Preferred Language
Articles
/
bsj-9735
Optimizing Blockchain Consensus: Incorporating Trust Value in the Practical Byzantine Fault Tolerance Algorithm with Boneh-Lynn-Shacham Aggregate Signature
...Show More Authors

The consensus algorithm is the core mechanism of blockchain and is used to ensure data consistency among blockchain nodes. The PBFT consensus algorithm is widely used in alliance chains because it is resistant to Byzantine errors. However, the present PBFT (Practical Byzantine Fault Tolerance) still has issues with master node selection that is random and complicated communication. The IBFT consensus technique, which is enhanced, is proposed in this study and is based on node trust value and BLS (Boneh-Lynn-Shacham) aggregate signature. In IBFT, multi-level indicators are used to calculate the trust value of each node, and some nodes are selected to take part in network consensus as a result of this calculation. The master node is chosen from among them based on which node has the highest trust value, it transforms the BLS signature process into the information interaction process between nodes. Consequently, communication complexity is reduced, and node-to-node information exchange remains secure. The simulation experiment findings demonstrate that the IBFT consensus method enhances transaction throughput rate by 61% and reduces latency by 13% when compared to the PBFT algorithm.

Scopus Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Sun Jun 01 2014
Journal Name
Baghdad Science Journal
Image Steganography by Using Multiwavelet Transform
...Show More Authors

Steganography is the art of secret communication. Its purpose is to hide the presence of information, using, for example, images as covers. The frequency domain is well suited for embedding in image, since hiding in this frequency domain coefficients is robust to many attacks. This paper proposed hiding a secret image of size equal to quarter of the cover one. Set Partitioning in Hierarchal Trees (SPIHT) codec is used to code the secret image to achieve security. The proposed method applies Discrete Multiwavelet Transform (DMWT) for cover image. The coded bit stream of the secret image is embedded in the high frequency subbands of the transformed cover one. A scaling factors ? and ? in frequency domain control the quality of the stego

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Wed Dec 25 2019
Journal Name
Journal Of Engineering
Link Failure Recovery for a Large-Scale Video Surveillance System using a Software-Defined Network
...Show More Authors

The software-defined network (SDN) is a new technology that separates the control plane from data plane for the network devices. One of the most significant issues in the video surveillance system is the link failure. When the path failure occurs, the monitoring center cannot receive the video from the cameras. In this paper, two methods are proposed to solve this problem.  The first method uses the Dijkstra algorithm to re-find the path at the source node switch. The second method uses the Dijkstra algorithm to re-find the path at the ingress node switch (or failed link).

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Wed Aug 28 2024
Journal Name
Mesopotamian Journal Of Cybersecurity
A Novel Anomaly Intrusion Detection Method based on RNA Encoding and ResNet50 Model
...Show More Authors

Cybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a

... Show More
View Publication
Scopus (9)
Crossref (4)
Scopus Crossref
Publication Date
Sat Aug 01 2015
Journal Name
Journal Of Engineering
Reducing of Manufacturing Lead Time by Implementation of Lean Manufacturing Principles
...Show More Authors

Many organizations today are  interesting to implementing lean manufacturing principles  that should enable them to eliminating the wastes to reducing a  manufacturing lead time.  This paper concentrates on  increasing  the competitive level of the company in globalization markets and improving of the productivity by reducing the manufacturing lead time. This will be by using the main tool of lean manufacturing which is value stream mapping (VSM) to identifying all the activities of manufacturing process (value and non-value added activities) to reducing elimination of wastes (non-value added activities) by converting a manufacturing system to pull instead of push by applying some of pull system strategies a

... Show More
View Publication Preview PDF
Publication Date
Thu Jan 16 2020
Journal Name
Journal Of Accounting And Financial Studies ( Jafs )
دور معايير التدقيق الدولية في تعزيز خدمات التأكيد: بحث تطبيقي على عينه من مراقبي الحسابات
...Show More Authors

  

View Publication Preview PDF
Publication Date
Fri Jan 01 2010
Journal Name
مجلة العلوم التربوية والنفسية
أثر استراتيجية تعلم الاقران في تصحيح الفهم الخاطئ للمفاهيم الجغرافية لدى طالبات الصف الاول المتوسط
...Show More Authors

يرمي هذا البحث الى تعرف اثر استراتيجية تعليم الاقران في تصحيح الفهم الخاطئ للمفاهيم الجغرافية لدى طالبات الصف الاول متوسط

Preview PDF
Publication Date
Wed Jun 01 2016
Journal Name
Journal Of Economics And Administrative Sciences
Strategic Risk's Variation as a function of Competitive Intelligence Investment - An applied research on some Iraqi's manufacturing Companies –
...Show More Authors

 

ABSTRUCT

          The main aim of this research has been associated with the study of relationship between competitive intelligence and strategic risk, and to deduct their specific trends, which are interpreted as predicted by research hypotheses according to a review of literature including prior studies. The basic theme  of these hypotheses is related to the probability that declining levels of strategic risk and competitive positions of industrial companies is dependent upon the growing capacity to stay ahead of competitors in the market.

    A purposive non-random

... Show More
View Publication Preview PDF
Crossref
Publication Date
Tue Dec 30 2025
Journal Name
دراسات سياسية وإستراتيجية
استراتيجية الحكومات العراقية في تحقيق اهداف التنمية المستدامة بعد عام 2003 )القضاء على الفقر:دراسة حالة(
...Show More Authors

التنمية المستدامة حق لكل البشرية وأنها مفهوم ٌ مركب من عنصرين هما التنمية واالستدامة مهمين متالصقين أي ال يوجد تنمية دون استدامة وال العكس يصح، وأنها تمتلك العديد دراسات سياسية وإستراتيجية من األهداف ويبرز هدف الـ)القضاء على الفقر، والقضاء على الجوع( ومن أهم أهدافها، هذه الظاهرة بارزة في المجتمع العراقي بسبب الحروب واالزمات المتكررة فيه وحاالت الحصار االقتصادي، وكذلك بسبب عدم توزيع موارده بشكل عادل من قبل

... Show More
Preview PDF
Publication Date
Sun Dec 02 2018
Journal Name
Arab Science Heritage Journal
المواقع الجغرافية التابعة لمدينة دمشق في كتاب تاريخ دمشق الكبير لابن عساكر ت 571هـ/1272م
...Show More Authors

the history of Damascus by Ibn ' asaakir d. 571 a.h. 1272 m from local histories books concerned with male citizen narrators, to distinguish between rate and Rob them, this book is more a history of Islamic heritage books on Islamic City, and if we know that Ibn ' asaakir translated it for personal

View Publication Preview PDF
Publication Date
Mon Mar 01 1999
Journal Name
مجلة الاستاذ للعلوم الانسانية والاجتماعية
اخلاقيات مهنة العاملين في المكتبات المركزية الجامعة بغداد والمستنصرية والتكنولوجية من وجهه نظر المستفيدين منها.
...Show More Authors

يهدف البحث إلى معرفة ما هيه اخلاقيات مهنة العاملين في المكتبات وتحديث متطلباتهم الضرورية من المهنة لكي يسمو بأخلاقياتها ، وهل هذه الاخلاقيات متوافرة في العاملين في مكتباتنا الجامعية ضمن حدود الدراسة ؟ ومن ادوات جمع البيانات : استمارة بالاخلاقيات وزعت على مجموعة من الاساتذة و استبانة وزعت على من المكتبات الجامعية . وكان مجتمع الدراسة العاملون في المكتبات المركزية الأولى والثانية لجامعة بغداد والمكتبة المرك

... Show More
Preview PDF