Preferred Language
Articles
/
YxcGkY8BVTCNdQwCLXtg
Reliable and valid questionnaire for organizational, system, and individual factors to utilize cloud health information system
...Show More Authors

Scopus
Publication Date
Wed Jan 02 2019
Journal Name
Differential Equations And Dynamical Systems
Stability and Bifurcation in a Prey–Predator–Scavenger System with Michaelis–Menten Type of Harvesting Function
...Show More Authors

View Publication
Scopus (26)
Crossref (14)
Scopus Clarivate Crossref
Publication Date
Tue Jul 12 2022
Journal Name
Proceedings Of Seventh International Congress On Information And Communication Technology
Identification of Key Criteria of Selecting the Delivery System and Type of Contract in Construction Projects
...Show More Authors

View Publication
Scopus (2)
Crossref (2)
Scopus Clarivate Crossref
Publication Date
Sun Dec 01 2019
Journal Name
Ieee Xplore
A Hybrid Modified Lightweight Algorithm Combined of Two Cryptography Algorithms PRESENT and Salsa20 Using Chaotic System
...Show More Authors

Cryptography algorithms play a critical role in information technology against various attacks witnessed in the digital era. Many studies and algorithms are done to achieve security issues for information systems. The high complexity of computational operations characterizes the traditional cryptography algorithms. On the other hand, lightweight algorithms are the way to solve most of the security issues that encounter applying traditional cryptography in constrained devices. However, a symmetric cipher is widely applied for ensuring the security of data communication in constraint devices. In this study, we proposed a hybrid algorithm based on two cryptography algorithms PRESENT and Salsa20. Also, a 2D logistic map of a chaotic system is a

... Show More
Scopus (30)
Crossref (15)
Scopus Crossref
Publication Date
Fri Jan 01 2016
Journal Name
Ieee Access
Towards an Applicability of Current Network Forensics for Cloud Networks: A SWOT Analysis
...Show More Authors

In recent years, the migration of the computational workload to computational clouds has attracted intruders to target and exploit cloud networks internally and externally. The investigation of such hazardous network attacks in the cloud network requires comprehensive network forensics methods (NFM) to identify the source of the attack. However, cloud computing lacks NFM to identify the network attacks that affect various cloud resources by disseminating through cloud networks. In this paper, the study is motivated by the need to find the applicability of current (C-NFMs) for cloud networks of the cloud computing. The applicability is evaluated based on strengths, weaknesses, opportunities, and threats (SWOT) to outlook the cloud network. T

... Show More
View Publication Preview PDF
Scopus (17)
Crossref (15)
Scopus Clarivate Crossref
Publication Date
Mon Jan 01 2018
Journal Name
Image And Video Technology: 8th Pacific-rim Symposium
A New Scheme for QoE Management of Live Video Streaming in Cloud Environment
...Show More Authors

Scopus (1)
Scopus Clarivate Crossref
Publication Date
Tue Nov 06 2018
Journal Name
Iraqi National Journal Of Nursing Specialties
Determination of Quality Assurance for Maternal and Child Health Services in Baghdad City
...Show More Authors

Objective: To determine the quality assurance for maternal and child health care services in Baghdad City.
Methodology: A descriptive study is conducted throughout the period of November 28th 2008 to October 10th
2009. A simple random sample of (349) is selected through the use of probability sampling approach. The study
sample was divided into four groups which include (220) consumers, (35) medical staff, (72) nursing staff and (22)
organization structure (primary health care centers). Data were collected through the use of assessment tools. It was
comprised of four questionnaires and overall items included in these questionnaires are (116) items. The study
included assessment of organization structure. Data were colle

... Show More
View Publication Preview PDF
Publication Date
Fri Jun 15 2018
Journal Name
Journal Of Baghdad College Of Dentistry
Oral Health Knowledge and Behavior in Relation to Oral Hygiene and Gingival Condition among a Group of Industry Workers
...Show More Authors

Background: In Iraqi communities, the workers considered the largest population groups, so increasing their dental education by increasing the care for their dental health knowledge and behavior is very important, the present study was aimed to evaluate the gingival health and oral hygiene in relation to knowledge and behavior among a group of a workers selected randomly from Al Fedaa company in Baghdad city. Materials and methods: A sample of 110 workers (65 men and 45 women) included in this study, a questionnaire used to evaluate their oral health knowledge and behavior. The gingival health condition of the workers was examined by using Loe and Silness index (1963), Silness and Loe index (1964) was used to asses plaque quantity, and Ramf

... Show More
View Publication
Crossref
Publication Date
Tue Mar 01 2022
Journal Name
Process Safety And Environmental Protection
Safety and health management response to COVID-19 in the construction industry: A perspective of fieldworkers
...Show More Authors

View Publication
Scopus (51)
Crossref (49)
Scopus Clarivate Crossref
Publication Date
Wed Mar 10 2021
Journal Name
Baghdad Science Journal
THe role of feeding plate in reducing some nutrirional and health problems accompaniment to cleft palate
...Show More Authors

The present study was designed to indicate the influence of the feeding plate on the nutritional and general health problems of the isolated cleft palate infants. For this study fourteen infants were taken, their ages between one day to one week, refered from cosmetic surgery and palate center to cleft lip and palate rehabilitation center in institute of technical medical / Baghdad for feeding plate purpose . Four infants put them as normal group; all those infants were subjected during (6th) month to evaluate the body weight, feeding problem and the respiratory infection. According to tables and figures this study showed a gradual improvement in nutritional problem including (feeding problem, body weight) and health problem (such as respir

... Show More
View Publication Preview PDF
Publication Date
Sun Dec 07 2008
Journal Name
Baghdad Science Journal
Optimal Color Model for Information Hidingin Color Images
...Show More Authors

In present work the effort has been put in finding the most suitable color model for the application of information hiding in color images. We test the most commonly used color models; RGB, YIQ, YUV, YCbCr1 and YCbCr2. The same procedures of embedding, detection and evaluation were applied to find which color model is most appropriate for information hiding. The new in this work, we take into consideration the value of errors that generated during transformations among color models. The results show YUV and YIQ color models are the best for information hiding in color images.

View Publication Preview PDF
Crossref