Comparison Analysis of Two Fish and Blow Fish Algorithm

2015 ◽  
Vol 2 (2) ◽  
pp. 82-85
Author(s):  
Sathiyapriya.S

Steganography is a technique that allows one to hide binary data within an image while adding few noticeable changes. There are many security algorithms are available in steganography, but in particular the algorithm Blowfish and Twofish both are used to secure information in telemedicine. Thisresearch aspires to compare both these algorithms how work well in securing information while transmitting the telemedicine data. This study focuses which algorithm can use for hiding information in health care domain. This research also aims to find out how much in-depth both algorithms hiding the information with securely.

2020 ◽  
pp. 81-94
Author(s):  
Soobia Saeed ◽  
Afnizanfaizal Abdullah ◽  
N. Z. Jhanjhi ◽  
Mehmood Naqvi ◽  
Azeem Khan

Author(s):  
Subhas C. Misra ◽  
Sandip Bisui ◽  
Kamel Fantazy

Among the emerging areas in health-care system, the implementation of Electronic Medical Record system and the discovery of Personalized Medicine are occupying top positions. While some of the personalized drugs have already been discovered, implementing this new medicare system requires a lot of changes in the traditional health-care system. This paper aims at identifying these critical changes required in the adoption of the Personalized Medicine system. A systemic attempt has been made to prepare a list of possible changes required for the adoption based on available literature. This research study shows that changes from reactive to efficient medical care, from trial and error to right treatment for right person at right time, from narrow mind-set to open mindedness, from open information of patients to secure information, from less emphasis on IT infrastructure to more emphasis on IT infrastructure are some of the significant changes that are necessary for implementing the revolutionary medicare system of personalized Medicine.


2020 ◽  
Vol 18 (Suppl.1) ◽  
pp. 460-466
Author(s):  
S. Panayotova ◽  
D. Petrova

The paper covers an important issue in national and international aspect: the migration processes and the legislation in Bulgaria. About 60,000 to 70,000 immigrants have been registered in the country but according to the National Statistical Institute (NSI) the number of immigrants residing in Bulgaria is between 300 and 350 thousand coming from more than 11 countries. The purpose of this study is to present an up-to-date picture of migration, in particular immigrants in Bulgaria, and their limited access to the labor market, health care, education, and social assistance. The authors use the methods of comparison, analysis, and data pooling. Secondary information from the authors' participation in the seminar Waves of Integration (TSUNAMI) in Caciulata, Romania, 2019 was also analyzed. The results of the survey show that the majority of the Bulgarian population perceives immigrants as a threat due to difficulties in their integration and in relation to the worse economic situation of the country compared to other European countries. In conclusion, migration in the country between 2017 and 2019, including illegal, is relatively low. The refugee crisis affects the Bulgarian population mainly politically and psychologically, and for asylum seekers Bulgaria is not a final destination but a transit territory.


2021 ◽  
Vol 3 ◽  
Author(s):  
Emmanouil G. Spanakis ◽  
Stelios Sfakianakis ◽  
Silvia Bonomi ◽  
Claudio Ciccotelli ◽  
Sabina Magalini ◽  
...  

This work aims to provide information, guidelines, established practices and standards, and an extensive evaluation on new and promising technologies for the implementation of a secure information sharing platform for health-related data. We focus strictly on the technical aspects and specifically on the sharing of health information, studying innovative techniques for secure information sharing within the health-care domain, and we describe our solution and evaluate the use of blockchain methodologically for integrating within our implementation. To do so, we analyze health information sharing within the concept of the PANACEA project that facilitates the design, implementation, and deployment of a relevant platform. The research presented in this paper provides evidence and argumentation toward advanced and novel implementation strategies for a state-of-the-art information sharing environment; a description of high-level requirements for the transfer of data between different health-care organizations or cross-border; technologies to support the secure interconnectivity and trust between information technology (IT) systems participating in a sharing-data “community”; standards, guidelines, and interoperability specifications for implementing a common understanding and integration in the sharing of clinical information; and the use of cloud computing and prospectively more advanced technologies such as blockchain. The technologies described and the possible implementation approaches are presented in the design of an innovative secure information sharing platform in the health-care domain.


2021 ◽  
Vol ahead-of-print (ahead-of-print) ◽  
Author(s):  
Jafar Pourmahmoud ◽  
Maedeh Gholam Azad

Purpose The purpose of this paper is to propose the data envelopment analysis (DEA) model that can be used as binary-valued data. Often the basic DEA models were developed by assuming that all of the data are non-negative. However, there are situations where all data are binary. As an example, the information on many diseases in health care is binary data. The existence of binary data in traditional DEA models may change the behavior of the production possibility set (PPS). This study defines a binary summation operator, expresses the modified principles and introduces the extracted PPS of axioms. Furthermore, this study proposes a binary integer programming of DEA (BIP-DEA) for assessing the efficiency scores to use as an alternate tool in prediction. Design/methodology/approach In this study, the extracted PPS of modified axioms and the BIP-DEA model for assessing the efficiency score is proposed. Findings The binary integer model was proposed to eliminate the challenges of the binary-value data in DEA. Originality/value The importance of the proposed model for many fields including the health-care industry is that it can predict the occurrence or non-occurrence of the events, using binary data. This model has been applied to evaluate the most important risk factors for stroke disease and mechanical disorders. The targets set by this model can help to diagnose earlier the disease and increase the patients’ chances of recovery.


Author(s):  
Kadhim Hassan Kaittan ◽  
Samir Jasim Mohammed

During study of directly spread spectrum systems, noted that this system uses many types of code to spread data through communication process. There are different types of code sequences available with good correlation properties, they often use pesudo sequence for spreading which is to be less efficient in protecting information from the breaches that attack the communications systems from penetration. In this article gold sequence will use, which is consider better and more complex than the rest of the code sequence (pseudo-noise (PN) sequence, barker code, hadamard code, and others) in terms of the security aspect of the information, thereby it is difficult to detect the information sent in addition to that it is used in code-division multiple access. Design and implement difficult code to protect information in the communication system carried out here by using MATLAB, for sending a binary data and color photo to be sure that this system is working properly with few errors and better information protection than the rest of the other code that is used in direct sequence spread spectrum.


Sign in / Sign up

Export Citation Format

Share Document