The internet of medical things (IoMT), which is expected the lead to the biggest technology in worldwide distribution. Using 5th generation (5G) transmission, market possibilities and hazards related to IoMT are improved and detected. This framework describes a strategy for proactively addressing worries and offering a forum to promote development, alter attitudes and maintain people's confidence in the broader healthcare system without compromising security. It is combined with a data offloading system to speed up the transmission of medical data and improved the quality of service (QoS). As a result of this development, we suggested the enriched energy efficient fuzzy (EEEF) data offloading technique to enhance the delivery of data transmission at the original targeted location. Initially, healthcare data was collected. Preprocessing is achieved by the normalization method. An EEEF data offloading scheme is proposed. A fruit fly optimization (FFO) technique is utilized. The performance metrics such as energy consumption, delay, resource utilization, scalability, and packet loss are analyzed and compared with existing techniques. The future scope will make use of a revolutionary optimization approach for IoMT.
This search seeks to know the trends of academics in the field of Press and audio, video and read press about paper press compared with continued development and widespread deployment of web journalism. This research belongs to descriptive studies which depends on sample survey approach adopted by five-meter design measuring trends. It contains 28 items having applied honesty and reliability transaction and the scale form is distributed to the sample studied of about 110 professors and then the researcher collects them and then applying the appropriate statistical program to get the results. This search seeks to know the trends of academics in the field of Press and audio, video and read press about paper press compared with continu
... Show MoreEthnographic research is perhaps the most common applicable type of qualitative research method in psychology and medicine. In ethnography studies, the researcher immerses himself in the environment of participants to understand the cultures, challenges, motivations, and topics that arise between them by investigating the environment directly. This type of research method can last for a few days to a few years because it involves in-depth monitoring and data collection based on these foundations. For this reason, the findings of the current study stimuli the researchers in psychology and medicine to conduct studies by applying ethnographic research method to investigate the common cultural patterns language, thinking, beliefs, and behavior
... Show MoreObjective: the aim of this study is to determine the level of students' knowledge about the environmental health.
Methodology: The cross-sectional study was conducted at the College of Health and Medical Technology in Baghdad
city during the period from 1st march till 1st of July 2012. Data was collected by self-recording of a previously designed
questionnaire to obtain socio-demographic information such as (age, gender, department, year of grade).
Results: The highest rate of students were in the 2nd year followed by the 3rd year, highest rate of students had low
level of knowledge followed by intermediate level of knowledge, while lowest rate of students on had high level of
knowledge .Females had higher level of know
The paradigm and domain of data security is the key point as per the current era in which the data is getting transmitted to multiple channels from multiple sources. The data leakage and security loopholes are enormous and there is need to enforce the higher levels of security, privacy and integrity. Such sections incorporate e-administration, long range interpersonal communication, internet business, transportation, coordinations, proficient correspondences and numerous others. The work on security and trustworthiness is very conspicuous in the systems based situations and the private based condition. This examination original copy is exhibiting the efficacious use of security based methodology towards the execution with blockchain
... Show MoreThe using of the parametric models and the subsequent estimation methods require the presence of many of the primary conditions to be met by those models to represent the population under study adequately, these prompting researchers to search for more flexible parametric models and these models were nonparametric, many researchers, are interested in the study of the function of permanence and its estimation methods, one of these non-parametric methods.
For work of purpose statistical inference parameters around the statistical distribution for life times which censored data , on the experimental section of this thesis has been the comparison of non-parametric methods of permanence function, the existence
... Show MorePortable devices such as smartphones, tablet PCs, and PDAs are a useful combination of hardware and software turned toward the mobile workers. While they present the ability to review documents, communicate via electronic mail, appointments management, meetings, etc. They usually lack a variety of essential security features. To address the security concerns of sensitive data, many individuals and organizations, knowing the associated threats mitigate them through improving authentication of users, encryption of content, protection from malware, firewalls, intrusion prevention, etc. However, no standards have been developed yet to determine whether such mobile data management systems adequately provide the fu
... Show More