Preferred Language
Articles
/
joe-1786
A An Authentication and Access Control Model for Healthcare based Cloud Services
...Show More Authors

Electronic Health Record (EHR) systems are used as an efficient and effective method of exchanging patients’ health information with doctors and other key stakeholders in the health sector to obtain improved patient treatment decisions and diagnoses. As a result, questions regarding the security of sensitive user data are highlighted. To encourage people to move their sensitive health records to cloud networks, a secure authentication and access control mechanism that protects users’ data should be established. Furthermore, authentication and access control schemes are essential in the protection of health data, as numerous responsibilities exist to ensure security and privacy in a network. So, the main goal of our suggested solution is to maintain a secure authentication and access control mechanism for health cloud data. Thus, in this work, Security Secret Key Provider (SSKP) phase is proposed for the E-healthcare-based cloud that consists of two parts. The first is an authentication scheme that is Security Secret Key (SSK) and the second is a modular access control mechanism. We explain the methodology of the proposed approach through appropriate evaluation results, which improves system security and performance by minimizing the time spent to get authentication and access the data. Simulation results indicate that our approach is significantly more effective than existing research.

 

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Mon Jan 01 2024
Journal Name
Ieee Access
A Direct Solution Scheme for Wide-Angle Electromagnetic Scattering Problems Using Compressive Sensing-Based Method of Moments
...Show More Authors

View Publication
Scopus Clarivate Crossref
Publication Date
Wed Jun 10 2009
Journal Name
Iraqi Journal Of Laser
Real Time Quantum Bit Error Rate Performance Test for a Quantum Cryptography System Based on BB84 protocol
...Show More Authors

In this work, the performance of the receiver in a quantum cryptography system based on BB84 protocol is scaled by calculating the Quantum Bit Error Rate (QBER) of the receiver. To apply this performance test, an optical setup was arranged and a circuit was designed and implemented to calculate the QBER. This electronic circuit is used to calculate the number of counts per second generated by the avalanche photodiodes set in the receiver. The calculated counts per second are used to calculate the QBER for the receiver that gives an indication for the performance of the receiver. Minimum QBER, 6%, was obtained with avalanche photodiode excess voltage equals to 2V and laser diode power of 3.16 nW at avalanche photodiode temperature of -10

... Show More
View Publication Preview PDF
Publication Date
Mon Feb 04 2019
Journal Name
Journal Of The College Of Education For Women
Effectiveness of Graduality, Escalation and Argumentation in Quranic Politeness Discourse “Surat Ghafir a Model” A Pragmatic Study
...Show More Authors

Theauthor addressed politeness discourse in “Surat Ghafir”. Quran texts include many rhetorical utterances which are considered pragmatic mechanismsconcerned with finding polite discourse. examining these texts allow to determine the effectiveness degree in the discourse, and to find the effect level that leads to interaction between the speaker and the listener. Graduation is considered an effect and a mechanism of discourse escalation.
The author reached a common definition of the graduation effectiveness term, due to its importance in finding polite discourse that is constructed by lingual manifestations some of which are escalation and graduation. Escalation is a mechanism to show the level of discourse graduation, it is a mea

... Show More
View Publication Preview PDF
Publication Date
Sun Nov 01 2020
Journal Name
Iop Conference Series: Materials Science And Engineering
Development of an Optimized Botnet Detection Framework based on Filters of Features and Machine Learning Classifiers using CICIDS2017 Dataset
...Show More Authors
Abstract<p>Botnet is a malicious activity that tries to disrupt traffic of service in a server or network and causes great harm to the network. In modern years, Botnets became one of the threads that constantly evolving. IDS (intrusion detection system) is one type of solutions used to detect anomalies of networks and played an increasing role in the computer security and information systems. It follows different events in computer to decide to occur an intrusion or not, and it used to build a strategic decision for security purposes. The current paper <italic>suggests</italic> a hybrid detection Botnet model using machine learning approach, performed and analyzed to detect Botnet atta</p> ... Show More
View Publication
Scopus (22)
Crossref (12)
Scopus Crossref
Publication Date
Sun Dec 29 2024
Journal Name
Plant Protection
Efficacy of silver nanoparticles from Fusarium solani and mycorrhizal inoculation for biological control of Fusarium wilt in tomato
...Show More Authors

The present study investigates the characterization of silver nanoparticles (AgNPs) synthesized using Fusarium solani and their impact on tomato seed germination, plant growth, and disease resistance. A visible color change from yellow to dark smoky indicated the formation of AgNPs, while UV-visible spectrophotometry revealed an absorbance peak at 437 nm, confirming their presence. Atomic force microscopy analysis showed that the AgNPs ranged from 0 to 39.27 nm in size, with an average height of 5.772 nm, while scanning electron microscopy highlighted their diverse surface morphology. The application of AgNPs and mycorrhizal fungi significantly improved tomato seed germination rates, plant height, and dry weight compared to untreate

... Show More
View Publication
Scopus (4)
Crossref (4)
Scopus Crossref
Publication Date
Wed Mar 23 2022
Journal Name
Journal Of Educational And Psychological Researches
Mental wandering and its relationship to attention control among university students
...Show More Authors

Research summary: The current research aims to identify:

1-Mental wandering among university students 2- Attentioncontrol among universitey students. 3- The relationship between mental wandering and attention control among university students. 4- The difference in the relationship among university students: accoerding to a- the gender variable (males - females) b- according to the specialization variable) Scientific-human), and the results of the current research reached the following: 1- University students have mental wandering associated with the task, and mental wandering that is not related to the task. 2- University students have attentive control 3- There is no relationship between mental wandering associated with task and

... Show More
View Publication Preview PDF
Publication Date
Tue Feb 27 2024
Journal Name
Mathematical Modelling Of Engineering Problems
Dynamics of a Fractional-Order Prey-Predator Model with Fear Effect and Harvesting
...Show More Authors

View Publication
Scopus Crossref
Publication Date
Thu Dec 22 2022
Journal Name
Fine Art Journal
Spatial relationships and their impact on monumental sculptures (arab capitals as a model)
...Show More Authors

The current research deals with spatial relations as a tool to link urban landmarks in a homogeneous composition with monumental sculptures, by identifying these landmarks and the extent of their impact on them, which constitutes an urgent need to evaluate the appropriate place and its effects on them, so that this analytical study is a critical approach adopted in artistic studies of monumental models in Arabcapitals .The current research came in four chapters, the first chapter of which dealt with the research problem, its importance and the need for it, then its objectives that were determined in revealing the spatial relations and their impact on

... Show More
View Publication Preview PDF
Publication Date
Sat Jul 01 2023
Journal Name
Journal Of Engineering
Toward Improving BIM Acceptance in FM: A Conceptual Model Integrating TTF and TAM
...Show More Authors

Substantial research has been performed on Building Information Modeling (BIM) in various topics, for instance, the use and benefit of BIM in design, construction, sustainable environment building, and Facility assets over the past several years. Although there are various studies on these topics, Building Information Modeling (BIM) awareness through facilities management is still relatively poor. The researcher's interest is increased in BIM study is based heavily upon the perception that it can facilitate the exchange and reuse of information during various project phases. This property and others can be used in the Iraqi Construction industry to motivate the government to eliminate the change resistance to use innovat

... Show More
View Publication Preview PDF
Crossref (3)
Crossref
Publication Date
Sun Jan 27 2019
Journal Name
Journal Of The College Of Education For Women
Music and Singing in The Heritage of Baghdadi The 1930s is a Model
...Show More Authors

Music and singing are always associated with the movement of society and the emergence of cultural and artistic activities other.
The social and political transformations of the 1930s helped to disseminate the study Music and music in the city of Baghdad and across Iraq This is the beginning of a new era of musical art alongside other arts.
While achieving musical arts A new step was advanced by publishing a technical study among the younger generation they were looking for to contribute to the musical field On the other hand, the city of Baghdad during the period of research many musical and musical performances Egyptian teams have provided many artistic activities and events which have had a significant impact on the development

... Show More
View Publication Preview PDF