Preferred Language
Articles
/
bsj-9203
A Novel System for Confidential Medical Data Storage Using Chaskey Encryption and Blockchain Technology
...Show More Authors

Secure storage of confidential medical information is critical to healthcare organizations seeking to protect patient's privacy and comply with regulatory requirements. This paper presents a new scheme for secure storage of medical data using Chaskey cryptography and blockchain technology. The system uses Chaskey encryption to ensure integrity and confidentiality of medical data, blockchain technology to provide a scalable and decentralized storage solution. The system also uses Bflow segmentation and vertical segmentation technologies to enhance scalability and manage the stored data. In addition, the system uses smart contracts to enforce access control policies and other security measures. The description of the system detailing and provide an analysis of its security and performance characteristics. The resulting images were tested against a number of important metrics such as Peak Signal-to-Noise Ratio (PSNR), Mean Squared Error (MSE), bit error rate (BER), Signal-to-Noise Ratio (SNR), Normalization Correlation (NC) and Structural Similarity Index (SSIM). Our results showing that the system provides a highly secure and scalable solution for storing confidential medical data, with potential applications in a wide range of healthcare settings.

Scopus Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Thu Mar 29 2018
Journal Name
Construction Research Congress 2018
Validation of Time-Safety Influence Curve Using Empirical Safety and Injury Data—Poisson Regression
...Show More Authors

View Publication
Scopus (5)
Crossref (5)
Scopus Crossref
Publication Date
Sat Jun 19 2021
Journal Name
Iraqi Journal Of Pharmaceutical Sciences ( P-issn 1683 - 3597 E-issn 2521 - 3512)
Serum Chitotriosidase level as a Novel Biomarker for Therapeutic Monitoring of Nephropathic Cystinosis among the Iraqi children
...Show More Authors

Background: Cystinosis is a rare autosomal recessive lysosomal storage disease with high morbidity and mortality. It is caused by mutations in the CTNS gene that encodes the cystine transporter, cystinosin, which leads to lysosomal cystine accumulation. It is the major cause of inherited Fanconi syndrome, and should be suspected in young children with failure to thrive and signs of renal proximal tubular damage. The diagnosis can be missed in infants, because not all signs of renal Fanconi syndrome are present during the first months of life. Elevated white blood cell cystine content is the cornerstone of the diagnosis. Since chitotriosidase (CHIT1 or chitinase-1) is mainly produced by activated macrophages both in normal and inflammator

... Show More
View Publication Preview PDF
Scopus Crossref
Publication Date
Tue Dec 01 2020
Journal Name
Baghdad Science Journal
A Competitive Study Using UV and Ozone with H2O2 in Treatment of Oily Wastewater
...Show More Authors

          In this study, ultraviolet (UV), ozone techniques with hydrogen peroxide oxidant were used to treat the wastewater which is produced from South Baghdad Power Station using lab-scale system. From UV-H2O2 experiments, it was shown that the optimum exposure time was 80 min. At this time, the highest removal percentages of oil, COD, and TOC were 84.69 %, 56.33 % and 50 % respectively. Effect of pH on the contaminants removing was studied in the range of (2-12). The best oil, COD, and TOC removal percentages (69.38 %, 70 % and 52 %) using H2O2/UV were at pH=12. H2O2/ozone experiments exhibited better performance compared to

... Show More
View Publication Preview PDF
Scopus (9)
Crossref (4)
Scopus Clarivate Crossref
Publication Date
Sun Apr 30 2023
Journal Name
Ingénierie Des Systèmes D Information
Performance Evaluation of Multi-Organization E-Government Based on Hyperledger Fabric Blockchain Platform
...Show More Authors

View Publication
Scopus (1)
Crossref (1)
Scopus Crossref
Publication Date
Sun Mar 01 2020
Journal Name
Journal Of Engineering
Evaluation of Fatigue Behavior of Epoxy Coatings used for Potable Water Storage Tanks
...Show More Authors

In this paper, three types of epoxy-based coatings (Polyamide, pure Polyamine, and Polyamine reinforced by glass-flake) used as a lining for potable water tanks were studied using experimental and finite element methods. Tensile, impact, and fatigue tests were conducted on uncoated and coated AISI 316 stainless steel. The test results show that the applied epoxy based coating improves the mechanical properties, increases of fatigue crack resistance, and enhance the dynamic fracture toughness. The fatigue crack propagation is influenced by the compositions of epoxy coating, and the glass-flake improves the coating resistance to fatigue crack propagation compared to other types.

View Publication Preview PDF
Crossref (2)
Crossref
Publication Date
Mon Mar 03 2014
Journal Name
Journal Of Baghdad College Of Dentistry
Stem Cells a Novel Approach to Periodontal Regeneration: A Review of Literature
...Show More Authors

Publication Date
Tue Aug 26 2025
Journal Name
Journal Of Baghdad College Of Dentistry
Stem cells a novel approach to periodontal regeneration (A review of literature)
...Show More Authors

In this review of literature, the light will be concentrated on the role of stem cells as an approach in periodontal regeneration.

View Publication Preview PDF
Publication Date
Wed Mar 01 2023
Journal Name
Al-khwarizmi Engineering Journal
A Methodology for Evaluating and Scheduling Preventive Maintenance for a Thermo-Electric Unit Using Artificial Intelligence
...Show More Authors

Flow-production systems whose pieces are connected in a row may not have maintenance scheduling procedures fixed because problems occur at different times (electricity plants, cement plants, water desalination plants). Contemporary software and artificial intelligence (AI) technologies are used to fulfill the research objectives by developing a predictive maintenance program. The data of the fifth thermal unit of the power station for the electricity of Al Dora/Baghdad are used in this study. Three stages of research were conducted. First, missing data without temporal sequences were processed. The data were filled using time series hour after hour and the times were filled as system working hours, making the volume of the data relativel

... Show More
View Publication Preview PDF
Scopus (2)
Scopus Crossref
Publication Date
Wed Aug 30 2023
Journal Name
Al Mustansiriyah Journal Of Pharmaceutical Sciences
Multiple Sclerosis is a Risk Factor for Hyperthyroidism and Interferon Beta Action on Thyroid Hormones via Novel Immuno-neuro-enzymological Mechanisms
...Show More Authors

Objective : Multiple sclerosis (MS) is a common neurological disease deeply linked with the immune-inflammatory disorders whereas the term (multiple) mostly refers to the multi-focal zones of Inflammation caused by lymphocytes and macrophages infiltration besides oligodendrocytes death. Accordingly , the dysfunctional immune system able to damage myelin ( a pivotal component of the central nervous system ) which responsible for communication among neurons. The aim of the present study is to innovate a biochemical relationship between MS and thyroid hormones (THs) by highlighting immunological responses and also to examine the action of Interferon beta (IFNβ) drug on thyroid hormone (THs) and thyroid stimulation hormone (TSH). Materials and

... Show More
Preview PDF
Publication Date
Wed Aug 28 2024
Journal Name
Mesopotamian Journal Of Cybersecurity
A Novel Anomaly Intrusion Detection Method based on RNA Encoding and ResNet50 Model
...Show More Authors

Cybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a

... Show More
View Publication
Scopus (5)
Scopus Crossref