Preferred Language
Articles
/
LhfKupABVTCNdQwCa5AE
A Proposed Blockchain-Based Digital-Identity Management using ERC 725/735
...Show More Authors

In modern technology, the ownership of electronic data is the key to securing their privacy and identity from any trace or interference. Therefore, a new identity management system called Digital Identity Management, implemented throughout recent years, acts as a holder of the identity data to maintain the holder’s privacy and prevent identity theft. Therefore, an overwhelming number of users have two major problems, users who own data and third-party applications will handle it, and users who have no ownership of their data. Maintaining these identities will be a challenge these days. This paper proposes a system that solves the problem using blockchain technology for Digital Identity Management systems. Blockchain is a powerful technique to build a digital identity in chain matters that enables a secure environment. The idea of Blockchain is to distribute the data across multiple devices in a cryptographic way, which will reduce the ability to an impossible level. Therefore, in this paper a proposed Digital Identity based on Blockchain (ERC 725, and ERC 735) with MD6 as a hashing algorithm will be implemented in a Secure smart contract can prevent function calls from being carried out until the sender has received confirmation from a reliable issuer; for example, we might include a feature that restricts smart contract interactions to legitimate users only. Many additional use cases are possible with ERC-725, including multi-sig execution approvals and contract call verification in place of key validation.

View Publication Preview PDF
Quick Preview PDF
Publication Date
Sun Jul 20 2025
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Using a 3D Chaotic Dynamic System as a Random Key Generator for Image Steganography
...Show More Authors

In today's digital era, the importance of securing information has reached critical levels. Steganography is one of the methods used for this purpose by hiding sensitive data within other files. This study introduces an approach utilizing a chaotic dynamic system as a random key generator, governing both the selection of hiding locations within an image and the amount of data concealed in each location. The security of the steganography approach is considerably improved by using this random procedure. A 3D dynamic system with nine parameters influencing its behavior was carefully chosen. For each parameter, suitable interval values were determined to guarantee the system's chaotic behavior. Analysis of chaotic performance is given using the

... Show More
View Publication Preview PDF
Publication Date
Wed Jan 01 2020
Journal Name
Ieee Access
Smart Routing Management Framework Exploiting Dynamic Data Resources of Cross-Layer Design and Machine Learning Approaches for Mobile Cognitive Radio Networks: A Survey
...Show More Authors

View Publication
Scopus (20)
Crossref (21)
Scopus Clarivate Crossref
Publication Date
Mon Oct 06 2025
Journal Name
International Journal Of Innovative Research And Scientific Studies
The requirements of total quality management and the determinants of its application in private Iraqi press institutions: Al-zaman newspaper as a model
...Show More Authors

This study investigates the requirements of total quality management (TQM) and the determinants affecting its application in Al-Zaman newspaper, one of Iraq’s leading private press institutions. The research employed a survey methodology, using a structured questionnaire administered to 30 participants representing journalistic, administrative, and technical staff. Five TQM dimensions, each measured through four indicators, were assessed to capture the perceptions of employees regarding the availability and effectiveness of quality practices. Data were analyzed using the Statistical Package for the Social Sciences (SPSS). The results revealed that while senior management at Al-Zaman demonstrates formal support for TQM, there is a

... Show More
View Publication Preview PDF
Crossref
Publication Date
Mon Jan 01 2024
Journal Name
International Journal Of Neutrosophic Science
A New Paradigm for Decision Making under Uncertainty in Signature Forensics Applications based on Neutrosophic Rule Engine
...Show More Authors

One of the most popular and legally recognized behavioral biometrics is the individual's signature, which is used for verification and identification in many different industries, including business, law, and finance. The purpose of the signature verification method is to distinguish genuine from forged signatures, a task complicated by cultural and personal variances. Analysis, comparison, and evaluation of handwriting features are performed in forensic handwriting analysis to establish whether or not the writing was produced by a known writer. In contrast to other languages, Arabic makes use of diacritics, ligatures, and overlaps that are unique to it. Due to the absence of dynamic information in the writing of Arabic signatures,

... Show More
View Publication Preview PDF
Scopus (6)
Scopus Crossref
Publication Date
Tue Dec 12 2017
Journal Name
Al-khwarizmi Engineering Journal
Model Reference Adaptive Control based on a Self-Recurrent Wavelet Neural Network Utilizing Micro Artificial Immune Systems
...Show More Authors

Abstract 

This paper presents an intelligent model reference adaptive control (MRAC) utilizing a self-recurrent wavelet neural network (SRWNN) to control nonlinear systems. The proposed SRWNN is an improved version of a previously reported wavelet neural network (WNN). In particular, this improvement was achieved by adopting two modifications to the original WNN structure. These modifications include, firstly, the utilization of a specific initialization phase to improve the convergence to the optimal weight values, and secondly, the inclusion of self-feedback weights to the wavelons of the wavelet layer. Furthermore, an on-line training procedure was proposed to enhance the control per

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Wed Jun 10 2009
Journal Name
Iraqi Journal Of Laser
Real Time Quantum Bit Error Rate Performance Test for a Quantum Cryptography System Based on BB84 protocol
...Show More Authors

In this work, the performance of the receiver in a quantum cryptography system based on BB84 protocol is scaled by calculating the Quantum Bit Error Rate (QBER) of the receiver. To apply this performance test, an optical setup was arranged and a circuit was designed and implemented to calculate the QBER. This electronic circuit is used to calculate the number of counts per second generated by the avalanche photodiodes set in the receiver. The calculated counts per second are used to calculate the QBER for the receiver that gives an indication for the performance of the receiver. Minimum QBER, 6%, was obtained with avalanche photodiode excess voltage equals to 2V and laser diode power of 3.16 nW at avalanche photodiode temperature of -10

... Show More
View Publication Preview PDF
Publication Date
Sun Mar 08 2026
Journal Name
Statistics, Optimization And Information Computing
Adult Dengue Fever in Bangladesh: A One-Sample Rank-Based Test of Hematologic Location Against Healthy References
...Show More Authors

Dengue fever is a mosquito-borne viral infection that produces characteristic abnormalities in routine blood tests, yet these hematologic changes are typically analysed separately for each parameter rather than as a combined multivariate profile. This study investigated whether the joint hematologic profile of adult dengue patients in Bangladesh is systematically displaced from healthy adult reference values. We analysed a cohort of laboratory-confirmed adult dengue cases from a Bangladeshi hospital and focused on four core hematologic indices: haemoglobin, white blood cell count, platelet count, and platelet distribution width (PDW). External adult reference means were used to define a healthy location vector, and robust multivariate infer

... Show More
View Publication
Scopus Crossref
Publication Date
Mon Oct 01 2012
Journal Name
Applied Energy
Analysis of thermal and electrical performance of a hybrid (PV/T) air based solar collector for Iraq
...Show More Authors

The electrical and thermal performance of a typical single pass hybrid photovoltaic/thermal (PV/T) air collector is modeled, simulated and analyzed for two selected case studies in Iraq. An improved mathematical thermo-electrical model is derived in terms of design, operating and climatic parameters of the hybrid solar collector to evaluate its important characteristics: collector flow and heat removal factors, PV maximum power point and its temperature coefficient, and overall power and efficiency. Unlike previous PV/T thermal models, the present model is obtained with some additions and corrections in radiation and convection heat coefficients for the top loss and for the air duct with more applicable sky temperature correlation. The well

... Show More
View Publication
Scopus (137)
Crossref (121)
Scopus Crossref
Publication Date
Mon Oct 01 2012
Journal Name
Applied Energy
Analysis of thermal and electrical performance of a hybrid (PV/T) air based solar collector for Iraq
...Show More Authors

View Publication
Scopus (137)
Crossref (121)
Scopus Crossref
Publication Date
Sun Nov 01 2015
Journal Name
Journal Of Engineering
A Spike Neural Controller for Traffic Load Parameter with Priority-Based Rate in Wireless Multimedia Sensor Networks
...Show More Authors

Wireless Multimedia Sensor Networks (WMSNs) are a type of sensor network that contains sensor nodes equipped with cameras, microphones; therefore the WMSNS are able to   produce multimedia data such as video and audio streams, still images, and scalar data from the surrounding environment. Most multimedia applications typically produce huge volumes of data, this leads to congestion. To address this challenge, This paper proposes Modify Spike Neural Network control for Traffic Load Parameter with Exponential Weight of Priority Based Rate Control algorithm (MSNTLP with EWBPRC). The Modify Spike Neural Network controller (MSNC) can calculate the appropriate traffi

... Show More
View Publication Preview PDF