Preferred Language
Articles
/
TxetUJEBVTCNdQwCzZTJ
Private Backend Server Software-Based Telehealthcare Tracking and Monitoring System
...Show More Authors

In these recent years, the world has witnessed a kind of social exclusion and the inability to communicate directly due to the Corona Virus Covid 19 (COVID-19) pandemic, and the consequent difficulty of communicating with patients with hospitals led to the need to use modern technology to solve and facilitate the problem of people communicating with each other. healthcare has made many remarkable developments through the Internet of things (IOT) and cloud computing to monitor real-time patients' data, which has enabled many patients' lives to be saved. this paper presents the design and implementation of a Private Backend Server Software based on an IoT health monitoring system concerned emergency medical services utilizing biosensors to detect multivital signs of an individual with an ESP32 microcontroller board and IoT cloud. The device displays the vital data, which is then uploaded to a cloud server for storage and analysis over an IoT network. Vital data is received from the cloud server and shown on the IoT medical client dashboard for remote monitoring. The proposed system allows users to ameliorate healthcare jeopardy and minify its costs by recording, gathering, sharing, and analyzing vast biodata streams such as Intensive Care Units (ICU) (i.e., temperature, heartbeat rate, Oxygen level (CO2), etc.), efficiently in real-time. In this proposal, the data will send from sensors fixed in the patient body to the Web and Mobile App continually in real time for collection and analysis.

Scopus Clarivate Crossref
View Publication
Publication Date
Wed Aug 28 2024
Journal Name
Mesopotamian Journal Of Cybersecurity
A Novel Anomaly Intrusion Detection Method based on RNA Encoding and ResNet50 Model
...Show More Authors

Cybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a

... Show More
View Publication
Scopus (8)
Crossref (2)
Scopus Crossref
Publication Date
Thu Jun 06 2024
Journal Name
Journal Of Applied Engineering And Technological Science (jaets)
Deep Learning and Its Role in Diagnosing Heart Diseases Based on Electrocardiography (ECG)
...Show More Authors

Diagnosing heart disease has become a very important topic for researchers specializing in artificial intelligence, because intelligence is involved in most diseases, especially after the Corona pandemic, which forced the world to turn to intelligence. Therefore, the basic idea in this research was to shed light on the diagnosis of heart diseases by relying on deep learning of a pre-trained model (Efficient b3) under the premise of using the electrical signals of the electrocardiogram and resample the signal in order to introduce it to the neural network with only trimming processing operations because it is an electrical signal whose parameters cannot be changed. The data set (China Physiological Signal Challenge -cspsc2018) was ad

... Show More
View Publication
Scopus Crossref
Publication Date
Fri Dec 01 2023
Journal Name
Advances In Science And Technology Research Journal
Experimental Investigation and Fuzzy Based Prediction of Titanium Alloy Performance During Drilling Process
...Show More Authors

View Publication
Scopus (9)
Crossref (9)
Scopus Clarivate Crossref
Publication Date
Wed Aug 28 2024
Journal Name
Mesopotamian Journal Of Cybersecurity
A Novel Anomaly Intrusion Detection Method based on RNA Encoding and ResNet50 Model
...Show More Authors

Cybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a

... Show More
View Publication
Scopus (8)
Crossref (2)
Scopus Crossref
Publication Date
Sat Jul 06 2024
Journal Name
Multimedia Tools And Applications
Text classification based on optimization feature selection methods: a review and future directions
...Show More Authors

A substantial portion of today’s multimedia data exists in the form of unstructured text. However, the unstructured nature of text poses a significant task in meeting users’ information requirements. Text classification (TC) has been extensively employed in text mining to facilitate multimedia data processing. However, accurately categorizing texts becomes challenging due to the increasing presence of non-informative features within the corpus. Several reviews on TC, encompassing various feature selection (FS) approaches to eliminate non-informative features, have been previously published. However, these reviews do not adequately cover the recently explored approaches to TC problem-solving utilizing FS, such as optimization techniques.

... Show More
View Publication Preview PDF
Scopus (8)
Crossref (9)
Scopus Crossref
Publication Date
Sun Dec 20 2020
Journal Name
Journal Of Accounting And Financial Studies ( Jafs )
The impact of the reserve requirement ratio in the activity of the bank credit: Applied Research in a sample of Iraqi private banks
...Show More Authors

The research topic (The Impact of the Compulsory Reserve on the Banks Credit-an applied  research on    a sample of Iraqi banks), was chosen on basis of the Iraqi  private Banks attempts to increase their credit activities in hope to gain more profits.This coincided with  the CBI aim to back the private banking market.It is thus apparent why the CBI issued its regulation to those banks to increase their capitals up  to IDB250. On the other hand,the CBI acted as an obstacle in the way of increasing the private banks of their capitals,that is by implementing the quantitive  monetary tool  so called the compulsory reserve.This is why we intended to overlook at this contradictional  problome

... Show More
View Publication Preview PDF
Publication Date
Sun Jun 30 2019
Journal Name
Journal Of Accounting And Financial Studies ( Jafs )
The impact of strategic planning for electronic services to developing cash bank deposits: An Applied research for a sample of Iraqi private banks
...Show More Authors

               The bank deposits is fuel banking activity and raw material products for the commercial bank and the basis of its activity and its lifetime So the bank, which seeks to continue the successful development of the volume of cash deposits has translated the work of the bank to meet the needs of different sectors by providing the necessary funding, and from this point of view was the research problem a lack of interest departments of banking services to commercial banks as a means for the development of electronic cash deposits have, and which represents the basis for the supplier commercial bank fund.

 

View Publication Preview PDF
Publication Date
Sun Feb 03 2019
Journal Name
Journal Of Accounting And Financial Studies ( Jafs )
The effect of the Banking Capital on Finance Fixed Assets of the Bank: An Applied Study on a Sample of Iraqi Private Banks
...Show More Authors

To the Banks capital several uses, including the protection of deposits and this was approved by the Basel Committee, And Finance long-term investments which intended to investment in fixed assets that are essential to the continuation of banking activity, Fixed assets not financed from the funds of the deposit, but the owner equity do this jop. the current research tries to prove the effect of banks capital on fixed assets for a sample of iraqi private banks (bank of baghdad and Iraqi middle east Investment bank), for the period from 2011 until 2014. The research concluded that the capital of bank of baghdad affect on his total fixed assets by (84%), and the capital of Iraqi middle east Investment bank affect on his total fixed assets b

... Show More
View Publication Preview PDF
Crossref
Publication Date
Tue Oct 01 2013
Journal Name
Journal Of Economics And Administrative Sciences
The impact of Innovation in offering the banking services in achieving competitive advantage for banks ( An applied study in the Iraqi private Banks )
...Show More Authors

     This research aims at recognizing the concept of Innovation in offering the banking services as well as the concept and dimensions of competitive advantage . And to identify and analyze the relationship ( correlation and impact ) between the concept of Innovation in  offering the banking services and the dimensions of the competitive advantage under discussion . The research includes all Iraqi private banks in Baghdad city only of the (20) banks . The researcher adopted , in this study , a random sample of the distribution of the questionnaire to members of the research sample are managers , customers and employees in these banks , and were distributed ( 115 ) form  questionnaire , ( 97 ) form w

... Show More
View Publication Preview PDF
Crossref
Publication Date
Wed Apr 01 2015
Journal Name
Journal Of Economics And Administrative Sciences
A specimen of the internal control system on the stock in light of the application JIT system In construction companies
...Show More Authors

Suffer most of the facilities of the high cost of inventory , which affects the high cost of the product and thus affects many administrative decisions , as well as suffer the facilities of the systems developed by the provisions of inventory control , and this problem is exacerbated in the construction sector where the inventory in the form of Construction spin of the Year for another it becomes difficult to control the cost effectively , and is the research problem in question follows: What are the implications of the use of the system in time inventory accounting system for the contracting company does kills Alrkaah to the provisions of the cost of inventory and what is the optimal approach to inventory control ? Find assumed

... Show More
View Publication Preview PDF
Crossref