Preferred Language
Articles
/
ohf6UZEBVTCNdQwCJ5Q2
Mobile Application to Locate and Track Person's Whereabouts and Send SOS Messages
...Show More Authors

Scopus Crossref
View Publication
Publication Date
Fri Jul 15 2022
Journal Name
Bmc Health Services Research
Design and evaluation of a new mobile application to improve the management of minor ailments: a pilot study
...Show More Authors
Abstract<sec> <title>Background

Seeking pharmacist advice about minor ailments is a common practice among Iraqi patients because such advice is free and quick. Unfortunately, the assessment and management of minor ailments by Iraqi pharmacists were inappropriate. Therefore, this study aimed to develop a model for a mobile application that can assist community pharmacists in the diagnosis and management of minor ailments.

Methods

The scientific content of the application was based on the information in the symptoms in the pharmacy and British Nati

... Show More
Scopus (3)
Crossref (2)
Scopus Clarivate Crossref
Publication Date
Tue Dec 20 2022
Journal Name
2022 International Conference On Computer And Applications (icca)
Design Mobile Application for Blood Donation System
...Show More Authors

View Publication
Crossref (1)
Scopus Crossref
Publication Date
Sun Mar 01 2020
Journal Name
Baghdad Science Journal
Mobile-based Telemedicine Application using SVD and F-XoR Watermarking for Medical Images
...Show More Authors

A medical- service platform is a mobile application through which patients are provided with doctor’s diagnoses based on information gleaned from medical images. The content of these diagnostic results must not be illegitimately altered during transmission and must be returned to the correct patient. In this paper, we present a solution to these problems using blind, reversible, and fragile watermarking based on authentication of the host image. In our proposed algorithm, the binary version of the Bose_Chaudhuri_Hocquengham (BCH) code for patient medical report (PMR) and binary patient medical image (PMI) after fuzzy exclusive or (F-XoR) are used to produce the patient's unique mark using secret sharing schema (SSS). The patient’s un

... Show More
View Publication Preview PDF
Scopus (1)
Scopus Clarivate Crossref
Publication Date
Sun Aug 13 2017
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
One Algorithm to Cipher Messages in Columnar and Fixed Period-d Transposition Cipher
...Show More Authors

    One of ciphering systems depends on transposition of letters in plain text to generate cipher text. The programming of transposition depends mainly on 2-dimension matrix in either methods but the difference is in columnar .We print columns in the matrix according to their numbers in key but in the fixed, the cipher text will be obtained by printing matrix by rows.

View Publication Preview PDF
Publication Date
Mon Jan 28 2019
Journal Name
Iraqi Journal Of Science
Proposal Hybrid CBC Encryption System to Protect E-mail Messages
...Show More Authors

Email is one of the most commonly utilized communication methods. The confidentiality, the integrity and the authenticity are always substantial in communication of the e-mail, mostly in the business utilize. However, these security goals can be ensured only when the cryptography is utilized. Cryptography is a procedure of changing unique data into a configuration with the end goal that it is just perused by the coveted beneficiary. It is utilized to shield data from other individuals for security purposes. Cryptography algorithms can be classified as symmetric and asymmetric methods. Symmetric methods can be classified as stream cipher and block cipher. There are different operation modes provided by the block cipher, these are Cipher B

... Show More
View Publication Preview PDF
Publication Date
Tue Feb 01 2022
Journal Name
Baghdad Science Journal
Securing Text Messages Using Graph Theory and Steganography
...Show More Authors

      Data security is an important component of data communication and transmission systems. Its main role is to keep sensitive information safe and integrated from the sender to the receiver. The proposed system aims to secure text messages through two security principles encryption and steganography. The system produced a novel method for encryption using graph theory properties; it formed a graph from a password to generate an encryption key as a weight matrix of that graph and invested the Least Significant Bit (LSB) method for hiding the encrypted message in a colored image within a green component. Practical experiments of (perceptibility, capacity, and robustness) were calculated using similarity measures like PSNR, MSE, and

... Show More
View Publication Preview PDF
Scopus (9)
Crossref (4)
Scopus Clarivate Crossref
Publication Date
Thu Dec 19 2024
Journal Name
Journal Of Baghdad College Of Dentistry
Validity of computed tomographic in assessment of genial tubercle and anterior mandible as a reference guide to locate osteotomy in genioglossus advancement
...Show More Authors

Background: Genioglossus advancement is a surgical procedure to advance the tongue in some patients with obstructive sleep apnea syndrome.The important step in this procedure is that of accurately capturing the bone segment attached to the genioglossus muscle to avoid complications such as mandibular fracture, devitalization of the inferior incisor roots, and incomplete incorporation of the genioglossus Materials and Method: Computed tomography scans were taken for 53 Iraqi adult patients (28 male and 25 female) range from (18-35) years with skeletal class I classification and intact anterior mandible dentition included in this study using sagittal and axial sections. The measurements were done for genial tubercle and anterior mandibular re

... Show More
View Publication Preview PDF
Publication Date
Thu Aug 31 2023
Journal Name
Journal Of Legal Sciences
Challenges and Risks Faced Mobile Banking Services and Ways to Confront and Limit Them
...Show More Authors

      This study deals with the challenges and risks faced by mobile banking services and their plagiarism and reduction, the issue of risk management and review, as it acquires financial importance for banks that provide electronic mobile banking services, as included by the Basel Committee, financial accounting via mobile phone, and in line with treason works Traditional commercial banks invest in modern ones, including mobile phones.

View Publication Preview PDF
Publication Date
Thu Mar 29 2018
Journal Name
Iproceedings
Effect of Reminding Parents on Vaccination Dates Using Mobile Short Messages on the Routine Vaccination Coverage of Infants in Al Resafa-Baghdad, 2015-2016
...Show More Authors

View Publication
Publication Date
Tue Dec 22 2020
Journal Name
Journal Of Accounting And Financial Studies ( Jafs )
Cost Management of construction industries according to the fast-track method
...Show More Authors

Construction projects have become a changing dramatically in recent decades and that the goal of the beneficiaries of the implementation of structural project is to complete the work with less time and within the cost of the specific and the best possible quality may sometimes happen that highlights the importance of time on the rest of the items at the implementation of projects for various reasons, including the need to use the project as soon as possible possible change rapidly to customer's requests, but the high cost of the project represents the biggest obstacle for entrepreneurs with its effects on the quality and the time workers, and is a measure of those elements in monetary terms is the key to integration between them, so the

... Show More
View Publication Preview PDF