The internet of medical things (IoMT), which is expected the lead to the biggest technology in worldwide distribution. Using 5th generation (5G) transmission, market possibilities and hazards related to IoMT are improved and detected. This framework describes a strategy for proactively addressing worries and offering a forum to promote development, alter attitudes and maintain people's confidence in the broader healthcare system without compromising security. It is combined with a data offloading system to speed up the transmission of medical data and improved the quality of service (QoS). As a result of this development, we suggested the enriched energy efficient fuzzy (EEEF) data offloading technique to enhance the delivery of data transmission at the original targeted location. Initially, healthcare data was collected. Preprocessing is achieved by the normalization method. An EEEF data offloading scheme is proposed. A fruit fly optimization (FFO) technique is utilized. The performance metrics such as energy consumption, delay, resource utilization, scalability, and packet loss are analyzed and compared with existing techniques. The future scope will make use of a revolutionary optimization approach for IoMT.
The Al-Kindy College Medical Journal (KCMJ) is an Iraqi scholarly journal published by the Al-Kindy College of Medicine, University of Baghdad. It was officially founded in 2004. It is a peer-reviewed journal, published in both online and printed forms. It has a mission to offer a publication platform that mirrors recent knowledge and findings in the field of medicine and medical sciences. It publishes various types of articles, including editorial, review article, research article, brief report, case report, and letter to editor. It accepts articles in the English language. It was biannually published till 2021 when it started to launch three issues per year. The journal is registered with numerous partners, including Iraqi Academi
... Show MoreObjective(s): To assess the burden of mothers` care for child with colostomy and find out relationships between child and mother socio-demographic data with mothers` burden. Methodology: a descriptive study was conducted from 1 August 2013 to 1 September 2014. The sample consisted of 100 children and their mothers at Baghdad Teaching hospital in Baghdad city. A questionnaire was prepared based on the previous literature review, meeting mothers of children with colostomy, and the Zarit Burden Interview scale. Data has collected through the application of questionnaire and interview techniques. Results: T
The research aimed at measuring the compatibility of Big date with the organizational Ambidexterity dimensions of the Asia cell Mobile telecommunications company in Iraq in order to determine the possibility of adoption of Big data Triple as a approach to achieve organizational Ambidexterity.
The study adopted the descriptive analytical approach to collect and analyze the data collected by the questionnaire tool developed on the Likert scale After a comprehensive review of the literature related to the two basic study dimensions, the data has been subjected to many statistical treatments in accordance with res
... Show MoreIn data mining, classification is a form of data analysis that can be used to extract models describing important data classes. Two of the well known algorithms used in data mining classification are Backpropagation Neural Network (BNN) and Naïve Bayesian (NB). This paper investigates the performance of these two classification methods using the Car Evaluation dataset. Two models were built for both algorithms and the results were compared. Our experimental results indicated that the BNN classifier yield higher accuracy as compared to the NB classifier but it is less efficient because it is time-consuming and difficult to analyze due to its black-box implementation.
This paper present the fast and robust approach of English text encryption and decryption based on Pascal matrix. The technique of encryption the Arabic or English text or both and show the result when apply this method on plain text (original message) and how will form the intelligible plain text to be unintelligible plain text in order to secure information from unauthorized access and from steel information, an encryption scheme usually uses a pseudo-random enecryption key generated by an algorithm. All this done by using Pascal matrix. Encryption and decryption are done by using MATLAB as programming language and notepad ++to write the input text.This paper present the fast and robust approach of English text encryption and decryption b
... Show MorePurpose – The Cloud computing (CC) and its services have enabled the information centers of organizations to adapt their informatic and technological infrastructure and making it more appropriate to develop flexible information systems in the light of responding to the informational and knowledge needs of their users. In this context, cloud-data governance has become more complex and dynamic, requiring an in-depth understanding of the data management strategy at these centers in terms of: organizational structure and regulations, people, technology, process, roles and responsibilities. Therefore, our paper discusses these dimensions as challenges that facing information centers in according to their data governance and the impa
... Show MoreThe key objective of the study is to understand the best processes that are currently used in managing talent in Australian higher education (AHE) and design a quantitative measurement of talent management processes (TMPs) for the higher education (HE) sector.
The three qualitative multi-method studies that are commonly used in empirical studies, namely, brainstorming, focus group discussions and semi-structured individual interviews were considered. Twenty
The effect of the magnetic abrasive finishing (MAF) method on the temperature rise (TR), and material removal rate (MRR) has been investigated in this paper. Sixteen runs were to determine the optimum temperature in the contact area (between the abrasive powder and surface of workpiece) and the MRR according to Taguchi orthogonal array (OA). Four variable technological parameters (cutting speed, finishing time, working gap, and the current in the inductor) with four levels for each parameter were used, the matrix is known as a L16 (44) OA. The signal to noise ratio (S/N) ratio and analysis of the variance (ANOVA) were utilized to analyze the results using (MINITAB17) to find the optimum condition and identify the significant p
... Show MoreThere are many images you need to large Khoznah space With the continued evolution of storage technology for computers, there is a need nailed required to reduce Alkhoznip space for pictures and image compression in a good way, the conversion method Alamueja
This article explores the process of VGI collection by assessing the relative usability and accuracy of a range of different methods (Smartphone GPS, Tablet, and analogue maps) for data collection amongst different demographic and educational groups, and in different geographical contexts. Assessments are made of positional accuracy, completeness, and data collectors’ experiences with reference to the official cadastral data and the administration system in a case-study region of Iraq. Ownership data was validated by crowd agreement. The result shows that successful VGI projects have access to varying data collection methods.