Automated clinical decision support system (CDSS) acts as new paradigm in medical services today. CDSSs are utilized to increment specialists (doctors) in their perplexing decision-making. Along these lines, a reasonable decision support system is built up dependent on doctors' knowledge and data mining derivation framework so as to help with the interest the board in the medical care gracefully to control the Corona Virus Disease (COVID-19) virus pandemic and, generally, to determine the class of infection and to provide a suitable protocol treatment depending on the symptoms of patient. Firstly, it needs to determine the three early symptoms of COVID-19 pandemic criteria (fever, tiredness, dry cough and breathing difficulty) used to diagnose the person being infected by COVID-19 virus or not. Secondly, this approach divides the infected peoples into four classes, based on their immune system risk level (very high degree, high degree, mild degree, and normal), and using two indices of age and current health status like diabetes, heart disorders, or hypertension. Where, these people are graded and expected to comply with their class regulations. There are six important COVID-19 virus infections of different classes that should receive immediate health care to save their lives. When the test is positive, the patient age is considered to choose one of the six classifications depending on the patient symptoms to provide him the suitable care as one of the four types of suggested treatment protocol of COVID-19 virus infection in COVID-19 DSS application. Finally, a report of all information about any classification case of COVID-19 infection is printed where this report includes the status of patient (infection level) and the prevention protocol. Later, the program sends the report to the control centre (medical expert) containing the information. In this paper, it was suggested the use of C4.5 Algorithm for decision tree.
For businesses that provide delivery services, the efficiency of the delivery process in terms of punctuality is very important. In addition to increasing customer trust, efficient route management, and selection are required to reduce vehicle fuel costs and expedite delivery. Some small and medium businesses still use conventional methods to manage delivery routes. Decisions to manage delivery schedules and routes do not use any specific methods to expedite the delivery settlement process. This process is inefficient, takes a long time, increases costs and is prone to errors. Therefore, the Dijkstra algorithm has been used to improve the delivery management process. A delivery management system was developed to help managers and drivers
... Show MoreBackground Parkinson’s disease (PD) is currently the fastest-growing neurological disorder in the world. Patients with PD face numerous challenges in managing their chronic condition, particularly in countries with scarce healthcare infrastructure. Objective This qualitative study aimed to delve into neurologists’ perspectives on challenges and gaps in the Iraqi healthcare system that influence the management of PD, as well as strategies to mitigate these obstacles. Method Semi-structured interviews were conducted with neurologists from five different Iraqi provinces, working in both hospitals and private neurology clinics, between November 2024 and January 2025. A thematic analysis approach was employed to identify the main challenge
... Show MoreThe laser micro-cutting process is the most widely commonly applied machining process which can be applied to practically all metallic and non-metallic materials. While this had challenges in cutting quality criteria such as geometrical precision, surface quality and numerous others. This article investigates the laser micro-cutting of PEEK composite material using nano-fiber laser, due to their significant importunity and efficiency of laser in various manufacturing processes. Design of experiential tool based on Response Surface Methodology (RSM)-Central Composite Design (CCD) used to generate the statistical model. This method was employed to analysis the influence of parameters including laser speed,
... Show Moreدور وزارة الخارجية الامريكية في عملية صنع القرار
Abstract
Objective(s): To evaluate the level of Psychological Empowerment among Nurses as perceived by their Point of View, and identify the differences in nurses' Psychological Empowerment with regard to age, gender, graduation level, and years of work employment.
Methodology: A descriptive analytic design was conducted on nurses in Psycho-social health Units in Primary Health Care Centers in Kirkuk Governorate, to achieve the objectives of the study. A convenient (non-probability) sample of 84 nurses was selected. The data collected through self-report method for the period from 25th August to 10th October 2022. The questionnaire was adopted
... Show MoreBiometrics is widely used with security systems nowadays; each biometric modality can be useful and has distinctive properties that provide uniqueness and ambiguity for security systems especially in communication and network technologies. This paper is about using biometric features of fingerprint, which is called (minutiae) to cipher a text message and ensure safe arrival of data at receiver end. The classical cryptosystems (Caesar, Vigenère, etc.) became obsolete methods for encryption because of the high-performance machines which focusing on repetition of the key in their attacks to break the cipher. Several Researchers of cryptography give efforts to modify and develop Vigenère cipher by enhancing its weaknesses.
... Show MoreTo achieve safe security to transfer data from the sender to receiver, cryptography is one way that is used for such purposes. However, to increase the level of data security, DNA as a new term was introduced to cryptography. The DNA can be easily used to store and transfer the data, and it becomes an effective procedure for such aims and used to implement the computation. A new cryptography system is proposed, consisting of two phases: the encryption phase and the decryption phase. The encryption phase includes six steps, starting by converting plaintext to their equivalent ASCII values and converting them to binary values. After that, the binary values are converted to DNA characters and then converted to their equivalent complementary DN
... Show MoreThe confirming of security and confidentiality of multimedia data is a serious challenge through the growing dependence on digital communication. This paper offers a new image cryptography based on the Chebyshev chaos polynomials map, via employing the randomness characteristic of chaos concept to improve security. The suggested method includes block shuffling, dynamic offset chaos key production, inter-layer XOR, and block 90 degree rotations to disorder the correlations intrinsic in image. The method is aimed for efficiency and scalability, accomplishing complexity order for n-pixels over specific cipher rounds. The experiment outcomes depict great resistant to cryptanalysis attacks, containing statistical, differential and brut
... Show MoreChaotic systems have been proved to be useful and effective for cryptography. Through this work, a new Feistel cipher depend upon chaos systems and Feistel network structure with dynamic secret key size according to the message size have been proposed. Compared with the classical traditional ciphers like Feistel-based structure ciphers, Data Encryption Standards (DES), is the common example of Feistel-based ciphers, the process of confusion and diffusion, will contains the dynamical permutation choice boxes, dynamical substitution choice boxes, which will be generated once and hence, considered static,
While using chaotic maps, in the suggested system, called