Blockchain is an innovative technology that has gained interest in all sectors in the era of digital transformation where it manages transactions and saves them in a database. With the increasing financial transactions and the rapidly developed society with growing businesses many people looking for the dream of a better financially independent life, stray from large corporations and organizations to form startups and small businesses. Recently, the increasing demand for employees or institutes to prepare and manage contracts, papers, and the verifications process, in addition to human mistakes led to the emergence of a smart contract. The smart contract has been developed to save time and provide more confidence while dealing, as well as to cover the security aspects of digital management and to solve negotiation concerns. The smart contract was employed in creating a distributed ledger to eliminate the need for centralization. In this paper, a simple prototype has been implemented for the smart contract integrated with blockchain which is simulated in a local server with a set of nodes. Several security objectives, such as confidentiality, authorization, integrity, and non-repudiation, have been achieved in the proposed system. Besides, the paper discussed the importance of using the Blockchain technique, and how it contributed to the management of transactions in addition to how it was implemented in highly transparent real-estate scenarios. The smart contract was employed in creating a distributed ledger to eliminate the need for centralization. The elliptic-curve public key has been adopted as an alternative for the RSA in a signature generation/verification process and encryption protocol. For secure transactions, The Secure Socket Layer (SSL) also has been adopted as a secure layer in the web browser. The results have been investigated and evaluated from different aspects and the implementation was in a restricted environment. Experiments showed us the complexity of time and cost when using the (ECC) algorithm and using (RSA) algorithm depending on the size and length of the key. So if the size of the key in (ECC) equals (160) bits, and it corresponds to (1024) bits in (RSA), which is equivalent to 40% for (ECC) and 30% for (RSA). As a result, the (ECC) algorithm is complex, its key is smaller and the process of generating the key is faster, so it has achieved a high level of security.
Abstract:
The research aims to identify the concept of trading securities in Iraq and to propose a new mechanism for the taxation of trading profits and the extent of its impact on tax revenues, as it was observed that there are professional investors in the trading market and some of them achieve huge annual profits. and this profit should be like other taxable profits. The General Commission of Taxes and in cooperation with the Iraq Stock Exchange should identifying those profits, subjecting them to income tax, and adding them to the tax base. The researcher relied on the use of the descriptive and analytical approach bas
... Show MoreThis research includes the application of non-parametric methods in estimating the conditional survival function represented in a method (Turnbull) and (Generalization Turnbull's) using data for Interval censored of breast cancer and two types of treatment, Chemotherapy and radiation therapy and age is continuous variable, The algorithm of estimators was applied through using (MATLAB) and then the use average Mean Square Error (MSE) as amusement to the estimates and the results showed (generalization of Turnbull's) In estimating the conditional survival function and for both treatments ,The estimated survival of the patients does not show very large differences
... Show MoreThe research aims to identify the extent of the impact of non-Iraqi trading of shares in the Iraq Stock Exchange on the overall financial investment in the market size. And it imposes a search and no statistically significant relationship between variable trading non-Iraqis, the size and the total volume of the market and took the search Iraq Stock Exchange sample to search being the only private place to trade securities in Iraq for the period of 2009- 2015 in order to see if there is a positive impact on the size of trading non-Iraqis or not. Search and adopted the annual reports issued by the Iraq Stock Exchange the main conclusion are:
Having a positive effect on the size of the trading of non-Iraqis in the financial vo
... Show MoreBackground: Diabetes mellitus is one of the commonest chronic disorders worldwide with a rapid rise in prevalence. In Iraq its prevalence is high especially in elderly age group. Patients with type 2 diabetes mellitus have higher vulnerability for complications, whether microvascular or macrovascular. Ocular complications are common in diabetes mellitus, and comprise diabetic retinopathy, diabetic papillopathy, cataract, glaucoma, dry eye disease and diabetic keratopathy. Diabetic keratopathy involves endothelial and epithelial tissues of the cornea, leading to persistent epithelial defect, corneal erosion, or corneal ulcers.
Aim of the Study: To compare the mean corneal endothelial cell count between patients wi
... Show MoreThe design and implementation of an active router architecture that enables flexible network programmability based on so-called "user components" will be presents. This active router is designed to provide maximum flexibility for the development of future network functionality and services. The designed router concentrated mainly on the use of Windows Operating System, enhancing the Active Network Encapsulating Protocol (ANEP). Enhancing ANEP gains a service composition scheme which enables flexible programmability through integration of user components into the router's data path. Also an extended program that creates and then injects data packets into the network stack of the testing machine will be proposed, we will call this program
... Show MoreMarriage outside the court is a manifestation of the oppression that women are subjected to in Iraq its seriousness comes out of the consequences that it leads to The. It overlooks the age of the girl and her marriage in younger age or coerced to marry as it leads to neglecting the affordability of marital relationship as long as the marriage does not have any legal or material consequences. The present study aims to detect Characteristics of both wives, husbands and families Who agree to marry her daughters outside the court. And the reasons that lead them to marry outside the courts. It also aims to provide information on the circumstances of marriage and reasons for refusing to ratify it in court. The study was based on the sample soc
... Show MoreEnsuring security, integrity, and reliability of the election process consider as the main challenges in the electronic voting system. This paper describes the e-voting system by integrating the biometric authentication, advanced encryption, and watermarking techniques towards meeting such challenges. The system employs the fingerprint authentication by utilizing the Scale-Invariant Feature Transform (SIFT) for verifying the identity of the voter to ensure genuineness and non-repudiation of the service. The vote will be encrypted with the AES-GCM technique to be employed in securing the voting process, thus ensuring both data privacy and integrity. Hybrid Blind Watermarking employs the technique of Discrete Wavelet Transform (DWT) a
... Show More