Preferred Language
Articles
/
bsj-5597
Coronavirus Disease Diagnosis, Care and Prevention (COVID-19) Based on Decision Support System
...Show More Authors

              Automated clinical decision support system (CDSS) acts as new paradigm in medical services today. CDSSs are utilized to increment specialists (doctors) in their perplexing decision-making. Along these lines, a reasonable decision support system is built up dependent on doctors' knowledge and data mining derivation framework so as to help with the interest the board in the medical care gracefully to control the Corona Virus Disease (COVID-19) virus pandemic and, generally, to determine the class of infection and to provide a suitable protocol treatment depending on the symptoms of patient. Firstly, it needs to determine the three early symptoms of COVID-19 pandemic criteria (fever, tiredness, dry cough and breathing difficulty) used to diagnose the person being infected by COVID-19 virus or not. Secondly, this approach divides the infected peoples into four classes, based on their immune system risk level (very high degree, high degree, mild degree, and normal), and using two indices of age and current health status like diabetes, heart disorders, or hypertension. Where, these people are graded and expected to comply with their class regulations. There are six important COVID-19 virus infections of different classes that should receive immediate health care to save their lives. When the test is positive, the patient age is considered to choose one of the six classifications depending on the patient symptoms to provide him the suitable care as one of the four types of suggested treatment protocol of COVID-19 virus infection in COVID-19 DSS application. Finally, a report of all information about any classification case of COVID-19 infection is printed where this report includes the status of patient (infection level) and the prevention protocol. Later, the program sends the report to the control centre (medical expert) containing the information. In this paper, it was suggested the use of C4.5 Algorithm for decision tree.

Scopus Clarivate Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Sat Apr 30 2022
Journal Name
Iraqi Journal Of Science
A Review on Face Detection Based on Convolution Neural Network Techniques
...Show More Authors

     Face detection is one of the important applications of biometric technology and image processing. Convolutional neural networks (CNN) have been successfully used with great results in the areas of image processing as well as pattern recognition. In the recent years, deep learning techniques specifically CNN techniques have achieved marvellous accuracy rates on face detection field. Therefore, this study provides a comprehensive analysis of face detection research and applications that use various CNN methods and algorithms. This paper presents ten of the most recent studies and illustrate the achieved performance of each method. 

View Publication Preview PDF
Scopus (10)
Crossref (3)
Scopus Crossref
Publication Date
Wed Jun 29 2022
Journal Name
Journal Of The College Of Education For Women
Content Analysis of Social Studies Book at the Secondary School in the Kingdom of Saudi Arabia (Curricula System- Joint Program) in the Light of the Cultural Intelligence Dimensions
...Show More Authors

The study aimed at recognizing the availability of the cultural intelligence dimensions in social studies book at the high school in the kingdom of Saudi Arabia (curricula system- joint program). The study used the descriptive approach and content analysis method. As tools of the study, the study adopted a list of cultural list of indicators and dimensions that suits the secondary stage social curricula. It further adopted a content analysis form designed to analyze the social studies book in the secondary school in the kingdom of Saudi Arabia. The study has reached several results, the most significant results were: There is a difference in including the cultural intelligence dimensions in social studies book at high school in the kingd

... Show More
View Publication Preview PDF
Crossref
Publication Date
Tue May 01 2018
Journal Name
Journal Of Physics: Conference Series
Hiding Techniques for Dynamic Encryption Text based on Corner Point
...Show More Authors

Hiding technique for dynamic encryption text using encoding table and symmetric encryption method (AES algorithm) is presented in this paper. The encoding table is generated dynamically from MSB of the cover image points that used as the first phase of encryption. The Harris corner point algorithm is applied on cover image to generate the corner points which are used to generate dynamic AES key to second phase of text encryption. The embedded process in the LSB for the image pixels except the Harris corner points for more robust. Experimental results have demonstrated that the proposed scheme have embedding quality, error-free text recovery, and high value in PSNR.

View Publication Preview PDF
Scopus (10)
Crossref (2)
Scopus Clarivate Crossref
Publication Date
Sun Jun 01 2014
Journal Name
Baghdad Science Journal
Dispersal and Development of Powdery Mildew Disease Caused by Oidiopsis haplophylli on Ornamental Plants (Nasturtium) Tropaeolum majus L. in Baghdad
...Show More Authors

This study wass carried out to investigate the incedence of powdery mildew disease on ornamental plants (Nasturtium) Tropaeolum majus L. caused by Oidiopsis haplophylli in some nurseries of Baghdad area and in fields at college of Agriculture /University of Baghdad. This study was conducted in tow succesive seasons of 2011-2012 (April and May). The survey indicated that the Mildew disease existe in the following nurseries (Al-Adhamiya 97.5% ,Palestine street 93.8%, Zayouna 86.0%, and 100% in two fields at college of Agriculture. It has been found that the disease severity was developed in Agriculture college fields successively from 12-4-2011 to 20-5-2011 and from 12-4-2012 to 20-5-2012 (18.0–98.0 % and 22.7–96.0% )for the two sea

... Show More
View Publication Preview PDF
Crossref
Publication Date
Mon Mar 07 2022
Journal Name
Journal Of Educational And Psychological Researches
The level of Mental Mindfulness of College of Education Students at Umm Al-Qura University in the light of Corona Pandemic
...Show More Authors

The aim of this research is to identify the level of mental mindfulness among female students of the College of Education at Umm Al-Qura University, as well as to identify the statistically significant differences in the level of mental mindfulness according to academic level, specialization, and academic achievement. A mental mindfulness scale was designed to cover five dimensions. The study employed the analytic descriptive approach applied to a random sample of (217) female students from various academic specializations. The findings indicated that the level of mental mindfulness was average among female students. Statistically significant differences were attributable to the academic level, academic specializations, and academic achi

... Show More
View Publication Preview PDF
Publication Date
Sun Sep 29 2019
Journal Name
Iraqi Journal Of Science
Intelligent TRIPLE DES with N Round Based on Genetic Algorithm
...Show More Authors

     This work presents an approach for the applying Triple DES (TRIPLE DES) based on using genetic algorithm by adding intelligent feature for TRIPLE DES with N round for genetic algorithm. Encapsulated cipher file with special program which send an acknowledgment to a sender to know who decipher or  broken to  crash it , Thus it is considered as the initial step to improve privacy. The outcome for proposed system gives a good indication that it is a promising system compared with other type of cipher system.

View Publication Preview PDF
Scopus Crossref
Publication Date
Wed Mar 01 2006
Journal Name
Journal Of Accounting And Financial Studies ( Jafs )
أهمية ودور و ملائمة البيانات المحاسبية في صنع و اتخاذ و ترشيد القرارات الادارية
...Show More Authors

    

View Publication Preview PDF
Publication Date
Sat Sep 30 2017
Journal Name
Al-khwarizmi Engineering Journal
Programming a Pneumatic Processes Sequence based on PLC by Demonstration
...Show More Authors

Abstract

Pneumatic processes sequence (PPS) is used widely in industrial applications. It is common to do a predetermined PPS to achieve a specific larger task within the industrial application like the PPS achieved by the pick and place industrial robot arm. This sequence may require change depending on changing the required task and usually this requires the programmer intervention to change the sequence’ sprogram, which is costly and may take long time. In this research a PLC-based PPS control system is designed and implemented, in which the PPS is programmed by demonstration. The PPS could be changed by demonstrating the new required sequence via the user by following simple series of manual steps without h

... Show More
View Publication Preview PDF
Crossref
Publication Date
Wed Jan 01 2020
Journal Name
Iraqi National Journal Of Nursing Specialties
Assessment of Nurses knowledge toward prevention of Complications related Valvular Replacement Surgery at Surgical Department in AL-Nasiriyah Heart Center
...Show More Authors

Objectives: The study aims to assess  the nurses knowledge toward prevention of complications related to valvular  replacement surgery and to find out the relationship between nurses knowledge and their demographic and occupational characteristic's Which as (Age, gender, level of education ,years of experience in Surgical Department , and training sessions)

 

Methodology: A descriptive design  (a cross-sectional study ) was carried out from December 2017 to May 2018 in order to assess nurses' knowledge of preventing complications Valvular Replacement Surgery at Surgical Department in  Nasiriyah Heart Center on a purposive (non-probability) sample

... Show More
View Publication Preview PDF
Publication Date
Fri Sep 23 2022
Journal Name
Specialusis Ugdymas
Text Cryptography based on Arabic Words Characters Number
...Show More Authors

Cryptography is a method used to mask text based on any encryption method, and the authorized user only can decrypt and read this message. An intruder tried to attack in many manners to access the communication channel, like impersonating, non-repudiation, denial of services, modification of data, threatening confidentiality and breaking availability of services. The high electronic communications between people need to ensure that transactions remain confidential. Cryptography methods give the best solution to this problem. This paper proposed a new cryptography method based on Arabic words; this method is done based on two steps. Where the first step is binary encoding generation used t

... Show More