There is a significant necessity to compress the medical images for the purposes of communication and storage.Most currently available compression techniques produce an extremely high compression ratio with a high-quality loss. Inmedical applications, the diagnostically significant regions (interest region) should have a high image quality. Therefore, it ispreferable to compress the interest regions by utilizing the Lossless compression techniques, whilst the diagnostically lessersignificant regions (non-interest region) can be compressed by utilizing the Lossy compression techniques. In this paper, a hybridtechnique of Set Partition in Hierarchical Tree (SPIHT) and Bat inspired algorithms have been utilized for Lossless compressionthe interest region, and the non-interest region is loosely compressed with the Discrete Cosine Transform (DCT) technique.The experimental results present that the proposed hybrid technique enhances the compression performance and ratio. Also,the utilization of DCT increases compression performance with low computational complexity.
{"title":"MEDICAL IMAGES COMPRESSION BASED ON SPIHT AND BAT INSPIRED ALGORITHMS","authors":"S. Jasim","doi":"10.25195/IJCI.V45I1.43","DOIUrl":"https://doi.org/10.25195/IJCI.V45I1.43","url":null,"abstract":"There is a significant necessity to compress the medical images for the purposes of communication and storage.Most currently available compression techniques produce an extremely high compression ratio with a high-quality loss. Inmedical applications, the diagnostically significant regions (interest region) should have a high image quality. Therefore, it ispreferable to compress the interest regions by utilizing the Lossless compression techniques, whilst the diagnostically lessersignificant regions (non-interest region) can be compressed by utilizing the Lossy compression techniques. In this paper, a hybridtechnique of Set Partition in Hierarchical Tree (SPIHT) and Bat inspired algorithms have been utilized for Lossless compressionthe interest region, and the non-interest region is loosely compressed with the Discrete Cosine Transform (DCT) technique.The experimental results present that the proposed hybrid technique enhances the compression performance and ratio. Also,the utilization of DCT increases compression performance with low computational complexity.","PeriodicalId":53384,"journal":{"name":"Iraqi Journal for Computers and Informatics","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2019-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"69282116","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Generally, the electronic technology has been implemented to automate the traditional systems. So, differentcopy of management systems in different scope were presented. These systems include the services provided to company as wellas people, such as, healthcare. The traditional data management systems for pharmacy as example, suffer fromthe capacity, time consuming, medicines accessibility, managing the medicines store as well as the need of qualifiedstaff according to the requirements of employer expectations. In this paper, a hospital e-pharmacy system is proposed in order to facilitate the job, outdo the mentioned problems. A data management system to the Iraqi hospital's pharmacy is proposed which is divided into two main parts: database, and Graphical User Interface (GUI) frames. The database built using SQL Server contains the pharmacy information relatedto the medicines, patient information….etc. the GUI frames ease the use of the proposed system by unskilled users. Theproposal system is responsible on monitoring and controlling the work of pharmacy in hospital in terms of management ofmedicine issuing ordering and hospital reports.
{"title":"HOSPITAL PHARMACY MANAGEMENT SYSTEM","authors":"S. Khudhur","doi":"10.25195/ijci.v44i2.56","DOIUrl":"https://doi.org/10.25195/ijci.v44i2.56","url":null,"abstract":"Generally, the electronic technology has been implemented to automate the traditional systems. So, differentcopy of management systems in different scope were presented. These systems include the services provided to company as wellas people, such as, healthcare. The traditional data management systems for pharmacy as example, suffer fromthe capacity, time consuming, medicines accessibility, managing the medicines store as well as the need of qualifiedstaff according to the requirements of employer expectations. In this paper, a hospital e-pharmacy system is proposed in order to facilitate the job, outdo the mentioned problems. A data management system to the Iraqi hospital's pharmacy is proposed which is divided into two main parts: database, and Graphical User Interface (GUI) frames. The database built using SQL Server contains the pharmacy information relatedto the medicines, patient information….etc. the GUI frames ease the use of the proposed system by unskilled users. Theproposal system is responsible on monitoring and controlling the work of pharmacy in hospital in terms of management ofmedicine issuing ordering and hospital reports.","PeriodicalId":53384,"journal":{"name":"Iraqi Journal for Computers and Informatics","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2018-12-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"42631595","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
All the important information is exchanged between facilities using the internet and networks, all these data should besecret and secured probably, the personal information of person in each of these institutions day by day need to organized secretlyand the need of the cryptography systems is raised which can easily encrypt the personal and critical data and it can be shared withother centers via internet without and concerns about privacy. Chaotic performance is added to different phases of AES but very few apply it on key generation and choosing ChebyshevPolynomial will provide a chaotic map which will led to random strong key. our system based on modified advanced encryptionstandard (AES) , with encryption and decryption in real time taking to consideration the criticality of data images that beenencrypted the main encryption algorithm is the same the modification is done by replacing the key generation algorithm byChebyshev Polynomial to generate key with the required key size.
{"title":"AES WITH CHAOTIC USING CHEBYSHEV POLYNOMIAL","authors":"T. jabor, Hiba Taresh, A. Raheema","doi":"10.25195/ijci.v44i2.55","DOIUrl":"https://doi.org/10.25195/ijci.v44i2.55","url":null,"abstract":"All the important information is exchanged between facilities using the internet and networks, all these data should besecret and secured probably, the personal information of person in each of these institutions day by day need to organized secretlyand the need of the cryptography systems is raised which can easily encrypt the personal and critical data and it can be shared withother centers via internet without and concerns about privacy. Chaotic performance is added to different phases of AES but very few apply it on key generation and choosing ChebyshevPolynomial will provide a chaotic map which will led to random strong key. our system based on modified advanced encryptionstandard (AES) , with encryption and decryption in real time taking to consideration the criticality of data images that beenencrypted the main encryption algorithm is the same the modification is done by replacing the key generation algorithm byChebyshev Polynomial to generate key with the required key size.","PeriodicalId":53384,"journal":{"name":"Iraqi Journal for Computers and Informatics","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2018-12-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"49050512","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Reem Razzaq Abdul Hussein, Salih M. Al-Qaraawi, M. Croock
In e-government, the mining techniques are considered as a procedure for extracting data from the related webapplication to be converted into useful knowledge. In addition, there are different methods of mining that can be applied to differentgovernment data. The significant ideas behind this paper are to produce a comprehensive study amongst the previous research workin improving the speed of queries to access the database and obtaining specific predictions. The provided study compares datamining methods, database management, and types of data. Moreover, a proposed model is introduced to put these different methodstogether for improving the online applications. These applications produce the ability to retrieve the information, matching keywords,indexing database, and performing the prediction from a vast amount of data.
{"title":"ROLE OF DATA MINING IN E-GOVERNMENT FRAMEWORK","authors":"Reem Razzaq Abdul Hussein, Salih M. Al-Qaraawi, M. Croock","doi":"10.25195/IJCI.V44I2.50","DOIUrl":"https://doi.org/10.25195/IJCI.V44I2.50","url":null,"abstract":"In e-government, the mining techniques are considered as a procedure for extracting data from the related webapplication to be converted into useful knowledge. In addition, there are different methods of mining that can be applied to differentgovernment data. The significant ideas behind this paper are to produce a comprehensive study amongst the previous research workin improving the speed of queries to access the database and obtaining specific predictions. The provided study compares datamining methods, database management, and types of data. Moreover, a proposed model is introduced to put these different methodstogether for improving the online applications. These applications produce the ability to retrieve the information, matching keywords,indexing database, and performing the prediction from a vast amount of data.","PeriodicalId":53384,"journal":{"name":"Iraqi Journal for Computers and Informatics","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2018-12-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"45534942","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Reem Razzaq Abdul Hussein, Salih Mahdi Al-Qaraawi, Muayad Sadik Croock
{"title":"ROLE OF DATA MINING IN E-GOVERNMENT FRAMEWORK","authors":"Reem Razzaq Abdul Hussein, Salih Mahdi Al-Qaraawi, Muayad Sadik Croock","doi":"10.25195/2017/4421","DOIUrl":"https://doi.org/10.25195/2017/4421","url":null,"abstract":"","PeriodicalId":53384,"journal":{"name":"Iraqi Journal for Computers and Informatics","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2018-12-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"44177869","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
The increasing in the number of vehicles on streets has led to traffic congestion. In order to reduce the waiting timein cases of emergency, the idea of this work is suggested. This work is divided into two parts, the particular part and softwarepart. The first circular particular part is a model which consists of four lanes junction of a traffic light, it also has GSM system (Global System for Mobile Communications). The GSM and lamps of the traffic light are connected to Arduino UNO. TheArduino controls every signal which is coming from the inputs (GSM) to software and display to the outputs (lamps) Thesecond circular particular part is a model which consist same components the first circuit except replace the GSM withIR(infrared Remote).The goal from this work is to help us in the emergence cases, the opening and closing of the traffic light arecontrolled by using GSM system and IR, the time of each lane, is controlled that means reduce the crowding.
{"title":"DESIGN AND IMPLEMENTATION SMART TRAFFIC LIGHT USING GSM AND IR","authors":"Thaar A. Kareem, M. Jabbar","doi":"10.25195/ijci.v44i2.52","DOIUrl":"https://doi.org/10.25195/ijci.v44i2.52","url":null,"abstract":"The increasing in the number of vehicles on streets has led to traffic congestion. In order to reduce the waiting timein cases of emergency, the idea of this work is suggested. This work is divided into two parts, the particular part and softwarepart. The first circular particular part is a model which consists of four lanes junction of a traffic light, it also has GSM system (Global System for Mobile Communications). The GSM and lamps of the traffic light are connected to Arduino UNO. TheArduino controls every signal which is coming from the inputs (GSM) to software and display to the outputs (lamps) Thesecond circular particular part is a model which consist same components the first circuit except replace the GSM withIR(infrared Remote).The goal from this work is to help us in the emergence cases, the opening and closing of the traffic light arecontrolled by using GSM system and IR, the time of each lane, is controlled that means reduce the crowding.","PeriodicalId":53384,"journal":{"name":"Iraqi Journal for Computers and Informatics","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2018-12-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"42823295","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Alaa Khalaf Hamoud, Ali Salah Hashim, Wid Akeel Awadh
{"title":"CLINICAL DATA WAREHOUSE A REVIEW","authors":"Alaa Khalaf Hamoud, Ali Salah Hashim, Wid Akeel Awadh","doi":"10.25195/2017/4424","DOIUrl":"https://doi.org/10.25195/2017/4424","url":null,"abstract":"","PeriodicalId":53384,"journal":{"name":"Iraqi Journal for Computers and Informatics","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2018-12-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"41856358","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Clinical decisions are crucial because they are related to human lives. Thus, managers and decision makers inthe clinical environment seek new solutions that can support their decisions. A clinical data warehouse (CDW) is animportant solution that is used to achieve clinical stakeholders’ goals by merging heterogeneous data sources in a centralrepository and using this repository to find answers related to the strategic clinical domain, thereby supporting clinicaldecisions. CDW implementation faces numerous obstacles, starting with the data sources and ending with the tools thatview the clinical information. This paper presents a systematic overview of purpose of CDWs as well as the characteristics;requirements; data sources; extract, transform and load (ETL) process; security and privacy concerns; design approach;architecture; and challenges and difficulties related to implementing a successful CDW. PubMed and Google Scholarare used to find papers related to CDW. Among the total of 784 papers, only 42 are included in the literature review. Thesepapers are classified based on five perspectives, namely methodology, data, system, ETL tool and purpose, to findinsights related to aspects of CDW. This review can contribute answers to questions related to CDW and providerecommendations for implementing a successful CDW.
{"title":"CLINICAL DATA WAREHOUSE: A REVIEW","authors":"Alaa Khalaf Hamoud, A. S. Hashim, Wid Akeel Awadh","doi":"10.25195/IJCI.V44I2.53","DOIUrl":"https://doi.org/10.25195/IJCI.V44I2.53","url":null,"abstract":"Clinical decisions are crucial because they are related to human lives. Thus, managers and decision makers inthe clinical environment seek new solutions that can support their decisions. A clinical data warehouse (CDW) is animportant solution that is used to achieve clinical stakeholders’ goals by merging heterogeneous data sources in a centralrepository and using this repository to find answers related to the strategic clinical domain, thereby supporting clinicaldecisions. CDW implementation faces numerous obstacles, starting with the data sources and ending with the tools thatview the clinical information. This paper presents a systematic overview of purpose of CDWs as well as the characteristics;requirements; data sources; extract, transform and load (ETL) process; security and privacy concerns; design approach;architecture; and challenges and difficulties related to implementing a successful CDW. PubMed and Google Scholarare used to find papers related to CDW. Among the total of 784 papers, only 42 are included in the literature review. Thesepapers are classified based on five perspectives, namely methodology, data, system, ETL tool and purpose, to findinsights related to aspects of CDW. This review can contribute answers to questions related to CDW and providerecommendations for implementing a successful CDW.","PeriodicalId":53384,"journal":{"name":"Iraqi Journal for Computers and Informatics","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2018-12-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"45974204","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Salsa (20) cipher is speedier than AES cipher and its offered superior security. Salsa (8) and Salsa (12) are specified for apps wherever the grade of security is less necessary than speed. The concept of this research is to suggest super salsa keystream utilizing various volumes matrices size (array (4, 4), array (4, 8), array (4, 16)) are used to increase the complexity of key stream and make it more reluctant to linear and differential attacks. Furthermore, in each iteration, the diffusion of generated keystream will increase due the effect of changing the volume acting for one element of the array is not fixed. The generated keys of the suggested Super SALSA keystream are depicted as simple operations and a high hardiness randomly keystream by exceeding the five benchmark tests. Likewise, it's presenting a situation of equilibrium between complexity and speed for Salsa (8, 12 and 20).
{"title":"A SUGGESTED SUPER SALSA STREAM CIPHER","authors":"Mohammed Salih Mahdi, Nidaa Flaih Hassan","doi":"10.25195/2017/4422","DOIUrl":"https://doi.org/10.25195/2017/4422","url":null,"abstract":"Salsa (20) cipher is speedier than AES cipher and its offered superior security. Salsa (8) and Salsa (12) are specified for apps wherever the grade of security is less necessary than speed. The concept of this research is to suggest super salsa keystream utilizing various volumes matrices size (array (4, 4), array (4, 8), array (4, 16)) are used to increase the complexity of key stream and make it more reluctant to linear and differential attacks. Furthermore, in each iteration, the diffusion of generated keystream will increase due the effect of changing the volume acting for one element of the array is not fixed. The generated keys of the suggested Super SALSA keystream are depicted as simple operations and a high hardiness randomly keystream by exceeding the five benchmark tests. Likewise, it's presenting a situation of equilibrium between complexity and speed for Salsa (8, 12 and 20).","PeriodicalId":53384,"journal":{"name":"Iraqi Journal for Computers and Informatics","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2018-12-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"42324051","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}