Preferred Language
Articles
/
4RjNspQBVTCNdQwC5h4P
The Blockchain for Healthcare 4.0 Apply in Standard Secure Medical Data Processing Architecture
...Show More Authors

Cloud-based Electronic Health Records (EHRs) have seen a substantial increase in usage in recent years, especially for remote patient monitoring. Researchers are interested in investigating the use of Healthcare 4.0 in smart cities. This involves using Internet of Things (IoT) devices and cloud computing to remotely access medical processes. Healthcare 4.0 focuses on the systematic gathering, merging, transmission, sharing, and retention of medical information at regular intervals. Protecting the confidential and private information of patients presents several challenges in terms of thwarting illegal intrusion by hackers. Therefore, it is essential to prioritize the protection of patient medical data that is stored, accessed, and shared on the cloud to avoid unauthorized access or compromise by the authorized components of E-healthcare systems. A multitude of cryptographic methodologies have been devised to offer safe storage, exchange, and access to medical data in cloud service provider (CSP) environments. Traditional methods have not been effective in providing a harmonious integration of the essential components for EHR security solutions, such as efficient computing, verification on the service side, verification on the user side, independence from a trusted third party, and strong security. Recently, there has been a lot of interest in security solutions that are based on blockchain technology. These solutions are highly effective in safeguarding data storage and exchange while using little computational resources. The researchers focused their efforts exclusively on blockchain technology, namely on Bitcoin. The present emphasis has been on the secure management of healthcare records through the utilization of blockchain technology. This study offers a thorough examination of modern blockchain-based methods for protecting medical data, regardless of whether cloud computing is utilized or not. This study utilizes and evaluates several strategies that make use of blockchain. The study presents a comprehensive analysis of research gaps, issues, and a future roadmap that contributes to the progress of new Healthcare 4.0 technologies, as demonstrated by research investigations.

Scopus Clarivate Crossref
View Publication
Publication Date
Wed Feb 01 2023
Journal Name
Jacc: Cardiovascular Interventions
CRT-100.98 International Registry of Cardiovascular Diseases in Women (IROCW): Assessing the Feasibility of Large Data Registry in the Absence of Funding and Electronic Database – Initial Data From Iraq
...Show More Authors

View Publication
Crossref (1)
Crossref
Publication Date
Sat Sep 30 2017
Journal Name
Iraqi Journal Of Chemical And Petroleum Engineering
Spatial Data Analysis for Geostatistical Modeling of Petrophysical Properties for Mishrif Formaiton, Nasiriya Oil Field
...Show More Authors

Spatial data analysis is performed in order to remove the skewness, a measure of the asymmetry of the probablitiy distribution. It also improve the normality, a key concept of statistics from the concept of normal distribution “bell shape”, of the properties like improving the normality porosity, permeability and saturation which can be are visualized by using histograms. Three steps of spatial analysis are involved here; exploratory data analysis, variogram analysis and finally distributing the properties by using geostatistical algorithms for the properties. Mishrif Formation (unit MB1) in Nasiriya Oil Field was chosen to analyze and model the data for the first eight wells. The field is an anticline structure with northwest- south

... Show More
View Publication Preview PDF
Publication Date
Thu Dec 31 2015
Journal Name
Al-khwarizmi Engineering Journal
Prediction of Performance Equations for Household Compressors Depending on Manufacturing Data for Refrigerators and Freezers
...Show More Authors

Abstract

 A surface fitting model is developed based on calorimeter data for two famous brands of household compressors. Correlation equations of ten coefficient polynomials were found as a function of refrigerant saturating and evaporating temperatures in range of (-35℃ to -10℃) using Matlab software for cooling capacity, power consumption, and refrigerant mass flow rate.

Additional correlations equations for these variables as a quick choice selection for a proper compressor use at ASHRAE standard that cover a range of swept volume range (2.24-11.15) cm3.

The result indicated that these surface fitting models are accurate with in ± 15% for 72 compressors model of cooling cap

... Show More
View Publication Preview PDF
Publication Date
Wed Dec 22 2021
Journal Name
Plos One
Awareness and preparedness of healthcare workers against the first wave of the COVID-19 pandemic: A cross-sectional survey across 57 countries
...Show More Authors
Background

Since the COVID-19 pandemic began, there have been concerns related to the preparedness of healthcare workers (HCWs). This study aimed to describe the level of awareness and preparedness of hospital HCWs at the time of the first wave.

Methods

This multinational, multicenter, cross-sectional survey was conducted among hospital HCWs from February to May 2020. We used a hierarchical logistic regression multivariate analysis to adjust the influence of variables based on awareness and preparedness. We then used association rule mining to identify relationships between HCW confidence in handling suspected

... Show More
View Publication
Scopus (31)
Crossref (32)
Scopus Clarivate Crossref
Publication Date
Wed Feb 01 2023
Journal Name
Journal Of Engineering
A Comparison of Dispute Resolution Provisions between the Joint Contract Tribunal and the Iraqi Standard Bidding Document
...Show More Authors

Due to a party's violation of his obligations or responsibilities indicated in the contract, many engineering projects confront extensive contractual disputes, which in turn need arbitration or other forms of dispute resolution, which negatively impact the project's outcome. Each contract has its terms for dispute resolution. Therefore, this paper aims to study the provisions for dispute resolution according to Iraqi (SBDW) and the JCT (SBC/Q2016) and also to show the extent of the difference between the two contracts in the application of these provisions. The methodology includes a detailed study of the dispute settlement provisions for both contracts with a comparative analysis to identify the differences in the appli

... Show More
View Publication Preview PDF
Crossref
Publication Date
Tue Nov 01 2022
Journal Name
Res Militaris
The Impact of the different methods of Selecting One Group in Calculating the Items Sensitivity Coefficient on the Standard Characteristics of the Criterion-Referenced Test
...Show More Authors

AbstractThe research aims to identify the impact of the different methods in calculating the Items sensitivity coefficient on the standard characteristics of the Criterion-Referenced test in the measurement and evaluation material. The research sample consisted of (35) male and female students, who were chosen by the intentional method. The researcher prepared learning-teaching program in constructing the content of the measurement and evaluation material for non-specialized departments, prepared an achievement test in its equivalent forms, identified the results of agreement between the methods used in analyzing the items of the criterion-referenced test, and compared the standard characteristics of the achievement test, both according to

... Show More
Preview PDF
Publication Date
Thu Jul 31 2025
Journal Name
Computers, Materials & Continua
A Secure Audio Encryption Method Using Tent-Controlled Permutation and Logistic Map-Based Key Generation
...Show More Authors

The exponential growth of audio data shared over the internet and communication channels has raised significant concerns about the security and privacy of transmitted information. Due to high processing requirements, traditional encryption algorithms demand considerable computational effort for real-time audio encryption. To address these challenges, this paper presents a permutation for secure audio encryption using a combination of Tent and 1D logistic maps. The audio data is first shuffled using Tent map for the random permutation. The high random secret key with a length equal to the size of the audio data is then generated using a 1D logistic map. Finally, the Exclusive OR (XOR) operation is applied between the generated key and the sh

... Show More
View Publication
Crossref (1)
Scopus Clarivate Crossref
Publication Date
Mon Apr 03 2023
Journal Name
Journal Of Genetic And Environmental Resources Conservation
Histopathological of effect of zinc on liver architecture of mice, Mus musculus
...Show More Authors

The current study was conducted to find out the effect of zinc (Zn) on the liver tissue of adult male white mouse, Mus musculus at concentrations (50 and 100 mg/kg/day) and for (30) days.(30) mice were used, divided into three groups of (10) mice, represented by control group, group of (50) mg/kg/day and (100) mg/kg/day. Histopathological changes appeared in the liver of male mice treated with zinc in concentration (50 and 100 mg/kg/day) for 30 days, including deformation and damage to Glisson's capsule, epithelial separation of capsule, in addition to cellular changes represented by hypertrophy of hepatocytes, as seen a swelling necrosis, hypertrophy of nuclei, thickening and degeneration in some hepatocytes, as well as the observed scatte

... Show More
Publication Date
Tue Aug 31 2021
Journal Name
International Journal Of Intelligent Engineering And Systems
FDPHI: Fast Deep Packet Header Inspection for Data Traffic Classification and Management
...Show More Authors

Traffic classification is referred to as the task of categorizing traffic flows into application-aware classes such as chats, streaming, VoIP, etc. Most systems of network traffic identification are based on features. These features may be static signatures, port numbers, statistical characteristics, and so on. Current methods of data flow classification are effective, they still lack new inventive approaches to meet the needs of vital points such as real-time traffic classification, low power consumption, ), Central Processing Unit (CPU) utilization, etc. Our novel Fast Deep Packet Header Inspection (FDPHI) traffic classification proposal employs 1 Dimension Convolution Neural Network (1D-CNN) to automatically learn more representational c

... Show More
View Publication
Scopus (9)
Crossref (8)
Scopus Crossref
Publication Date
Mon Sep 23 2019
Journal Name
Baghdad Science Journal
Hazard Rate Estimation Using Varying Kernel Function for Censored Data Type I
...Show More Authors

     In this research, several estimators concerning the estimation are introduced. These estimators are closely related to the hazard function by using one of the nonparametric methods namely the kernel function for censored data type with varying bandwidth and kernel boundary. Two types of bandwidth are used:  local bandwidth and global bandwidth. Moreover, four types of boundary kernel are used namely: Rectangle, Epanechnikov, Biquadratic and Triquadratic and the proposed function was employed with all kernel functions. Two different simulation techniques are also used for two experiments to compare these estimators. In most of the cases, the results have proved that the local bandwidth is the best for all the

... Show More
View Publication Preview PDF