Preferred Language
Articles
/
bsj-8164
Secure Smart Contract Based on Blockchain to Prevent the Non-Repudiation Phenomenon
...Show More Authors

Blockchain is an innovative technology that has gained interest in all sectors in the era of digital transformation where it manages transactions and saves them in a database. With the increasing financial transactions and the rapidly developed society with growing businesses many people looking for the dream of a better financially independent life, stray from large corporations and organizations to form startups and small businesses. Recently, the increasing demand for employees or institutes to prepare and manage contracts, papers, and the verifications process, in addition to human mistakes led to the emergence of a smart contract. The smart contract has been developed to save time and provide more confidence while dealing, as well as to cover the security aspects of digital management and to solve negotiation concerns. The smart contract was employed in creating a distributed ledger to eliminate the need for centralization. In this paper, a simple prototype has been implemented for the smart contract integrated with blockchain which is simulated in a local server with a set of nodes. Several security objectives, such as confidentiality, authorization, integrity, and non-repudiation, have been achieved in the proposed system. Besides, the paper discussed the importance of using the Blockchain technique, and how it contributed to the management of transactions in addition to how it was implemented in highly transparent real-estate scenarios. The smart contract was employed in creating a distributed ledger to eliminate the need for centralization. The elliptic-curve public key has been adopted as an alternative for the RSA in a signature generation/verification process and encryption protocol. For secure transactions, The Secure Socket Layer (SSL) also has been adopted as a secure layer in the web browser. The results have been investigated and evaluated from different aspects and the implementation was in a restricted environment. Experiments showed us the complexity of time and cost when using the (ECC) algorithm and using (RSA) algorithm depending on the size and length of the key. So if the size of the key in (ECC) equals (160) bits, and it corresponds to (1024) bits in (RSA), which is equivalent to 40% for (ECC) and 30% for (RSA). As a result, the (ECC) algorithm is complex, its key is smaller and the process of generating the key is faster, so it has achieved a high level of security.

Scopus Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Sun Mar 26 2017
Journal Name
Iraqi Journal Of Pharmaceutical Sciences ( P-issn 1683 - 3597 E-issn 2521 - 3512)
Potentiometric Transducers for the Selective Recognition of Risperidone Based on Molecularly Imprinted Polymer
...Show More Authors

          Graphite Coated Electrodes (GCE) based on molecularly imprinted polymers were fabricated for the selective potentiometric determination of Risperidone (Ris). The molecularly imprinted (MIP) and nonimprinted (NIP) polymers were synthesized by bulk polymerization using (Ris.) as a template, acrylic acid (AA) and acrylamide (AAm) as monomers, ethylene glycol dimethacrylate (EGDMA) as a cross-linker and benzoyl peroxide (BPO) as an initiator. The imprinted membranes and the non-imprinted membranes were prepared using dioctyl phthalate (DOP) and Dibutylphthalate (DBP) as plasticizers in PVC matrix. The membranes were coated on graphite electrodes. The MIP electrodes using

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Wed Jul 31 2019
Journal Name
Journal Of Educational And Psychological Researches
An Instructional Design According to the constructivism Model for Chemistry Subject and Its Effect on the Life Skill by the Second Intermediate Female Students
...Show More Authors

The research aims to identify the effect of teaching-learning design based on the constructivism theory on the life skills of middle stage students. The sample consisted of (60) students from one of the middle schools in Baghdad's governorate. The experimental group and control group consisted of 30 students for each group, the research tool was the life skills scale composed of (78) items. The scale proved its validity and reliability, which was found to be (0.85). The results showed a statistically significant difference in life skills between the two groups of research in favor of the experimental group, which studied the educational design according to models of constructivism theory compared to the usual method of teaching.

View Publication Preview PDF
Publication Date
Thu Feb 01 2018
Journal Name
Journal Of Economics And Administrative Sciences
The importance of providing Islamic finance services for non- Muslims in Europe
...Show More Authors

Abstract

             This paper follows the growing interest and continuity of Islamic finance products worldwide, which has encouraged the formulation of financial institutions based on the concepts of Islamic Sharia in many countries of the world and is no longer limited to Islamic countries only, and  Not exclusive to Muslims which is due to Islamic finance services and their ability to apply in non-Islamic societies, and perhaps what encouraged the development and progress of this industry Islamic history, which was attended by many different models With the development of trade's share between different countries as well as trips carried out by Muslims

... Show More
View Publication Preview PDF
Crossref
Publication Date
Fri Jun 01 2007
Journal Name
Al-khwarizmi Engineering Journal
Investigation of heat transfer phenomena and flow behavior around electronic chip
...Show More Authors

Computational study of three-dimensional laminar and turbulent flows around electronic chip (heat source) located on a printed circuit board are presented. Computational field involves the solution of elliptic partial differential equations for conservation of mass, momentum, energy, turbulent energy, and its dissipation rate in finite volume form. The k-ε turbulent model was used with the wall function concept near the walls to treat of turbulence effects. The SIMPLE algorithm was selected in this work. The chip is cooled by an external flow of air. The goals of this investigation are to investigate the heat transfer phenomena of electronic chip located in enclosure and how we arrive to optimum level for cooling of this chip. These par

... Show More
View Publication Preview PDF
Publication Date
Mon Jan 23 2023
Journal Name
Arab Science Heritage Journal
ظاهرة المفارقة في كتاب بلاغات النساء دراسة بلاغية اسلوبية
...Show More Authors

The Arab woman expressed the life of oppression that she suffers from in her masculine environment, as she expressed her linguistic abilities with eloquence and intelligence, as she did not neglect philosophy, wisdom,

View Publication Preview PDF
Publication Date
Mon Dec 26 2022
Journal Name
Arab Science Heritage Journal
ظاهرة المفارقة في كتاب بلاغات النساء دراسة بلاغية اسلوبية
...Show More Authors

The Arab woman expressed the life of oppression that she suffers from in her masculine environment, as she expressed her linguistic abilities with eloquence and intelligence, as she did not neglect philosophy, wisdom, and exhortation

View Publication Preview PDF
Publication Date
Wed Sep 01 2010
Journal Name
Journal Of Economics And Administrative Sciences
مكافحة ظاهرة الفساد في إطار تكامل المحتويين الإداري والاستراتيجي
...Show More Authors

ينقسم الاتجاه الأساسي الذي يجري مناقشته في هذه الورقة إلى مستويين: الأول يركز على تحديد مضمون العلاقة بين الشفافية والفساد، فضلا عن توضيح الدور الذي يمكن أن تؤديه أخلاقيات الأعمال، لتثار التساؤلات هي: هل أن الشفافية والفساد متغيرين مرتبطين معا؟ وهل تؤثر الشفافية في الفساد؟ وهل أن وجود الشفافية كفيل بإزاحة الفساد، أم نحتاج إلى شيء أخر يدعم عملية الشفافية؟ وإذا تم التحدث عن الشفافية كمصطلح بدون وجود مما

... Show More
View Publication Preview PDF
Crossref
Publication Date
Wed Dec 01 2010
Journal Name
Journal Of Economics And Administrative Sciences
التدقيق الداخلي وأثرة في الحد من ظاهرة غسيل الأموال
...Show More Authors

Still Financial institutions, including banks, a key target for money launderers to transfer illicit funds to the legitimate funds and by weaknesses in the internal audit procedures applied in the banks or through a lack of legal structure to combat this phenomenon in addition to the procedures by other regulations                                                                

T

... Show More
View Publication Preview PDF
Crossref
Publication Date
Thu Oct 18 2018
Journal Name
Al–bahith Al–a'alami
Public exposure to news satellite channels and its relationship to levels of preference and evaluation of programs: Survey study on a sample of the audience of Baghdad City Cente
...Show More Authors

The media, especially the satellite channels in our time, are one of the most important pillars of daily life, public and private, for society and people, and are considered by sociologists and sociologists as one of the most important factors of social upbringing and the most important, as a result of the technological and technological development of the media as well as increasing their numbers and vertical and horizontal expansion locally, As well as entering into the lives of individuals and people and leading them to important sites within their interests and preferences, not to mention the long time spent exposure to those media and benefit from the programs offered or broadcast. , The problem of this research is that there is a l

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Thu Jun 20 2019
Journal Name
Baghdad Science Journal
Taxonomy of Memory Usage in Swarm Intelligence-Based Metaheuristics
...Show More Authors

Metaheuristics under the swarm intelligence (SI) class have proven to be efficient and have become popular methods for solving different optimization problems. Based on the usage of memory, metaheuristics can be classified into algorithms with memory and without memory (memory-less). The absence of memory in some metaheuristics will lead to the loss of the information gained in previous iterations. The metaheuristics tend to divert from promising areas of solutions search spaces which will lead to non-optimal solutions. This paper aims to review memory usage and its effect on the performance of the main SI-based metaheuristics. Investigation has been performed on SI metaheuristics, memory usage and memory-less metaheuristics, memory char

... Show More
View Publication Preview PDF
Crossref (3)
Clarivate Crossref