Preferred Language
Articles
/
joe-1786
A An Authentication and Access Control Model for Healthcare based Cloud Services
...Show More Authors

Electronic Health Record (EHR) systems are used as an efficient and effective method of exchanging patients’ health information with doctors and other key stakeholders in the health sector to obtain improved patient treatment decisions and diagnoses. As a result, questions regarding the security of sensitive user data are highlighted. To encourage people to move their sensitive health records to cloud networks, a secure authentication and access control mechanism that protects users’ data should be established. Furthermore, authentication and access control schemes are essential in the protection of health data, as numerous responsibilities exist to ensure security and privacy in a network. So, the main goal of our suggested solution is to maintain a secure authentication and access control mechanism for health cloud data. Thus, in this work, Security Secret Key Provider (SSKP) phase is proposed for the E-healthcare-based cloud that consists of two parts. The first is an authentication scheme that is Security Secret Key (SSK) and the second is a modular access control mechanism. We explain the methodology of the proposed approach through appropriate evaluation results, which improves system security and performance by minimizing the time spent to get authentication and access the data. Simulation results indicate that our approach is significantly more effective than existing research.

 

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Wed Jul 01 2015
Journal Name
The Sai 2015
An optimal defuzzification method for interval type-2 fuzzy logic control scheme
...Show More Authors

Scopus (10)
Crossref (6)
Scopus Crossref
Publication Date
Tue Sep 10 2019
Journal Name
Periodicals Of Engineering And Natural Sciences (pen)
A classification model on tumor cancer disease based mutual information and firefly algorithm
...Show More Authors

View Publication
Scopus (15)
Crossref (6)
Scopus Crossref
Publication Date
Wed Aug 28 2024
Journal Name
Mesopotamian Journal Of Cybersecurity
A Novel Anomaly Intrusion Detection Method based on RNA Encoding and ResNet50 Model
...Show More Authors

Cybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a

... Show More
View Publication
Scopus (5)
Scopus Crossref
Publication Date
Wed Aug 28 2024
Journal Name
Mesopotamian Journal Of Cybersecurity
A Novel Anomaly Intrusion Detection Method based on RNA Encoding and ResNet50 Model
...Show More Authors

Cybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a

... Show More
View Publication
Scopus (5)
Scopus Crossref
Publication Date
Mon Feb 18 2019
Journal Name
Journal Of Accounting And Financial Studies ( Jafs )
The Role of Insurance Awareness in marketing Insurance Services: An Explorative Research views of a Sample of Employees in the National Company for Insurance
...Show More Authors

This research aims at shedding light on the concept of insurance awareness and clarifying its role on marketing insurance services of a sample of (100) employees in the National Company for Insurance. Questionnaire is used as a main instrument for collecting data and information from the sample. Their answers were analyzed by using arithmetic means, standard deviation, centesimal weight, and the correlation coefficient ( , F, t) tests .The research reached several conclusions of which:1.The sample member's response to insurance awareness and marketing insurance services factors was in the medium level.2.There was a positive relationship of a moral sign between insurance awareness and marketing insurance services, that correlation coeffic

... Show More
View Publication Preview PDF
Crossref
Publication Date
Mon Dec 03 2018
Journal Name
Journal Of Engineering
Variable Structure Control Design for a Magnetic Levitation System
...Show More Authors

In this paper the variable structure control theory is utilized to derive a discontinuous controller to the magnetic levitation system. The magnetic levitation system model is considered uncertain, which subjected to the uncertainty in system parameters, also it is open-loop unstable and strongly nonlinear. The proposed variable structure control to magnetic levitation system is proved, and the area of attraction is determined. Additionally, the chattering, which induced due to the discontinuity in control law, is attenuated by using a non-smooth approximate. With this approximation the resulted controller is a continuous variable structure controller with a determined steady state error according to the selected control

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Fri May 07 2021
Journal Name
Journal Of Evaluation In Clinical Practice
Exploring the acceptance of <scp>COVID</scp>‐19 vaccine among healthcare workers and general population using health belief model
...Show More Authors
Abstract<sec><title>Rationale, aims and objectives

Little is known about hesitancy to receive the COVID‐19 vaccines. The objectives of this study were (1) to assess the perceptions of healthcare workers (HCWs) and the general population regarding the COVID‐19 vaccines, (2) to evaluate factors influencing the acceptance of vaccination using the health belief model (HBM), and (3) to qualitatively explore the suggested intervention strategies to promote the vaccination.

Methods

This was a cross‐sectional study based on electronic survey data that was collected in Iraq during December first‐19th, 2020. The electronic surve

... Show More
View Publication
Scopus (123)
Crossref (130)
Scopus Clarivate Crossref
Publication Date
Tue Sep 01 2020
Journal Name
Al-khwarizmi Engineering Journal
UAV Control Based on Dual LQR and Fuzzy-PID Controller
...Show More Authors

This paper presents the design of a longitudinal controller for an autonomous unmanned aerial vehicle (UAV). This paper proposed the dual loop (inner-outer loop) control based on the intelligent algorithm. The inner feedback loop controller is a Linear Quadratic Regulator (LQR) to provide robust (adaptive) stability. In contrast, the outer loop controller is based on Fuzzy-PID (Proportional, Integral, and Derivative) algorithm to provide reference signal tracking. The proposed dual controller is to control the position (altitude) and velocity (airspeed) of an aircraft. An adaptive Unscented Kalman Filter (AUKF) is employed to track the reference signal and is decreased the Gaussian noise. The mathematical model of aircraft

... Show More
View Publication Preview PDF
Crossref (2)
Crossref
Publication Date
Wed Jul 06 2022
Journal Name
Journal Of Asian Multicultural Research For Social Sciences Study
Remote Data Auditing in a Cloud Computing Environment
...Show More Authors

In the current paradigms of information technology, cloud computing is the most essential kind of computer service. It satisfies the need for high-volume customers, flexible computing capabilities for a range of applications like as database archiving and business analytics, and the requirement for extra computer resources to provide a financial value for cloud providers. The purpose of this investigation is to assess the viability of doing data audits remotely inside a cloud computing setting. There includes discussion of the theory behind cloud computing and distributed storage systems, as well as the method of remote data auditing. In this research, it is mentioned to safeguard the data that is outsourced and stored in cloud serv

... Show More
View Publication
Crossref
Publication Date
Mon Nov 30 2020
Journal Name
Journal Of Economics And Administrative Sciences
Evaluating Quality of Control Policies and Procedures for Banking Transactions Using the Non-application Gap Model to Enhance Financial Reporting Requirements Applied Study in an Iraqi Private Bank
...Show More Authors

The research aims to enhance the level of evaluation of the performance of banking transactions control policies and procedures. The research is based on the following hypothesis: efficient transactions control policies and procedures contribute enhancing financial reporting, by assessing non-application gap of those policies and procedures in a manner that helps to prevent, discover, and correct material misstatementsThe researchers designed an examination list that includes the control policies and procedures related to the transactions, as a guide to the bank audit program prepared by the Federal Financial Supervision Bureau. The research methodology is

... Show More
View Publication Preview PDF
Crossref (2)
Crossref