- Glena Aziz Qadir
- [email protected]
- 0750 468 5352
-
E-healthcare is a digital version of a patient’s medical history, which
includes information about their medical conditions, treatments, and
medications. E-healthcare is typically used by healthcare providers to improve
the quality of patient care. E-healthcare systems are essential tools that contain
sensitive patient information and are subject to strict privacy and security
regulations. Since the rise of the cloud computing many healthcare providers
are now storing their E-healthcare data on cloud-based systems. Transferring
E-healthcare data to the cloud computing can introduce a variety of security
challenges that must be carefully considered and managed. One of the main
security concerns when moving E-healthcare data to the cloud computing is the
risk of unauthorized access to patient information. The access control is a
critical component of E-healthcare systems, and ensuring secure and
appropriate access to patient data is essential for protecting security. Also,
privacy is maintained for the integrity of the healthcare system by encrypting
data when storing it in the cloud. The access control allows only authorized
users to access E-health data. In healthcare, timely access to patient data is
critical for effective care delivery. Time delays in accessing data can lead to
serious consequences for patient care that including delayed diagnosis and
inappropriate treatment. For this reason, the time delay of user access is
decreased using the proposed algorithms.
In this thesis, the Generate Access Key (GAK) algorithm is proposed
based on Message Authentication Code (MAC) and Hashing technique to
produce a Security Secret Key (SSK). The GAK would work by providing
users with a unique SSK that would be used to allow them to access data in the
E-healthcare based cloud system with the minimum of delay. Users are also
given flexible access rights based on their role and rights according to User
Access Rights (UAR) algorithm. In order to protect the privacy of users, the
X
data is encrypted using the Database Encryption (DBE) algorithm before being
stored in the database and to read by the users the data in the system must be
decrypted based on the Database Decryption (DBD) algorithm. The simulation
results of our algorithms show that the delay for authenticating two hundred
users is 440 milliseconds, and the data response time is 150 milliseconds for
200 participants requesting data simultaneously. The computational cost was
compared with other related works and found that in our algorithm, 0.035
milliseconds were needed for all the registration, login, and authentication
stages. - Erbil Technical Engineering College
- Information System Engineering
- Security
Helen Hazim Abdul Qadir, a student of the Media Techniques Department at the Erbil Technical Administrative College has successfully completed her program after being admitted to a program affiliated with the US Embassy in Baghdad.
This program was conducted for 26 days in the United States, in which 85 students from Iraq participated, including 25 students from the Kurdistan Region, one of those was a student of our university.
During the program, students attended several different programs organized by American universities, which consisted of (leadership, breadth of construction by youth), and at the end of the program, certificates were awarded to the participants.
A Seminar held in Mergasur Technical Institute
Under the quality assurance and staff professional development unit, Today on Tuesday, August 8, 2023, in the presence of Dr. Talib Mohammed Sharif Omer, the Dean of Mergasor Technical Institute/ Erbil Polytechnic University, a seminar was presented by Assist. Prof. Dr Hiwa Abdulaziz Balisani entities”Leadership skills Development” for a number of universities lectures, heads of departments and staff of the Institute.
At the beginning of the seminar, the Dean of Mergasor Institute, welcomed the participants, and thanked Dr Hiwa Abdulaziz Balisani for the time he has given us as he has come far a long way to serve the academic staff.
Then Dr Balisani delivered his fruitful seminar, and then highlighted on the the five levels leadership.
At the end of the seminar, the Dean of the college provided an appreciation letter to Dr Balisani for his wonderful presentation.
-
Dlawar Hassan Hamdamin -
[email protected] - 0750 464 6377
- استراتيجية التدريب و دورها في تطوير الكفاءات القيادية - دلاور حسن حمدامين
-
Abstract
Purpose: This study aims to analyze the relation and impact of the training strategy represented by its dimensions (training process steps, the diversity of training programs, the support and commitment of the senior management to the training strategy, the use of modern technology) with the dimensions of developing leadership competencies represented by (knowledge, skills, behavior).
Methodology: The problem of the study, which raised several questions about the nature of the correlation and influence between the independent variable (training strategy) and the dependent variable (development of leadership competencies). The hypotheses were subjected to multiple tests, and the study used a questionnaire as a means of obtaining data.
Method: The study followed the analytical descriptive analyses, as main and sub-variables were described, as well as to analyze the relationships and influence between the variables.it describe the population of the study that are (218) scientific head departments of (5) governor universities in Erbil, the study sample represented (140) head departments, those participate and responded questioner reached (136) heads of departments. and statistical tests by computer program (SPSS V.26).
Finding: The results of the statistical analysis indicate that the heads of scientific departments in the public universities in the Erbil governorate are well interested in the training strategy, plans and various long-term programs for the development of competencies and personal skills. The results also show that there is a strong direct relationship between the two variables and the development of leadership competencies that is directly affected by any change that Led in the independent variable training strategy in the universities surveyed
Recommendations: This study recommended assigning and encouraging mature experience age groups and young people, to exchange experiences and knowledge among themselves in order to develop leadership competencies. And reconsider assigning females to administrative tasks, due to the strong demand by females to assume administrative positions on the one hand, and the appropriateness of these jobs in the educational sector to the characteristics of females in terms of their ability to deal with and solve problems and their patience, perseverance, and seriousness in work.
Keywords: training strategy, competency development, public universities in Erbil Governorate
-
Shaqlawa Technical College -
Business Administration -
Business Administration