Preferred Language
Articles
/
joe-1786
A An Authentication and Access Control Model for Healthcare based Cloud Services
...Show More Authors

Electronic Health Record (EHR) systems are used as an efficient and effective method of exchanging patients’ health information with doctors and other key stakeholders in the health sector to obtain improved patient treatment decisions and diagnoses. As a result, questions regarding the security of sensitive user data are highlighted. To encourage people to move their sensitive health records to cloud networks, a secure authentication and access control mechanism that protects users’ data should be established. Furthermore, authentication and access control schemes are essential in the protection of health data, as numerous responsibilities exist to ensure security and privacy in a network. So, the main goal of our suggested solution is to maintain a secure authentication and access control mechanism for health cloud data. Thus, in this work, Security Secret Key Provider (SSKP) phase is proposed for the E-healthcare-based cloud that consists of two parts. The first is an authentication scheme that is Security Secret Key (SSK) and the second is a modular access control mechanism. We explain the methodology of the proposed approach through appropriate evaluation results, which improves system security and performance by minimizing the time spent to get authentication and access the data. Simulation results indicate that our approach is significantly more effective than existing research.

 

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Tue Mar 30 2021
Journal Name
Wasit Journal Of Computer And Mathematics Science
Dynamic Data Replication for Higher Availability and Security
...Show More Authors

The paradigm and domain of data security is the key point as per the current era in which the data is getting transmitted to multiple channels from multiple sources. The data leakage and security loopholes are enormous and there is need to enforce the higher levels of security, privacy and integrity. Such sections incorporate e-administration, long range interpersonal communication, internet business, transportation, coordinations, proficient correspondences and numerous others. The work on security and trustworthiness is very conspicuous in the systems based situations and the private based condition. This examination original copy is exhibiting the efficacious use of security based methodology towards the execution with blockchain

... Show More
View Publication
Crossref (1)
Crossref
Publication Date
Mon Oct 02 2023
Journal Name
Journal Of Engineering
Control of Propagation of Salt Wedge by using Roughness Blocks having Different Inclination
...Show More Authors

The hydraulic conditions of a flow previously proved to be changed when placing large-scale geometric roughness elements on the bed of an open channel. These elements impose more resistance to the flow.  The geometry of the roughness elements, the numbers used, and the configuration are parameters that can affect the hydraulic flow characteristics. The target is to use inclined block elements to control the salt wedge propagation pointed in most estuaries to prevent its negative effects. The Computational Fluid Dynamics CFD Software was used to simulate the two-phase flow in an estuary model. In this model, the used block elements are 2 cm by 3 cm cross-sections with an inclined face in the flow direction, with a length

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Thu Mar 01 2018
Journal Name
2018 Tenth International Conference On Advanced Computational Intelligence (icaci)
On high-level control of power-augmentation lower extremity exoskeletons: Human walking intention
...Show More Authors

View Publication
Scopus (8)
Crossref (6)
Scopus Crossref
Publication Date
Mon Mar 27 2023
Journal Name
8th Engineering And 2nd International Conference For College Of Engineering – University Of Baghdad: Coec8-2021 Proceedings
Evaluation of the capability of Shatt Al-Arab River to control flood discharge
...Show More Authors

Abstract. Shatt Al-Arab River was the most important tide river in Iraq, it suffered from neglect and lack of maintenance in the past decades. The river embankment is constantly exposed to erosion processes due to several factors, one of the most important of these factors is the movement of water currents due to the tidal energy coming from the Arabian Gulf. In this study, one dimension unsteady-state model was implemented to study river flood capacity simulation by using HEC-RAS (5.0.7) software in Shatt Al Arab River and its tributaries. The data included flow rate, water level records were collected daily from 2018 to 2020 at different stations along the mentioned river and its feeders, additionally, the considered flood discharge data

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Mon Feb 18 2019
Journal Name
Journal Of Accounting And Financial Studies ( Jafs )
Control Over The Medical Evacuation Program in light of the Government's Accounting System
...Show More Authors

The accounting system of government is considered an important tool to follow up the financial transactions that reflect the activities of governmental units and by which the useful information for estimating governmental annual revenues and expenditures are provided through the state public budget because it is an information system that provides detailed past performance, as well as measures the efficiency of the governmental agencies performance in implementing the budget, and the of success governmental units is measured through the type of services and programs offered, their size and the possibility of achieving the objectives assigned to them. The medical evacuation program is one of the medical and curative health services provid

... Show More
View Publication Preview PDF
Crossref
Publication Date
Wed May 31 2017
Journal Name
Al-khwarizmi Engineering Journal
Corrosion control of Buried Low Carbon Steel Structure by Using Alteration Medias method
...Show More Authors


Abstract

The aim of the present work is to control of metal buried corrosion by alteration the media method. This method depended on the characteristics of each media. The corrosion rates in different media (soil, sand, porcelanite stone and gravel) for specimens of low carbon steel were measured by two methods weight loss method and polarization method, weight loss measured by buried specimens in these medias separately for 90 days. The polarization method includes preparing of specimen and salt solutions have electrical resistivity equivalent electrical resistivity of these media. The corrosion rate of two method results in (soil > sand> porcelainte stone> gravel). The lower corrosion rate happene

... Show More
View Publication Preview PDF
Publication Date
Tue Dec 01 2015
Journal Name
Journal Of Economics And Administrative Sciences
Achieve the requirements of the Administrative Control according to human resource management practices
...Show More Authors

Human Resources Management Practices (HRMP) and managerial control represent two academic fields that have been and still are the focus of many studies. However, merging both fields and studying the relationship that connects them and also the role that HRMP play in achieving the requirements of managerial control represents a new and novel study according to the available literature in these fields.

To achieve these goals, this study has been conducted, using the surveying questionnaire method, on a sample of ten general inspector offices in Iraq that work in the field of control for ministries and independent committees. A questionnaire has been used to collect the data which was analyzed with several s

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun Jan 01 2023
Journal Name
Journal Of Engineering
Intelligent Congestion Control of 5G Traffic in SDN using Dual-Spike Neural Network
...Show More Authors

Software Defined Networking (SDN) with centralized control provides a global view and achieves efficient network resources management. However, using centralized controllers has several limitations related to scalability and performance, especially with the exponential growth of 5G communication. This paper proposes a novel traffic scheduling algorithm to avoid congestion in the control plane. The Packet-In messages received from different 5G devices are classified into two classes: critical and non-critical 5G communication by adopting Dual-Spike Neural Networks (DSNN) classifier and implementing it on a Virtualized Network Function (VNF). Dual spikes identify each class to increase the reliability of the classification

... Show More
View Publication Preview PDF
Crossref (6)
Crossref
Publication Date
Thu Nov 02 2023
Journal Name
Journal Of Engineering
New Research Trends in Designing E-Government Architecture Based on Blockchain Technology
...Show More Authors

Blockchain has garnered the most attention as the most important new technology that supports recent digital transactions via e-government. The most critical challenge for public e-government systems is reducing bureaucracy and increasing the efficiency and performance of administrative processes in these systems since blockchain technology can play a role in a decentralized environment and execute a high level of security transactions and transparency. So, the main objectives of this work are to survey different proposed models for e-government system architecture based on blockchain technology implementation and how these models are validated.  This work studies and analyzes some research trends focused on blockchain

... Show More
View Publication Preview PDF
Crossref (2)
Crossref
Publication Date
Wed Apr 30 2025
Journal Name
Al-turath University College Multidisciplinary Journal
The Role of Nominalization in Social Media Discourse An English Corpus Based Analysis دور التعابير الاسمية في خطاب وسائل التواصل الاجتماعي : تحليل يعتمد البيانات المحوسبة في اللغة الانكليزية
...Show More Authors

The expansion of the social media environment has created its own linguistic realities which involve more colloquial communication and practical employment of language. This research focuses on nominalizations in detail, which are originally formed words that have been changed for a noun role. These nominalizations are examined within the context of Facebook posts. The research aims to discover the various nominalizations used and how often they appear in a large sample of data from Public Facebook Posts Corpora. Computational linguistics opened new fields of study and enabled researchers to study large amounts of data easily, making it easier to identify patterns. Two computational methods of identifying nominalization in a large dataset w

... Show More
Preview PDF