Mobile-base Registration System for Blood Donation (MBRS-BD)

Ban Salman Shukur

Computer Science Department, Baghdad College of Economic Sciences University, Baghdad, Iraq.

Maad M. Mijwil *

Computer Techniques Engineering Department, Baghdad College of Economic Sciences University, Baghdad, Iraq.

Najeeb Abbs Al-Sammarraie

Al-Madinah International University, Kuala Lumpur, Malaysia.

*Author to whom correspondence should be addressed.


In the healthcare management domain, blood donation receives a particular interest due to its crucial and vital importance in saving people’s lives. In Iraq, the blood donation procedure usually consumes a lot of time for donors as it is carried out through a non-automated and paper-based process, which is done only in hospitals/ medical centers for those who are willing to donate. Patients who are in a need for blood donation may have to wait until they receive the service, and this may results in dramatic or undesired consequences. At the same, the blood donation procedure negatively affects people who are willing or wish to donate blood and mostly leads to ignore this matter by a lot of them unless there is a critical situation concerning one of their family members.  This paper propose a Mobile-Base Registration System for Blood Donation (MBRS_BD) using Firebase Cloud Messaging (FCM) to manage the process of donor’s registration automatically using a smartphone to simulate, ease, and minimize the time required for that.  Donor can register in any available Iraqi hospitals/ medical center using MBRS-BD and go in the exact time to complete his/her donation process.

Keywords: Firebase cloud messaging, blood donation, android, healthcare, information systems, mobile system

How to Cite

Shukur, B. S., Mijwil, M. M., & Al-Sammarraie, N. A. (2022). Mobile-base Registration System for Blood Donation (MBRS-BD). Asian Journal of Research in Computer Science, 14(4), 36–45.


Download data is not yet available.


Mijwil MM, Shukur BS, Mahmood E Sh. The most common heart diseases and their influence on human life: A mini-review. J Adv Med Med Res. 2022;34 (15):26-36. Available:

Mijwil MM, Shukur BS. A scoping review of machine learning techniques and their utilisation in predicting heart diseases. Ibn al-Haitham J Pure Appl Sci. 2022;35(3): 175-189. Available: 2813

Mostafa AM, Youssef AE, Alshorbagy G. A framework for a smart social blood donation system based on mobile cloud computing. Health Inform Inter J. 2014;3 (4):1-10. Available:

Pavitra H, Ahmmed GFA. Design of SMS based automated blood bank using embedded system. Int J Eng Technol. 2017;04(07):1-4.

Moharkar A, Somani A. Automated blood bank using embedded system. Int J Innov Res Sci Eng Technol. 2018;7(1):296-300.


Wasim M, Bhure R. intelligent blood bank assistance using embedded systems. Int J Sci Eng Technol Res. 2016;5(49): 10084-10087.

Baş S, Carello G, Lanzarone E, Ocak Z, Yalçındağ S. Management of blood donation system: Literature review and research perspectives. Health Care Systems Engineering for Scientists and Practitioners. 2016;169:121-132.

Available: -35132-2_12

Mostfa A, Alabass A, Sharkawy A. Nineveh blood: Android based blood donation application for nineveh governorate in Iraq. AL-Rafidain J Compu Sci Math, 2020;14(2):85-96. Available:

Sahani A. Android v/s IOS – The unceasing battle. Int. J. Comput. Appl. 2017;180(3):23-26.

Abdulrazak LF, Al-Tabatabaie KF. Impact of mobile phone on The Iraqi Society. Int J Adv Res. 2017; 5(1):149-157.


Altabatabaie KF. Adoption and appropriation of mobile phone on the Iraqi society. Int J Sci Technol Res. 2018;7 (7):14-18.

Kemp S. Digital 2021: Iraq; 2021.


Kemp S. Digital 2021: Iraq; 2022.


Gao J, Li L, Kong P, Bissyandé TF, Klein J. Understanding the evolution of android app vulnerabilities. IEEE Trans Reliab. 2021;70(1):212-230. Available:

Singh AK, Prajapati KS, Kumara V, Mishra S. Usage analysis of mobile devices. Procedia Comput Sci. 2017;122:657-662.


Brilingaitė A, Bukauskas L, Kutka E. Detection of premeditated security vulnerabilities in mobile applications. In Proceeding of European Conference on Cyber Warfare and Security. 2019;63-69.

Nirumand A, Zamani B, Ladani BT. VAnDroid: A framework for vul-nerability analysis of android applications using a model-driven reverse engineering technique. Software Pract Exper. 49(1):70–99.


Khokhlov I, Reznik L. Android system security evaluation. In Proceeding of Annual Consumer Communications & Networking Conference, Las Vegas, NV, United States. 2018;1-6. Available:

Schmeelk S, Aho A. Defending android applications availability. In Proceeding of Annual Software Technology Conference (STC), Gaithersburg, MD, United States. 2017;1-5:25-28. Available:

Thom C. Addressing push messaging problems in mobile cloud computing; 2016.


Albertengo G, Debele FG, Hassan W, Stramandino D. On the performance of web services, google cloud messaging and firebase cloud messaging. Digit Commun Netw. 2020;6(1):31-37. Available:

Firdaus D, Priambodo B, Jumaryadi Y. Implementation of push notification for business incubator. Int J Online Biomed Eng. 2019;15(14):42–53.


Srivastava N, Shree U, Chauhan NR, Tiwari DK. Firebase cloud messaging (Android). Int. J Innov Res Sci Eng technol. 2017;6:11-18.

Hyun S, Cho J, Cho G, Kim H. Design and analysis of push notification- based malware on android. Secur. Commun. Netw. 2018;(8510256):1-13.


Aziz T. Mobile app development to empower educators and to prepare students as future leaders; 20115.