Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
Skip to main content
Nada Ahmed

    Nada Ahmed

    With the rapid developments in information technologies and the success of Internet, computing resources have become cheaper, more powerful, and more available than before. This technological development has enabled the realization of... more
    With the rapid developments in information technologies and the success of Internet, computing resources have become cheaper, more powerful, and more available than before. This technological development has enabled the realization of long held dream called “computing as utility”, in which resources are provided as a general utility that can be leased and released by users through the Internet in an ondemand fashion. It emerged in to the market with a huge potential to fulfill this dream and many attractive promises that are inviting to many con summers around the world. As such, it offers many advantage, in terms of reduced cost, relief from managing complex IT infrastructure, flexibility, and scalability. However, cloud computing is a risky paradigm. For instance, the use of cloud services, which are external assets to their consumers, implies unprecedented risks that must be taken in account. |This paper highlights and categorizes risk factors associated with security involved in...
    United Arab Emirates is demonstrating a model to the world in its response to the crisis and dealing with a pandemic that has provoked unprecedented health care delivery changes. Here, the authors describe how services were remodeled to... more
    United Arab Emirates is demonstrating a model to the world in its response to the crisis and dealing with a pandemic that has provoked unprecedented health care delivery changes. Here, the authors describe how services were remodeled to safely manage patients with mental disorders in the largest admitting psychiatric facility in the capital city Abu Dhabi, the Behavioral Science Pavilion in Sheikh Khalifa Medical City. The article illustrates the changes in admission rates, outpatient clinic and emergency room visits, paving the way for a pliable mental health service that copes with unpredictable circumstances.
    As a part of quality assurance program, film reject analysis was conducted in the three most occupied hospitals in Khartoum, Sudan. Initially, 959 films were evaluated for a period of 12 days in eight x-ray rooms. The film repeat causes... more
    As a part of quality assurance program, film reject analysis was conducted in the three most occupied hospitals in Khartoum, Sudan. Initially, 959 films were evaluated for a period of 12 days in eight x-ray rooms. The film repeat causes were evaluated by radiographers and radiologists. Reasons for reject films were identified and corrective actions were accordingly applied; investigation was done once again by analyzing a total number of 1803 films for the same period. In one hospital a repeat rate was reduced from 16.64% to 9.75% due to radiography factors, while in another from 16.11% to 3.81% due to processor factor. The reject causes rates were ranged from 14.2 % to 32%, 3.6 to 16 and from 1.7% to 11.3% due to over/under exposure, processing problems and wrong positioning respectively. Significant improvement in image quality was observed. The results showed that improvements in image quality and dose reduction could be achieved using simple reject film analysis.
    Cloud computing emerged in recent years as the most significant developments in modern computing. However, there are several risks involved in using a cloud environment. To make the decision of migrating to cloud services there is a great... more
    Cloud computing emerged in recent years as the most significant developments in modern computing. However, there are several risks involved in using a cloud environment. To make the decision of migrating to cloud services there is a great need to assess the various risks involved. The main target of risk assessment is to define appropriate controls for reducing or eliminating those risks. We conducted a survey and formulated different associated risk factors to simulate the data from the experiments. We applied different feature selection algorithms such as Best-First, and random search algorithms methods to reduce the attributes to 3, 4, and 9 attributes, which enabled us to achieve better accuracy. Further, seven function approximation algorithms, namely Isotonic Regression, Randomizable Filter Classifier, Kstar, Extra Tree, IBK, multilayered perceptron, and SMOreg were selected after experimenting with more than thirty different algorithms. The experimental results reveal that feature reduction and prediction algorithms is very efficient and can achieve high accuracy.
    In the last two decades, adaptive antennas have been applied widely to wireless communication networks with preexisting infrastructure ,ie networks with base stations. A wide variety of adaptive algorithms has been developed to combat... more
    In the last two decades, adaptive antennas have been applied widely to wireless communication networks with preexisting infrastructure ,ie networks with base stations. A wide variety of adaptive algorithms has been developed to combat multiple access interference ...