Preferred Language
Articles
/
OBbJlocBVTCNdQwC5Vfd
Feasibility of Internet of Things Application for Real-Time Healthcare for Malaysian Pilgrims
...Show More Authors

Internet of Things (IoT) technology could be an effective solution to accomplish real-time retrieval of historical electronic health records (EHRs) to present better service of healthcare. In a pilgrimage environment such as the Hajj, IoT can be applied by identifying the non-local patients as electronic tags, and the tag data can be read by wireless sensors. The data that is collected using Radio-Frequency Identification (RFID) can be acquired from a Wireless Sensor Network (WSN) in order to accomplish many decisions, such as sending an ambulance to a patient’s location, sending an emergency alert to his immediate family circle, and retrieving his EHR from a database. The main contribution of this research is to propose a conceptual IoT framework relevant to support the non-local patients through retrieval of EHR between countries via internet network. The conceptual framework based on four layers (connectivity, access, abstraction and service) is proposed to show how the IoT can be a solution for the case study. The validation results show that the proposed framework is useful to serve the health cases of Malaysian pilgrims.

Scopus Crossref
View Publication
Publication Date
Tue Dec 01 2020
Journal Name
Baghdad Science Journal
Real-Time Cloth Simulation on Virtual Human Character Using Enhanced Position Based Dynamic Framework Technique
...Show More Authors

     Cloth simulation and animation has been the topic of research since the mid-80's in the field of computer graphics. Enforcing incompressible is very important in real time simulation. Although, there are great achievements in this regard, it still suffers from unnecessary time consumption in certain steps that is common in real time applications.   This research develops a real-time cloth simulator for a virtual human character (VHC) with wearable clothing. This research achieves success in cloth simulation on the VHC through enhancing the position-based dynamics (PBD) framework by computing a series of positional constraints which implement constant densities. Also, the self-collision and collision wit

... Show More
View Publication Preview PDF
Scopus (23)
Crossref (20)
Scopus Clarivate Crossref
Publication Date
Sun Jun 05 2016
Journal Name
Baghdad Science Journal
Development of Green Method for Trace Determination of Bendiocarb in Real Samples Using Emerson
...Show More Authors

In this study, cloud point extraction combined with molecular spectrometry as an eco-friendly method is used for extraction, enrichment and determination of bendiocarb (BC) insecticide in different complex matrices. The method involved an alkaline hydrolysis of BC followed Emerson reaction in which the resultant phenol is reacted with 4-aminoantipyrene(4-AAP) in the presence of an alkaline oxidant of potassium ferric cyanide to form red colored product which then extracted into micelles of Triton X-114 as a mediated extractant at room temperature. The extracted product in cloud point layer is separated from the aqueous layer by centrifugation for 20 min and dissolved in a minimum amount of a mixture ethanol: water (1:1) followed

... Show More
View Publication Preview PDF
Crossref (2)
Crossref
Publication Date
Thu Dec 09 2021
Journal Name
Iraqi Journal Of Pharmaceutical Sciences ( P-issn 1683 - 3597 E-issn 2521 - 3512)
Occupational Toxicity and Health Hazards of the Healthcare Providers at Healthcare Facilities in Sulaimani City, Iraq
...Show More Authors

 

Objective: The present study aimed to evaluate the occupational health hazards that face health care providers in Sulaimani City.

Methods: A cross-sectional study conducted utilizing quantitative data collection methods. It involved 159 respondents including Physicians, Pharmacists, Medical assistants, Laboratory Instructors and Nurses who worked in 8 major health facilities in Sulaimani city, Kurdistan region, Iraq.

Results: Nurses were the most susceptible group to sharp related injuries 13.84%, cuts and wounds 10.69% than the others and they were more experiencing verbal abuse in the workplace 15%. Laboratory instructors represent the most exposed group

... Show More
View Publication Preview PDF
Scopus (2)
Crossref (1)
Scopus Crossref
Publication Date
Fri Dec 29 2017
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Optimum Time Schedule for Industrial Processes (II)
...Show More Authors

The  present study  deals  with successive  stages  of  productive

operations happened to produce a production within each stage befo re it  moves to the next one. ll cou ld  be deduced that this study is an extension  to what bas  been mentioned  in (1 ) .ln  (I),  the  optimum distribution of  di!Terent jobs of  workers and  machines  in  the productive operations has been st ud ied whi le the study  invol ves the optimum schedule for the succession of these operations presuming that thay have already been distributed on machines and workers (2).A mathematical form has been put for this study to define the "Object.ive Function "

... Show More
View Publication Preview PDF
Publication Date
Thu Jun 02 2022
Journal Name
Environmental Science And Pollution Research
Sustainability reporting and corporate reputation of Malaysian IPO companies
...Show More Authors

The aim of this paper is to explore the relationship between sustainability reporting (SR) and corporate reputation (CR) in the context of initial public offering (IPO) companies in the developing market of Malaysia. This study utilises secondary data from 2007 to 2017 derived from the content analysis of the annual reports and Datastream of 139 sampled IPO companies listed on Bursa Malaysia. The study also employs ordinary least squares (OLS) regression. The result shows that CR has a positive association with SR quantity and quality and its dimensions, i.e., society, environmental, employee, and product. This result suggests that IPO companies can use SR practices to improve their CR. Most companies give little attention to SR issues. Mor

... Show More
View Publication
Scopus (15)
Scopus
Publication Date
Mon Apr 17 2017
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Simulation Expirment for Proofing the Theoretical Assumption of Time Complexity for Binary Search Tree
...Show More Authors

      It is frequently asserted that an advantage of a binary search tree implementation of a set over linked list implementation is that for reasonably well balanced binary search trees the average search time (to discover whether or not a particular element is present in the set) is O(log N) to the base 2 where N is the number of element in the set (the size of the tree).  This paper presents an experiment for measuring and comparing the obtained binary search tree time with the expected time (theoretical), this experiment proved the correctness of the hypothesis, the experiment is carried out using a program in turbo Pascal with recursion technique implementation and a statistical method  to prove th

... Show More
View Publication Preview PDF
Publication Date
Sat Oct 29 2022
Journal Name
Current Trends In Geotechnical Engineering And Construction
Calculating the Real Need for Fire Brigade Stations in Al-Samawah City
...Show More Authors

The location of fire brigade stations and equipment has a significant impact on the efficacy and efficiency of fire brigade department services. The challenge addressed by this study was that the fire brigade department required a consistent and repeatable technique to assess the response capabilities and safeguarding levels offered as the city of Samawah/Iraq grew and changed. Evaluating the locations of the current fire brigade stations in the city of Samawah is the aspect addressed by the research to determine the accuracy and validity of the locations of these stations by the competent authorities and their suitability to the area of the city’s neighborhoods and its residents. The Iraqi Ministry of Housing, Construction, Municipalitie

... Show More
View Publication
Scopus Crossref
Publication Date
Wed Mar 08 2017
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
List of Scorpions Recorded For the First Time in Iraq
...Show More Authors

 The present study is the first taxonomic study on scorpions in Iraq. The specimens were collected from regions in the middle and south of Iraq, three families, seven genera and eight  species were recorded for the first time in Iraq and one new species of the world. 

View Publication Preview PDF
Publication Date
Sat Apr 03 2021
Journal Name
Lubricants
UV-Visible Spectrophotometer for Distinguishing Oxidation Time of Engine Oil
...Show More Authors

Samples of gasoline engine oil (SAE 5W20) that had been exposed to various oxidation times were inspected with a UV-Visible (UV-Vis) spectrophotometer to select the best wavelengths and wavelength ranges for distinguishing oxidation times. Engine oil samples were subjected to different thermal oxidation periods of 0, 24, 48, 72, 96, 120, and 144 hours, resulting in a range of total base number (TBN) levels. Each wavelength (190.5 – 849.5 nm) and selected wavelength ranges were evaluated to determine the wavelength or wavelength ranges that could best distinguish among all oxidation times. The best wavelengths and wavelength ranges were analyzed with linear regression to determine the best wavelength or range to predict oxidation t

... Show More
View Publication Preview PDF
Scopus (12)
Crossref (12)
Scopus Clarivate Crossref
Publication Date
Wed Apr 01 2015
Journal Name
Ibn Al-haitham Journal For Pure And Applied Science
Security For Three -Tired Web Application
...Show More Authors

Web application protection lies on two levels: the first is the responsibility of the server management, and the second is the responsibility of the programmer of the site (this is the scope of the research). This research suggests developing a secure web application site based on three-tier architecture (client, server, and database). The security of this system described as follows: using multilevel access by authorization, which means allowing access to pages depending on authorized level; password encrypted using Message Digest Five (MD5) and salt. Secure Socket Layer (SSL) protocol authentication used. Writing PHP code according to set of rules to hide source code to ensure that it cannot be stolen, verification of input before it is s

... Show More
Preview PDF