A medical- service platform is a mobile application through which patients are provided with doctor’s diagnoses based on information gleaned from medical images. The content of these diagnostic results must not be illegitimately altered during transmission and must be returned to the correct patient. In this paper, we present a solution to these problems using blind, reversible, and fragile watermarking based on authentication of the host image. In our proposed algorithm, the binary version of the Bose_Chaudhuri_Hocquengham (BCH) code for patient medical report (PMR) and binary patient medical image (PMI) after fuzzy exclusive or (F-XoR) are used to produce the patient's unique mark using secret sharing schema (SSS). The patient’s unique mark is used later as a watermark to be embedded into host PMI using blind watermarking-based singular value decomposition (SVD) algorithm. This is a new solution that we also proposed to applying SVD into a blind watermarking image. Our algorithm preserves PMI content authentication during the transmission and PMR ownership to the patient for subsequently transmitting associated diagnosis to the correct patient via a mobile telemedicine application. The performance of experimental results is high compare to previous results, uses recovered watermarks demonstrating promising results in the tamper detection metrics and self-recovery capability, with 30db PSNR, NC value is 0.99.
Destiny functional theory (DFT) calculations are undertaken in order to scrutinize the electrochemical and calcium (Ca) storage characteristics of a graphyne-like aluminum nitride monolayer (G-AlNyen) as an electrode material for Ca-ion batteries (CIBs). The results show that the change in internal energy as well as the cell voltage values for the CIB with the G-AlNyen anode are comparable to others with two-dimensional 2D nano-materials. It is shown that Ca is adsorbed primarily onto the center of a hexagonal and triangular ring of G-AlNyen with absorption energies of −2.06 and −0.42 eV. After increasing the concentration of Ca atoms on G-AlNyen, the adsorption energy as well as the cell voltage decreases. Lower values of 0.15–0.32 e
... Show MoreAbstract:
This study aims to identify the level of patients’ satisfaction among a sample of hospitalized patients in the targeted hospital (Al-Kindy Teaching Hospital, and Al-Yarmook Teaching Hospital). Moreover, this study highlights the reality of services for patients, especially in the targeted governmental teaching hospitals. The Patient Satisfaction with Nursing Care (PSNCS) has been measured in these hospitals through the revised scale by Tang et al, (2013).This scale includes four major domains; Health Information (5 items), Influencing Support (4 items), Decision Control (4 items), Specialized Technical Competence (7 items). The method of surveying patients’ opinions about the degree
... Show MoreObjectives: The study objectives are to determine the impact of education program upon the academic nurses'
practice concerning documentation of nursing sheets, and to find out the relationship between nurses knowledge
and their demographic characteristics, which include age, sex, and years of experience in medical and surgical
wards.
Methodology: A quasi- experimental study was carried out at the medical and surgical wards in teaching
hospitals in Sulaimani governorate from the beginning of March up to June 2007٠
To reach the objectives of the study anon-probability (purposive) sample of (25) academic nurses who work in
the medical and surgical wards in teaching hospitals.
The data were collected through the use
Abstract:
This research aims to apply the Performance Focused Activity Based Costing System in the consultant office of Al-Khwarizmi College of Engineering at the University of Technology for the purpose of measuring the cost of consulting services provided by these offices in order to reduce costs and their reflection in achieving profits. For the purpose of calculating costs accurately, and to test the hypothesis of the research, the research was applied in the office of the consultant of the College of Engineering Al-Khwarizm - University of Baghdad through the financial statement
... Show MoreIn this study, the photodegradation of Congo red dye (CR) in aqueous solution was investigated using Au-Pd/TiO2 as photocatalyst. The concentration of dye, dosage of photocatalyst, amount of H2O2, pH of the medium and temperature were examined to find the optimum values of these parameters. It has been found that 28 ppm was the best dye concentration. The optimum amount of photocatalyst was 0.09 g/75 mL of dye solution when the degradation percent was ~ 96 % after irradiation time of 12 hours, while the best amount of hydrogen peroxide was 7μl/75 mL of dye solution at degradation percent ~97 % after irradiation time of 10 hours, whereas pH 5 was the best value to carry out the reaction at the highest deg
... Show MoreThe research aims to clarify the COBIT5 framework for IT governance and to develop of a criterion based on Balanced Scorecard that contributes in measuring the performance of IT governance. To achieve these goals, the researchers adopted the deductive approach in the design of balanced scorecard to measure the IT governance at the Bank of Baghdad that was chosen because it relied heavily on IT.
The research has reached a number of conclusions, the most important of which is that the performance of IT department in the Bank of Baghdad falls within the good level that requires constant monitoring, the most committed items of Balanced Scorecard by the Bank were customer, internal operation, growth and finally the financial item; IT
... Show MoreCybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a
... Show MoreThe process of stocks evaluating considered as a one of challenges for the financial analysis, since the evaluating focuses on define the current value for the cash flows which the shareholders expected to have. Due to the importance of this subject, the current research aims to choose Fama & French five factors Model to evaluate the common stocks to define the Model accuracy in Fama& French for 2014. It has been used factors of volume, book value to market value, Profitability and investment, in addition to Beta coefficient which used in capital assets pricing Model as a scale for Fama & French five factors Model. The research sample included 11 banks listed in Iraq stock market which have me
... Show MoreThe aim of this study is to evaluate the anti fungal activity of a combination of essential oils against water molds. HPLC analysis was done to evaluate the quantity and quality of the active compounds in this combination which extracted from three herbs( Peppermint Menthapiperita ,Thyme Thymusvulgaris, Common sage Salvia officinalis L.) and the active compounds are Camphor,Menthol,,Thujone and Thymol with different concentrations. In this study (MIC) , (MFC) were measured and (LD50) determined after 48,96 h from fingerlings treatment of common carp in aquariums .The results of (MIC) were 0.025µl/ml for Aphanomyces sp. and 0.015µl/ml for both Achlya sp. and Fusariumsolani which showed significant differences(p<0.05) from Malachite gre
... Show More