Preferred Language
Articles
/
bsj-7513
Proposed Framework for Official Document Sharing and Verification in E-government Environment Based on Blockchain Technology
...Show More Authors

Progression in Computer networks and emerging of new technologies in this field helps to find out new protocols and frameworks that provides new computer network-based services. E-government services, a modernized version of conventional government, are created through the steady evolution of technology in addition to the growing need of societies for numerous services. Government services are deeply related to citizens’ daily lives; therefore, it is important to evolve with technological developments—it is necessary to move from the traditional methods of managing government work to cutting-edge technical approaches that improve the effectiveness of government systems for providing services to citizens. Blockchain technology is among the modern technologies highly suitable for developing digital governance services, and its technological ability to sustain information stability is vital in digital governance systems since it improves integrity and transparency measures while preventing corruption. In this study, computer networking protocols are built to form a peer-to-peer network framework for managing official documents. using blockchain technology was built to illustrate how any element of government work may be developed using it. The suggested framework comprises the addition of a new official document, and the verification of an existing document. The system was created in socket programming using Java and tested the response times for many simultaneous requests. The system was tested using transactions per second (throughput) measurement. The result showed that the proposed system processed 200 document verification transactions within 50 seconds. In addition, the test of the proposed system presented the time required for document retrieval—about three seconds to answer 100 document retrieval transactions. Furthermore, the results of throughput were compared to the results of the same measurement of some popular applications such as bitcoin. And the result of the proposed system was within the average value of output throughput of the other compared applications.

Scopus Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Wed Dec 15 2010
Journal Name
Iraqi Journal Of Laser
Detection and Quantification of Class I Caries with Laser Fluorescence Technique
...Show More Authors

The objective of the present study is to verify the actual carious lesion depth by laser
fluorescence technique using 650 nm CW diode laser in comparison with the histopathological
investigation. Five permanent molar teeth were extracted from adult individuals for different reasons
(tooth impaction, periodontal diseases, and pulp infections); their ages were ranging from 20-25 years
old. Different carious teeth with varying clinical stages of caries progression were examined. An
experimental laser fluorescence set-up was built to perform the work regarding in vitro detection and
quantification of occlusal dental caries and the determination of its actual clinical carious lesion depth by
650 nm CW diode laser (excitat

... Show More
View Publication Preview PDF
Publication Date
Mon Mar 11 2019
Journal Name
Baghdad Science Journal
Determination of Nicotine Extracted from Eggplant and Green Pepper by HPLC
...Show More Authors

Nicotine was separated from eggplant and green pepper seeds (Solanaceous) by High Performance Liquid Chromatography (HPLC).The concentration of nicotine in the eggplant extract (0.871-0.877 μg/ml) was determined by injecting standard material with 0.5 and 1.5 μg/ml, while the concentrations of nicotine in green pepper extract (0.613-0.618 μg/ml) was determined when the standard material was injected with 0.5 and 1.5 μg/ml. The qualitative chemical data was calculated from derivations of the standard material. Nicotine concentration was measured qualitatively in both extracts through the calibration curve and method of the standard addition. This technique has high accuracy and compatibility, bringing the proportion of relati

... Show More
View Publication Preview PDF
Scopus (6)
Crossref (3)
Scopus Crossref
Publication Date
Fri Jul 21 2023
Journal Name
Journal Of Engineering
EVALUATION OF ELECTRONIC GOVERNMENT SECURITY ISSUES APPLIED TO COMPUTER CENTER OF BAGHDAD UNIVERSITY (CASE STUDY)
...Show More Authors

Information security contributes directly to increase the level of trust between the government’s departments by providing an assurance of confidentiality, integrity, and availability of sensitive governmental information. Many threats that are caused mainly by malicious acts can shutdown the egovernment services. Therefore the governments are urged to implement security in e-government projects.
Some modifications were proposed to the security assessment multi-layer model (Sabri model) to be more comprehensive model and more convenient for the Iraqi government. The proposed model can be used as a tool to assess the level of security readiness of government departments, a checklist for the required security measures and as a commo

... Show More
View Publication Preview PDF
Publication Date
Thu Dec 01 2016
Journal Name
Journal Of Economics And Administrative Sciences
Usage of non-linear programming in building a mathematical model for production planning according to discount constraints put on bought amount
...Show More Authors

Abstract

 This research deals will the declared production planning operation in the general company of planting oils, which have  great role in production operations management who had built mathematical model for correct non-linear programming according to discounting operation during raw materials or half-made materials purchasing operation which concentration of six main products by company but discount included just three products of raw materials, and there were six months taken from the 1st half of 2014 as a planning period has been chosen . Simulated annealing algorithm  application on non-linear model which been more difficulty than possible solution when imposed restric

... Show More
View Publication Preview PDF
Crossref
Publication Date
Fri Jun 01 2012
Journal Name
Journal Of Accounting And Financial Studies ( Jafs )
Effect of risk selection policy for life insurance on the prodectivity of iraqi insurance company
...Show More Authors

The life insurance companies need a sound system to use it in selecting Insurable risks so they can avoid or reduce possible losses that may be insured to a minimum levels , But the application within IRAQI INSURANCE  COMPANY reflects that it still depends on a traditional ways in the procedures used to select that risks .

                 This  research represents an attempt to put acceptable suggestions about developing a system for selecting insurable risks which used now by iraqi insurance company by recognizing the risks of life insurance , determining kinds of risks which can difined as normal and upnormal risks , rectification of the

... Show More
View Publication Preview PDF
Publication Date
Tue Jun 30 2015
Journal Name
College Of Islamic Sciences
From the responses of Imam Abi Zakaria al-Nawawi 676 AH on the grammarians in his commentary on Sahel Muslim
...Show More Authors

From the responses of Imam Abi Zakaria al-Nawawi 676 AH on the grammarians in his commentary on Sahel Muslim

View Publication Preview PDF
Publication Date
Wed Mar 29 2017
Journal Name
Iraqi Journal Of Pharmaceutical Sciences ( P-issn 1683 - 3597 E-issn 2521 - 3512)
Efficacy of Combination of Meropenem with Gentamicin, and Amikacin against Resistant E. coli Isolated from Patients with UTIs: in vitro Study
...Show More Authors

         Seventy five E. coli isolates were collected from urine of patients with urinary tract infections in AL-Kadhimia and AL-Yarmook teaching hospitals in Baghdad for a period between 22/11/2009 to 15/3/2010,  from these samples twenty five isolates were selected according to their pattern of the highest resistance as these showing multi-drug resistances and tested to specify their minimum inhibitory concentration for (meropenem, gentamicin and amikacin), meropenem was found having the lowest MIC comparing with others. This study also includes in vitro effects of various combinations of three types of antimicrobials (meropenem, gentamicin and amikacin) against twenty five E. c

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Sat Dec 24 2022
Journal Name
Iraqi Journal Of Pharmaceutical Sciences ( P-issn 1683 - 3597 E-issn 2521 - 3512)
Therapeutic Effects of Vitamin E in Non-alcoholic Fatty Liver Disease: An Open-Labeled Clinical Trial
...Show More Authors

Abstract: non-alcoholic fatty liver disease (NAFLD) is one of the widespread chronic liver diseases; it is ranging from simple fat buildup in the liver (steatosis) to non-alcoholic steatohepatitis (NASH) presence of inflammation and hepatocyte injury.                                                                                                                                        &nb

... Show More
View Publication Preview PDF
Scopus (3)
Crossref (3)
Scopus Crossref
Publication Date
Wed Feb 10 2016
Journal Name
Scientific Reports
Experimental demonstration on the deterministic quantum key distribution based on entangled photons
...Show More Authors

As an important resource, entanglement light source has been used in developing quantum information technologies, such as quantum key distribution(QKD). There are few experiments implementing entanglement-based deterministic QKD protocols since the security of existing protocols may be compromised in lossy channels. In this work, we report on a loss-tolerant deterministic QKD experiment which follows a modified “Ping-Pong”(PP) protocol. The experiment results demonstrate for the first time that a secure deterministic QKD session can be fulfilled in a channel with an optical loss of 9 dB, based on a telecom-band entangled photon source. This exhibits a conceivable prospect of ultilizing entanglement light source in real-life fiber-based

... Show More
View Publication
Scopus (17)
Crossref (16)
Scopus Clarivate Crossref
Publication Date
Fri Feb 04 2022
Journal Name
Neuroquantology
Detecting Damaged Buildings on Post-Hurricane Satellite Imagery based on Transfer Learning
...Show More Authors

In this article, Convolution Neural Network (CNN) is used to detect damage and no damage images form satellite imagery using different classifiers. These classifiers are well-known models that are used with CNN to detect and classify images using a specific dataset. The dataset used belongs to the Huston hurricane that caused several damages in the nearby areas. In addition, a transfer learning property is used to store the knowledge (weights) and reuse it in the next task. Moreover, each applied classifier is used to detect the images from the dataset after it is split into training, testing and validation. Keras library is used to apply the CNN algorithm with each selected classifier to detect the images. Furthermore, the performa

... Show More
View Publication
Scopus (3)
Scopus Crossref