Preferred Language
Articles
/
bsj-8164
Secure Smart Contract Based on Blockchain to Prevent the Non-Repudiation Phenomenon
...Show More Authors

Blockchain is an innovative technology that has gained interest in all sectors in the era of digital transformation where it manages transactions and saves them in a database. With the increasing financial transactions and the rapidly developed society with growing businesses many people looking for the dream of a better financially independent life, stray from large corporations and organizations to form startups and small businesses. Recently, the increasing demand for employees or institutes to prepare and manage contracts, papers, and the verifications process, in addition to human mistakes led to the emergence of a smart contract. The smart contract has been developed to save time and provide more confidence while dealing, as well as to cover the security aspects of digital management and to solve negotiation concerns. The smart contract was employed in creating a distributed ledger to eliminate the need for centralization. In this paper, a simple prototype has been implemented for the smart contract integrated with blockchain which is simulated in a local server with a set of nodes. Several security objectives, such as confidentiality, authorization, integrity, and non-repudiation, have been achieved in the proposed system. Besides, the paper discussed the importance of using the Blockchain technique, and how it contributed to the management of transactions in addition to how it was implemented in highly transparent real-estate scenarios. The smart contract was employed in creating a distributed ledger to eliminate the need for centralization. The elliptic-curve public key has been adopted as an alternative for the RSA in a signature generation/verification process and encryption protocol. For secure transactions, The Secure Socket Layer (SSL) also has been adopted as a secure layer in the web browser. The results have been investigated and evaluated from different aspects and the implementation was in a restricted environment. Experiments showed us the complexity of time and cost when using the (ECC) algorithm and using (RSA) algorithm depending on the size and length of the key. So if the size of the key in (ECC) equals (160) bits, and it corresponds to (1024) bits in (RSA), which is equivalent to 40% for (ECC) and 30% for (RSA). As a result, the (ECC) algorithm is complex, its key is smaller and the process of generating the key is faster, so it has achieved a high level of security.

Scopus Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Wed Aug 01 2018
Journal Name
Journal Of Economics And Administrative Sciences
Analysis of the Current Financial Crisis : Causes and Solutions (Iraqi crisis a model , based on the public budget for the fiscal year 2016)
...Show More Authors

The research aims to analysis of the current financial crisis in Iraq through knowing its causes and then propose some solutions that help in remedy the crisis and that on the level of expenditures and revenues, and has been relying on the Federal general budget law of the Republic of Iraq for the fiscal year 2016 to obtain the necessary data in respect of the current expenditures and revenues which necessary to achieve the objective of the research , and through the research results has been reached to a set of conclusions which the most important of them that causes of the current financial crisis in Iraq , mainly belonging to increased expenditures and especially the current ones and the lack of revenues , especially non-oil o

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sat Feb 27 2021
Journal Name
Journal Of Engineering
Environmental benefits through Storage, Exchange of thermal energy in smart city
...Show More Authors

The aim of this study is to look at  the potential of a  local sustainable energy network in  a pre-existing context to develop a novel design beneficial to the environment. Nowadays, the concept of smart cities is still in the developmental phase/stage   andwe are currently residing in a transitional period, therefore it is very important to discover new solutions that show direct benefits the people may get from  transforming their city from a traditional to a smart city. Using experience and knowledge of successful projects in various European and non-European smart cities, this study attempts to demonstrate the practical potential of gradually moving existing cities to t

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Fri Mar 01 2019
Journal Name
Al-khwarizmi Engineering Journal
Improve Akaike’s Information Criterion Estimation Based on Denoising of Quadrature Mirror Filter Bank
...Show More Authors

Akaike’s Information Criterion (AIC) is a popular method for estimation the number of sources impinging on an array of sensors, which is a problem of great interest in several applications. The performance of AIC degrades under low Signal-to-Noise Ratio (SNR). This paper is concerned with the development and application of quadrature mirror filters (QMF) for improving the performance of AIC. A new system is proposed to estimate the number of sources by applying AIC to the outputs of filter bank consisting quadrature mirror filters (QMF). The proposed system can estimate the number of sources under low signal-to-noise ratio (SNR).

View Publication Preview PDF
Publication Date
Sat Sep 30 2017
Journal Name
Al-khwarizmi Engineering Journal
Robot Arm Path Planning Using Modified Particle Swarm Optimization based on D* algorithm
...Show More Authors

Abstract

Much attention has been paid for the use of robot arm in various applications. Therefore, the optimal path finding has a significant role to upgrade and guide the arm movement. The essential function of path planning is to create a path that satisfies the aims of motion including, averting obstacles collision, reducing time interval, decreasing the path traveling cost and satisfying the kinematics constraints. In this paper, the free Cartesian space map of 2-DOF arm is constructed to attain the joints variable at each point without collision. The D*algorithm and Euclidean distance are applied to obtain the exact and estimated distances to the goal respectively. The modified Particle Swarm Optimization al

... Show More
View Publication Preview PDF
Crossref (10)
Crossref
Publication Date
Tue Sep 27 2022
Journal Name
Al–bahith Al–a'alami
Motives for public exposure to advertisement through smart phone applications and its purchasing decisions relationship (A research drawn from a Master Degree thesis)
...Show More Authors

Advertisement on smart phone shopping apps are a new way of driving users to satisfy their needs and influence their purchasing decisions, In this way, the research could be aimed to know The role of the relationship between the motivations for audience exposure to shopping apps advertisement and purchasing decisions, In order to achieve the objectives of the research, the researcher adopted the survey method and used the questionnaire and the scale to collect data and information, The researcher chose the "random sample multi stages", The sample size was (475) respondents from Baghdad city center (18 years and above) women and men.

View Publication Preview PDF
Crossref
Publication Date
Wed May 01 2013
Journal Name
Journal Of Computer Science
PROTOCOLS FOR SECURE ROUTING AND TRANSMISSION IN MOBILE AD HOC NETWORK: A REVIEW
...Show More Authors

Mobile ad hoc network security is a new area for research that it has been faced many difficulties to implement. These difficulties are due to the absence of central authentication server, the dynamically movement of the nodes (mobility), limited capacity of the wireless medium and the various types of vulnerability attacks. All these factor combine to make mobile ad hoc a great challenge to the researcher. Mobile ad hoc has been used in different applications networks range from military operations and emergency disaster relief to community networking and interaction among meeting attendees or students during a lecture. In these and other ad hoc networking applications, security in the routing protocol is necessary to protect against malic

... Show More
View Publication Preview PDF
Scopus (8)
Crossref (5)
Scopus Crossref
Publication Date
Sat Jul 05 2025
Journal Name
Journal Of Machine And Computing
Cyber Neutrosophic Model for Secure and Uncertainty Aware Evaluation in Indoor Design Projects
...Show More Authors

To perform a secure evaluation of Indoor Design data, the research introduces a Cyber-Neutrosophic Model, which utilizes AES-256 encryption, Role-Based Access Control, and real-time anomaly detection. It measures the percentage of unpredictability, insecurity, and variance present within model features. Also, it provides reliable data security. Similar features have been identified between the final results of the study, corresponding to the Cyber-Neutrosophic Model analysis, and the cybersecurity layer helped mitigate attacks. It is worth noting that Anomaly Detection successfully achieved response times of less than 2.5 seconds, demonstrating that the model can maintain its integrity while providing privacy. Using neutrosophic sim

... Show More
View Publication
Scopus Crossref
Publication Date
Sat Jan 26 2019
Journal Name
Association Of Arab Universities Journal Of Engineering Sciences
Secure Mobile Sink Node location in Wireless Sensor Network using Dynamic Routing Protocol
...Show More Authors

The important device in the Wireless Sensor Network (WSN) is the Sink Node (SN). That is used to store, collect and analyze data from every sensor node in the network. Thus the main role of SN in WSN makes it a big target for traffic analysis attack. Therefore, securing the SN position is a substantial issue. This study presents Security for Mobile Sink Node location using Dynamic Routing Protocol called (SMSNDRP), in order to increase complexity for adversary trying to discover mobile SN location. In addition to that, it minimizes network energy consumption. The proposed protocol which is applied on WSN framework consists of 50 nodes with static and mobile SN. The results havw shown in each round a dynamic change in the route to reach mobi

... Show More
Publication Date
Sun Feb 03 2019
Journal Name
Iraqi Journal Of Physics
Influence of non-thermal argon plasma needle on blood coagulation
...Show More Authors

Non-thermal argon plasma needle at atmospheric pressure was
constructed. The experimental setup was based on a simple and low
cost electric component that generates a sufficiently high electric
field at the electrodes to ionize the argon gas which flow at
atmospheric pressure. A high AC power supply was used with 1.1
kV and 19.57 kHz. Non-thermal Argon plasma used on blood
samples to show the ability of non-thermal plasma to promote blood
coagulation. Three tests have been done to show the ability of plasma
to coagulate both normal and anti-coagulant blood. Each blood
sample has been treated for varying time from 20sec. to 180sec. at
different distances. The results of the current study showed that the
co

... Show More
View Publication Preview PDF
Crossref
Publication Date
Mon Jul 01 2019
Journal Name
Iop Conference Series: Materials Science And Engineering
On Estimation of the Stress – Strength Reliability Based on Lomax Distribution
...Show More Authors
Abstract<p>The present paper concerns with the problem of estimating the reliability system in the stress – strength model under the consideration non identical and independent of stress and strength and follows Lomax Distribution. Various shrinkage estimation methods were employed in this context depend on Maximum likelihood, Moment Method and shrinkage weight factors based on Monte Carlo Simulation. Comparisons among the suggested estimation methods have been made using the mean absolute percentage error criteria depend on MATLAB program.</p>
View Publication
Scopus (9)
Crossref (4)
Scopus Crossref