Preferred Language
Articles
/
alkej-521
A Proposed Artificial Intelligence Algorithm for Assessing of Risk Priority for Medical Equipment in Iraqi Hospital
...Show More Authors

This paper presents a robust algorithm for the assessment of risk priority for medical equipment based on the calculation of static and dynamic risk factors and Kohnen Self Organization Maps (SOM). Four risk parameters have been calculated for 345 medical devices in two general hospitals in Baghdad. Static risk factor components (equipment function and physical risk) and dynamics risk components (maintenance requirements and risk points) have been calculated. These risk components are used as an input to the unsupervised Kohonen self organization maps. The accuracy of the network was found to be equal to 98% for the proposed system. We conclude that the proposed model gives fast and accurate assessment for risk priority and it works as promising tool for risk factor assessment for the service departments in large hospitals in Iraq.

 

View Publication Preview PDF
Quick Preview PDF
Publication Date
Fri Mar 31 2023
Journal Name
Journal Of Al-qadisiyah For Computer Science And Mathematics
A Cryptosystem for Database Security Based on RC4 Algorithm
...Show More Authors

Because of vulnerable threats and attacks against database during transmission from sender to receiver, which is one of the most global security concerns of network users, a lightweight cryptosystem using Rivest Cipher 4 (RC4) algorithm is proposed. This cryptosystem maintains data privacy by performing encryption of data in cipher form and transfers it over the network and again performing decryption to original data. Hens, ciphers represent encapsulating system for database tables

View Publication
Crossref (1)
Crossref
Publication Date
Sat Jul 31 2021
Journal Name
Iraqi Journal Of Science
A Decision Tree-Aware Genetic Algorithm for Botnet Detection
...Show More Authors

     In this paper, the botnet detection problem is defined as a feature selection problem and the genetic algorithm (GA) is used to search for the best significant combination of features from the entire search space of set of features. Furthermore, the Decision Tree (DT) classifier is used as an objective function to direct the ability of the proposed GA to locate the combination of features that can correctly classify the activities into normal traffics and botnet attacks. Two datasets  namely the UNSW-NB15 and the Canadian Institute for Cybersecurity Intrusion Detection System 2017 (CICIDS2017), are used as evaluation datasets. The results reveal that the proposed DT-aware GA can effectively find the relevant features from

... Show More
Scopus (4)
Crossref (1)
Scopus Crossref
Publication Date
Sat Jul 31 2021
Journal Name
Iraqi Journal Of Science
A Decision Tree-Aware Genetic Algorithm for Botnet Detection
...Show More Authors

     In this paper, the botnet detection problem is defined as a feature selection problem and the genetic algorithm (GA) is used to search for the best significant combination of features from the entire search space of set of features. Furthermore, the Decision Tree (DT) classifier is used as an objective function to direct the ability of the proposed GA to locate the combination of features that can correctly classify the activities into normal traffics and botnet attacks. Two datasets  namely the UNSW-NB15 and the Canadian Institute for Cybersecurity Intrusion Detection System 2017 (CICIDS2017), are used as evaluation datasets. The results reveal that the proposed DT-aware GA can effectively find the relevant

... Show More
View Publication Preview PDF
Scopus (4)
Crossref (1)
Scopus Crossref
Publication Date
Tue Aug 31 2021
Journal Name
Iraqi Journal Of Science
A lightweight AES Algorithm Implementation for Secure IoT Environment
...Show More Authors

In recent years, the rapid development in the field of wireless technologies led to the appearance of a new topic, known as the Internet of things (IoT). The IoT applications can be found in various fields of our life, such as smart home, health care, smart building, and etc. In all these applications, the data collected from the real world are transmitted through the Internet; therefore, these data have become a target of many attacks and hackers. Hence, a secure communication must be provided to protect the transmitted data from unauthorized access. This paper focuses on designing a secure IoT system to protect the sensing data. In this system, the security is provided by the use of Lightweight AES encryption algorithm to encrypt the d

... Show More
View Publication Preview PDF
Scopus (22)
Crossref (3)
Scopus Crossref
Publication Date
Fri Jan 01 2016
Journal Name
Diabetic Foot & Ankle
Risk factors for occurrence and recurrence of diabetic foot ulcers among Iraqi diabetic patients
...Show More Authors

View Publication
Scopus (14)
Crossref (8)
Scopus Crossref
Publication Date
Fri Jan 01 2016
Journal Name
Diabetic Foot & Ankle
Risk factors for occurrence and recurrence of diabetic foot ulcers among Iraqi diabetic patients
...Show More Authors

There are a few studies that discuss the medical causes for diabetic foot (DF) ulcerations in Iraq, one of them in Wasit province. The aim of our study was to analyze the medical, therapeutic, and patient risk factors for developing DF ulcerations among diabetic patients in Baghdad, Iraq.

Preview PDF
Scopus (14)
Crossref (8)
Scopus Crossref
Publication Date
Wed Sep 28 2022
Journal Name
Journal Of The College Of Education For Women
A Proposed Program from the Perspective of the General Practice of Social Work to Overcome Husbands' Violence Against Their Wives
...Show More Authors

Husbands’ violence towards their wives is one of the greatly important issues in social sciences. Accordingly, the current study aims at determining the levels of violence practiced by husbands towards their wives to propose a professional program from the perspective of the general practice of social work to overcome such a phenomenon. The study is descriptive in nature, where the researcher has used a comprehensive social survey method. To achieve the goal of the study, the researcher has prepared a questionnaire that consisted of two parts. The first part contains the primary data of the two sections, and the second contains (38) phrases distributed over four axes to measure the levels and types of violence among the sample’s memb

... Show More
View Publication Preview PDF
Crossref
Publication Date
Thu Dec 19 2024
Journal Name
Ieee Explorer
A Novel Flow Priority and Continuity Control Mechanism in SDN Network
...Show More Authors

In recent days, the escalating need to seamlessly transfer data traffic without discontinuities across the Internet network has exerted immense pressure on the capacity of these networks. Consequently, this surge in demand has resulted in the disruption of traffic flow continuity. Despite the emergence of intelligent networking technologies such as software-defined networking, network cloudification, and network function virtualization, they still need to improve their performance. Our proposal provides a novel solution to tackle traffic flow continuity by controlling the selected packet header bits (Differentiated Services Code Point (DSCP)) that govern the traffic flow priority. By setting the DSCP bits, we can determine the appropriate p

... Show More
View Publication
Crossref
Publication Date
Wed Dec 01 2021
Journal Name
Journal Of Economics And Administrative Sciences
Investment Trends for Iraqi Industries in Terms of Clean Production (selected model)
...Show More Authors

   Industrial Investment according to Clean Productive methods is an important element in the process of rational use of Economic Resources, and the Iraqi industrial sector relied on traditional production methods; the productive activities in this sector did not take into consideration the environmental dimension, which leads to achieving the optimal use of economic resources, so it was necessary to have new investment trends heading with Clean Production. Therefore, the research is based on the hypothesis that "Clean Production contributes to improving the environment and rational use of Natural Resources." Based on the descriptive - inductive analysis methodology that study of Iraqi industries with Clean Production,

... Show More
View Publication Preview PDF
Crossref (2)
Crossref
Publication Date
Sat Mar 26 2022
Journal Name
Journal Of Accounting And Financial Studies ( Jafs )
The role of the marketing intelligence system in the quality of the insurance service : Applied research in the National Insurance Company
...Show More Authors

The current research seeks to identify the role of the marketing intelligence system in its dimensions (customer intelligence, market intelligence, competitor intelligence, insurance product intelligence, sales representatives) and its reflection on improving the quality of the insurance service provided by the National Insurance Company represented in its dimensions (reliability, response, tangibility, Safety, the spirit of empathy, communication) adopted in the current research, and based on that, the research came as an attempt to find out the extent to which the research sample company can apply the approach of the marketing intelligence system and its impact on improving the quality of the insurance service provided to custo

... Show More
View Publication Preview PDF