Secure storage of confidential medical information is critical to healthcare organizations seeking to protect patient's privacy and comply with regulatory requirements. This paper presents a new scheme for secure storage of medical data using Chaskey cryptography and blockchain technology. The system uses Chaskey encryption to ensure integrity and confidentiality of medical data, blockchain technology to provide a scalable and decentralized storage solution. The system also uses Bflow segmentation and vertical segmentation technologies to enhance scalability and manage the stored data. In addition, the system uses smart contracts to enforce access control policies and other security measures. The description of the system detailing and provide an analysis of its security and performance characteristics. The resulting images were tested against a number of important metrics such as Peak Signal-to-Noise Ratio (PSNR), Mean Squared Error (MSE), bit error rate (BER), Signal-to-Noise Ratio (SNR), Normalization Correlation (NC) and Structural Similarity Index (SSIM). Our results showing that the system provides a highly secure and scalable solution for storing confidential medical data, with potential applications in a wide range of healthcare settings.
Applying a well-performing heat exchanger is an efficient way to fortify the relatively low thermal response of phase-change materials (PCMs), which have broad application prospects in the fields of thermal management and energy storage. In this study, an improved PCM melting and solidification in corrugated (zigzag) plate heat exchanger are numerically examined compared with smooth (flat) plate heat exchanger in both horizontal and vertical positions. The effects of the channel width (0.5 W, W, and 2 W) and the airflow temperature (318 K, 323 K, and 328 K) are exclusively studied and reported. The results reveal the much better performance of the horizontal corrugated configuration compared with the smooth channel during both melti
... Show MoreTo maintain the security and integrity of data, with the growth of the Internet and the increasing prevalence of transmission channels, it is necessary to strengthen security and develop several algorithms. The substitution scheme is the Playfair cipher. The traditional Playfair scheme uses a small 5*5 matrix containing only uppercase letters, making it vulnerable to hackers and cryptanalysis. In this study, a new encryption and decryption approach is proposed to enhance the resistance of the Playfair cipher. For this purpose, the development of symmetric cryptography based on shared secrets is desired. The proposed Playfair method uses a 5*5 keyword matrix for English and a 6*6 keyword matrix for Arabic to encrypt the alphabets of
... Show MoreThe aesthetic contents of data visualization is one of the contemporary areas through which data scientists and designers have been able to link data to humans, and even after reaching successful attempts to model data visualization, it wasn't clear how that reveals how it contributed to choosing the aesthetic content as an input to humanize these models, so the goal of the current research is to use The analytical descriptive approach aims to identify the aesthetic contents in data visualization, which the researchers interpreted through pragmatic philosophy and Kantian philosophy, and analyze a sample of data visualization models to reveal the aesthetic entrances in them to explain how to humanize them. The two researchers reached seve
... Show MoreThe high carbon dioxide emission levels due to the increased consumption of fossil fuels has led to various environmental problems. Efficient strategies for the capture and storage of greenhouse gases, such as carbon dioxide are crucial in reducing their concentrations in the environment. Considering this, herein, three novel heteroatom-doped porous-organic polymers (POPs) containing phosphate units were synthesized in high yields from the coupling reactions of phosphate esters and 1,4-diaminobenzene (three mole equivalents) in boiling ethanol using a simple, efficient, and general procedure. The structures and physicochemical properties of the synthesized POPs were established using various techniques. Field emission scanning elect
... Show MoreThe study of the future of the international system currently appears, according to scientific data and existing facts in light of the emergence of international actors from non-states and international informal institutions, to be heading towards a non-polarity system and this trend is fueled by many variables to reduce polarity, and it is expected in the future that the international system will turn into a non-polarity.
Objective: The objectives of the present study were to evaluate the effectiveness of the instructional intervention
about medical and health knowledge of patients with diabetes mellitus type II.
Methodology: A Quasi- experimental study was carried out in National Center for Diabetes Mellitus/ Almustansria
University, started from 4th January 2012, to 1st April 2012. Non-probability (purposive sample) of (50) diabetes
mellitus type II, who visit National Center for Diabetes Mellitus/ Almustansria University. The study sample is
divided equally into (25) study and (25) control groups. The study group received the instructional intervention.
While the control not exposed to the instructional intervention. The data are coll
In this work, functionally graded materials were synthesized by centrifugal technique at different
volume fractions 0.5, 1, 1.5, and 2% Vf with a rotation speed of 1200 rpm and a constant rotation time, T
= 6 min . The mechanical properties were characterized to study the graded and non-graded nanocomposites
and the pure epoxy material. The mechanical tests showed that graded and non-graded added alumina
(Al2O3) nanoparticles enhanced the effect more than pure epoxy. The maximum difference in impact strength
occurred at (FGM), which was loaded from the rich side of the nano-alumina where the maximum value was
at 1% Vf by 133.33% of the sample epoxy side. The flexural strength and Young modulus of the fu
With the revolutionized expansion of the Internet, worldwide information increases the application of communication technology, and the rapid growth of significant data volume boosts the requirement to accomplish secure, robust, and confident techniques using various effective algorithms. Lots of algorithms and techniques are available for data security. This paper presents a cryptosystem that combines several Substitution Cipher Algorithms along with the Circular queue data structure. The two different substitution techniques are; Homophonic Substitution Cipher and Polyalphabetic Substitution Cipher in which they merged in a single circular queue with four different keys for each of them, which produces eight different outputs for
... Show More