Preferred Language
Articles
/
jih-318
Estimate Complete the Survival Function for Real Data of Lung Cancer Patients
...Show More Authors

 In this paper, we estimate the survival function for the patients of lung cancer using different nonparametric estimation methods depending on sample from complete real data which describe the duration of survivor for patients who suffer from the lung cancer based on diagnosis of disease or the enter of patients in a hospital for period of two years (starting with 2012 to the end of 2013). Comparisons between the mentioned estimation methods has been performed using statistical indicator mean squares error, concluding that the survival function for the lung cancer by using shrinkage method is the best

View Publication Preview PDF
Quick Preview PDF
Publication Date
Sat Jan 01 2022
Journal Name
The International Journal Of Nonlinear Analysis And Applications
Developing Bulk Arrival Queuing Models with Constant Batch Policy Under Uncertainty Data Using (0-1) Variables
...Show More Authors

This paper delves into some significant performance measures (PMs) of a bulk arrival queueing system with constant batch size b, according to arrival rates and service rates being fuzzy parameters. The bulk arrival queuing system deals with observation arrival into the queuing system as a constant group size before allowing individual customers entering to the service. This leads to obtaining a new tool with the aid of generating function methods. The corresponding traditional bulk queueing system model is more convenient under an uncertain environment. The α-cut approach is applied with the conventional Zadeh's extension principle (ZEP) to transform the triangular membership functions (Mem. Fs) fuzzy queues into a family of conventional b

... Show More
Publication Date
Wed Feb 06 2013
Journal Name
Eng. & Tech. Journal
A proposal to detect computer worms (malicious codes) using data mining classification algorithms
...Show More Authors

Malicious software (malware) performs a malicious function that compromising a computer system’s security. Many methods have been developed to improve the security of the computer system resources, among them the use of firewall, encryption, and Intrusion Detection System (IDS). IDS can detect newly unrecognized attack attempt and raising an early alarm to inform the system about this suspicious intrusion attempt. This paper proposed a hybrid IDS for detection intrusion, especially malware, with considering network packet and host features. The hybrid IDS designed using Data Mining (DM) classification methods that for its ability to detect new, previously unseen intrusions accurately and automatically. It uses both anomaly and misuse dete

... Show More
Publication Date
Sun Jan 01 2017
Journal Name
Iraqi Journal Of Science
Strong Triple Data Encryption Standard Algorithm using Nth Degree Truncated Polynomial Ring Unit
...Show More Authors

Cryptography is the process of transforming message to avoid an unauthorized access of data. One of the main problems and an important part in cryptography with secret key algorithms is key. For higher level of secure communication key plays an important role. For increasing the level of security in any communication, both parties must have a copy of the secret key which, unfortunately, is not that easy to achieve. Triple Data Encryption Standard algorithm is weak due to its weak key generation, so that key must be reconfigured to make this algorithm more secure, effective, and strong. Encryption key enhances the Triple Data Encryption Standard algorithm securities. This paper proposed a combination of two efficient encryption algorithms to

... Show More
Publication Date
Mon Dec 05 2022
Journal Name
Baghdad Science Journal
A Security and Privacy Aware Computing Approach on Data Sharing in Cloud Environment
...Show More Authors

Today, the role of cloud computing in our day-to-day lives is very prominent. The cloud computing paradigm makes it possible to provide demand-based resources. Cloud computing has changed the way that organizations manage resources due to their robustness, low cost, and pervasive nature. Data security is usually realized using different methods such as encryption. However, the privacy of data is another important challenge that should be considered when transporting, storing, and analyzing data in the public cloud. In this paper, a new method is proposed to track malicious users who use their private key to decrypt data in a system, share it with others and cause system information leakage. Security policies are also considered to be int

... Show More
View Publication Preview PDF
Scopus (4)
Scopus Crossref
Publication Date
Tue Nov 30 2021
Journal Name
Iraqi Journal Of Science
Strong Triple Data Encryption Standard Algorithm using Nth Degree Truncated Polynomial Ring Unit
...Show More Authors

Cryptography is the process of transforming message to avoid an unauthorized access of data. One of the main problems and an important part in cryptography with secret key algorithms is key. For higher level of secure communication key plays an important role. For increasing the level of security in any communication, both parties must have a copy of the secret key which, unfortunately, is not that easy to achieve. Triple Data Encryption Standard algorithm is weak due to its weak key generation, so that key must be reconfigured to make this algorithm more secure, effective, and strong. Encryption key enhances the Triple Data Encryption Standard algorithm securities. This paper proposed a combination of two efficient encryption algorithms

... Show More
View Publication Preview PDF
Publication Date
Fri Jun 30 2023
Journal Name
Iraqi National Journal Of Nursing Specialties
Effectiveness of Cardiac Rehabilitation Instructional Program on Health-related Quality of Life for Patients Undergone Coronary Artery Bypass Graft Surgery
...Show More Authors

Objective(s): evaluation of effectiveness of cardiac rehabilitation instructional program on health-related quality of life and to find out the relationship between health-related quality of life and patient’s socio-demographic and clinical characteristics. 

Methodology: A descriptive study design was carried out from 8th August, 2022 to 10th January, 2023.

A non-probability purposive sample of (50) patients undergone coronary artery bypass graft surgery at Iraqi center for heart diseases using pre-experimental design. The data were collected by direct interview with sample using questionnaire composed of three parts: part (1) Socio-demographic and clinical ch

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Fri Jun 30 2023
Journal Name
Iraqi National Journal Of Nursing Specialties
Effectiveness of Cardiac Rehabilitation Instructional Program on Health-related Quality of Life for Patients Undergone Coronary Artery Bypass Graft Surgery
...Show More Authors

Objective(s): evaluation of effectiveness of cardiac rehabilitation instructional program on health-related quality of life and to find out the relationship between health-related quality of life and patient’s socio-demographic and clinical characteristics.  Methodology: A descriptive study design was carried out from 8th August, 2022 to 10th January, 2023. A non-probability purposive sample of (50) patients undergone coronary artery bypass graft surgery at Iraqi center for heart diseases using pre-experimental design. The data were collected by direct interview with sample using questionnaire composed of three parts: part (1) Socio-demographic and clinical characteristics which included 11 items. Part (2) Knowledge r

... Show More
View Publication
Crossref (1)
Crossref
Publication Date
Thu Jun 01 2023
Journal Name
Baghdad Science Journal
Green synthesis of nano binary oxide SiO2/V2O5 NPs integrated ointment cream application on wound dressings and skin cancer cells
...Show More Authors

Green synthesis is depending on preparation of nano composited SiO2/V2O5 by using the modified sol-gel method depending on rice husk ash as a source for the extraction of silica gel and the product powder of nano composited SiO2/V2O5 characterization by many techniques such as X-ray diffraction spectroscopy (XRD), field emission scanning electron microscopy (FESEM), and N2 adsorptions/desorption isotherms (BET). This study also includs the biological effectiveness of SiO2/V2O5 and its effect on inhibiting bacterial growth after the prepared nanomaterial was applied to wound dressings, which gave a promising result for its use as

... Show More
View Publication Preview PDF
Scopus (1)
Crossref (1)
Scopus Crossref
Publication Date
Tue Feb 28 2023
Journal Name
Iraqi Journal Of Science
Studying some cytotoxic and cytogenetic potentials of Dandelion methanolic extract on MCF-7 cancer cell line: an in vitro study
...Show More Authors

      This study aimed to evaluate the anticancer activity and cell division arresting by dandelion methanolic extract on breast cancer cell line MCF-7 cancer cell line. For achieving this goal, cytotoxicity assay (MTT assay), multipara system assay: High Content Screening (HCS) which include (viable cell count VCC; membrane permeability MP; cellular mitochondrial permeability CMP; nuclear intensity NI and cytochrome C releasing ), reactive oxygen species detection and cell cycle phases division were tested. The results of this study showed the ability of the plant to reduce cancer cell viability in a dose-dependant manner within IC50 (141.0) in comparison to IC50 of (334.4) on the

... Show More
View Publication Preview PDF
Scopus (4)
Crossref (1)
Scopus Crossref
Publication Date
Sun Mar 17 2019
Journal Name
Baghdad Science Journal
On Generalized Continuous Fuzzy Proper Function from a Fuzzy Topological Space to another Fuzzy Topological Space
...Show More Authors

The purpose of this paper is to introduce and study the concepts of fuzzy generalized open sets, fuzzy generalized closed sets, generalized continuous fuzzy proper functions and prove results about these concepts.

View Publication Preview PDF
Scopus (1)
Scopus Clarivate Crossref