show More
Publication Date
Tue Apr 01 2025
Journal Name
Mesopotamian Journal Of Cybersecurity
The Impact of Feature Importance on Spoofing Attack Detection in IoT Environment
...Show More Authors

The Internet of Things (IoT) is an expanding domain that can revolutionize different industries. Nevertheless, security is among the multiple challenges that it encounters. A major threat in the IoT environment is spoofing attacks, a type of cyber threat in which malicious actors masquerade as legitimate entities. This research aims to develop an effective technique for detecting spoofing attacks for IoT security by utilizing feature-importance methods. The suggested methodology involves three stages: preprocessing, selection of important features, and classification. The feature importance determines the most significant characteristics that play a role in detecting spoofing attacks. This is achieved via two techniques: decision tr

... Show More
View Publication Preview PDF
Scopus Crossref
Publication Date
Mon Jan 01 2024
Journal Name
Journal Of The College Of Languages (jcl)
The neology in the Iraqi dialect after the invasion of 2003 and the level of imaginative comprehension: La neología en el dialecto Iraqui tras la invasión de 2003 y el nivel de la comprensión imaginativa
...Show More Authors

       The article analyzes the neologisms that arose in the Iraqi dialect after the 2003 US-British invasion and the fall of Saddam Hussein's regime, according to the theory I advocate: "The Basic Outline of Reference," a developed theory of Arab legacy and cognitive theory, which came out in 1987 in America, so we have used the terminology of cognitive grammar. In this theory it is stated that the reference is the interaction between four components: perception, imagination, imaginative comprehension and the linguistic sign or symbolization (the neological word in this article), which are closely related, so that none of them can be lacking, because they constitute a holistic whole that belongs to a deeper level. Let us

... Show More
View Publication Preview PDF
Crossref
Publication Date
Tue Jan 02 2018
Journal Name
Journal Of Educational And Psychological Researches
The effectiveness of educational design design according to the theory of Ozbal in the acquisition of geographical concepts among the pupils of the fourth primary in the geography and development of their habits of mind
...Show More Authors

Summary The objective of the research is to learn the design of a learning educational learning according to the theory of Ausubel in the acquisition of geographical concepts among the students of the fourth primary in the field of geography and the development of their habits of mind. To achieve this, the researcher relied on the two hypotheses the researcher used the design of equal groups the first experimental group was studied according to the design educational educational learning according to the theory and the other is an officer according to the traditional method. The research community consists of fourth grade pupils in primary school day for girls in the Directorate of Education Baghdad, Al-Rusafa, the third academic year 20

... Show More
View Publication Preview PDF
Publication Date
Sat Oct 01 2016
Journal Name
Journal Of Economics And Administrative Sciences
Assessing the quality of health services applied research 5qs in Baghdad teaching hospital
...Show More Authors

Abstract

       This research aims to assess and measure the quality of health services provided by the Baghdad Educational Hospital using  five dimensions of 5Qs , Developer model by (Zinelidin), 2006), the problem of the research is to try to determine the quality of health services provided at the hospital as well as the investigation of the existence of the elements of quality contribute to achieve the requirements of customers and their needs, and used for the purposes of this research two approaches, first used Applied Research to 5Qs dimension model and use the Checklist as a Key tool to collection and analysis of data and the second descriptive analytical me

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun Aug 30 2020
Journal Name
Journal Of Economics And Administrative Sciences
Comparison of the performance of some r- (k,d) class estimators with the (PCTP) estimator that used in estimating the general linear regression model in the presence of autocorrelation and multicollinearity problems at the same time "
...Show More Authors

In the analysis of multiple linear regression, the problem of multicollinearity and auto-correlation drew the attention of many researchers, and given the appearance of these two problems together and their bad effect on the estimation, some of the researchers found new methods to address these two problems together at the same time. In this research a comparison for the performance of the Principal Components Two Parameter estimator (PCTP) and The (r-k) class estimator and the r-(k,d) class estimator by conducting a simulation study and through the results and under the mean square error (MSE) criterion to find the best way to address the two problems together. The results showed that the r-(k,d) class estimator is the best esti

... Show More
View Publication Preview PDF
Crossref
Publication Date
Mon May 15 2017
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Proposed Methods To Prevent SQL Injection
...Show More Authors

  In the last decade, the web has rapidly become an attractive platform, and an indispensable part of our lives. Unfortunately, as our dependency on the web increases so programmers focus more on functionality and appearance than security, has resulted in the interest of attackers in exploiting serious security problems that target web applications and web-based information systems e.g. through an SQL injection attack.     SQL injection in simple terms, is the process of passing SQL code into interactive web applications that employ database services such applications accept user input  such as form  and then include this input in database requests, typically SQL statements in a way that was not intende

... Show More
View Publication Preview PDF
Publication Date
Thu Mar 30 2023
Journal Name
College Of Islamic Sciences
Ethics (stop harming, guarding the tongue, spreading peace and spending) in the hadiths of the Prophet, book (Faith) from Sahih Al-Bukhari / model - analytical study: : Ethics of restraining harm in the hadiths of the Prophet "Analytical study"
...Show More Authors

(Social values) are of great importance in the lives of nations and peoples as they are the frame of reference that governs the relations of members of society to each other and regulates their life affairs.

And the Prophet of Islam (may God’s prayers and peace be upon him) has told about a group of (social values) such as: spreading peace, feeding food, being fair in dealing with others, and clarifying what a Muslim should have towards his Muslim brother from the safety of the chest and refraining from harming him with the tongue and hand, and so on. Ethics and behaviors that are directly and closely related to (social values).

The best book that abounds with these (social valu

... Show More
View Publication Preview PDF