Preferred Language
Articles
/
bsj-7513
Proposed Framework for Official Document Sharing and Verification in E-government Environment Based on Blockchain Technology
...Show More Authors

Progression in Computer networks and emerging of new technologies in this field helps to find out new protocols and frameworks that provides new computer network-based services. E-government services, a modernized version of conventional government, are created through the steady evolution of technology in addition to the growing need of societies for numerous services. Government services are deeply related to citizens’ daily lives; therefore, it is important to evolve with technological developments—it is necessary to move from the traditional methods of managing government work to cutting-edge technical approaches that improve the effectiveness of government systems for providing services to citizens. Blockchain technology is among the modern technologies highly suitable for developing digital governance services, and its technological ability to sustain information stability is vital in digital governance systems since it improves integrity and transparency measures while preventing corruption. In this study, computer networking protocols are built to form a peer-to-peer network framework for managing official documents. using blockchain technology was built to illustrate how any element of government work may be developed using it. The suggested framework comprises the addition of a new official document, and the verification of an existing document. The system was created in socket programming using Java and tested the response times for many simultaneous requests. The system was tested using transactions per second (throughput) measurement. The result showed that the proposed system processed 200 document verification transactions within 50 seconds. In addition, the test of the proposed system presented the time required for document retrieval—about three seconds to answer 100 document retrieval transactions. Furthermore, the results of throughput were compared to the results of the same measurement of some popular applications such as bitcoin. And the result of the proposed system was within the average value of output throughput of the other compared applications.

Scopus Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Mon Dec 20 2021
Journal Name
Baghdad Science Journal
Temperature Stress on Physiological and Morphological Traits in Rhizophora apiculata
...Show More Authors

Global warming has had considerable effects on vital ecosystems, which has also been caused by increased temperatures and CO2 that follow changes in different abiotic factors, which poses threats to mangrove forests environment. This research was conducted to examine the physiological and morphological characteristics of the Rhizophora apiculata mangrove regarding higher air temperature for the variety of tree species that respond to climate change. Seedlings were cultivated for three months in regulated growth chambers with three varying temperatures of 38°C, 21°C under CO2 at 450 ppm, and ambient CO2 concentration i.e., 450 ± 20 ppm under average temperature at 28°C as the control condition

... Show More
View Publication Preview PDF
Scopus (4)
Crossref (3)
Scopus Clarivate Crossref
Publication Date
Sun Jan 01 2023
Journal Name
International Journal Of Economics And Finance Studies
THE EFFECTS OF INFORMATION TECHNOLOGY ADOPTION ON THE FINANCIAL REPORTING: MODERATING ROLE OF AUDIT RISK
...Show More Authors

Scopus (29)
Scopus
Publication Date
Sat Jul 01 2023
Journal Name
Journal Of Accounting And Financial Studies ( Jafs )
The role of e-learning standards in auditing in auditing the performance of customer capita: applied research
...Show More Authors

                  In light of the corona pandemic, educational institutions have moved to learning and teaching via the Internet and e-learning ,and this is considered a turning  point in course of higher education in Iraq in particular and education in general, which generated a great challenge for educational institutions to achieve the highest possible levels in practices and processes to reach the highest quality of their outputs from graduate students to the labor market that auditing performance by adopting e-learning standards is one of the effective tools that help the management of educational institutions by providing information on the ex

... Show More
View Publication Preview PDF
Publication Date
Sun Jan 01 2023
Journal Name
Materials Science In Semiconductor Processing
A dual S-scheme g-C3N4/Fe3O4/Bi2WO6/Bi2S3 heterojunction for improved photocatalytic decomposition of methylene blue: Proposed mechanism, and stability studies
...Show More Authors

View Publication
Scopus (55)
Crossref (52)
Scopus Clarivate Crossref
Publication Date
Tue Aug 24 2021
Journal Name
Conference: The 5th International Multi-conference On Artificial Intelligence Technology (mcait 2021).
Text Encryption Based on DNA Cryptography, RNA, and Amino Acid
...Show More Authors

To achieve safe security to transfer data from the sender to receiver, cryptography is one way that is used for such purposes. However, to increase the level of data security, DNA as a new term was introduced to cryptography. The DNA can be easily used to store and transfer the data, and it becomes an effective procedure for such aims and used to implement the computation. A new cryptography system is proposed, consisting of two phases: the encryption phase and the decryption phase. The encryption phase includes six steps, starting by converting plaintext to their equivalent ASCII values and converting them to binary values. After that, the binary values are converted to DNA characters and then converted to their equivalent complementary DN

... Show More
Publication Date
Fri Jan 10 2025
Journal Name
International Journal Of Scientific Research In Science, Engineering And Technology
Image Cryptography Based on Chebyshev Polynomials and Transposition- Substitution Transformations
...Show More Authors

The confirming of security and confidentiality of multimedia data is a serious challenge through the growing dependence on digital communication. This paper offers a new image cryptography based on the Chebyshev chaos polynomials map, via employing the randomness characteristic of chaos concept to improve security. The suggested method includes block shuffling, dynamic offset chaos key production, inter-layer XOR, and block 90 degree rotations to disorder the correlations intrinsic in image. The method is aimed for efficiency and scalability, accomplishing  complexity order for n-pixels over specific cipher rounds. The experiment outcomes depict great resistant to cryptanalysis attacks, containing statistical, differential and brut

... Show More
View Publication
Crossref
Publication Date
Sat Dec 30 2023
Journal Name
Wasit Journal For Pure Sciences
Honeywords Generation Technique based on Meerkat Clan Algorithm and WordNet
...Show More Authors

The efficiency of the Honeywords approach has been proven to be a significant tool for boosting password security. The suggested system utilizes the Meerkat Clan Algorithm (MCA) in conjunction with WordNet to produce honeywords, thereby enhancing the level of password security. The technique of generating honeywords involves data sources from WordNet, which contributes to the improvement of authenticity and diversity in the honeywords. The method encompasses a series of consecutive stages, which include the tokenization of passwords, the formation of alphabet tokens using the Meerkat Clan Algorithm (MCA), the handling of digit tokens, the creation of unique character tokens, and the consolidation of honeywords. The optimization of t

... Show More
View Publication Preview PDF
Crossref
Publication Date
Thu Sep 01 2016
Journal Name
Indonesian Journal Of Electrical Engineering And Computer Science
Performance evaluation of heterogeneous network based on RED and WRED
...Show More Authors

Scopus (3)
Scopus
Publication Date
Thu Jun 01 2023
Journal Name
Journal Of Engineering
A Modified Vigenère Cipher based on Time and Biometrics features
...Show More Authors

Biometrics is widely used with security systems nowadays; each biometric modality can be useful and has distinctive properties that provide uniqueness and ambiguity for security systems especially in communication and network technologies. This paper is about using biometric features of fingerprint, which is called (minutiae) to cipher a text message and ensure safe arrival of data at receiver end. The classical cryptosystems (Caesar, Vigenère, etc.) became obsolete methods for encryption because of the high-performance machines which focusing on repetition of the key in their attacks to break the cipher. Several Researchers of cryptography give efforts to modify and develop Vigenère cipher by enhancing its weaknesses.

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Fri Oct 01 2021
Journal Name
International Journal Of Electrical And Computer Engineering (ijece)
Color image compression based on spatial and magnitude signal decomposition
...Show More Authors

<p>In this paper, a simple color image compression system has been proposed using image signal decomposition. Where, the RGB image color band is converted to the less correlated YUV color model and the pixel value (magnitude) in each band is decomposed into 2-values; most and least significant. According to the importance of the most significant value (MSV) that influenced by any simply modification happened, an adaptive lossless image compression system is proposed using bit plane (BP) slicing, delta pulse code modulation (Delta PCM), adaptive quadtree (QT) partitioning followed by an adaptive shift encoder. On the other hand, a lossy compression system is introduced to handle the least significant value (LSV), it is based on

... Show More
View Publication Preview PDF
Scopus (8)
Crossref (3)
Scopus Crossref