Preferred Language
Articles
/
pRf6UZEBVTCNdQwCopTV
IoT E-health System for Cardiac Telemonitoring
...Show More Authors

Scopus Crossref
View Publication
Publication Date
Mon Apr 03 2023
Journal Name
Journal Of Educational And Psychological Researches
Challenges Faced by Families of Children with Intellectual Disabilities and Its Effect on the Psychological Health in the Asir
...Show More Authors

Abstract

This research aims to identify the challenges faced by families of children with intellectual disabilities and to identify the impact of the challenges facing them on the mental health of their children with intellectual disabilities. Based on the following questions: What is the nature of the challenges faced by families of children with disabilities and how do these challenges affect the mental health of their children with intellectual disabilities? The study was conducted on a sample of four families of six children with intellectual disabilities, depending on the degree and type of disability. To achieve the study's objectives, the qualitative approach was used, Because of the importance of accessin

... Show More
View Publication Preview PDF
Publication Date
Fri Jul 24 2020
Journal Name
Indian Journal Of Forensic Medicine & Toxicology
The Incidence of Hepatitis C Virus Infections among People Screened in Governmental Health Care Facilities in 2018 in Iraq
...Show More Authors

View Publication
Crossref
Publication Date
Sun Dec 15 2019
Journal Name
Journal Of Baghdad College Of Dentistry
Oral health in relation to nutritional status among 10 years old primary school children in Al-Hillah city/ Iraq
...Show More Authors

Background: Oral health and nutrition are in interdependent relationship that good nutritional health enhancing good oral health. Nutrition can affect the development and integrity of oral cavity and the progression of oral disease. The aim of the present study was to assess the prevalence of the gingival health condition in relation to the nutritional status, among 10 years old primary school children in urban and rural area in Al-Hillah city. Material and method: Eight hundred ninety one (891) students, aged10 years old, selected randomly from different primary schools, in urban and rural area in Al-Hillah city, were included in this study. Oral examination including of plaque index assessment, which was done according to the criteria

... Show More
View Publication Preview PDF
Scopus (3)
Crossref (1)
Scopus Crossref
Publication Date
Fri May 07 2021
Journal Name
Journal Of Evaluation In Clinical Practice
Exploring the acceptance of <scp>COVID</scp>‐19 vaccine among healthcare workers and general population using health belief model
...Show More Authors
Abstract<sec><title>Rationale, aims and objectives

Little is known about hesitancy to receive the COVID‐19 vaccines. The objectives of this study were (1) to assess the perceptions of healthcare workers (HCWs) and the general population regarding the COVID‐19 vaccines, (2) to evaluate factors influencing the acceptance of vaccination using the health belief model (HBM), and (3) to qualitatively explore the suggested intervention strategies to promote the vaccination.

Methods

This was a cross‐sectional study based on electronic survey data that was collected in Iraq during December first‐19th, 2020. The electronic surve

... Show More
View Publication
Scopus (123)
Crossref (130)
Scopus Clarivate Crossref
Publication Date
Sun Nov 01 2020
Journal Name
Iop Conference Series
Modified PRESENT Encryption algorithm based on new 5D Chaotic system
...Show More Authors

Cryptography is a major concern in communication systems. IoE technology is a new trend of smart systems based on various constrained devices. Lightweight cryptographic algorithms are mainly solved the most security concern of constrained devices and IoE systems. On the other hand, most lightweight algorithms are suffering from the trade-off between complexity and performance. Moreover, the strength of the cryptosystems, including the speed of the algorithm and the complexity of the system against the cryptanalysis. A chaotic system is based on nonlinear dynamic equations that are sensitive to initial conditions and produce high randomness which is a good choice for cryptosystems. In this work, we proposed a new five-dimensional of a chaoti

... Show More
Scopus (9)
Crossref (4)
Scopus Crossref
Publication Date
Tue Sep 01 2015
Journal Name
Journal Of Engineering
Dynamic Analysis of Fluid – Structure Interaction of Axial Fan System
...Show More Authors

Fluid-structure interaction method is performed to predict the dynamic characteristics of axial fan system. A fluid-structure interface physical environment method (monolithic method) is used to couple the fluid flow solver with the structural solver. The integration of the three-dimensional Navier-Stokes equations is performed in the time Doman, simultaneously to the integration of the three dimensional structural model. The aerodynamic loads are transfer from the flow to structure and the coupling step is repeated within each time step, until the flow solution and the structural solution have converged to yield a coupled solution of the aeroelastic set of equations. Finite element method is applied to solve numerically

... Show More
View Publication Preview PDF
Publication Date
Wed Feb 01 2017
Journal Name
International Journal Of Science And Research (ijsr)
Supra-Approximation Spaces Using Mixed Degree System in Graph Theory
...Show More Authors

This paper is concerned with introducing and studying the o-space by using out degree system (resp. i-space by using in degree system) which are the core concept in this paper. In addition, the m-lower approximations, the m-upper approximations and ospace and i-space. Furthermore, we introduce near supraopen (near supraclosed) d. g.'s. Finally, the supra-lower approximation, supraupper approximation, supra-accuracy are defined and some of its properties are investigated.

Publication Date
Mon Dec 20 2021
Journal Name
Baghdad Science Journal
Performance Analysis of Propagation in VHF Military Tactical Communication System
...Show More Authors

The main challenge of military tactical communication systems is the accessibility of relevant information on the particular operating environment required for the determination of the waveform's ideal use. The existing propagation model focuses mainly on broadcasting and commercial wireless communication with a highs transceiver antenna that is not suitable for numerous military tactical communication systems. This paper presents a study of the path loss model related to radio propagation profile within the suburban in Kuala Lumpur. The experimental path loss modeling for VHF propagation was collected from various suburban settings for the 30-88 MHz frequency range. This experiment was highly affected by ecological factors and existing

... Show More
View Publication Preview PDF
Scopus (4)
Scopus Clarivate Crossref
Publication Date
Wed Feb 29 2012
Journal Name
Al-khwarizmi Engineering Journal
A New Audio Steganography System Based on Auto-Key Generator
...Show More Authors

Stenography is the art of hiding the very presence of communication by embedding secret message into innocuous looking cover document, such as digital image, videos, sound files, and other computer files that contain perceptually irrelevant or redundant information as covers or carriers to hide secret messages.

In this paper, a new Least Significant Bit (LSB) nonsequential embedding technique in wave audio files is introduced. To support the immunity of proposed hiding system, and in order to recover some weak aspect inherent with the pure implementation of stego-systems, some auxiliary processes were suggested and investigated including the use of hidden text jumping process and stream ciphering algorithm. Besides, the suggested

... Show More
View Publication Preview PDF
Publication Date
Sat Dec 01 2012
Journal Name
Journal Of Engineering
Development an Anomaly Network Intrusion Detection System Using Neural Network
...Show More Authors

Most intrusion detection systems are signature based that work similar to anti-virus but they are unable to detect the zero-day attacks. The importance of the anomaly based IDS has raised because of its ability to deal with the unknown attacks. However smart attacks are appeared to compromise the detection ability of the anomaly based IDS. By considering these weak points the proposed
system is developed to overcome them. The proposed system is a development to the well-known payload anomaly detector (PAYL). By
combining two stages with the PAYL detector, it gives good detection ability and acceptable ratio of false positive. The proposed system improve the models recognition ability in the PAYL detector, for a filtered unencrypt

... Show More
View Publication Preview PDF
Crossref