Preferred Language
Articles
/
joe-1786
A An Authentication and Access Control Model for Healthcare based Cloud Services
...Show More Authors

Electronic Health Record (EHR) systems are used as an efficient and effective method of exchanging patients’ health information with doctors and other key stakeholders in the health sector to obtain improved patient treatment decisions and diagnoses. As a result, questions regarding the security of sensitive user data are highlighted. To encourage people to move their sensitive health records to cloud networks, a secure authentication and access control mechanism that protects users’ data should be established. Furthermore, authentication and access control schemes are essential in the protection of health data, as numerous responsibilities exist to ensure security and privacy in a network. So, the main goal of our suggested solution is to maintain a secure authentication and access control mechanism for health cloud data. Thus, in this work, Security Secret Key Provider (SSKP) phase is proposed for the E-healthcare-based cloud that consists of two parts. The first is an authentication scheme that is Security Secret Key (SSK) and the second is a modular access control mechanism. We explain the methodology of the proposed approach through appropriate evaluation results, which improves system security and performance by minimizing the time spent to get authentication and access the data. Simulation results indicate that our approach is significantly more effective than existing research.

 

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Fri Sep 01 2017
Journal Name
Journal Of Baghdad College Of Dentistry
Assessing the Radiopacity of Three Resin Composite Materials Using a Digital Radiography Technique
...Show More Authors

Background: Radiopacity is one of the prerequisites for dental materials, especially for composite restorations. It's essential for easy detection of secondary dental caries as well as observation of the radiographic interface between the materials and tooth structure. The aim of this study to assess the difference in radiopacity of different resin composites using a digital x-ray system. Materials and methods: Ten specimens (6mm diameter and 1mm thickness) of three types of composite resins (Evetric, Estelite Sigma Quick,and G-aenial) were fabricated using Teflon mold. The radiopacity was assessed using dental radiography equipment in combination with a phosphor plate digital system and a grey scale value aluminum step wedge with thickness

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun Dec 30 2012
Journal Name
Al-kindy College Medical Journal
A typical clinical presentation of molluscum contagiosum in Iraqi patients;clinical descriptive study
...Show More Authors

Background Molluscum contagiosum is skin disease caused by the molluscum contagiosum virus (MCV) usually causing one or more small dome shaped umbilicated papules with symptoms that maybe self-resolve. MCV was once a disease primarily of children, but it has evolved to become a sexually transmitted disease in adults. It is believed to be a member of the pox virus family. In addition to the classic presentation of the disease; it can also come in different clinical forms that simulate large number of dermatolological disease.
Objective: To study different clinical forms of Molluscum contagiosum presentation in different age groups of Iraqi patients.
Method:This clinical descriptive study was performed in the outpatient department of

... Show More
View Publication Preview PDF
Publication Date
Mon Feb 01 2010
Journal Name
Oral Surgery, Oral Medicine, Oral Pathology, Oral Radiology, And Endodontology
Oral Candida flora in a group of Jordanian patients with β-thalassemia major
...Show More Authors

Objective Thalassemic patients present with multiple immune abnormalities that may predispose them to oral Candida, however this has not been investigated. The aim of this study was to assess oral candidal colonization in a group of patients with β-thalassemia major both qualitatively and quantitatively. Study design The oral mycologic flora of 50 β-thalassemia major patients and 50 age- and sex-matched control subjects was assessed using the concentrated oral rinse technique. Candida species were identified using the germ tube test and the Vitek yeast identification system. Results Oral Candida was isolated from 37 patients (74%) and 28 healthy subjects (56%; P = .04). The mean candidal count was significantly higher in thalassemic patie

... Show More
View Publication
Scopus (10)
Crossref (8)
Scopus Clarivate Crossref
Publication Date
Sat Aug 01 2015
Journal Name
Journal Of Engineering
Development of a Blueprint Impact System of the risks on construction projects Implementation
...Show More Authors

In Production and Operations Management the specialists  have  tried to develop a strategy to counter the risks arising from the activities of the organization and of waste of various types and therefore the risk management in the contemporary framework represents a phenomenon of new quality, and can not be this phenomenon to take practical dimensions, but the development of culture of the organization towards the risks and deal with all aspects and paint ways to address them within an integrated program, and requires new skills and systems provide accurate information capable of coordination between the various parties within the organization.

     The research aims to develop a blu

... Show More
View Publication Preview PDF
Publication Date
Mon Sep 23 2019
Journal Name
Al-kindy College Medical Journal
Primary Hydatid Cyst of Parotid Gland: A Rare Case Diagnosed by Computed Tomography
...Show More Authors

Hydatid disease is a zoonotic infection caused by Echinococcus species. The cystic form of this infection mostly involves liver and lung. Hydatid disease of the parotid gland even in endemic regions is a very rare entity that may be easily overlooked in daily practice. Herein, I present a case report of a 60-year-old Iraqi female patient who presented with a progressively painless mass in her right parotid. It was diagnosed radiologically as a hydatid cyst and was excised successfully. Histopathologic examination of the resected specimen confirmed the hydatid cyst. This case emphasizes the importance of considering hydatidosis in the differential diagnosis of any parotid mass, especially in endemic countries.

 

&nbsp

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Thu Sep 01 2022
Journal Name
Translational Research In Anatomy
Unusual large central sphenoethmoidal cell separating the two sphenoid sinuses - A case report
...Show More Authors

View Publication
Scopus (5)
Crossref (2)
Scopus Crossref
Publication Date
Wed May 03 2023
Journal Name
Annals Of Medicine & Surgery
Immunohistochemical expression of beta-catenin in ampullary adenocarcinoma: a cross-sectional retrospective study
...Show More Authors
Introduction:

Ampullary carcinomas are uncommon malignant tumours of the digestive system, they usually are adenocarcinomas presenting histologically as three types: intestinal, pancreaticobiliary and mixed. β-catenin is a multifunctional protein involved in physiological homoeostasis and intracellular adhesion. Abnormal nuclear accumulation of β-catenin has been described in many malignancies such as colon, breast, liver and others. The relationships between the immunohistochemical expression of β-catenin and the subtype, the grade and the stage of ampullary carcinoma are studied.

Material and m
... Show More
View Publication Preview PDF
Clarivate Crossref
Publication Date
Tue Sep 29 2020
Journal Name
International Journal Of Innovation, Creativity And Change
A Pragma-Linguistic Study of Deontic Modals in the Language of International Contracts.
...Show More Authors

Deontic modality expresses what is necessary or possible according to the norms of morality and laws of community. It is a cover term for those cases where modal auxiliaries used to express notions like ''obligation'', ''prohibition'' and, ''permission''. Deontic modals are basically performatives, having the ''so-be-it'' component of directives in that the speaker directs the behavior of the addressee to get things done. The present study identifies the use of deontic models in international contracts to prove that there are major pragmatic strategies employed in writing them. To achieve the aim of the study, a modified model of Danet’s (1980) and Trosborg’s (1995) in accordance to Searle (1969) is used to analyze 16 texts selected fro

... Show More
Publication Date
Sun Jun 30 2019
Journal Name
Journal Of The College Of Education For Women
Qualities of Life Partner from the Perspective of a Sample of University Students
...Show More Authors

The study aims at identifying the morphological and psycho-socio-economic qualities wished to be in a life partner among a sample of Palestinian youth. The total sample was (231) and consisted of  (83) male and (148) female students. Each student presented a detailed report on the qualities he/she wished to be in life partner. The study used the descriptive approach and content analysis method. The validity and stability of the analysis were calculated. The results showed eight qualities in both groups: physical, psychological, emotional, social, intellectual, familial, economic and academic. Female students were found to have more variations than male students in terms of the qualities preferable in the life partner. Male students

... Show More
View Publication Preview PDF
Publication Date
Wed Feb 06 2013
Journal Name
Eng. & Tech. Journal
A proposal to detect computer worms (malicious codes) using data mining classification algorithms
...Show More Authors

Malicious software (malware) performs a malicious function that compromising a computer system’s security. Many methods have been developed to improve the security of the computer system resources, among them the use of firewall, encryption, and Intrusion Detection System (IDS). IDS can detect newly unrecognized attack attempt and raising an early alarm to inform the system about this suspicious intrusion attempt. This paper proposed a hybrid IDS for detection intrusion, especially malware, with considering network packet and host features. The hybrid IDS designed using Data Mining (DM) classification methods that for its ability to detect new, previously unseen intrusions accurately and automatically. It uses both anomaly and misuse dete

... Show More