Preferred Language
Articles
/
bsj-9735
Optimizing Blockchain Consensus: Incorporating Trust Value in the Practical Byzantine Fault Tolerance Algorithm with Boneh-Lynn-Shacham Aggregate Signature
...Show More Authors

The consensus algorithm is the core mechanism of blockchain and is used to ensure data consistency among blockchain nodes. The PBFT consensus algorithm is widely used in alliance chains because it is resistant to Byzantine errors. However, the present PBFT (Practical Byzantine Fault Tolerance) still has issues with master node selection that is random and complicated communication. The IBFT consensus technique, which is enhanced, is proposed in this study and is based on node trust value and BLS (Boneh-Lynn-Shacham) aggregate signature. In IBFT, multi-level indicators are used to calculate the trust value of each node, and some nodes are selected to take part in network consensus as a result of this calculation. The master node is chosen from among them based on which node has the highest trust value, it transforms the BLS signature process into the information interaction process between nodes. Consequently, communication complexity is reduced, and node-to-node information exchange remains secure. The simulation experiment findings demonstrate that the IBFT consensus method enhances transaction throughput rate by 61% and reduces latency by 13% when compared to the PBFT algorithm.

Scopus Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Thu Jul 01 2021
Journal Name
مجلة اداب ذي قار
دور الفضائيات الموجهة الناطقة بالعربية في تشكيل معارف واتجاهات الجمهور العراقي ازاء البرلمان العراقي
...Show More Authors

Publication Date
Fri Apr 01 2016
Journal Name
Journal Of Economics And Administrative Sciences
Quality, nursing service quality, accreditation standards, standards of nursing practice
...Show More Authors

Abstract

      health organizations are trying to  introduce  services of high quality and efficiency which requires  applying some standards of nursing career to improve nursing service quality in the hospital, which provides an essential data base key to diagnosis the negative and positive part in nursing services to guarantee the quality of services presented .  The aim of this study is to evaluated the quality of  nursing service through stating the indicators of nursing career standards by comparing the reality of the a hospital with what should standards . In addition , adapting nursing career standards with what is suitable for hos

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sat Sep 01 2007
Journal Name
Journal Of Economics And Administrative Sciences
صياغة أهداف المحاسبة والتقارير المالية في ظل اختلاف المتغيرات البيئية أفكار مطروحة وأراء مقترحة
...Show More Authors

المقدمة ومنهجية البحث

تتفق أغلب الأدبيات ومنها المحاسبية, بأن الخطوة الأولى في وضع وتقييم أي نظام إداري أو محاسبي هي في صياغة أهداف ذلك النظام لما لذلك من أهمية في توفير معيار للحكم على كفاءة التطبيق من عدمه.

وتعرف الأهداف بأنها (النهايات التي تعمل أو توجه النشاطات باتجاهها أو هي النهايات التي تطمح النشاطات تحقيقها). ( 1 ) ..,

 كما تعرف أيضا بأنها (الأ

... Show More
View Publication Preview PDF
Crossref
Publication Date
Tue Feb 01 2022
Journal Name
Baghdad Science Journal
Milk Tumor Necrosis Factor Alpha and Interleukin-1Beta Among Toxoplasma gondii-Free and Infected Women
...Show More Authors

Pro-inflammatory cytokines play an important role in intercellular communications. In the last two decades, many cytokines have been identified in human milk. These cytokines are variable according to different conditions such as pathogenic infections which strongly stimulated the immune response. The present study aims to determine of IL1β and TNF-α in Toxoplasma gondii-free and infected women in an attempt to clarify the impacts of the infections on cytokines especially in mother's milk. The serum and milk sample were collected from 96 samples (48 for seropositive and 48 for seronegative). To confirm the Toxoplasma gondii infection; enzyme linked immunofluorescence assay (ELIFA) was used to detect anti-Toxoplasma Ig

... Show More
View Publication Preview PDF
Scopus (7)
Scopus Clarivate Crossref
Publication Date
Tue Jan 01 2008
Journal Name
Journal Of Educational And Psychological Researches
أثر تدريس المواد البيئية في تنمية الاتجاهات البيئية لطالبات كلية العلوم للبنات – جامعة بغداد
...Show More Authors

يهدف البحث إلى استقصاء أثر دراسة طالبات كلية العلوم للبنات في جامعة بغداد لمقرر التلوث البيئي في تنمية اتجاهاتهن البيئية، وذلك من خلال التعرّف على النمو في المستوى العام لاتجاهات الطالبات البيئية والكشف عن الفروق الإحصائية في اتجاهاتهن قبل وبعد دراسة المقرر.

وقد تألفت عينة البحث من(50) طالبة من طالبات قسم الفيزياء / الفيزياء الطبية المرحلة الأولى في كلية العلوم للبنات- جامعة بغداد. اعتمدت ا

... Show More
View Publication Preview PDF
Publication Date
Sun Jun 01 2014
Journal Name
Baghdad Science Journal
Image Steganography by Using Multiwavelet Transform
...Show More Authors

Steganography is the art of secret communication. Its purpose is to hide the presence of information, using, for example, images as covers. The frequency domain is well suited for embedding in image, since hiding in this frequency domain coefficients is robust to many attacks. This paper proposed hiding a secret image of size equal to quarter of the cover one. Set Partitioning in Hierarchal Trees (SPIHT) codec is used to code the secret image to achieve security. The proposed method applies Discrete Multiwavelet Transform (DMWT) for cover image. The coded bit stream of the secret image is embedded in the high frequency subbands of the transformed cover one. A scaling factors ? and ? in frequency domain control the quality of the stego

... Show More
View Publication Preview PDF
Crossref
Publication Date
Tue Apr 02 2024
Journal Name
Al-iraqia Journal Of Scientific Engineering Research
Prioritise Five Tafseer Translators Using Clustering Technique for Surah Al-Baqarah
...Show More Authors

View Publication Preview PDF
Crossref
Publication Date
Wed Mar 08 2017
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Genetic –Based Face Retrieval Using Statistical Features
...Show More Authors

Content-based image retrieval has been keenly developed in numerous fields. This provides more active management and retrieval of images than the keyword-based method. So the content based image retrieval becomes one of the liveliest researches in the past few years. In a given set of objects, the retrieval of information suggests solutions to search for those in response to a particular description. The set of objects which can be considered are documents, images, videos, or sounds. This paper proposes a method to retrieve a multi-view face from a large face database according to color and texture attributes. Some of the features used for retrieval are color attributes such as the mean, the variance, and the color image's bitmap. In add

... Show More
View Publication Preview PDF
Publication Date
Wed Dec 25 2019
Journal Name
Journal Of Engineering
Link Failure Recovery for a Large-Scale Video Surveillance System using a Software-Defined Network
...Show More Authors

The software-defined network (SDN) is a new technology that separates the control plane from data plane for the network devices. One of the most significant issues in the video surveillance system is the link failure. When the path failure occurs, the monitoring center cannot receive the video from the cameras. In this paper, two methods are proposed to solve this problem.  The first method uses the Dijkstra algorithm to re-find the path at the source node switch. The second method uses the Dijkstra algorithm to re-find the path at the ingress node switch (or failed link).

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Wed Aug 28 2024
Journal Name
Mesopotamian Journal Of Cybersecurity
A Novel Anomaly Intrusion Detection Method based on RNA Encoding and ResNet50 Model
...Show More Authors

Cybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a

... Show More
View Publication
Scopus (6)
Scopus Crossref