Preferred Language
Articles
/
joe-1786
A An Authentication and Access Control Model for Healthcare based Cloud Services
...Show More Authors

Electronic Health Record (EHR) systems are used as an efficient and effective method of exchanging patients’ health information with doctors and other key stakeholders in the health sector to obtain improved patient treatment decisions and diagnoses. As a result, questions regarding the security of sensitive user data are highlighted. To encourage people to move their sensitive health records to cloud networks, a secure authentication and access control mechanism that protects users’ data should be established. Furthermore, authentication and access control schemes are essential in the protection of health data, as numerous responsibilities exist to ensure security and privacy in a network. So, the main goal of our suggested solution is to maintain a secure authentication and access control mechanism for health cloud data. Thus, in this work, Security Secret Key Provider (SSKP) phase is proposed for the E-healthcare-based cloud that consists of two parts. The first is an authentication scheme that is Security Secret Key (SSK) and the second is a modular access control mechanism. We explain the methodology of the proposed approach through appropriate evaluation results, which improves system security and performance by minimizing the time spent to get authentication and access the data. Simulation results indicate that our approach is significantly more effective than existing research.

 

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Thu Apr 18 2019
Journal Name
Al-kindy College Medical Journal
Immunohistochemical Targeting of p110β Isoform of phosphatidylinositol 3-kinase co-associated with Cyclin-Dependent Kinase 1 in a Group of Tissues from Iraqi Patients with Breast Cancer
...Show More Authors

Background: While two-thirds of breast cancers express hormone receptors for either estrogen (ER) and/or progesterone (PR) , genetically altered PI3K pathway was found in more than 70% of ER-positive breast cancers.An aberrant activity of cyclin-dependent kinase 1 (CDK1) in a wide variety of human cancers has selectively constituted an attractive pharmacological targets in MYC-dependent human breast cancer cells.

Aim of the study:  Role of p110-beta as well as and CDK 1  in the pathogenesis of subset of breast cancers and contribution in their carcinogenesis.

Type of the study: is a retrospective study

Methods: This retr

... Show More
View Publication Preview PDF
Crossref
Publication Date
Fri Jan 01 2021
Journal Name
Journal Of Engineering
Measurable Mistakes in Architecture the Effect of Designer's Experience on the Propagation of Mistakes in Architectural Design - Residential Buildings in Al Sulaymaniyah City as a Case Study
...Show More Authors

The importance of physical and nonphysical architectural design values made architectural designers need good experience to be experts of architectural values reasonably without neglecting any value in the design process.  The importance of such values made that ignoring any values and mistakes occurs in the design process. Simultaneously, architectural designers' different nature and the difference in their experiences are causing different understandings of the design values, thus causing architectural mistakes. The research problem appears from the randomly propagating of mistakes in contemporary architecture, which is about to become a phenomenon in Al Sulaymaniyah city. The research aims to find the main reason

... Show More
View Publication Preview PDF
Crossref (2)
Crossref
Publication Date
Sun Dec 15 2019
Journal Name
Al-academy
Artistic Integration of Aesthetic Manifestations in the Andalusian Islamic Style into the Interior Architecture (Mansour Laalaj's Door / Meknes a Case Study): شهريار عبد القادر محمود -سعد جرجيس
...Show More Authors

The Islamic architectural heritage constitutes a civilized fortune that has to be preserved and protected and work should be done to maintain its development to be more convenient for the circumstances of the age and the civilization transformations. Due to the fact that architecture represents the civilization pot and cultural identity, its originality has to be preserved and work has to be done to prevent the strange architectural invasion that changes its character and make it lose the identity and the character and detached from its roots and environment.    

Decoration, in the interior design, as a concept is connected to ornamentation process of interior spaces, which is a process of adding certain items

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun Feb 28 2021
Journal Name
Journal Of Economics And Administrative Sciences
The effect of increasing the volume of debt on the volume of trading (applied research on a sample of private banks listed on the Iraq Stock Exchange)
...Show More Authors

 

This research worked on identifying the effect of increasing the volume of indebtedness by companies listed on the Iraq Stock Exchange on the trading volume of those companies, and this research included some theoretical concepts related to both debt financing and trading volume, and it represents the research community of the joint-stock companies listed in The Iraq Stock Exchange (the banking sector). As for the research sample, it was deliberately chosen represented by companies with continuous trading without stopping, which reached 10 joint-stock companies, and the period of research was extended during the period 2011-2015, and a set of indicators and financial methods were used In measuring research v

... Show More
View Publication Preview PDF
Crossref
Publication Date
Wed May 05 2021
Journal Name
Journal Of Petroleum Research And Studies
The Role of Chemistry of the Oil-Field Water in the Distribution of Reservoir Pressures: A Case Study of Mishrif Reservoir in the Southern Oil-Fields, Iraq
...Show More Authors

Mishrif Formation is the main reservoir in oil-fields (North Rumaila, South Rumaila, Majnoon, Zubair and West Qurna) which located at Basrah southern Iraq. The Inductively coupled plasma-Mass spectrometer (ICP-MS) was used for the water chemistry analysis and Scanning Electron Microprobe (SEM) for the purpose of mineralogy diagnosis. A weak acidic water of salinity six-time greater than seawater plays a role in generating the formation pressure and controlling the fluid flow. The potentiometric subsurface maps were modeled and the direction of super-pressure sites that are of a great importance in the oil exploration were marked to pay attention during future drilling.

View Publication
Crossref
Publication Date
Fri Apr 12 2019
Journal Name
Journal Of Economics And Administrative Sciences
The role of determining the economic quantity of the demand in reducing the total costs of inventory A case study in the Institute of Technical Management / Baghdad
...Show More Authors

ABSTRACT

The research aims to identify the role of scientific planning of inventory by determining the quantity of economic demand and the number of times of purchase and associated annual total costs to achieve a sufficient and appropriate level of inventory . The research was based on the case study methodology. Materials of increasing demand in the Institute of Technical Management and knowledge of the degree of conformity of the procurement plan with the standard indicators adopted in a scientific method ,its include economic order quantity and number of purchasing times .
one of The main results  of the research was  the existence of a large difference between the quantity of the economic purchase of ea

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Sun Jun 30 2024
Journal Name
International Journal Of Intelligent Engineering And Systems
Eco-friendly and Secure Data Center to Detection Compromised Devices Utilizing Swarm Approach
...Show More Authors

Modern civilization increasingly relies on sustainable and eco-friendly data centers as the core hubs of intelligent computing. However, these data centers, while vital, also face heightened vulnerability to hacking due to their role as the convergence points of numerous network connection nodes. Recognizing and addressing this vulnerability, particularly within the confines of green data centers, is a pressing concern. This paper proposes a novel approach to mitigate this threat by leveraging swarm intelligence techniques to detect prospective and hidden compromised devices within the data center environment. The core objective is to ensure sustainable intelligent computing through a colony strategy. The research primarily focusses on the

... Show More
View Publication
Scopus (4)
Scopus Crossref
Publication Date
Sun Jun 05 2011
Journal Name
Baghdad Science Journal
Applying Quran Security and Hamming CodesFor Preventing of Text Modification
...Show More Authors

The widespread of internet allover the world, in addition to the increasing of the huge number of users that they exchanged important information over it highlights the need for a new methods to protect these important information from intruders' corruption or modification. This paper suggests a new method that ensures that the texts of a given document cannot be modified by the intruders. This method mainly consists of mixture of three steps. The first step which barrows some concepts of "Quran" security system to detect some type of change(s) occur in a given text. Where a key of each paragraph in the text is extracted from a group of letters in that paragraph which occur as multiply of a given prime number. This step cannot detect the ch

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sat Oct 01 2022
Journal Name
Al–bahith Al–a'alami
Media and democracy between propaganda and incitement
...Show More Authors

First: The entrance to media and democracy
The growth of the media and the development of its technologies are linked to the development of the democratic system and its political and mass institutions. In many cases, the technologies concerned were able to open the closed doors to the spread of democracy and broaden the base of its applications. As Dupre points out, “audio-visual has opened the image and sound after printing has opened the natural language” (1) to democratization. The generalization of the book, due to the development of printing, led to the transcendence of the Church's dominance in Europe, and the direct broadcasting and transmission of information enabled the media to transcend the domination of factional syst

... Show More
View Publication Preview PDF
Crossref
Publication Date
Fri Jun 01 2007
Journal Name
Journal Of The College Of Languages (jcl)
Language and Difference: Heidegger, Saussure, and Derrida
...Show More Authors

Although the concept of difference is as old as the foundational concept of similarity, the modern (and contemporary) understanding of difference as a working notion that not only differentiates, but also approximates conflicting elements in an all encompassing system owes a great deal to the German philosopher Georg Wilhelm Friedrich Hegel (1770-1831). An idealist to the backbone, Hegel bequeathed to modern philosophy the postulation that the identity of an individual rests not in itself but in the relationship that individual‟s identity entertains with other members of society. In his classic Phenomenology of Spirit, Hegel explains how humans come to consciousness (pivotal concept in Idealism) through a strenuous, albeit apparently i

... Show More
View Publication Preview PDF