Preferred Language
Articles
/
bsj-9735
Optimizing Blockchain Consensus: Incorporating Trust Value in the Practical Byzantine Fault Tolerance Algorithm with Boneh-Lynn-Shacham Aggregate Signature
...Show More Authors

The consensus algorithm is the core mechanism of blockchain and is used to ensure data consistency among blockchain nodes. The PBFT consensus algorithm is widely used in alliance chains because it is resistant to Byzantine errors. However, the present PBFT (Practical Byzantine Fault Tolerance) still has issues with master node selection that is random and complicated communication. The IBFT consensus technique, which is enhanced, is proposed in this study and is based on node trust value and BLS (Boneh-Lynn-Shacham) aggregate signature. In IBFT, multi-level indicators are used to calculate the trust value of each node, and some nodes are selected to take part in network consensus as a result of this calculation. The master node is chosen from among them based on which node has the highest trust value, it transforms the BLS signature process into the information interaction process between nodes. Consequently, communication complexity is reduced, and node-to-node information exchange remains secure. The simulation experiment findings demonstrate that the IBFT consensus method enhances transaction throughput rate by 61% and reduces latency by 13% when compared to the PBFT algorithm.

Scopus Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Sun Oct 01 2017
Journal Name
Journal Of Educational And Psychological Researches
أثر انموذج دانيال في الدافعية المعرفية لطلاب الصف الثالث المتوسط
...Show More Authors

The Current research aims to identify ( The effects of Daniel Model in Cognitive Motivation for the Students of the Third grade average ) , To verify the objective of this research , the researchers added nul hypothesis following : There is no difference is statistically significant at the level of ( 0.05 ) between the average scores of students who studied Daniel Model and the average students who studied by using traditional method in Cognitive Motivation scale. The research was conducted on a sample of the average Third grade students in a medium Al – sadiq Al – Ameen secretary for boys affiliated to the General Directorate for Educational in Baghdad Al – rusafa 2 and for academic year ( 2014 – 2015 ) , the researchers adopted

... Show More
View Publication Preview PDF
Publication Date
Wed Oct 31 2018
Journal Name
Arab Science Heritage Journal
الدور الدور العلمي للمرأة في التراث البغدادي ( العصر العباسي أنموذجاً )
...Show More Authors

تناول البحث اثر النساء في البيت العباسي وتأثيرهن الثقافي والعلمي في التراث البغدادي ، وانعكاسه على الواقع الاجتماعي الذي يعد بحد ذاته مظهر من مظاهر الانسجام والتلاحم بين الماضي والحاضر إذ تركن أثرا بارزا في الحضارة والعلم وأسهمن بصورة مباشره او غير مباشره في دعم وتطور الحضارة  العربية الإسلامية .

View Publication Preview PDF
Publication Date
Sun Jan 13 2019
Journal Name
Arab Science Heritage Journal
الشيخ الحاج محمد الأمين وجهاده القومي الإسلامي في السودان الغربي
...Show More Authors

الشيخ الحاج محمد الأمين، من الشخصيات التي كتبت بعلامات بارزة تاريخ شعبها والمنطقة، من خلال مقاومة الاحتلال الفرنسي الصليبي في السودان الغربي، ونشره الاسلام بين القبائل الوثنية، القاطنة هناك  و قيادة حركة قومية إسلامية لإعادة أمجاد الشعب السراكولا ،وإحياء إمبراطورية غانا الإسلامية والتي كانت تشكل الجزء الأغلب من السودان الغربي.   

View Publication Preview PDF
Publication Date
Wed Jun 07 2023
Journal Name
Journal Of Educational And Psychological Researches
Omani Second-Cycle Students’ Motivations for Electronic Games
...Show More Authors

The current study aims to investigate the second cycle students’ motives for using electronic games in Oman. The sample consisted of (570) students, (346 males and 224 females). The participants completed an open-ended question which was analyzed based on ground theory. The results showed that (46.820%) of the males and (77.678) of the females played electronic games for pleasure, entertainment, and fun. This first category of motivation got the highest percentage of frequency (58.947%). The motive to become a hacker, a popular YouTuber got the lowest percentage (2.280%). Other students’ motives toward playing electronic games included: filling the leisure time, overcoming boredom, feeling adventures, getting science fiction and chal

... Show More
View Publication Preview PDF
Publication Date
Tue Mar 30 2021
Journal Name
Baghdad Science Journal
Variant Domination Types for a Complete h-ary Tree
...Show More Authors

Graph  is a tool that can be used to simplify and solve network problems. Domination is a typical network problem that graph theory is well suited for. A subset of nodes in any network is called dominating if every node is contained in this subset, or is connected to a node in it via an edge. Because of the importance of domination in different areas, variant types of domination have been introduced according to the purpose they are used for. In this paper, two domination parameters the first is the restrained and the second is secure domination have been chosn. The secure domination, and some types of restrained domination in one type of trees is called complete ary tree  are determined.

View Publication Preview PDF
Scopus (19)
Crossref (3)
Scopus Clarivate Crossref
Publication Date
Wed Jun 22 2022
Journal Name
Arab Science Heritage Journal
تسميةُ بعض الأعمال(كُفْراً) في أحاديثِ الكتبِ الستةِ (دراسة تحليلية)
...Show More Authors

This search aimed to show a series of converses that our prophet [peace be upon him] call ,some of them , (Kufraa) , and explain the meaning of (AI-kufr) that called on some works , so does it mean the apparent part or the pronunciation of(Al-Kufr) has another meanings ?

View Publication Preview PDF
Crossref
Publication Date
Mon Jan 07 2019
Journal Name
Arab Science Heritage Journal
مرويات أبو حنيفة الدنيوري عن النبات في معجم لسان العرب
...Show More Authors

        يأخذ هذا النوع من الدراسات أهميته في مجال الدراسات التاريخية لاسيما انه يقوم على أساس البحث والتقصي عن بعض الظواهر في المعاجم كونها  تمثل المصدر الأساسي الذي وجدنا فيه الجزء الأعظم من  تلك المادة المفقودة لكتاب النبات لابو حنيفة الدينوري.

View Publication Preview PDF
Publication Date
Sun Jan 02 2022
Journal Name
Journal Of The College Of Languages (jcl)
A Criticism and study of “The Arabic translations of contemporary Persian novels” (“Translations of Muhammad Alauddin Mansour” as a model): قنقـــد و بررسی ترجمـــــه¬ی عربی رمــــان¬های معـــــاصر فــــارسی (ترجمه¬های محمد علاء الدین منصور- بررسی نمونه¬ای)
...Show More Authors

     Arab translators have always paid great attention to the translation of the Persian literary genres, in particular, contemporary Iranian novels. They have always translated for the most prominent Iranian novelists such as Jalal Al Ahmad, Sadiq Hidayat, Mahmoud Dowlatabadi, Bozorg Alavi, Ismail Fasih‎, Houshang Golshiri, Gholam-Hossein Saedi, Simin Daneshvar, Sadiq Chubak, Samad Behrangi and others that have succeeded in perfectly picturing the Iranian society.

      Within the perspectives of Arab translators and by using the descriptive - analytical approach, the present study provides an analytical study of the translation into Arabic some of the modern Persian novels. Moreove

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun Feb 25 2024
Journal Name
Baghdad Science Journal
An exploratory study of history-based test case prioritization techniques on different datasets
...Show More Authors

In regression testing, Test case prioritization (TCP) is a technique to arrange all the available test cases. TCP techniques can improve fault detection performance which is measured by the average percentage of fault detection (APFD). History-based TCP is one of the TCP techniques that consider the history of past data to prioritize test cases. The issue of equal priority allocation to test cases is a common problem for most TCP techniques. However, this problem has not been explored in history-based TCP techniques. To solve this problem in regression testing, most of the researchers resort to random sorting of test cases. This study aims to investigate equal priority in history-based TCP techniques. The first objective is to implement

... Show More
View Publication Preview PDF
Scopus (2)
Crossref (1)
Scopus Crossref
Publication Date
Tue Jun 01 2021
Journal Name
Baghdad Science Journal
A New Methodology to Find Private Key of RSA Based on Euler Totient Function
...Show More Authors

          The aim of this paper is to present a new methodology to find the private key of RSA. A new initial value which is generated from a new equation is selected to speed up the process. In fact, after this value is found, brute force attack is chosen to discover the private key. In addition, for a proposed equation, the multiplier of Euler totient function to find both of the public key and the private key is assigned as 1. Then, it implies that an equation that estimates a new initial value is suitable for the small multiplier. The experimental results show that if all prime factors of the modulus are assigned larger than 3 and the multiplier is 1, the distance between an initial value and the private key

... Show More
View Publication Preview PDF
Scopus (12)
Crossref (3)
Scopus Clarivate Crossref