Preferred Language
Articles
/
joe-1786
A An Authentication and Access Control Model for Healthcare based Cloud Services
...Show More Authors

Electronic Health Record (EHR) systems are used as an efficient and effective method of exchanging patients’ health information with doctors and other key stakeholders in the health sector to obtain improved patient treatment decisions and diagnoses. As a result, questions regarding the security of sensitive user data are highlighted. To encourage people to move their sensitive health records to cloud networks, a secure authentication and access control mechanism that protects users’ data should be established. Furthermore, authentication and access control schemes are essential in the protection of health data, as numerous responsibilities exist to ensure security and privacy in a network. So, the main goal of our suggested solution is to maintain a secure authentication and access control mechanism for health cloud data. Thus, in this work, Security Secret Key Provider (SSKP) phase is proposed for the E-healthcare-based cloud that consists of two parts. The first is an authentication scheme that is Security Secret Key (SSK) and the second is a modular access control mechanism. We explain the methodology of the proposed approach through appropriate evaluation results, which improves system security and performance by minimizing the time spent to get authentication and access the data. Simulation results indicate that our approach is significantly more effective than existing research.

 

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Mon Dec 07 2020
Journal Name
Iranian Journal Of Parasitology
Serum levels of il-12 and il-23 in breast cancer patients infected with toxoplasma gondii: A case-control study
...Show More Authors

Scopus (2)
Scopus
Publication Date
Thu Nov 06 2025
Journal Name
Frontiers In Oral Health
Irisin, a promising adipomyokine, shows low levels in relation to periodontal diseases, unlike visfatin and IL-6 (case-control study)
...Show More Authors
Introduction

Adipose tissue releases pro- and anti-inflammatory cytokines and hormones such as irisin, visfatin, and interleukin-6, which may be linked to periodontal diseases.

Objectives

Our study aimed to determine salivary irisin, visfatin, and interleukin-6 levels in gingivitis and periodontitis patients, compare them with healthy periodontal patients, and evaluate the association between these biomarkers.

Materials a
... Show More
View Publication
Scopus Crossref
Publication Date
Thu Feb 28 2019
Journal Name
Journal Of Accounting And Financial Studies ( Jafs )
The Impact of Adequacy and Authoritative Evidences in the Audit Risks: An Exploratory Research for A Sample Views of Auditors in Iraq
...Show More Authors

The Audit evedances represent the reconciliation tools between the Financial data shown on financial statements, and the level of satisfaction level of the Auditor about these statements. According that, the Auditor try to achieve the highest quantity of These evidances, and the most satisfactive of it…, but that will be so hard sometimes, when the internal controlling system is not good, and when the Auditor had some satisfied evidences, but not sharp… So, this research comes to inspect the relation between the quantity, and the level of satisfaction, and argument to prove that evidences gives. This research assumes that getting enough evidences leads to reduce faults, improves the auditing operation, and avoids risks. The research

... Show More
View Publication Preview PDF
Crossref
Publication Date
Wed Mar 10 2021
Journal Name
Baghdad Science Journal
Production of protease, an analyst for the blood clot from a variety of fungal isolates / 1 rating fungal isolates and agricultural circles
...Show More Authors

House 21 fungal isolates fungus to the analyst Albroca output of manufactured blood clot from the Blama human blood showed positive fungi to test analyzes blood clot variation in times where decomposition recorded fungi

View Publication Preview PDF
Publication Date
Sat Dec 30 2017
Journal Name
International Journal Of Science And Research (ijsr)
Color-based for tree yield fruits image counting
...Show More Authors

Identifying the total number of fruits on trees has long been of interest in agricultural crop estimation work. Yield prediction of fruits in practical environment is one of the hard and significant tasks to obtain better results in crop management system to achieve more productivity with regard to moderate cost. Utilized color vision in machine vision system to identify citrus fruits, and estimated yield information of the citrus grove in-real time. Fruit recognition algorithms based on color features to estimate the number of fruit. In the current research work, some low complexity and efficient image analysis approach was proposed to count yield fruits image in the natural scene. Semi automatic segmentation and yield calculation of fruit

... Show More
View Publication
Publication Date
Wed Jun 24 2020
Journal Name
Neuroimaging - Neurobiology, Multimodal And Network Applications
Electroencephalogram Based Biomarkers for Detection of Alzheimer’s Disease
...Show More Authors

Alzheimer’s disease (AD) is an age-related progressive and neurodegenerative disorder, which is characterized by loss of memory and cognitive decline. It is the main cause of disability among older people. The rapid increase in the number of people living with AD and other forms of dementia due to the aging population represents a major challenge to health and social care systems worldwide. Degeneration of brain cells due to AD starts many years before the clinical manifestations become clear. Early diagnosis of AD will contribute to the development of effective treatments that could slow, stop, or prevent significant cognitive decline. Consequently, early diagnosis of AD may also be valuable in detecting patients with dementia who have n

... Show More
View Publication
Crossref (2)
Crossref
Publication Date
Thu Nov 17 2016
Journal Name
International Journal Of Computer Applications
Colour Recognizing Robot Arm Equipped with a CMOS Camera and an FPGA
...Show More Authors

In this paper a system is designed on an FPGA using a Nios II soft-core processor, to detect the colour of a specific surface and moving a robot arm accordingly. The surface being detected is bounded by a starting mark and an ending mark, to define the region of interest. The surface is also divided into sections as rows and columns and each section can have any colour. Such a system has so many uses like for example warehouses or even in stores where their storing areas can be divided to sections and each section is coloured and a robot arm collects objects from these sections according to the section’s colour also the robot arm can organize objects in sections according to the section’s colour.

View Publication
Publication Date
Thu Nov 17 2016
Journal Name
International Journal Of Computer Applications
Colour Recognizing Robot Arm Equipped with a CMOS Camera and an FPGA
...Show More Authors

In this paper a system is designed on an FPGA using a Nios II soft-core processor, to detect the colour of a specific surface and moving a robot arm accordingly. The surface being detected is bounded by a starting mark and an ending mark, to define the region of interest. The surface is also divided into sections as rows and columns and each section can have any colour. Such a system has so many uses like for example warehouses or even in stores where their storing areas can be divided to sections and each section is coloured and a robot arm collects objects from these sections according to the section’s colour also the robot arm can organize objects in sections according to the section’s colour.

Crossref (1)
Crossref
Publication Date
Wed Sep 01 2021
Journal Name
Baghdad Science Journal
An Efficient Image Encryption Using a Dynamic, Nonlinear and Secret Diffusion Scheme
...Show More Authors

The growing use of tele

This paper presents a new secret diffusion scheme called Round Key Permutation (RKP) based on the nonlinear, dynamic and pseudorandom permutation for encrypting images by block, since images are considered particular data because of their size and their information, which are two-dimensional nature and characterized by high redundancy and strong correlation. Firstly, the permutation table is calculated according to the master key and sub-keys. Secondly, scrambling pixels for each block to be encrypted will be done according the permutation table. Thereafter the AES encryption algorithm is used in the proposed cryptosystem by replacing the linear permutation of ShiftRows step with the nonlinear and secret pe

... Show More
View Publication Preview PDF
Scopus (3)
Scopus Clarivate Crossref
Publication Date
Thu Jan 30 2020
Journal Name
Journal Of Engineering
  Positional Accuracy Assessment for Updating Authoritative Geospatial Datasets Based on Open Source Data and Remotely Sensed Images
...Show More Authors

OpenStreetMap (OSM) represents the most common example of online volunteered mapping applications. Most of these platforms are open source spatial data collected by non-experts volunteers using different data collection methods. OSM project aims to provide a free digital map for all the world. The heterogeneity in data collection methods made OSM project databases accuracy is unreliable and must be dealt with caution for any engineering application. This study aims to assess the horizontal positional accuracy of three spatial data sources are OSM road network database, high-resolution Satellite Image (SI), and high-resolution Aerial Photo (AP) of Baghdad city with respect to an analogue formal road network dataset obtain

... Show More
View Publication Preview PDF
Crossref (2)
Crossref