Preferred Language
Articles
/
joe-1786
A An Authentication and Access Control Model for Healthcare based Cloud Services
...Show More Authors

Electronic Health Record (EHR) systems are used as an efficient and effective method of exchanging patients’ health information with doctors and other key stakeholders in the health sector to obtain improved patient treatment decisions and diagnoses. As a result, questions regarding the security of sensitive user data are highlighted. To encourage people to move their sensitive health records to cloud networks, a secure authentication and access control mechanism that protects users’ data should be established. Furthermore, authentication and access control schemes are essential in the protection of health data, as numerous responsibilities exist to ensure security and privacy in a network. So, the main goal of our suggested solution is to maintain a secure authentication and access control mechanism for health cloud data. Thus, in this work, Security Secret Key Provider (SSKP) phase is proposed for the E-healthcare-based cloud that consists of two parts. The first is an authentication scheme that is Security Secret Key (SSK) and the second is a modular access control mechanism. We explain the methodology of the proposed approach through appropriate evaluation results, which improves system security and performance by minimizing the time spent to get authentication and access the data. Simulation results indicate that our approach is significantly more effective than existing research.

 

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Sun Mar 06 2011
Journal Name
Baghdad Science Journal
Detection of Extraintestinal Pathogenic Escherichia coli among Normal Stool Flora of Young, Healthy, Unmarried Males & Females as Predisposing Factor to Extraintestinal Infections:A Comparison Study
...Show More Authors

In this study we surveyed the dominant normal stool flora of randomly selected healthy, young (18-23 years old), unmarried (doctrinal) Iraqi college students (males and females) for the carriage of extraintestinal pathogenic E. coli (ExPEC). ExPEC virulence was detected phenotypically by mannose resistant hemagglutination of human red blood cells (MRHA) and mannose sensitive (MS) agglutination of Bakers' yeast (Saccharomyces cerevisceae). From 88 college students, 264 E. coli isolates were obtained (3 isolates per person): 123 from 41 females and 141 from 47 males. Of these isolates, 56% (149/264) caused MS agglutination of yeast cells and 4.16% (11/264) showed MRHA. Eighty two percent (9/11) of the isolates with MRHA also caused MS agglu

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun Feb 10 2019
Journal Name
Iraqi Journal Of Physics
The role of atmospheric non-thermal plasma in the bacteria inactivation
...Show More Authors

Non-thermal atmospheric pressure plasma has emerged as a
new promising tool in medicine and biology. In this work, A DBD
system was built as a source of atmospheric pressure non-thermal
Plasma suitable for clinical and biological applications. E. coli and
staphylococcus spp bacteria were exposed to the DBD plasma for a
period of time as inactivation (sterilization) process. A series of
experiments were achieved under different operating conditions. The
results showed that the inactivation, of the two kinds of bacteria, was
affected (increasing or decreasing) according to operation conditions
because they affects, as expected, the produced plasma properties
according to those conditions.

View Publication Preview PDF
Crossref
Publication Date
Mon Dec 22 2025
Journal Name
Al–bahith Al–a'alami
FACTORS AFFECTING WOMEN’S USE OF ELECTRONIC MARKETING ON SOCIAL MEDIA : (Field Study)
...Show More Authors

The research aims to determine the factors affecting the woman’s use of electronic marketing in social networking sites, and to know the extent of the sample’s use of social networking sites for electronic shopping purposes. The research tool used the questionnaire form that was designed in its final form after presenting it to the arbitrators and it included a set of questions and a five-Likert scale, and used the spss statistical program to perform the statistical operations that were laid out in tables showing the frequencies, percentages and percentages Salary, mean, standard deviation, and correlation using the Spearman correlation coefficient, the Ka2 square test, the F test, the Alpha Cronbach test, and arrived at Searching to

... Show More
View Publication Preview PDF
Crossref
Publication Date
Thu Dec 31 2020
Journal Name
Political Sciences Journal
Constructivism Theory in International Relations (Case Study on the War on Terrorism)
...Show More Authors

        The topic of the research revolves around constructivist theory, which is one of the most important theories that added weight to the theoretical and epistemological field of international relations. The constructivist theory studies international relations from a completely different side of theories by focusing on the social aspects of international relations, and by looking at international relations as social constructs. Ideas, cultures, norms, standards and language play a major role in their formation. The study also examines the state of the war on terrorism as it represents one of the most international cases in which its composition and composition coincide with constructive ideas and a

... Show More
View Publication Preview PDF
Crossref
Publication Date
Wed Feb 19 2020
Journal Name
International Journal Of Innovation, Creativity And Change
Secure Image Steganography Through Multilevel Security
...Show More Authors

The concealment of data has emerged as an area of deep and wide interest in research that endeavours to conceal data in a covert and stealth manner, to avoid detection through the embedment of the secret data into cover images that appear inconspicuous. These cover images may be in the format of images or videos used for concealment of the messages, yet still retaining the quality visually. Over the past ten years, there have been numerous researches on varying steganographic methods related to images, that emphasised on payload and the quality of the image. Nevertheless, a compromise exists between the two indicators and to mediate a more favourable reconciliation for this duo is a daunting and problematic task. Additionally, the current

... Show More
Publication Date
Mon Jan 01 2024
Journal Name
Journal Of The College Of Languages (jcl)
The neology in the Iraqi dialect after the invasion of 2003 and the level of imaginative comprehension: La neología en el dialecto Iraqui tras la invasión de 2003 y el nivel de la comprensión imaginativa
...Show More Authors

       The article analyzes the neologisms that arose in the Iraqi dialect after the 2003 US-British invasion and the fall of Saddam Hussein's regime, according to the theory I advocate: "The Basic Outline of Reference," a developed theory of Arab legacy and cognitive theory, which came out in 1987 in America, so we have used the terminology of cognitive grammar. In this theory it is stated that the reference is the interaction between four components: perception, imagination, imaginative comprehension and the linguistic sign or symbolization (the neological word in this article), which are closely related, so that none of them can be lacking, because they constitute a holistic whole that belongs to a deeper level. Let us

... Show More
View Publication Preview PDF
Crossref
Publication Date
Tue Jan 02 2018
Journal Name
Journal Of Educational And Psychological Researches
The effectiveness of educational design design according to the theory of Ozbal in the acquisition of geographical concepts among the pupils of the fourth primary in the geography and development of their habits of mind
...Show More Authors

Summary The objective of the research is to learn the design of a learning educational learning according to the theory of Ausubel in the acquisition of geographical concepts among the students of the fourth primary in the field of geography and the development of their habits of mind. To achieve this, the researcher relied on the two hypotheses the researcher used the design of equal groups the first experimental group was studied according to the design educational educational learning according to the theory and the other is an officer according to the traditional method. The research community consists of fourth grade pupils in primary school day for girls in the Directorate of Education Baghdad, Al-Rusafa, the third academic year 20

... Show More
View Publication Preview PDF
Publication Date
Mon Jul 01 2019
Journal Name
Journal Of Engineering
Speed Controller of Three Phase Induction Motor Using Sliding Mode Controller
...Show More Authors

In this paper, an adaptive integral Sliding Mode Control (SMC) is employed to control the speed of Three-Phase Induction Motor. The strategy used is the field oriented control as ac drive system. The SMC is used to estimate the frequency that required to generates three phase voltage of Space Vector Pulse Width Modulation (SVPWM) invertor . When the SMC is used with current controller, the quadratic component of stator current is estimated by the controller. Instead of using current controller, this paper proposed estimating the frequency of stator voltage since that the slip speed is function of the quadratic current . The simulation results of using the SMC showed that a good dynamic response can be obtained under load

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Tue Mar 30 2021
Journal Name
Baghdad Science Journal
Experimental Evidence of Chaotic Resonance in Semiconductor Laser
...Show More Authors

In this paper, an experimental study has been conducted regarding the indication of resonance in chaotic semiconductor laser.  Resonant perturbations are effective for harnessing nonlinear oscillators for various applications such as inducing chaos and controlling chaos. Interesting results have been obtained regarding to the effect of the   chaotic resonance by adding the frequency on the systems. The frequency changes nonlinear dynamical system through a critical value, there is a transition from a periodic attractor to a strange attractor. The amplitude has a very relevant impact on the system, resulting in an optimal resonance response for appropriate values related to correlation time. The chaotic system becomes regular under

... Show More
View Publication Preview PDF
Scopus (4)
Scopus Clarivate Crossref
Publication Date
Wed Jun 30 2010
Journal Name
Al-kindy College Medical Journal
Evaluation the Effectiveness of Impregnated Net in Reducing Leishmaniasis Incidence: Diala-Iraq
...Show More Authors

Background: Leishmaniasis is important public
health problem owing to its impact on morbidity
and mortality and difficulties in application of
effective control measures.
Objective: The aim of the study is to evaluate the
using of impregnate bed nets in the control of
leishmaniasis.
Methods: The study was conducted throughout
the years 2004 and 2005, in Diala Governorate
(about 60km north-east Baghdad). This is the first
study in Iraq for evaluation of the impregnated bed
net in control of leishmaniasis. Two villages were
selected to achieve this aim. The nets were
distributed for the first village to be used by their
population. The second village was served as
control.

Results: The

... Show More
View Publication Preview PDF