This research aims to Measurement provide the service from Two perspectives The first perspective Service Provider (doctors) and the second recipient of the service (patients) in Numan General Hospital, and represented the research problem in perceptions of medical staff in the hospital assigned to them responsibility by providing superior services satisfy customers, and how they maintained ready to assist customers and provide services that exceed their perceptions of these services through the use of the developer scale by (Frimpong and Wilson, 2012), includes orientation to provide the service scale four dimensions (Internal cooperative behaviors, service Competence, Service Responsiveness and Enhanced service) and includes do
... Show MoreConcentrations of radon were measured in this study for twenty-four samples of soil distributed in six locations on the north part of Iraq. The radon concentrations in soil samples measured by using alpha-emitters registration that emits from Radon (222Rn) in (CR-39) track detector. The concentrations values were calculated by a comparison with standard samples. The results shows that the radon gas concentrations in Darbandikhan City varies from (16.60-34.04 Bq/m3), Halabja City (16.51-23.32 Bq/m3), Al Sulaimaniya City (17.61-32.25 Bq/m3), Koisnjaq City (22.04-35.65 Bq/m3), Shaqlaua City (21.10-29.10 Bq/m3) and Erbil City (22.30-34.63 Bq/m3). The average radon gas concentration in Al Sulaimaniya and Erbil governorate are (22.30 Bq/m3)
... Show MoreA novel method for Network Intrusion Detection System (NIDS) has been proposed, based on the concept of how DNA sequence detects disease as both domains have similar conceptual method of detection. Three important steps have been proposed to apply DNA sequence for NIDS: convert the network traffic data into a form of DNA sequence using Cryptography encoding method; discover patterns of Short Tandem Repeats (STR) sequence for each network traffic attack using Teiresias algorithm; and conduct classification process depends upon STR sequence based on Horspool algorithm. 10% KDD Cup 1999 data set is used for training phase. Correct KDD Cup 1999 data set is used for testing phase to evaluate the proposed method. The current experiment results sh
... Show MoreIn this study tungsten oxide and graphene oxide (GO-WO2.89) were successfully combined using the ultra-sonication method and embedded with polyphenylsulfone (PPSU) to prepare novel low-fouling membranes for ultrafiltration applications. The properties of the modified membranes and performance were investigated using Fourier-transform infrared spectroscopy (FT-IR), scanning electron microscopy (SEM), contact angle (CA), water permeation flux, and bovine serum albumin (BSA) rejection. It was found that the modified PPSU membrane fabricated from 0.1 wt.% of GO-WO2.89 possessed the best characteristics, with a 40.82° contact angle and 92.94% porosity. The permeation flux of the best membrane was the highest. The pure water permeation f
... Show MoreIn the current worldwide health crisis produced by coronavirus disease (COVID-19), researchers and medical specialists began looking for new ways to tackle the epidemic. According to recent studies, Machine Learning (ML) has been effectively deployed in the health sector. Medical imaging sources (radiography and computed tomography) have aided in the development of artificial intelligence(AI) strategies to tackle the coronavirus outbreak. As a result, a classical machine learning approach for coronavirus detection from Computerized Tomography (CT) images was developed. In this study, the convolutional neural network (CNN) model for feature extraction and support vector machine (SVM) for the classification of axial
... Show MoreCyber security is a term utilized for describing a collection of technologies, procedures, and practices that try protecting an online environment of a user or an organization. For medical images among most important and delicate data kinds in computer systems, the medical reasons require that all patient data, including images, be encrypted before being transferred over computer networks by healthcare companies. This paper presents a new direction of the encryption method research by encrypting the image based on the domain of the feature extracted to generate a key for the encryption process. The encryption process is started by applying edges detection. After dividing the bits of the edge image into (3×3) windows, the diffusions
... Show MoreA general velocity profile for a laminar flow over a flat plate with zero incidence is obtained by employing a new boundary condition to the other available boundary conditions. The general velocity profile is mathematically simple and nearest to the exact solution. Also other related values, boundary layer thickness, displacement thickness, momentum thickness and coefficient of friction are nearest to the exact solution compared with other corresponding values for other researchers.