Preferred Language
Articles
/
xBciP48BVTCNdQwC0GVa
Blood donors appointment booking and managing system using PC and mobile web browsers in current pandemic (COVID-19)
...Show More Authors

<span>Blood donation is the main source of blood resources in the blood banks which is required in the hospitals for everyday operations and blood compensation for the patients. In special cases, the patients require fresh blood for compensation such as in the case of major operations and similar situations. Moreover, plasma transfusions are vital in the current pandemic of coronavirus disease (COVID-19). In this paper, we have proposed a donation system that manages the appointments between the donors and the patient in the case of fresh blood donation is required. The website is designed using the Bootstrap technology to provide suitable access using the PC or the smart phones web browser. The website contains large database including information about the donors and their blood group, available time, and other personal information to facilitate the donation process. This system is designed with unlimited abilities to be used by any hospital, blood bank, or individuals to manage the donation process with no constrains.</span>

Scopus Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Sun Oct 29 2023
Journal Name
Iraqi National Journal Of Nursing Specialties
Assessment the Relation between Breast Cancer and Blood Group
...Show More Authors

Objectives: To assess the relation between breast cancer & blood groups, identify the importance of women
age group and the relation of age with breast cancer.
Methodology: The study was performed on (115) women who were diagnosed with breast cancer in different
stages of disease and different ages. Blood samples were taken from them to demonstrate their blood groups and
(20) fresh tumor tissue samples were obtained; the tumor tissue used as a source of lectin for hemagglutinate
with erythrocyte of different blood groups. The study conducted at Baghdad Teaching Hospital and Radiation &
Nuclear Medicine Hospital from January, 2007 through June 2007.
Results: The study shows that the highest percentage of women

... Show More
View Publication Preview PDF
Publication Date
Tue Feb 27 2024
Journal Name
Tem Journal
Supervised Classification Accuracy Assessment Using Remote Sensing and Geographic Information System
...Show More Authors

Assessing the accuracy of classification algorithms is paramount as it provides insights into reliability and effectiveness in solving real-world problems. Accuracy examination is essential in any remote sensing-based classification practice, given that classification maps consistently include misclassified pixels and classification misconceptions. In this study, two imaginary satellites for Duhok province, Iraq, were captured at regular intervals, and the photos were analyzed using spatial analysis tools to provide supervised classifications. Some processes were conducted to enhance the categorization, like smoothing. The classification results indicate that Duhok province is divided into four classes: vegetation cover, buildings,

... Show More
View Publication Preview PDF
Scopus (8)
Crossref (6)
Scopus Clarivate Crossref
Publication Date
Mon Dec 14 2020
Journal Name
2020 13th International Conference On Developments In Esystems Engineering (dese)
Anomaly Based Intrusion Detection System Using Hierarchical Classification and Clustering Techniques
...Show More Authors

With the rapid development of computers and network technologies, the security of information in the internet becomes compromise and many threats may affect the integrity of such information. Many researches are focused theirs works on providing solution to this threat. Machine learning and data mining are widely used in anomaly-detection schemes to decide whether or not a malicious activity is taking place on a network. In this paper a hierarchical classification for anomaly based intrusion detection system is proposed. Two levels of features selection and classification are used. In the first level, the global feature vector for detection the basic attacks (DoS, U2R, R2L and Probe) is selected. In the second level, four local feature vect

... Show More
View Publication
Scopus (3)
Crossref (2)
Scopus Clarivate Crossref
Publication Date
Mon Apr 04 2022
Journal Name
Journal Of Educational And Psychological Researches
The Degree of Implementation of the Coronavirus Prevention Standards (Covid-19) In the Kingdom Of Saudi Arabia (A COMPARATIVE STUDY BETWEEN FAMILIES OF PEOPLE WITH INTELLECTUAL DISABILITIES AND FAMILIES OF ORDINARY PEOPLE)
...Show More Authors

The study aims to identify the degree of implementation of the coronavirus prevention standards (covid-19) in the kingdom of Saudi Arabia and compare it with the families of intellectual disabilities. The study population consisted of all families residing in the Kingdom of Saudi Arabia. To achieve the objectives of the research, the analytical descriptive approach was employed. The study sample consisted of (372) families, among them (84) families with intellectual disabilities, and (288) families without intellectual disabilities. They were chosen from the Saudi community according to what is available for collection in a simple random way, using the standard criteria for the prevention of coronavirus (Covid- 19) Prepared by the resear

... Show More
View Publication Preview PDF
Publication Date
Sun Jun 01 2014
Journal Name
Baghdad Science Journal
The effect of Glycated Haemogloin A1c and Fasting Blood Glucose in Type1 Diabetes
...Show More Authors

The glycated haemoglobin A1c(HbA1c) and Fasting blood glucose(FBG) effect on type1 diabetic pateints as a screening tests and as a gold standard for assessing glycemic control in subjects with diabetes were studied . Ninety one blood samples were collected in a peroid between June and the end of November 2012 at AL- Kindy Diabetic Center and Central Child Hospital,48 Females and 43 Males , aging between (11 month- 18 year), are divided into three groups, newly diagnosed , ongoing and healthy control group, with duration of disease between(1 day-3months) and (from birth-8 years) for newly diag

... Show More
View Publication Preview PDF
Crossref
Publication Date
Thu Jul 01 2021
Journal Name
مجلة کلية التربية بالعريش
تحليل مستويات نوبات الهلع من جائحة کورونا COVID-19 باستخدام نظرية الاستجابة المفردة :دراسة تشخصية فارقة على عينات من المجتمع العربي
...Show More Authors

View Publication
Crossref
Publication Date
Fri Nov 30 2018
Journal Name
Iop Conference Series: Materials Science And Engineering
Strengthening Aspects to Improve Serviceability of Open Web Expanded Steel-Concrete Composite Beams in Combined Bending and Torsion
...Show More Authors

View Publication
Publication Date
Mon Nov 01 2021
Journal Name
Journal Of Engineering
Stability Improvement of The Iraqi Super Grid (400kV) using High Voltage Direct Current (HVDC) Transmission
...Show More Authors

This research analyzes the level of the short circuit effect of the Iraqi super network and decides the suitable location for the High Voltage Direct Current (HVDC) connections in order to obtain the best short circuit reduction of the total currents of the buses in the network. The proposed method depends on choosing the transmission lines for Alternating current (AC) system that suffers from high Short Circuit Levels (SCLs) in order to reduce its impact on the transmission system and on the lines adjacent to it and this after replacing the alternating current (AC) line by direct current (DC) line. In this paper, Power System Simulator for Engineering (PSS/E) is used to model two types of HVDC lines in an effective regi

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Sat Dec 30 2017
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
New Proposed Method For Web Services Security
...Show More Authors

TI1e Web service securi ty challenge is to understand  and  assess the risk  involved  in securing  a web-based  service  today, based on our existing security technology, and at the same time tmck emerging standards and  understand  how they will be used  to offset the risk in

new web services. Any  security model must  i llustrate  how data  can

now  through   an  application   and   network   topology  to  meet  the

requirements  defined  by the busi ness  wi thout exposing  the data  to undue  risk.  In this paper  we propose &n

... Show More
View Publication Preview PDF
Publication Date
Sat Dec 02 2017
Journal Name
Al-khwarizmi Engineering Journal
Fuzzy control of mobile robot in slippery environment
...Show More Authors

 

The problem of independent motion control of mobile robot (МR) in conditions when unforeseen changes of conditions of interaction of wheels with a surface are considered. An example of such changes can be sudden entrance МR a slippery surface. The deployment of an autonomous unmanned ground vehicle for field applications provides the means by which the risk to personnel can be minimized and operational capabilities improved. In rough terrain, it is critical for mobile robots to maintain good wheel traction. Wheel slip could cause the rover to lose control and become trapped. This paper describes the application of fuzzy control to a feedback system within slippery environment. The study is conducted on an example of М

... Show More
View Publication Preview PDF