Preferred Language
Articles
/
joe-1966
New Research Trends in Designing E-Government Architecture Based on Blockchain Technology
...Show More Authors

Blockchain has garnered the most attention as the most important new technology that supports recent digital transactions via e-government. The most critical challenge for public e-government systems is reducing bureaucracy and increasing the efficiency and performance of administrative processes in these systems since blockchain technology can play a role in a decentralized environment and execute a high level of security transactions and transparency. So, the main objectives of this work are to survey different proposed models for e-government system architecture based on blockchain technology implementation and how these models are validated.  This work studies and analyzes some research trends focused on blockchain and the future of e-governance for connecting citizens and smart cities, such as Using Blockchain in the Notarial Office (NO), using blockchain technology in the management of police complaints, exploring blockchain-enabled end-to-end security e-voting, using blockchain and smart contract technology for trusted and safe property registration and record management, and using a blockchain-enabled Vehicle Certification (BVC) framework. Finally, this work has proven that the issue of transforming governments from the traditional system to electronic governments based on blockchain technology has become an inevitable matter of time.

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Fri Jul 01 2016
Journal Name
Journal Of Economics And Administrative Sciences
The Role of Government Controlling Standards GAO to limit Some of Negative Phenomena According to the Anti-corruption
...Show More Authors

Abstract :

       The research aims to diagnose some of the negative phenomena
 ( Counterfiting , Pettifogging , Embezzlement ) that have been detected over the past ( 2010 – 2014 ), a fixed-term part of the national strategy for the fight against corruption launched by the Joint Council for the fight against corruption in Iraq and measuring the application of government control according to the American standard GAO standards and identifying the potential for the application of those standards gap. It has been collecting data and information of special issues of corruption reports and meeting with (42) employees and the use of a checklist has been prepared for thi

... Show More
View Publication Preview PDF
Crossref
Publication Date
Tue Dec 29 2020
Journal Name
Journal Of Accounting And Financial Studies ( Jafs )
The Impact of Electronic Payment systems on the Profitability of Banks: An applied research on a sample of Iraqi commercial banks
...Show More Authors

Due to technological developments in the Iraqi banking sector, which is the use of electronic payment systems within the banking infrastructure. This has led to speed and accuracy in the completion of transactions, reduced costs, increased revenues and efficiency. This research examines the challenges and risks facing the Iraqi banking sector as a result of its use of electronic payment systems. And show its impact on the profitability of commercial banks. The research was based on the main hypothesis that there is a statistically significant moral impact relationship between electronic payment systems and the profitability of banks. Iraqi commercial banks were chosen as a research community, All Iraqi commercial banks that parti

... Show More
View Publication Preview PDF
Publication Date
Sun Feb 25 2024
Journal Name
Baghdad Science Journal
Efficient Task Scheduling Approach in Edge-Cloud Continuum based on Flower Pollination and Improved Shuffled Frog Leaping Algorithm
...Show More Authors

The rise of edge-cloud continuum computing is a result of the growing significance of edge computing, which has become a complementary or substitute option for traditional cloud services. The convergence of networking and computers presents a notable challenge due to their distinct historical development. Task scheduling is a major challenge in the context of edge-cloud continuum computing. The selection of the execution location of tasks, is crucial in meeting the quality-of-service (QoS) requirements of applications. An efficient scheduling strategy for distributing workloads among virtual machines in the edge-cloud continuum data center is mandatory to ensure the fulfilment of QoS requirements for both customer and service provider. E

... Show More
View Publication Preview PDF
Scopus (5)
Crossref (2)
Scopus Crossref
Publication Date
Sun Jan 01 2023
Journal Name
Journal Of Indian Academy Of Oral Medicine And Radiology
The Degenerative Condylar Change in Temporomandibular Joint Disorder of Iraqi Population and their Variability Based on Clinical Diagnosis
...Show More Authors

Background: As a multifactorial disorder, temporomandibular joint (TMD) is difficult to diagnose, and multiple factors affect the joint and cause the temporomandibular disorder. Standardization of clinical diagnosis of TMD should be used to reach a definite clinical diagnosis; the condylar bone may degenerate in accordance with these disorders. Aims: Evaluate the correlation between the clinical diagnosis and degenerative condylar change (flattening, sclerosis, erosion, and osteophyte). Materials and Methods: A prospective study with a study group of 97 TMD patients (total of 194 joints) aged 20 to 50. Patients were sent to cone beam computed tomography (CBCT) to assess the degenerative condylar change. Results: No association was found bet

... Show More
View Publication Preview PDF
Crossref (1)
Scopus Clarivate Crossref
Publication Date
Mon Aug 01 2011
Journal Name
Journal Of Engineering
DAMAGE DETECTION AND LOCATION FOR IN AND OUT-OFPLANE CURVED BEAMS USING FUZZY LOGIC BASED ON FREQUENCY DIFFERENCE
...Show More Authors

In this study, structures damage identification method based on changes in the dynamic characteristics
(frequencies) of the structure are examined, stiffness as well as mass matrices of the curved
(in and out-of-plane vibration) beam elements is formulated using Hamilton's principle. Each node
of both of them possesses seven degrees of freedom including the warping degree of freedom. The
curved beam element had been derived based on the Kang and Yoo’s thin-walled curved beam theory
in 1994. A computer program was developing to carry out free vibration analyses of the curved
beam as well as straight beam. Comparing with the frequencies for other researchers using the general
purpose program MATLAB. Fuzzy logic syste

... Show More
View Publication Preview PDF
Crossref (3)
Crossref
Publication Date
Sun Oct 31 2021
Journal Name
Iraqi Geological Journal
Estimate Gas Initially in Place of Tight Gas Reservoirs Based on Developed Methodology of Dynamic Material Balance Technique
...Show More Authors

With growing global demand for hydrocarbons and decreasing conventional reserves, the gas industry is shifting its focus in the direction of unconventional reservoirs. Tight gas reservoirs have typically been deemed uneconomical due to their low permeability which is understood to be below 0.1mD, requiring advanced drilling techniques and stimulation to enhance hydrocarbons. However, the first step in determining the economic viability of the reservoir is to see how much gas is initially in place. Numerical simulation has been regarded across the industry as the most accurate form of gas estimation, however, is extremely costly and time consuming. The aim of this study is to provide a framework for a simple analytical method to esti

... Show More
Preview PDF
Scopus (4)
Crossref (1)
Scopus Crossref
Publication Date
Tue Aug 24 2021
Journal Name
Periodicals Of Engineering And Natural Sciences (pen)
A plan for transportation and distribution the products based on multi-objective travelling salesman problem in fuzzy environmental
...Show More Authors

Transportation and distribution are the most important elements in the work system for any company, which are of great importance in the success of the chain work. Al-Rabee factory is one of the largest ice cream factories in Iraq and it is considered one of the most productive and diversified factories with products where its products cover most areas of the capital Baghdad, however, it lacks a distribution system based on scientific and mathematical methods to work in the transportation and distribution processes, moreover, these processes need a set of important data that cannot in any way be separated from the reality of fuzziness industrial environment in Iraq, which led to use the fuzzy sets theory to reduce the levels of uncertainty.

... Show More
View Publication Preview PDF
Scopus (2)
Crossref (1)
Scopus Crossref
Publication Date
Sun Jun 30 2013
Journal Name
Al-khwarizmi Engineering Journal
Estimated Outlet Temperatures in Shell-and-Tube Heat Exchanger Using Artificial Neural Network Approach Based on Practical Data
...Show More Authors

The objective of this study is to apply Artificial Neural Network for heat transfer analysis of shell-and-tube heat exchangers widely used in power plants and refineries. Practical data was obtained by using industrial heat exchanger operating in power generation department of Dura refinery. The commonly used Back Propagation (BP) algorithm was used to train and test networks by divided the data to three samples (training, validation and testing data) to give more approach data with actual case. Inputs of the neural network include inlet water temperature, inlet air temperature and mass flow rate of air. Two outputs (exit water temperature to cooling tower and exit air temperature to second stage of air compressor) were taken in ANN.

... Show More
View Publication Preview PDF
Publication Date
Sun Jul 09 2023
Journal Name
Journal Of Engineering
New Approach in Detection MAC Spoofing in a WiFi LAN
...Show More Authors

Medium Access Control (MAC) spoofing attacks relate to an attacker altering the manufacturer assigned MAC address to any other value. MAC spoofing attacks in Wireless Fidelity (WiFi) network are simple because of the ease of access to the tools of the MAC fraud on the Internet like MAC Makeup, and in addition to that the MAC address can be changed manually without software. MAC spoofing attacks are considered one of the most intensive attacks in the WiFi network; as result for that, many MAC spoofing detection systems were built, each of which comes with its strength and weak points. This paper logically identifies and recognizes the weak points
and masquerading paths that penetrate the up-to-date existing detection systems. Then the

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sat Feb 22 2020
Journal Name
Journal Of Economics And Administrative Sciences
The impact of time management on the performance of the functional business: Survey study at Al Salam General Company for Communications and Information Technology
...Show More Authors

The aim of the research is to know the level of time management application and its impact on the performance of the job, a survey search in the general company for communication and information technology and provide recommendations that help employees to optimize the use of time and improve performance, which is an important element in controlling the various functions of the company. In order to achieve the objectives of the research, the questionnaire was based on two main variables and distributed to a random sample of (44) employees in the company out of (308) employees, thus the proportion of the sample (14%). After collecting the samples from the sample, there are (6) incomplete forms that have been retri

... Show More
View Publication Preview PDF
Crossref