oalib

Publish in OALib Journal

ISSN: 2333-9721

APC: Only $99

Submit

Any time

2020 ( 65 )

2019 ( 442 )

2018 ( 582 )

2017 ( 588 )

Custom range...

Search Results: 1 - 10 of 157332 matches for " Fatima K. Al-Hamami "
All listed articles are free for downloading (OA Articles)
Page 1 /157332
Display every page Item
Trends of Pediatric Outpatients Prescribing in Umm Al Quwain, United Arab Emirates  [PDF]
Suleiman I. Sharif, Aseel H. Nassar, Fatima K. Al-Hamami, Maha M. Hassanein, Ashkur H. Elmi, Rubian S. Sharif
Pharmacology & Pharmacy (PP) , 2015, DOI: 10.4236/pp.2015.61002
Abstract: Background: Data with regard to local drug prescribing in pediatric population is scarce. This study was carried out to investigate the patterns of drug prescribing for pediatric outpatient in a general hospital in the United Arab Emirates. Methods: A total of 707 prescriptions were collected from a governmental hospital in Umm Al Quwain, United Arab Emirates covering the months of June and July, 2014. Encounters issued for patients older than 12 years were rejected. A total of 520 prescriptions for age groups ranging from 1 week to 12 years were studied. Prescriptions were analyzed using WHO drug use indicators. Results: All prescriptions were electronic and head lettered by the name of the hospital. Average number of drugs per prescriptions was 2.6 and all drugs were generics. Name of patient, age and gender and prescriber’s name and E-signature were present in 100%. Patient’s address, allergy and diagnosis were present in 21.15%, 83.26% and 64.42% of prescriptions respectively. Complete dosage regimen was present in all encounters. Patients were prescribed one, two, three, four or more than four drugs per prescription in 23.84%, 27.88%, 26.53%, 12.69%, and 8.65% respectively. The most commonly prescribed therapeutic classes of drugs were antibiotics (44.60%), antihistamines (43.65%), and analgesics/antipyretics (32.30%). The most commonly prescribed drugs among each class were amoxicillin (40%), xylometazoline (61.23%), and paracetamol (87.5%). Conclusion: Present results indicate that prescribing trends for pediatric population seems to be rational. However, there is over use of antibiotics and there are some areas that warrant further attention by the prescribers for a more significantly rational prescribing.
A Proposed Anti-viruses Strategy for a Complex Environment with a Huge Number of Viruses Attacks
Mohammad Alaa Hussain Al-Hamami
Journal of Emerging Trends in Computing and Information Sciences , 2011,
Abstract: This research presents a proposed anti-viruses strategy, the last intended to be reliable and adaptive tool to deal with complex environment suffer from huge no. of viruses attacks, where these viruses may be known, unknown, predictable or even non predictable. By using association rules for analyzing proposed database which its transactions are the tracked infected files by most reliable and strong anti-viruses, its attributes are the most critical attributes for anti-viruses systems. The extracted rules and some proposed unextracted rules will be analyzed, to build the proposed anti-viruses’ strategy. The anti-viruses strategy requires more advanced models, to deal with the complex environment; Multi-Agent System (MAS) is suggested to provide powerful tool for modeling complex systems to detect various viruses. Depending on the decomposition of system into several interacting and autonomous entities called agents, it is possible to build such a strategy.
Developing a Block-Cipher-Key Generator Using Philosophy of Data Fusion Technique
Soukaena H. Hashem,Mohammad A. AL-Hamami,Alaa H. AL-Hamami
Journal of Emerging Trends in Computing and Information Sciences , 2011,
Abstract: Good cryptographic systems should always be designed so that they are as difficult to break as possible. This research will concentrate on increasing the complexity of block cipher encryption. This complexity could be done by building a dynamic pool that consists of thousands of fused random bits; these bits come from previously used key and many other resources. Two fusion methods are proposed to generate the block cipher keys. The first method is by using Artificial Neural Network (ANN) and the second one by using genetic Algorithm (GA). For these two methods we introduce an example for Data Encryption Standard (DES) algorithm. Hamming distance function is used as threshold for testing the reliability of the keys in the proposed methods. This research also proposed a method for generating the sub-keys for the Blowfish algorithm.
A proposed Modified Data Encryption Standard algorithm by Using Fusing Data Techniqu
Alaa H. AL-Hamami,Mohammad A. AL-Hamami,Soukaena H. Hashem
World of Computer Science and Information Technology Journal , 2011,
Abstract: Data Encryption Standard (DES) is a block cipher that encrypts data in 64-bit blocks. A 64-bit block of plaintext goes in one end of the algorithm and a 64-bit block of cipher text comes out of the other end. Blowfish is a block cipher that encrypts data in 8-byte blocks .Blowfish consists of two parts: a key-expansion part and a data-encryption part. Key expansion converts a variable-length key of at most 56 bytes (448 bits) into several subkey arrays totaling 4168 bytes. Blowfish has 16 rounds, such as DES. In this research the fusion philosophy will be used to fuse DES’s with blowfish and Genetic Algorithms by taking the strong points in all of these techniques to create a proposed Fused DES-Blowfish algorithm. The proposed algorithm is presented as a modified DES depending on the advantage in key generation complexity in blowfish and advantage of optimization in Genetic Algorithm to give the optimal solution. The solution will be the depended tool for creation of the strong keys.
Applying Data Mining Techniques in Intrusion Detection System on Web and Analysis of Web Usage
Alaa H. Al-Hamami,Mohammad Ala`a Al-Hamami,Soukaena Hassan Hasheem
Information Technology Journal , 2006,
Abstract: This research concentrates on a particular aspect, which is to detect the intrusion on the web by applying Data Mining Technique especially by association analysis algorithm on the web log files. This algorithm depends on the facts that define the intrusion. As known the association algorithm first extracted the large itemsets that represent the super facts to build the association analysis for the intrusion. After building the intrusion detection scheme, all the transaction presented in the intrusion was deleted. Analysis the web log data file was again analyzed for the web usage, to study the visitor tracking without tracking the intruder visitors. According to this study the server configurations and all the services were improved.
A Proposal for Comprehensive Solution to the Problems of Passport`s Authentication
Alaa H. Al-Hamami,Saad A. Al-Anni
Information Technology Journal , 2005,
Abstract: This research introduces a comprehensive solution for the passport authentication problem. It proposed to use an invisible watermark to be hidden in the passport`s photo which is contain a digest value to be checked for the authentication. The construction of this watermark uses the idea of making a physical connection between the passenger characteristics (name) and passport`s number and photo.The proposed system makes it easy to authenticate the passport in the originator country which issues the passport. The problem is how to authenticate the passport by another country (not the originator). Diffie-Hellman exchange key has been used by the proposed system to exchange a secret key for making the authentication process correct and simple. Each country will use its own secret key for developing its invisible watermark. The watermark retrieving process by any country will depend on its secret key and the exchanged of a secret key.
Optimal Cell Towers Distribution by using Spatial Mining and Geographic Information System
Alaa H. AL-Hamami,Soukaena H. Hashe
World of Computer Science and Information Technology Journal , 2011,
Abstract: The appearance of wireless communication is dramatically changing our life. Mobile telecommunications emerged as a technological marvel allowing for access to personal and other services, devices, computation and communication, in any place and at any time through effortless plug and play. Setting up wireless mobile networks often requires: Frequency Assignment, Communication Protocol selection, Routing schemes selection, and cells towers distributions.This research aims to optimize the cells towers distribution by using spatial mining with Geographic Information System (GIS) as a tool. The distribution optimization could be done by applying the Digital Elevation Model (DEM) on the image of the area which must be covered with two levels of hierarchy. The research will apply the spatial association rules technique on the second level to select the best square in the cell for placing the antenna. From that the proposal will try to minimize the number of installed towers, makes tower’s location feasible, and provides full area coverage.
Optimal Cell Towers Distribution by using Spatial Mining and Geographic Information System
Alaa H. AL-Hamami,Soukaena H. Hashem
Computer Science , 2011,
Abstract: The appearance of wireless communication is dramatically changing our life. Mobile telecommunications emerged as a technological marvel allowing for access to personal and other services, devices, computation and communication, in any place and at any time through effortless plug and play. Setting up wireless mobile networks often requires: Frequency Assignment, Communication Protocol selection, Routing schemes selection, and cells towers distributions. This research aims to optimize the cells towers distribution by using spatial mining with Geographic Information System (GIS) as a tool. The distribution optimization could be done by applying the Digital Elevation Model (DEM) on the image of the area which must be covered with two levels of hierarchy. The research will apply the spatial association rules technique on the second level to select the best square in the cell for placing the antenna. From that the proposal will try to minimize the number of installed towers, makes tower's location feasible, and provides full area coverage.
Using Short Message Service (SMS) to Support Business Continuit
Maher Abdel-qade,Ahmad AL-Jaber,.Alaa AL-Hamami
World of Computer Science and Information Technology Journal , 2011,
Abstract: Now a day’s many organizations are required to communicate online on a daily basis, 24-hour, seven-days-a-week, to gain the desired competitive advantages and profits; although there are a variety of disruptions that may occur within business application such as broken (off-line) database-links and unhanded database exceptions. Such cases will end the automated business work, and force business users to continue business procedures and functionalities via paper work, which causes additional resources with less business competitive advantages. In this paper, we will propose a new model in which we embed short message services (SMS) within business applications using the SMS Gateway such as "Ozeki Message Server", and programmed application packages. By using our proposed model, we can maintain business continuity when a partial disruption occurs and then switch to our application model. As a result to the experimental work, we conclude that our model supports business continuity since it supports the account balance modification while the database link is disrupted. In addition, we carried out each step twice and the scenario was reliable since all of its steps were reliable.
A Fast Approach for Breaking RSA Cryptosystem
Alaa H Al-Hamami,Bilal S O Al-Kubaysee
World of Computer Science and Information Technology Journal , 2011,
Abstract: Prime numbers play a very important role in the complexity and security of the public key cryptosystem. RSA is one type of public key algorithm and its security depends on the complexity of factoring (n) value. Any encryption algorithm depends on the length of the key and the computational effort required breaking the key.This paper introduces an efficient algorithm to attack the RSA Scheme. Obtaining the private key of the RSA scheme is the target of the suggested algorithm by factoring the modulus based on the public key (e, n) of the RSA scheme. The suggested algorithm is very fast due to its treatments for the factorizing problem. It will limited the search for the p & q values especially when the value of n is small, since most of public key encryption schemes select a small encryption n in order to improve the efficiency and reliability of encryption. The suggested algorithm is more efficient than most existed algorithms of attack since it is break the search process and takes less running time.
Page 1 /157332
Display every page Item


Home
Copyright © 2008-2017 Open Access Library. All rights reserved.