Secure storage of confidential medical information is critical to healthcare organizations seeking to protect patient's privacy and comply with regulatory requirements. This paper presents a new scheme for secure storage of medical data using Chaskey cryptography and blockchain technology. The system uses Chaskey encryption to ensure integrity and confidentiality of medical data, blockchain technology to provide a scalable and decentralized storage solution. The system also uses Bflow segmentation and vertical segmentation technologies to enhance scalability and manage the stored data. In addition, the system uses smart contracts to enforce access control policies and other security measures. The description of the system detailing and provide an analysis of its security and performance characteristics. The resulting images were tested against a number of important metrics such as Peak Signal-to-Noise Ratio (PSNR), Mean Squared Error (MSE), bit error rate (BER), Signal-to-Noise Ratio (SNR), Normalization Correlation (NC) and Structural Similarity Index (SSIM). Our results showing that the system provides a highly secure and scalable solution for storing confidential medical data, with potential applications in a wide range of healthcare settings.
The electronic payment systems are considered the most important infrastructure for the work of banks, particularly after a steady and remarkable development in information and communication technology, Which created the reality of the work of the infrastructure for these systems and these systems also become one of the most important components of infrastructure for the work of banks, cause it is one of the most important channels through which the transfer of cash, financial instruments between financial institutions in general and banking in particular.
In order to achieve the objectives of the research, the most important to identify the concept of electronic payment systems, and its divisions, and th
... Show MoreThis world is moving towards knowledge economy which basically depends on knowledge and information. So, the economic units need to develop its financial reporting system which helps to provide useful information in timeliness for investors in accordance with the requirements of the knowledge economy and meets the needs of those investors. This research aims to revealing the reflects of knowledge economy on the approaches of financial reporting and suggesting a financial reporting model in the environment of knowledge economy, depending on combining the value approach with the events approach using database and communication technology and providing useful accounting information for all users regardless of
... Show More
Diazotization reaction between quinolin-2-ol and (2-chloro-1-(4-(N-(5-methylisoxazol-3-yl)sulfamoyl)phenyl)-2l4-diazyn-1-ium was carried out resulting in ligand-HL, this in turn reacted with the next metal ions (Ni2+, Pt4+, Pd2+, and Mn2+) forming stable complexes with unique geometries such as (tetrahedral for both Ni2+ and Mn2+, octahedral for Pt4+ and square planer for Pd2+ ). The creation of such complexes was detected by employing spectroscopic means involving ultraviolet-visible which proved the obtained geometries, fourier transfer proved the formation of azo group and the coordination with metal ion through it. Pyrolysis (TGA &
... Show MoreThe research aims to identify the risks faced by projects and work on the administration, such as those risks by using professional Project Management System (Project Management Professional) by identifying those risks and their impact on the objectives of the project, if they occur and to provide appropriate responses to Ha.autam search application on the draft Law Faculty port by the General Mansour Construction Contracting company has been using a method personal interview with the heads of departments and project managers in the Al-Mansour and tools descriptive and quantitative analysis as was used (likelihood and impact of risk analysis, Ai_kaoa scheme Sbb- effect, analysis of probability and impact, risk matrix (probability
... Show MoreThe accumulation of sediment in reservoirs poses a major challenge that impacts the storage capacity, quality of water, and efficiency of hydroelectric power generation systems. Geospatial methods, including Geographic Information Systems (GIS) and Remote Sensing (RS), were used to assess Dukan Reservoir sediment quantities. Satellite and reservoir water level data from 2010 to 2022 were used for sedimentation assessment. The satellite data was used to analyze the water spread area, employing the Normalized Difference Water Index (NDWI) and Modified Normalized Difference Water Index (MNDWI) to enhance the water surface in the satellite imagery of Dukan Reservoir. The cone formula was employed to calculate the live storag
... Show MoreIn this study, Zizphus spina-christi leaf powder was applied for the adsorption of methyl orange. The effect of different operating parameters on the Batch Process adsorption was investigated such as solution pH (2-12), effect of contact time (0-60 min.), initial dye concentration (2-20 mg/L), effect of adsorbent dosage (0-4.5 g) and effect of temperature (20-50ᵒC). The results show a maximum removal rate and adsorption capacity (%R= 23.146, qe = 2.778 mg/g) at pH = 2 and equilibrium was reached at 40 min. The pseudo- second-order kinetics were found to be best fit for the removal process (R2 = 0.997). Different isotherm models (Langmuir, Freundlich, Dubini-Radushkevich,Temkin) were applied in this stud
... Show MoreA new human-based heuristic optimization method, named the Snooker-Based Optimization Algorithm (SBOA), is introduced in this study. The inspiration for this method is drawn from the traits of sales elites—those qualities every salesperson aspires to possess. Typically, salespersons strive to enhance their skills through autonomous learning or by seeking guidance from others. Furthermore, they engage in regular communication with customers to gain approval for their products or services. Building upon this concept, SBOA aims to find the optimal solution within a given search space, traversing all positions to obtain all possible values. To assesses the feasibility and effectiveness of SBOA in comparison to other algorithms, we conducte
... Show MoreHoneywords are fake passwords that serve as an accompaniment to the real password, which is called a “sugarword.” The honeyword system is an effective password cracking detection system designed to easily detect password cracking in order to improve the security of hashed passwords. For every user, the password file of the honeyword system will have one real hashed password accompanied by numerous fake hashed passwords. If an intruder steals the password file from the system and successfully cracks the passwords while attempting to log in to users’ accounts, the honeyword system will detect this attempt through the honeychecker. A honeychecker is an auxiliary server that distinguishes the real password from the fake passwords and t
... Show MoreMost of the medical datasets suffer from missing data, due to the expense of some tests or human faults while recording these tests. This issue affects the performance of the machine learning models because the values of some features will be missing. Therefore, there is a need for a specific type of methods for imputing these missing data. In this research, the salp swarm algorithm (SSA) is used for generating and imputing the missing values in the pain in my ass (also known Pima) Indian diabetes disease (PIDD) dataset, the proposed algorithm is called (ISSA). The obtained results showed that the classification performance of three different classifiers which are support vector machine (SVM), K-nearest neighbour (KNN), and Naïve B
... Show MoreIn data transmission a change in single bit in the received data may lead to miss understanding or a disaster. Each bit in the sent information has high priority especially with information such as the address of the receiver. The importance of error detection with each single change is a key issue in data transmission field.
The ordinary single parity detection method can detect odd number of errors efficiently, but fails with even number of errors. Other detection methods such as two-dimensional and checksum showed better results and failed to cope with the increasing number of errors.
Two novel methods were suggested to detect the binary bit change errors when transmitting data in a noisy media.Those methods were: 2D-Checksum me