Preferred Language
Articles
/
bsj-8164
Secure Smart Contract Based on Blockchain to Prevent the Non-Repudiation Phenomenon
...Show More Authors

Blockchain is an innovative technology that has gained interest in all sectors in the era of digital transformation where it manages transactions and saves them in a database. With the increasing financial transactions and the rapidly developed society with growing businesses many people looking for the dream of a better financially independent life, stray from large corporations and organizations to form startups and small businesses. Recently, the increasing demand for employees or institutes to prepare and manage contracts, papers, and the verifications process, in addition to human mistakes led to the emergence of a smart contract. The smart contract has been developed to save time and provide more confidence while dealing, as well as to cover the security aspects of digital management and to solve negotiation concerns. The smart contract was employed in creating a distributed ledger to eliminate the need for centralization. In this paper, a simple prototype has been implemented for the smart contract integrated with blockchain which is simulated in a local server with a set of nodes. Several security objectives, such as confidentiality, authorization, integrity, and non-repudiation, have been achieved in the proposed system. Besides, the paper discussed the importance of using the Blockchain technique, and how it contributed to the management of transactions in addition to how it was implemented in highly transparent real-estate scenarios. The smart contract was employed in creating a distributed ledger to eliminate the need for centralization. The elliptic-curve public key has been adopted as an alternative for the RSA in a signature generation/verification process and encryption protocol. For secure transactions, The Secure Socket Layer (SSL) also has been adopted as a secure layer in the web browser. The results have been investigated and evaluated from different aspects and the implementation was in a restricted environment. Experiments showed us the complexity of time and cost when using the (ECC) algorithm and using (RSA) algorithm depending on the size and length of the key. So if the size of the key in (ECC) equals (160) bits, and it corresponds to (1024) bits in (RSA), which is equivalent to 40% for (ECC) and 30% for (RSA). As a result, the (ECC) algorithm is complex, its key is smaller and the process of generating the key is faster, so it has achieved a high level of security.

Scopus Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Sat Jun 01 2013
Journal Name
Journal Of Economics And Administrative Sciences
An Exploratory Study of the Relationships between Advertising Appeals, Attitudes toward Advertising , and Consumer buying Behavior of Smart phone
...Show More Authors

Abstract

Purpose of this study is to investigate the relationship between Advertising Appeals, Attitudes toward Advertising, and Consumer Buying Behavior for Smart Phone The study was carried out on the students of Middle East University (MEU) In Amman- Jordan.  A measurement scales  with acceptable reliability and validity is developed to capture the dimensions of study variables.  Four hypotheses were tested using Statistical package (SPSS-17).  A two-step detailed statistical analysis of data was involved. First, descriptive statistics was performed to understand the underlying components of study variables; second, regression analysis and Path analysis using AMOS 7 were performed t

... Show More
View Publication Preview PDF
Crossref
Publication Date
Fri Dec 31 2010
Journal Name
International Journal Of Advancements In Computing Technology
A proposed Technique for Information Hiding Based on DCT
...Show More Authors

The aim of this work is to design an algorithm which combines between steganography andcryptography that can hide a text in an image in a way that prevents, as much as possible, anysuspicion of the hidden textThe proposed system depends upon preparing the image data for the next step (DCT Quantization)through steganographic process and using two levels of security: the RSA algorithm and the digitalsignature, then storing the image in a JPEG format. In this case, the secret message will be looked asplaintext with digital signature while the cover is a coloured image. Then, the results of the algorithmare submitted to many criteria in order to be evaluated that prove the sufficiency of the algorithm andits activity. Thus, the proposed algorit

... Show More
View Publication Preview PDF
Crossref (2)
Crossref
Publication Date
Thu Feb 07 2019
Journal Name
Iraqi Journal Of Laser
Laser Enhanced Photocatalyic Degradation of Methylene blue using Nanostructured ZnO Catalyst based on Interfacial Charge Transfer
...Show More Authors

In this research, annealed nanostructured ZnO catalyst water putrefaction system was built using sun light and different wavelength lasers as stimulating light sources to enhance photocatalytic degradation activity of methylene blue (MB) dye as a model based on interfacial charges transfer. The structural, crystallite size, morphological, particle size, optical properties and degradation ability of annealed nanostructured ZnO were characterized by X-Ray Diffraction (XRD), Atomic Force Microscopy (AFM) and UV-VIS Spectrometer, respectively. XRD results demonstrated a pure crystalline hexagonal wurtzite with crystalline size equal to 23 nm. From AFM results, the average particle size was 79.25nm. All MB samples and MB with annealed nanostr

... Show More
View Publication Preview PDF
Publication Date
Sun Jun 20 2021
Journal Name
Baghdad Science Journal
Reinforcement Learning-Based Television White Space Database
...Show More Authors

Television white spaces (TVWSs) refer to the unused part of the spectrum under the very high frequency (VHF) and ultra-high frequency (UHF) bands. TVWS are frequencies under licenced primary users (PUs) that are not being used and are available for secondary users (SUs). There are several ways of implementing TVWS in communications, one of which is the use of TVWS database (TVWSDB). The primary purpose of TVWSDB is to protect PUs from interference with SUs. There are several geolocation databases available for this purpose. However, it is unclear if those databases have the prediction feature that gives TVWSDB the capability of decreasing the number of inquiries from SUs. With this in mind, the authors present a reinforcement learning-ba

... Show More
View Publication Preview PDF
Scopus (3)
Scopus Clarivate Crossref
Publication Date
Tue Oct 01 2013
Journal Name
Journal Of Economics And Administrative Sciences
Using Benford’s law to detecting earnings management Application on a sample of listed companies in the Iraqi market for securities
...Show More Authors

 

Abstract

The net profit reported in the annual financial statements of the companies listed in the financial markets, is considered one of the Sources of information relied upon by users of accounting information in making their investment decisions. At the same time be relied upon in calculating the bonus (Incentives) granted to management, therefore the management of companies to manipulate those numbers in order to increase those bonuses associated to earnings, This practices are called earnings management practices. the manipulation in the figures of earnings by management will mislead the users  of financial statements who depend on reported earnings in their deci

... Show More
View Publication Preview PDF
Crossref
Publication Date
Tue Aug 03 2021
Journal Name
Journal Of Accounting And Financial Studies ( Jafs )
Measurement and accounting disclosure for small and medium-sized enterprises according to the International Financial Reporting Standard (SMEs) and its reflection on the fairness of financial statements.
...Show More Authors

The research aims to identify small and medium enterprises in accounting thought in terms of definition and concept, and this international financial reporting standard for small and medium-sized enterprises (SMEs) in the theoretical aspect. As for the practical aspect, the small and medium-sized enterprises standard has been applied to the financial statements of the company in question, the preparation of the opening entry on the date of the transition, the requirements of measurement and the accounting disclosure on the date following the application of the standard, and the preparation of the company's financial statements and the accompanying explanations according to the standard of small and medium-sized enterprises. The r

... Show More
View Publication Preview PDF
Publication Date
Thu Jun 27 2019
Journal Name
Journal Of The College Of Education For Women
The Formula of the Name (Faael) in Plural According to the Dictionary Use
...Show More Authors

The grammar structure transforms from its fundamental field to another field that takes new dimensions, and is used in another way in speech that differs from the first one, because the formula basis of the name(Faael) in speech is a (distorted characteristic), and the distorted characteristic indicates the stability and the necessity of the characterized. as this characteristic has changed from its use as a distorted characteristic which was established by the elders. to a use that differs from the first and cannot be overlooked to achieve a new purpose, to be used as plural

View Publication Preview PDF
Publication Date
Sat Sep 01 2007
Journal Name
Journal Of Economics And Administrative Sciences
انعكاسات ظاهرة العولمة في أبراز أهمية احتضان الأعمال
...Show More Authors

ملخص البحث

العولمة ظاهرة اقتصادية سياسية اجتماعية لها انعكاساتها المختلفة على المجتمعات وعلى منظمات الأعمال في مختلف دول العالم، هذه الظاهرة أدت إلى المزيد من النتائج التي زادت منظمات الأعمال في الدول الغنية غناً وزادت منظمات الأعمال في دول العالم الثالث فقر، وقد ترتب على ذلك نتائج ايجابية لدى المجتمعات الغربية والمؤتلفة معها بسبب سيطرة منظمات الأعمال في تلك الدول على الأسواق في البلدان الن

... Show More
View Publication Preview PDF
Crossref
Publication Date
Mon Dec 26 2022
Journal Name
Arab Science Heritage Journal
أثر اللهجات العربية في إغناء ظاهرة الإتباع الحركي
...Show More Authors

       In research it is an important phonemic change for the speaker to reach Ease and lightness ,wich is the kinetic follow-up , and we tried to collect the scattered matter in the various dialects

View Publication Preview PDF
Publication Date
Mon Dec 01 2008
Journal Name
Journal Of Economics And Administrative Sciences
ظاهرة العاملين المؤقتين ( الدور المتنامي في ظل العالمية)
...Show More Authors

The research intended to take into consideration the phenomena of employing the temporary employees through the business organization increasingly, which has become one of the most apparent features of the contemporary strategy of the human resources management. It depends on the analytical descrptive Approach to meet the research problem which has been focalized around the dispute praising regarding the phenomena of the temporary employment and its dimensions and challenges which can be faced by the management of human resources as a result .The importance of the research is represented as one of rare research which confronts to the phenomena of the temporary employment in the Iraqi business environment. The most prominent objec

... Show More
View Publication Preview PDF
Crossref