Preferred Language
Articles
/
vBdUPo4BVTCNdQwCGD47
Secure QR-Code Generation in Healthcare
...Show More Authors

Scopus Crossref
View Publication
Publication Date
Fri Jun 30 2023
Journal Name
Ingénierie Des Systèmes D Information
Performance Evaluation of a Multi Organizations Secure Internet of Vehicles Based on Hyperledger Fabric Blockchain Platform
...Show More Authors

View Publication
Scopus (2)
Scopus Crossref
Publication Date
Fri May 07 2021
Journal Name
Pharmacy Practice
Measuring depression and anxiety prevalence among Iraqi healthcare college students using hospital anxiety and depression scale
...Show More Authors

Objective: The study aimed to 1) measure the prevalence of depression and anxiety among Iraqi pharmacy and medical students at a number of universities in Baghdad using Hospital Anxiety and Depression Scale (HADS) and 2) investigate the association between various sociodemographic factors and students’ HADS scores. Methods: This study was based on a cross-sectional descriptive design in four universities in Baghdad, Iraq. Depression and anxiety were screened using an Arabic version of the HADS. An online survey was administered via Qualtrics to convenience samples of students at four colleges of pharmacy and a college of medicine between March and June 2018. Multiple linear regression was used to identify factors associated

... Show More
View Publication
Scopus (17)
Crossref (9)
Scopus Clarivate Crossref
Publication Date
Fri Jan 01 2021
Journal Name
International Journal Of Agriculture And Statistical Science
COMPARISON OF FORECASTING OF THE RISK OF CORONAVIRUS (COVID-19) IN HIGH-QUALITY AND LOW-QUALITY HEALTHCARE SYSTEMS, USING ANN MODELS
...Show More Authors

COVID-19 is a disease that has abnormal over 170 nations worldwide. The number of infected people (either sick or dead) has been growing at a worrying ratio in virtually all the affected countries. Forecasting procedures can be instructed so helping in scheming well plans and in captivating creative conclusions. These procedures measure the conditions of the previous thus allowing well forecasts around the state to arise in the future. These predictions strength helps to make contradiction of likely pressures and significances. Forecasting procedures production a very main character in elastic precise predictions. In this case study used two models in order to diagnose optimal approach by compared the outputs. This study was introduce

... Show More
Preview PDF
Scopus (3)
Scopus
Publication Date
Fri May 01 2015
Journal Name
Journal Of Engineering
Brackish Water Desalination Coupled With Wastewater Treatment and Electricity Generation
...Show More Authors

A new bio-electrochemical system was proposed for simultaneous removal of organic matters and salinity from actual domestic wastewater and synthetically prepared saline water, respectively. The performance of a three-chambered microbial osmotic fuel cell (MOFC) provided with forward osmosis (FO) membrane and cation exchange membrane (CEM) was evaluated with respect to the chemical oxygen demand (COD) removal from wastewater, electricity generation, and desalination of saline water. The MOFC wasinoculated with activated sludge and fueled with actual domestic wastewater. Results revealed that maximum removal efficiency of COD from wastewater, TDS removal efficiency from saline water, power density, and current density were

... Show More
View Publication Preview PDF
Publication Date
Wed Jun 01 2016
Journal Name
Journal Of Engineering
Entropy Generation of Shell and Double Concentric Tubes Heat Exchanger
...Show More Authors

Entropy generation was studied for new type of heat exchanger (shell and double concentric tubes heat exchanger). Parameters of hot oil flow rate, temperature of inlet hot oil and pressure drop were investigated with the concept of entropy generation. The results showed that the value of entropy generation increased with increasing the flow rate of hot oil and when cold water flow rate was doubled from 20 to 40 l/min, these values were larger. On the other hand, entropy generation increased with increasing the hot oil inlet temperature at a certain flow rate of hot oil. Furthermore, at a certain hot oil inlet temperature, the entropy generation increased with the pressure drop at different hot oil inlet flow rates. Final

... Show More
View Publication Preview PDF
Publication Date
Mon Oct 02 2023
Journal Name
Journal Of Engineering
Power Generation from Utilizing Thermal Energy of Hazardous Waste Incinerators
...Show More Authors

A large amount of thermal energy is generated from burning hazardous chemical wastes, and the temperature of the flue gases in hazardous waste incinerators reaches up to (1200 °C). The flue gases are cooled to (40°C) and are treated before emission. This thermal energy can be utilized to produce electrical power by designing a system suitable for dangerous flue gases in the future depending on the results of much research about using a proto-type small steam power plant that uses safe fuel to study and develop the electricity generation process with water tube boiler which is manufactured experimentally with theoretical development for some of its parts which are inefficient in experimental work. The studied system gen

... Show More
View Publication Preview PDF
Crossref (2)
Crossref
Publication Date
Tue Feb 01 2022
Journal Name
Baghdad Science Journal
Retina Based Glowworm Swarm Optimization for Random Cryptographic Key Generation
...Show More Authors

The biometric-based keys generation represents the utilization of the extracted features from the human anatomical (physiological) traits like a fingerprint, retina, etc. or behavioral traits like a signature. The retina biometric has inherent robustness, therefore, it is capable of generating random keys with a higher security level compared to the other biometric traits. In this paper, an effective system to generate secure, robust and unique random keys based on retina features has been proposed for cryptographic applications. The retina features are extracted by using the algorithm of glowworm swarm optimization (GSO) that provides promising results through the experiments using the standard retina databases. Additionally, in order t

... Show More
View Publication Preview PDF
Scopus (11)
Crossref (3)
Scopus Clarivate Crossref
Publication Date
Fri Jul 21 2023
Journal Name
Journal Of Engineering
GENERATION AND TOOTH CONTACT ANALYSIS (TCA) OF HYPOID GEAR DRIVE
...Show More Authors

The present work covers the Face-Hobbing method for generation and simulation of meshing of Face hobbed hypoid gear drive. In this work the generation process of hobbed hypoid gear has been achieved by determination of the generation function of blade cutter. The teeth surfaces have been drawn depending on the simulation of the cutting process and the head cutter motion. Tooth contact analysis (TCA) of such gear drive is presented to evaluate analytically the transmission error function for concave and convex tooth side due to misalignment errors. TCA results show that the gear is very sensitive to misalignment errors and
the increasing of the gear teeth number decrease the transmission error for both concave and convex tooth sides a

... Show More
View Publication Preview PDF
Crossref (2)
Crossref
Publication Date
Wed Oct 01 2008
Journal Name
2008 First International Conference On Distributed Framework And Applications
A strategy for Grid based t-way test data generation
...Show More Authors

View Publication
Scopus (22)
Crossref (16)
Scopus Crossref
Publication Date
Sat Mar 01 2014
Journal Name
International Journal Of Computer Science Engineering And Technology
Streaming video content over NGA (next generation access) network technology‏
...Show More Authors

An approach for hiding information has been proposed for securing information using Slanlet transform and the T-codes. Same as the wavelet transform the Slantlet transform is better in compression signal and good time localization signal compression than the conventional transforms like (DCT) discrete cosine transforms. The proposed method provides efficient security, because the original secret image is encrypted before embedding in order to build a robust system that is no attacker can defeat it. Some of the well known fidelity measures like (PSNR and AR) were used to measure the quality of the Steganography image and the image after extracted. The results show that the stego-image is closed related to the cover image, with (PSNR) Peak Si

... Show More