Preferred Language
Articles
/
bsj-8164
Secure Smart Contract Based on Blockchain to Prevent the Non-Repudiation Phenomenon
...Show More Authors

Blockchain is an innovative technology that has gained interest in all sectors in the era of digital transformation where it manages transactions and saves them in a database. With the increasing financial transactions and the rapidly developed society with growing businesses many people looking for the dream of a better financially independent life, stray from large corporations and organizations to form startups and small businesses. Recently, the increasing demand for employees or institutes to prepare and manage contracts, papers, and the verifications process, in addition to human mistakes led to the emergence of a smart contract. The smart contract has been developed to save time and provide more confidence while dealing, as well as to cover the security aspects of digital management and to solve negotiation concerns. The smart contract was employed in creating a distributed ledger to eliminate the need for centralization. In this paper, a simple prototype has been implemented for the smart contract integrated with blockchain which is simulated in a local server with a set of nodes. Several security objectives, such as confidentiality, authorization, integrity, and non-repudiation, have been achieved in the proposed system. Besides, the paper discussed the importance of using the Blockchain technique, and how it contributed to the management of transactions in addition to how it was implemented in highly transparent real-estate scenarios. The smart contract was employed in creating a distributed ledger to eliminate the need for centralization. The elliptic-curve public key has been adopted as an alternative for the RSA in a signature generation/verification process and encryption protocol. For secure transactions, The Secure Socket Layer (SSL) also has been adopted as a secure layer in the web browser. The results have been investigated and evaluated from different aspects and the implementation was in a restricted environment. Experiments showed us the complexity of time and cost when using the (ECC) algorithm and using (RSA) algorithm depending on the size and length of the key. So if the size of the key in (ECC) equals (160) bits, and it corresponds to (1024) bits in (RSA), which is equivalent to 40% for (ECC) and 30% for (RSA). As a result, the (ECC) algorithm is complex, its key is smaller and the process of generating the key is faster, so it has achieved a high level of security.

Scopus Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Sun Feb 25 2024
Journal Name
Baghdad Science Journal
Hybrid CNN-based Recommendation System
...Show More Authors

Recommendation systems are now being used to address the problem of excess information in several sectors such as entertainment, social networking, and e-commerce. Although conventional methods to recommendation systems have achieved significant success in providing item suggestions, they still face many challenges, including the cold start problem and data sparsity. Numerous recommendation models have been created in order to address these difficulties. Nevertheless, including user or item-specific information has the potential to enhance the performance of recommendations. The ConvFM model is a novel convolutional neural network architecture that combines the capabilities of deep learning for feature extraction with the effectiveness o

... Show More
View Publication Preview PDF
Scopus (7)
Crossref (4)
Scopus Crossref
Publication Date
Sat Dec 01 2018
Journal Name
Political Sciences Journal
Political development on the royal regime era : A perusal according to the standards of Alexis de Tocqueville
...Show More Authors

Abstract: The researcher aims to highlight the historical frames of political development in royal regime era (1921-1949) and study its transitions on social-political aspect for the various periods during this consistent era of Iraq history. As some elements played an important role in shaping this era’s features ,as well as 2hat succeed it, which mainly affected the political progression’s configuration, such as : political culture role, social and cultural foundation, state policy essence and the unofficial institutions remarkable role in influencing public awareness and concerning it's relation to the state ,the clan and religious institutions. The researcher employed Alexis de Tocqueville’s evaluation criteria and indi

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sat Jul 05 2025
Journal Name
Journal Of Machine And Computing
Cyber Neutrosophic Model for Secure and Uncertainty Aware Evaluation in Indoor Design Projects
...Show More Authors

To perform a secure evaluation of Indoor Design data, the research introduces a Cyber-Neutrosophic Model, which utilizes AES-256 encryption, Role-Based Access Control, and real-time anomaly detection. It measures the percentage of unpredictability, insecurity, and variance present within model features. Also, it provides reliable data security. Similar features have been identified between the final results of the study, corresponding to the Cyber-Neutrosophic Model analysis, and the cybersecurity layer helped mitigate attacks. It is worth noting that Anomaly Detection successfully achieved response times of less than 2.5 seconds, demonstrating that the model can maintain its integrity while providing privacy. Using neutrosophic sim

... Show More
View Publication
Scopus Crossref
Publication Date
Sat Jan 26 2019
Journal Name
Association Of Arab Universities Journal Of Engineering Sciences
Secure Mobile Sink Node location in Wireless Sensor Network using Dynamic Routing Protocol
...Show More Authors

The important device in the Wireless Sensor Network (WSN) is the Sink Node (SN). That is used to store, collect and analyze data from every sensor node in the network. Thus the main role of SN in WSN makes it a big target for traffic analysis attack. Therefore, securing the SN position is a substantial issue. This study presents Security for Mobile Sink Node location using Dynamic Routing Protocol called (SMSNDRP), in order to increase complexity for adversary trying to discover mobile SN location. In addition to that, it minimizes network energy consumption. The proposed protocol which is applied on WSN framework consists of 50 nodes with static and mobile SN. The results havw shown in each round a dynamic change in the route to reach mobi

... Show More
Publication Date
Wed May 01 2013
Journal Name
Journal Of Computer Science
PROTOCOLS FOR SECURE ROUTING AND TRANSMISSION IN MOBILE AD HOC NETWORK: A REVIEW
...Show More Authors

Mobile ad hoc network security is a new area for research that it has been faced many difficulties to implement. These difficulties are due to the absence of central authentication server, the dynamically movement of the nodes (mobility), limited capacity of the wireless medium and the various types of vulnerability attacks. All these factor combine to make mobile ad hoc a great challenge to the researcher. Mobile ad hoc has been used in different applications networks range from military operations and emergency disaster relief to community networking and interaction among meeting attendees or students during a lecture. In these and other ad hoc networking applications, security in the routing protocol is necessary to protect against malic

... Show More
View Publication Preview PDF
Scopus (8)
Crossref (5)
Scopus Crossref
Publication Date
Sat Jun 26 2021
Journal Name
Journal Of The College Of Education For Women
The Wisdom-Based Thinking and its Relationship to the Psychological Capital: طلل غالب علوان
...Show More Authors

The present study aims to identify wisdom-based thinking and its relationship to psychological capital. It further aims to find out the differences in the level of wisdom-based thinking and psychological capital according to the variables of gender and specialization (scientific, humanities). To achieve this, the study has been conducted on a sample of (380) male and female students. The two scales, wisdom-based thinking and psychological capital are implemented to the sample after being constructed by the researcher and after ensuring their psychometric characteristics' suitability for the study's aims. Results concerning the first aim have shown that there is a significant relationship among students. The second aim has revealed that t

... Show More
View Publication
Crossref
Publication Date
Thu Jan 16 2020
Journal Name
Journal Of Accounting And Financial Studies ( Jafs )
Obstacles in Marketing Comprehensive Automobile Insurance Policy: بحث أستطلاعي في شركة التأمين الوطنية
...Show More Authors

Comprehensive automobile insurance is considered as an important insurance which is managing by National Insurance Company due to the continuous accidents the company is endeavoring to this market not for trading motives only but also to increase the insurance awareness of people and insurance benefit for other insurance portfolios .On this basis the researcher had chosen her subject ( obstacles in marketing comprehensive automobile Insurance policy ) the company faces several obstacles and limitations in marketing the policies of this portfolio due to certain factors and influences beyond the mainly connected with the reduction of marketing programmes of the company . the aim of this study is to shade the light upon the internal factors

... Show More
View Publication Preview PDF
Publication Date
Sun Dec 01 2013
Journal Name
Journal Of Accounting And Financial Studies ( Jafs )
Obstacles in Marketing Comprehensive Automobile Insurance Policy: بحث أستطلاعي في شركة التأمين الوطنية
...Show More Authors

Comprehensive automobile insurance is considered as an important branches in the portfolio of National Insurance Company in Iraq .Due to the continous accidents the company is endeavouring to   this market.

    The company faces several obstacles and limitations in marketing the policies of this portfolio due to certain factors and influences beyond the control of the company and others internal mainly connected with the reduction of the marketing programmes of the company .

    The target of this study is  to focus the light  upon the interal factors which can be gorerned by the company,confronted and solved.

 

View Publication Preview PDF
Publication Date
Sun Jun 26 2022
Journal Name
جامعة بغداد/ كلية التربية للعلوم الصرفة - ابن الهيثم
برنامج تدريبي قائم على دمج مهارات التفكير المستقبلي مع أنماط التفاعل الصفي وأثره على الكفاءة الذاتية الأكاديمية لمدرسي الرياضيات ومهارات الحل الإبداعي لطلبتهم
...Show More Authors

Publication Date
Mon Dec 05 2022
Journal Name
Baghdad Science Journal
Effects of Castor Oil Nanoemulsion Extracted by Hexane on the Fourth Larval stage of Culex quinquefsciatus from Al Hawizeh Marsh/Iraq, and Non- Targeted Organism
...Show More Authors

           The current study aims to show the importance of plant products as mosquitocides against Culex quinquefasciatus. Castor oil Nanoemulsions were subedit in various ratios including castor oil, ethanol, tween 80, and deionized water by using ultrasonication. Thermodynamic, centrifugation, PH, assay which improved that the formula  of 10 ml  of castor  oil, ethanol  5ml, tween 80 (14 ml) and deionized water 71ml was more stable than other formulas. The stable formula of castor oil nanoemulsion was characterized by transmission electron microscopy (TEM) and dynamic light scattering (DLS). Nanoemulsion droplets were spherical in shape and were found to have a Z-average diameter of 87.4nm. A concentration of ca

... Show More
View Publication Preview PDF
Scopus (3)
Crossref (1)
Scopus Crossref