Preferred Language
Articles
/
jeasiq-249
Evaluating the performance of Inspector General Office of the Ministry of health in accordance with normative people and people results for the European excellence model EFQM 2013
...Show More Authors

Abstract:

Current research has sought to apply the criteria of potential for altmizalaorbi model EFQM 2013 in assessing the performance of the Inspector General's Office/Ministry of health, so as to keep up with a modern and advanced management methods in the evaluation of performance, as well as to link performance to a citizen's life, and it takes him beyond the accepted service capabilities today, but of budget duties between dealers servicing responsibilities and future planning, financial control, competitiveness, human resources needs and maintaining quality and development, as well as the constant quest for continuous improvement, is the spirit of the principle underpinning the European Foundation Quality management when designing a model of excellence.  Use the Finder method of applied research, through data collection checklist for evaluation in addition to interviews, the answer has been analysed using percentages and arithmetic, and indicate their strengths for the purpose of strengthening, and vulnerabilities for patch and calendar, and improvement opportunities to invest and not to be missed. The outcome of the evaluation of potential standards generally good results except standard leadership, where criterion driving 57 points out of 100 points allocated

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Mon Feb 20 2017
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
A Hybrid Algorithm to Protect Computer Networks Based on Human Biometrics and Computer Attributes
...Show More Authors

Objective of this work is the mixing between human biometric characteristics and unique attributes of the computer in order to protect computer networks and resources environments through the development of authentication and authorization techniques. In human biometric side has been studying the best methods and algorithms used, and the conclusion is that the fingerprint is the best, but it has some flaws. Fingerprint algorithm has been improved so that their performance can be adapted to enhance the clarity of the edge of the gully structures of pictures fingerprint, taking into account the evaluation of the direction of the nearby edges and repeat. In the side of the computer features, computer and its components like human have uniqu

... Show More
View Publication Preview PDF
Publication Date
Sun Apr 26 2020
Journal Name
Iraqi Journal Of Science
Selective Image Encryption Based on DCT, Hybrid Shift Coding and Randomly Generated Secret Key
...Show More Authors

Most of today’s techniques encrypt all of the image data, which consumes a tremendous amount of time and computational payload. This work introduces a selective image encryption technique that encrypts predetermined bulks of the original image data in order to reduce the encryption/decryption time and the
computational complexity of processing the huge image data. This technique is applying a compression algorithm based on Discrete Cosine Transform (DCT). Two approaches are implemented based on color space conversion as a preprocessing for the compression phases YCbCr and RGB, where the resultant compressed sequence is selectively encrypted using randomly generated combined secret key.
The results showed a significant reduct

... Show More
View Publication Preview PDF
Scopus (14)
Crossref (5)
Scopus Crossref
Publication Date
Wed Nov 19 2014
Journal Name
Journal Of Biosciences
Caspase-like proteins: Acanthamoeba castellanii metacaspase and Dictyostelium discoideum paracaspase, what are their functions?
...Show More Authors

View Publication
Scopus (8)
Crossref (9)
Scopus Clarivate Crossref
Publication Date
Tue Aug 15 2023
Journal Name
Sumer 1
Biologically synthesized Copper Nanoparticles from S. epidermidis on resistant S. aureus and cytotoxic assay
...Show More Authors

The risk of significant concern is resistance to antibiotics for public health. The alternative treatment of metallic nanoparticles (NPs), such as heavy metals, effects on antibiotic resistance bacteria with different types of antibiotics of - impossible to treat using noval eco-friendly synthesis technique nanoparticles copper oxide (CuO NPs) preparation from S. epidermidis showed remarkable antimicrobial activity against S.aureus Minimum inhibitory concentra range (16,32,64,256,512) µg/ml via well diffusion method in vitro, discover those concentrations effected in those bacteria and the best concentration is 64 µg/ml, characterization CuO NPs to prove this included atomic force microscope, UV, X-ray Diffraction and TEM, and ant

... Show More
View Publication
Scopus (4)
Crossref (3)
Scopus Crossref
Publication Date
Sun Mar 05 2017
Journal Name
Baghdad Science Journal
Cache Coherence Protocol Design and Simulation Using IES (Invalid Exclusive read/write Shared) State
...Show More Authors

To improve the efficiency of a processor in recent multiprocessor systems to deal with data, cache memories are used to access data instead of main memory which reduces the latency of delay time. In such systems, when installing different caches in different processors in shared memory architecture, the difficulties appear when there is a need to maintain consistency between the cache memories of different processors. So, cache coherency protocol is very important in such kinds of system. MSI, MESI, MOSI, MOESI, etc. are the famous protocols to solve cache coherency problem. We have proposed in this research integrating two states of MESI's cache coherence protocol which are Exclusive and Modified, which responds to a request from reading

... Show More
View Publication Preview PDF
Scopus Crossref
Publication Date
Tue Jun 01 2021
Journal Name
Bulletin Of Electrical Engineering And Informatics
A new pseudorandom bits generator based on a 2D-chaotic system and diffusion property
...Show More Authors

A remarkable correlation between chaotic systems and cryptography has been established with sensitivity to initial states, unpredictability, and complex behaviors. In one development, stages of a chaotic stream cipher are applied to a discrete chaotic dynamic system for the generation of pseudorandom bits. Some of these generators are based on 1D chaotic map and others on 2D ones. In the current study, a pseudorandom bit generator (PRBG) based on a new 2D chaotic logistic map is proposed that runs side-by-side and commences from random independent initial states. The structure of the proposed model consists of the three components of a mouse input device, the proposed 2D chaotic system, and an initial permutation (IP) table. Statist

... Show More
View Publication
Scopus (12)
Crossref (6)
Scopus Crossref
Publication Date
Wed Feb 01 2023
Journal Name
Journal Of Ecological Engineering
Chlorpyrifos Removal from Aqueous Solutions by Emulsion Liquid Membrane – Stability, Extraction, and Stripping Studies
...Show More Authors

Crossref (2)
Crossref
Publication Date
Tue Aug 01 2023
Journal Name
Baghdad Science Journal
Digital Data Encryption Using a Proposed W-Method Based on AES and DES Algorithms
...Show More Authors

This paper proposes a new encryption method. It combines two cipher algorithms, i.e., DES and AES, to generate hybrid keys. This combination strengthens the proposed W-method by generating high randomized keys. Two points can represent the reliability of any encryption technique. Firstly, is the key generation; therefore, our approach merges 64 bits of DES with 64 bits of AES to produce 128 bits as a root key for all remaining keys that are 15. This complexity increases the level of the ciphering process. Moreover, it shifts the operation one bit only to the right. Secondly is the nature of the encryption process. It includes two keys and mixes one round of DES with one round of AES to reduce the performance time. The W-method deals with

... Show More
View Publication Preview PDF
Scopus (5)
Scopus Crossref
Publication Date
Wed Feb 01 2023
Journal Name
Baghdad Science Journal
Breast Cancer MRI Classification Based on Fractional Entropy Image Enhancement and Deep Feature Extraction
...Show More Authors

Disease diagnosis with computer-aided methods has been extensively studied and applied in diagnosing and monitoring of several chronic diseases. Early detection and risk assessment of breast diseases based on clinical data is helpful for doctors to make early diagnosis and monitor the disease progression. The purpose of this study is to exploit the Convolutional Neural Network (CNN) in discriminating breast MRI scans into pathological and healthy. In this study, a fully automated and efficient deep features extraction algorithm that exploits the spatial information obtained from both T2W-TSE and STIR MRI sequences to discriminate between pathological and healthy breast MRI scans. The breast MRI scans are preprocessed prior to the feature

... Show More
View Publication Preview PDF
Scopus (21)
Crossref (6)
Scopus Clarivate Crossref
Publication Date
Wed Mar 30 2022
Journal Name
Iraqi Journal Of Science
Involutive Gamma Derivations on n-Gamma Lie Algebra and 3- Pre Gamma -Lie Algebra
...Show More Authors

     In this paper, the structure of  and  have  been introduced and studied. We also obtain that a is  of a  if and only if there exists an  on such that . In addition, we obtain  that  of if and only if there is an   on  such that  , where  are subspaces of  with eigenvalues 1 and  −1, respectively. We also find  t that the existence of  on  implies that there exists a compatible  under appropriate condition.

View Publication Preview PDF
Scopus (1)
Scopus Crossref