Secure storage of confidential medical information is critical to healthcare organizations seeking to protect patient's privacy and comply with regulatory requirements. This paper presents a new scheme for secure storage of medical data using Chaskey cryptography and blockchain technology. The system uses Chaskey encryption to ensure integrity and confidentiality of medical data, blockchain technology to provide a scalable and decentralized storage solution. The system also uses Bflow segmentation and vertical segmentation technologies to enhance scalability and manage the stored data. In addition, the system uses smart contracts to enforce access control policies and other security measures. The description of the system detailing and provide an analysis of its security and performance characteristics. The resulting images were tested against a number of important metrics such as Peak Signal-to-Noise Ratio (PSNR), Mean Squared Error (MSE), bit error rate (BER), Signal-to-Noise Ratio (SNR), Normalization Correlation (NC) and Structural Similarity Index (SSIM). Our results showing that the system provides a highly secure and scalable solution for storing confidential medical data, with potential applications in a wide range of healthcare settings.
Bioinformatics is one of the computer science and biology sub-subjects concerned with the processes applied to biological data, such as gathering, processing, storing, and analyzing it. Biological data (ribonucleic acid (RNA), deoxyribonucleic acid (DNA), and protein sequences) has many applications and uses in many fields (data security, data segmentation, feature extraction, etc.). DNA sequences are used in the cryptography field, using the properties of biomolecules as the carriers of the data. Messenger RNA (mRNA) is a single strand used to make proteins containing genetic information. The information recorded from DNA also carries messages from DNA to ribosomes in the cytosol. In this paper, a new encryption technique bas
... Show MoreThe subject of the information technology system ( ITS ) of the important issues And contemporary thought in management, and various types of organizations seeking to apply and try to
... Show More
The research aimed to evaluate the financial performance of the Public Company for the manufacture of medicines and medical supplies / Samarra - Iraq to know the strengths and weaknesses that affect its performance, as well as to compare its performance in the years between (2017-2019), which are characterized by security stability with its performance in previous years (2014 -2016) which is characterized by security instability, to assess the extent of its ability to achieve growth in performance, by answering the main question, what is the evaluation of the performance of the Public Company for the manufacture of medicines and medical supplies / Samarra - Iraq in the light of financial indicators?
... Show Moreتشغل الفضاءات الداخلية الطبية اهتمام واسع , لما توفره من رعاية صحية للمرضى ,فلابد ان يُهتَمْ بها من الجانب الوظيفي(الادائي), لتحقيق الراحة البصرية والنفسية والجسدية لغرض الوصول الى الاداء الجيد للكادر الطبي, ولهذا وجد ضرورة التعرف على تلك الفضاءات الداخلية بشكل اعمق , وهل انها ملاءمة للمرتكزات التصميمية المتعارف عليها؟ , لذلك تم تسليط الضوء على الفضاءات الداخلية للمختبرات الطبية, وقد تناول البحث المشكلة واه
... Show MoreA simple, fast, selective of a new flow injection analysis method coupled with potentiometric detection was used to determine vitamin B1 in pharmaceutical formulations via the prepared new selective membranes. Two electrodes were constructed for the determination of vitamin B1 based on the ion-pair vitamin B1-phosphotungestic acid (B1-PTA) in a poly (vinyl chloride) supported with a plasticized di-butyl phthalate (DBPH) and di-butyl phosphate (DBP). Applications of these ion selective electrodes for the determination of vitamin B1 in the pharmaceutical preparations for batch and flow injection systems were described. The ion selective membrane exhibited a near-Nernstian slope values 56.88 and 58.53 mV / decade, with the linear dy
... Show MoreThe increasing number of orphans and their organizations and institutes in our community makes it increasingly important to design and develop an expert system that supports decisions concerning orphans and their families. This system can be used by any orphans organization to facilitate its work.
The proposed work is designed to manage the Orphans and Families of Martyrs of Terrorism Expert System (OFMTES) by registry all information about all orphans to display mostly orphan deserves bill, data is entered for each orphan, and with each entry a counter is increased according to this input information; the output result represents the score for that orphan. Different orphans have different scores. Coloring is used to know the degree o
Au XIXe siècle, avec l’excès de la passion, le roman français commence à avoir de nouvelles figures. Il tend à être un reflet de la pensée et de la passion. Stendhal et Balzac révèlent ainsi le conflit de l’âme et donnent à leur héros l’impression que tout est permis.
Ces protagonistes doivent, d’une part, subir des fluctuations psychologiques, et d’autre part, ces héros doivent être capables de faire face aux rancunes et aux conflits destructeurs. Les personnages stendhaliens et balzaciens finissent par croire que leur combat ne portera pas ses fruits, parce que toute passion déséquilibrée mènera, soit à la fol
... Show MoreWith the development of information technology and means for information transfer it has become necessary to protect sensitive information. The current research presents a method to protect secret colored images which includes three phases: The first phase calculates hash value using one of hash functions to ensure that no tampering with or updating the contents of the secret image. The second phase is encrypting image and embedding it randomly into appropriate cover image using Random Least Significant Bit (RLSB) technique. Random hiding provides protection of information embedded inside cover image for inability to predict the hiding positions, as well as the difficult of determining the concealment positions through the analysis of im
... Show MoreIn every system of security, to keep important data confidential, we need a high degree of protection. Steganography can be defined as a way of sending confidential texts through a secure medium of communications as well as protecting the information during the process of transmission. Steganography is a technology that is used to protect users' security and privacy. Communication is majorly achieved using a network through SMS, e-mail, and so on. The presented work suggested a technology of text hiding for protecting secret texts with Unicode characters. The similarities of glyphs provided invisibility and increased the hiding capacity. In conclusion, the proposed method succeeded in securing confidential data and achieving high p
... Show More