Preferred Language
Articles
/
vBdUPo4BVTCNdQwCGD47
Secure QR-Code Generation in Healthcare
...Show More Authors

Scopus Crossref
View Publication
Publication Date
Fri Jan 02 2015
Journal Name
International Journal Of Engineering Research And General Science
IT Auditing to Assure a Secure Cloud Computing for Enterprise Applications
...Show More Authors

Recently, all over the world mechanism of cloud computing is widely acceptable and used by most of the enterprise businesses in order increase their productivity. However there are still some concerns about the security provided by the cloud environment are raises. Thus in this our research project, we are discussing over the cloud computing paradigm evolvement for the large business applications like CRM as well as introducing the new framework for the secure cloud computing using the method of IT auditing. In this case our approach is basically directed towards the establishment of the cloud computing framework for the CRM applications with the use of checklists by following the data flow of the CRM application and its lifecycle. Those ch

... Show More
View Publication Preview PDF
Publication Date
Tue Jun 01 2021
Journal Name
Journal Of Engineering
Designing a Secure Software-Defined Radio Transceiver using the Logistic Map
...Show More Authors

The need to exchange large amounts of real-time data is constantly increasing in wireless communication. While traditional radio transceivers are not cost-effective and their components should be integrated, software-defined radio (SDR) ones have opened up a new class of wireless technologies with high security.  This study aims to design an  SDR  transceiver was built using one type of modulation, which is 16 QAM, and adding a  security subsystem using one type of chaos map, which is a  logistic map, because it is a very simple nonlinear dynamical equations that generate a random key and  EXCLUSIVE  OR with the originally transmitted data to protect data through the transmission. At th

... Show More
View Publication Preview PDF
Crossref
Publication Date
Mon Apr 01 2024
Journal Name
Wasit Journal Of Engineering Sciences
Analysis attackers’ methods with hashing secure password using CSPRNG and PBKDF2
...Show More Authors

Using the Internet, nothing is secure and as we are in need of means of protecting our data, the use of passwords has become important in the electronic world. To ensure that there is no hacking and to protect the database that contains important information such as the ID card and banking information, the proposed system stores the username after hashing it using the 256 hash algorithm and strong passwords are saved to repel attackers using one of two methods: -The first method is to add a random salt to the password using the CSPRNG algorithm, then hash it using hash 256 and store it on the website. -The second method is to use the PBKDF2 algorithm, which salts the passwords and extends them (deriving the password) before being ha

... Show More
View Publication
Crossref (4)
Crossref
Publication Date
Sun Jan 01 2023
Journal Name
Computers, Materials & Continua
Severity Based Light-Weight Encryption Model for Secure Medical Information System
...Show More Authors

View Publication
Scopus (20)
Crossref (35)
Scopus Clarivate Crossref
Publication Date
Wed Jul 01 2020
Journal Name
Journal Of Engineering
Securing Physical Layer for FHSS Communication System Using Code andPhase Hopping Techniques in CDMA, System Design and Implementation
...Show More Authors

The Frequency-hopping Spread Spectrum (FHSS) systems and techniques are using in military and civilianradar recently and in the communication system for securing the information on wireless communications link channels, for example in the Wi-Fi 8.02.X IEEE using multiple number bandwidth and frequencies in the wireless channel in order to hopping on them for increasing the security level during the broadcast, but nowadays FHSS problem, which is, any Smart Software Defined Radio (S-SDR) can easily detect a wireless signal at the transmitter and the receiver for the hopping sequence in both of these, then duplicate this sequence in order to hack the signal on both transmitter and receiver messages using the order of the se

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Sat Feb 01 2020
Journal Name
Iop Conference Series: Materials Science And Engineering
Implication of Yield Lines Theory in Method Three of the ACI Code for Two-Way Reinforced Concrete Slabs
...Show More Authors
Abstract<p>Reinforced concrete slabs are one of the most important and complicated elements of a building. For supported edges slabs, if the ratio of long span to short span is equal or less than two then the slab is considered as two-way slab otherwise is consider as one-way slab. Two-way reinforced concrete slabs are common in use in reinforced concrete buildings due to geometrically arrangement of columns suggested by architects who prefer a symmetric distribution of columns in their plans. Elastic theory is usually used for analysis of concrete slabs. However, for several reasons design methods based on elastic principles are limited in their function. Correspondingly, limit state analysis o</p> ... Show More
View Publication
Scopus (3)
Crossref (1)
Scopus Clarivate Crossref
Publication Date
Thu May 06 2021
Journal Name
International Journal Of Pharmacy Practice
Impact of COVID-19 pandemic on healthcare providers: save the frontline fighters
...Show More Authors
Abstract<sec><title>Objectives

The objective of this study was to assess the impact of the COVID-19 pandemic on healthcare providers (HCPs) at personal and professional levels.

Methods

This was a cross-sectional descriptive study. It was conducted using an electronic format survey through Qualtrics Survey Software in English. The target participants were HCPs working in any healthcare setting across Iraq. The survey was distributed via two professional Facebook groups between 7 April and 7 May 2020. The survey items were adopted with modifications from three previous studies of Severe Acute Respiratory Syndrome (SARS) and Avia

... Show More
View Publication
Scopus (11)
Crossref (3)
Scopus Clarivate Crossref
Publication Date
Thu May 06 2021
Journal Name
International Journal Of Pharmacy Practice
Impact of COVID-19 pandemic on healthcare providers: save the frontline fighters
...Show More Authors
Abstract<sec><title>Objectives

The objective of this study was to assess the impact of the COVID-19 pandemic on healthcare providers (HCPs) at personal and professional levels.

Methods

This was a cross-sectional descriptive study. It was conducted using an electronic format survey through Qualtrics Survey Software in English. The target participants were HCPs working in any healthcare setting across Iraq. The survey was distributed via two professional Facebook groups between 7 April and 7 May 2020. The survey items were adopted with modifications from three previous studies of Severe Acute Respiratory Syndrome (SARS) and Avia

... Show More
Scopus (11)
Crossref (3)
Scopus Clarivate Crossref
Publication Date
Wed Mar 01 2023
Journal Name
Journal Of Engineering
A An Authentication and Access Control Model for Healthcare based Cloud Services
...Show More Authors

Electronic Health Record (EHR) systems are used as an efficient and effective method of exchanging patients’ health information with doctors and other key stakeholders in the health sector to obtain improved patient treatment decisions and diagnoses. As a result, questions regarding the security of sensitive user data are highlighted. To encourage people to move their sensitive health records to cloud networks, a secure authentication and access control mechanism that protects users’ data should be established. Furthermore, authentication and access control schemes are essential in the protection of health data, as numerous responsibilities exist to ensure security and privacy in a network. So, the main goal of our s

... Show More
View Publication Preview PDF
Crossref (10)
Crossref
Publication Date
Mon Apr 17 2017
Journal Name
Wireless Personal Communications
ITPMAP: An Improved Three-Pass Mutual Authentication Protocol for Secure RFID Systems
...Show More Authors

View Publication
Scopus (9)
Crossref (5)
Scopus Clarivate Crossref