Preferred Language
Articles
/
bsj-5597
Coronavirus Disease Diagnosis, Care and Prevention (COVID-19) Based on Decision Support System
...Show More Authors

              Automated clinical decision support system (CDSS) acts as new paradigm in medical services today. CDSSs are utilized to increment specialists (doctors) in their perplexing decision-making. Along these lines, a reasonable decision support system is built up dependent on doctors' knowledge and data mining derivation framework so as to help with the interest the board in the medical care gracefully to control the Corona Virus Disease (COVID-19) virus pandemic and, generally, to determine the class of infection and to provide a suitable protocol treatment depending on the symptoms of patient. Firstly, it needs to determine the three early symptoms of COVID-19 pandemic criteria (fever, tiredness, dry cough and breathing difficulty) used to diagnose the person being infected by COVID-19 virus or not. Secondly, this approach divides the infected peoples into four classes, based on their immune system risk level (very high degree, high degree, mild degree, and normal), and using two indices of age and current health status like diabetes, heart disorders, or hypertension. Where, these people are graded and expected to comply with their class regulations. There are six important COVID-19 virus infections of different classes that should receive immediate health care to save their lives. When the test is positive, the patient age is considered to choose one of the six classifications depending on the patient symptoms to provide him the suitable care as one of the four types of suggested treatment protocol of COVID-19 virus infection in COVID-19 DSS application. Finally, a report of all information about any classification case of COVID-19 infection is printed where this report includes the status of patient (infection level) and the prevention protocol. Later, the program sends the report to the control centre (medical expert) containing the information. In this paper, it was suggested the use of C4.5 Algorithm for decision tree.

Scopus Clarivate Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Fri May 04 2018
Journal Name
Wireless Personal Communications
IFRS: An Indexed Face Recognition System Based on Face Recognition and RFID Technologies
...Show More Authors

View Publication
Scopus (10)
Crossref (8)
Scopus Clarivate Crossref
Publication Date
Mon Feb 04 2019
Journal Name
Journal Of Accounting And Financial Studies ( Jafs )
Using Regression Analysis as Analytical Procedure to Facilitate the Decision-Making Process in The Tax Audit: An Applied Research in the General Commission of Taxes
...Show More Authors

This research aims to clarify the advantages of using the regression method as analytical procedure in the tax audit to reducing the examination cost , time, effort, human and material resources, and represents an applied study in the General Commission of taxes. In order to achieve its objectives the research has used in the theoretical side the descriptive approach (analytical), and in the practical side regression method has been applied to the research sample represented by the soft drinks company that is subject to the tax settlement for the year 2014, where the value of sales has been verified by using the regression method without conductinga comprehensive examination. The most important results of the research indicate that the r

... Show More
View Publication Preview PDF
Crossref
Publication Date
Tue Sep 08 2020
Journal Name
Baghdad Science Journal
RMSRS: Rover Multi-purpose Surveillance Robotic System
...Show More Authors

The development of the internet of things (IoT) and the internet of robotics (IoR) are becoming more and more involved with our daily lives. It serves a variety of tasks some of them are essential to us. The main objective of SRR is to develop a surveillance system for detecting suspicious and targeted places for users without any loss of human life. This paper shows the design and implementation of a robotic surveillance platform for real-time monitoring with the help of image processing, which can explorer places of difficult access or high risk. The robotic live streaming is via two cameras, the first one is fixed straight on the road and the second one is dynamic with tilt-pan ability. All cameras have image processing capabilities t

... Show More
View Publication Preview PDF
Scopus (8)
Crossref (4)
Scopus Clarivate Crossref
Publication Date
Tue Oct 01 2019
Journal Name
2019 Ieee 9th International Conference On System Engineering And Technology (icset)
A Digital Signature System Based on Real Time Face Recognition
...Show More Authors

This study proposed a biometric-based digital signature scheme proposed for facial recognition. The scheme is designed and built to verify the person’s identity during a registration process and retrieve their public and private keys stored in the database. The RSA algorithm has been used as asymmetric encryption method to encrypt hashes generated for digital documents. It uses the hash function (SHA-256) to generate digital signatures. In this study, local binary patterns histograms (LBPH) were used for facial recognition. The facial recognition method was evaluated on ORL faces retrieved from the database of Cambridge University. From the analysis, the LBPH algorithm achieved 97.5% accuracy; the real-time testing was done on thirty subj

... Show More
View Publication Preview PDF
Scopus (9)
Crossref (2)
Scopus Clarivate Crossref
Publication Date
Sun Sep 03 2023
Journal Name
Iraqi Journal Of Computers, Communications, Control & Systems Engineering (ijccce)
Efficient Iris Image Recognition System Based on Machine Learning Approach
...Show More Authors

HM Al-Dabbas, RA Azeez, AE Ali, IRAQI JOURNAL OF COMPUTERS, COMMUNICATIONS, CONTROL AND SYSTEMS ENGINEERING, 2023

View Publication
Publication Date
Sun Nov 01 2020
Journal Name
Iop Conference Series
Modified PRESENT Encryption algorithm based on new 5D Chaotic system
...Show More Authors

Cryptography is a major concern in communication systems. IoE technology is a new trend of smart systems based on various constrained devices. Lightweight cryptographic algorithms are mainly solved the most security concern of constrained devices and IoE systems. On the other hand, most lightweight algorithms are suffering from the trade-off between complexity and performance. Moreover, the strength of the cryptosystems, including the speed of the algorithm and the complexity of the system against the cryptanalysis. A chaotic system is based on nonlinear dynamic equations that are sensitive to initial conditions and produce high randomness which is a good choice for cryptosystems. In this work, we proposed a new five-dimensional of a chaoti

... Show More
Scopus (9)
Crossref (4)
Scopus Crossref
Publication Date
Sun Jun 27 2021
Journal Name
Iraqi National Journal Of Nursing Specialties
Evaluation of Quality of Nursing Care Services Provided to Children under Five Years Based on Integrated Management of Child Health at Primary Health Care Centers in Baquba City
...Show More Authors

Objective(s): The study aims to evaluating the quality of nursing care provided to children under five years to compare between quality related to type of health sectors; to determine the quality of nursing care and to compare between such care in Baquba Health Care Sector I and II.

Methodology: A descriptive study is carried out for the period from December 15th 2019 to May 1st 2020. A purposive "non- probability" sample, of (60) staff nurse and (60) children is selected. An adopted questionnaire has been selected for the study which consists of three parts. The first part is nurses’ socio-demographic characteristic; the second part is ch

... Show More
View Publication Preview PDF
Publication Date
Sun May 27 2018
Journal Name
Journal Of Advanced Transportation
Accident Management System Based on Vehicular Network for an Intelligent Transportation System in Urban Environments
...Show More Authors

As cities across the world grow and the mobility of populations increases, there has also been a corresponding increase in the number of vehicles on roads. The result of this has been a proliferation of challenges for authorities with regard to road traffic management. A consequence of this has been congestion of traffic, more accidents, and pollution. Accidents are a still major cause of death, despite the development of sophisticated systems for traffic management and other technologies linked with vehicles. Hence, it is necessary that a common system for accident management is developed. For instance, traffic congestion in most urban areas can be alleviated by the real-time planning of routes. However, the designing of an efficie

... Show More
View Publication Preview PDF
Scopus (40)
Crossref (30)
Scopus Clarivate Crossref
Publication Date
Wed Jul 12 2023
Journal Name
Energies
Finite Time Disturbance Observer Based on Air Conditioning System Control Scheme
...Show More Authors

A novel robust finite time disturbance observer (RFTDO) based on an independent output-finite time composite control (FTCC) scheme is proposed for an air conditioning-system temperature and humidity regulation. The variable air volume (VAV) of the system is represented by two first-order mathematical models for the temperature and humidity dynamics. In the temperature loop dynamics, a RFTDO temperature (RFTDO-T) and an FTCC temperature (FTCC-T) are designed to estimate and reject the lumped disturbances of the temperature subsystem. In the humidity loop, a robust output of the FTCC humidity (FTCC-H) and RFTDO humidity (RFTDO-H) are also designed to estimate and reject the lumped disturbances of the humidity subsystem. Based on Lyapunov theo

... Show More
View Publication
Scopus (7)
Crossref (6)
Scopus Clarivate Crossref
Publication Date
Tue Dec 05 2023
Journal Name
Baghdad Science Journal
Robust Color Image Encryption Scheme Based on RSA via DCT by Using an Advanced Logic Design Approach
...Show More Authors

Information security in data storage and transmission is increasingly important. On the other hand, images are used in many procedures. Therefore, preventing unauthorized access to image data is crucial by encrypting images to protect sensitive data or privacy. The methods and algorithms for masking or encoding images vary from simple spatial-domain methods to frequency-domain methods, which are the most complex and reliable. In this paper, a new cryptographic system based on the random key generator hybridization methodology by taking advantage of the properties of Discrete Cosine Transform (DCT) to generate an indefinite set of random keys and taking advantage of the low-frequency region coefficients after the DCT stage to pass them to

... Show More
View Publication Preview PDF
Scopus (5)
Crossref (1)
Scopus Crossref