Automated clinical decision support system (CDSS) acts as new paradigm in medical services today. CDSSs are utilized to increment specialists (doctors) in their perplexing decision-making. Along these lines, a reasonable decision support system is built up dependent on doctors' knowledge and data mining derivation framework so as to help with the interest the board in the medical care gracefully to control the Corona Virus Disease (COVID-19) virus pandemic and, generally, to determine the class of infection and to provide a suitable protocol treatment depending on the symptoms of patient. Firstly, it needs to determine the three early symptoms of COVID-19 pandemic criteria (fever, tiredness, dry cough and breathing difficulty) used to diagnose the person being infected by COVID-19 virus or not. Secondly, this approach divides the infected peoples into four classes, based on their immune system risk level (very high degree, high degree, mild degree, and normal), and using two indices of age and current health status like diabetes, heart disorders, or hypertension. Where, these people are graded and expected to comply with their class regulations. There are six important COVID-19 virus infections of different classes that should receive immediate health care to save their lives. When the test is positive, the patient age is considered to choose one of the six classifications depending on the patient symptoms to provide him the suitable care as one of the four types of suggested treatment protocol of COVID-19 virus infection in COVID-19 DSS application. Finally, a report of all information about any classification case of COVID-19 infection is printed where this report includes the status of patient (infection level) and the prevention protocol. Later, the program sends the report to the control centre (medical expert) containing the information. In this paper, it was suggested the use of C4.5 Algorithm for decision tree.
Cybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a
... Show MoreBackground: Many workers have described the prevalence of HBV markers and anti-HCV among selected populations including health care personnel in Iraq. The purpose of this study is to describe the demographic characteristics and risk factors of hepatitis B and C in a sample of Iraqi health care workers (HCWs).
Materials and methods: A total of 1656 HCWs selected from Baghdad city was included in this study. A questionnaire form was filled for each HCW by direct interview. The data requested
included demographic characteristics and risk factors of exposure to HBV and HCV. HCWs were screened for the presence of HBsAg, anti-HBs and anti-HCV.
Results: A higher prevalence of HBsAg, anti-HBs and anti-HCV was de
This study was done to find the potential renal protective effects of sildenafil and its underlying mechanisms in mice with adenine-induced CKD. For the experiment, 40 male mice were split into four groups. The control group (A) received the same food without medication until the research ends, while the other three collections (B, C, and D) were given adenine (0.25% w/w in feed daily for 8 weeks), groups (C and D) were given sildenafil (0.5 and 2.5 mg/kg) respectively orally every day for 30 days, and then blood samples were taken to assess the function of the kidneys (Urea, total protein, and creatinine), total antioxidant capacity (TAC), superoxide dismutase (SOD), and catalase (CAT) in addition to kidney histopathology, as w
... Show MoreBackground: The Aim Of This Study Is To Determine The Modalities Of Treatment Of GTD In Baghdad Teaching Hospital And To Assess The Efficacy Of Our Management Protocols.
Patients &Methods: Department Of Obstetrics & Gynecology- Baghdad Teaching Hospital. Retrospective Analysis Of Case Records Between January 1999 To December2000. 41 Patients' Data Were Reviewed For Age, Gravidity, Parity, Blood Group, Antecedent Pregnancy And Clinical Presentation At The Time Of Diagnosis. Monitoring Of Hcg Level Before And After Chemotherapy, Other Investigations Were Reviewed, Looking For Number, Size And Site Of Metastasis. The Patient Were Classified According To WHO Scoring System. We Evaluate The Lines )f Ma
Background: Left ventricular function and volumes have major diagnostic and prognostic importance in patients with various cardiac diseases, such as ischemic heart disease which is a life-threatening heart disease condition characterized by systolic dysfunction and a decrease in cardiac output.
According to left ventricular ejection fraction, the degree of ischemic heart disease was classified as mild, moderate, and severe. To determine cardiac function and hemodynamics, the echocardiography technique is used, which is a noninvasive diagnostic method.
Patients and Methods: The study included 216 patients between 25 and 75 years old; 121 males and 95 females; 265 normal individuals (age range: 25 to 75 years ol
... Show MoreThe rapid development of telemedicine services and the requirements for exchanging medical information between physicians, consultants, and health institutions have made the protection of patients’ information an important priority for any future e-health system. The protection of medical information, including the cover (i.e. medical image), has a specificity that slightly differs from the requirements for protecting other information. It is necessary to preserve the cover greatly due to its importance on the reception side as medical staff use this information to provide a diagnosis to save a patient's life. If the cover is tampered with, this leads to failure in achieving the goal of telemedicine. Therefore, this work provides an in
... Show More
Abstract
This study aims to identify the degree to which the first cycle teachers use different feedback patterns in the e-learning system in addition to the differences in the degree of use according to specialization, teaching experience, and in-service training in the field of classroom assessment, as well as the interaction between them. The study sample consisted of (350) female teachers of the first cycle in government schools in Muscat Governorate for the academic year 2020/2021. The study used a questionnaire that contained four different patterns of feedback, which are reinforcement, informative, corrective, and interpretive feedback. The psychometric properties of the que
... Show More