Preferred Language
Articles
/
LhfKupABVTCNdQwCa5AE
A Proposed Blockchain-Based Digital-Identity Management using ERC 725/735
...Show More Authors

In modern technology, the ownership of electronic data is the key to securing their privacy and identity from any trace or interference. Therefore, a new identity management system called Digital Identity Management, implemented throughout recent years, acts as a holder of the identity data to maintain the holder’s privacy and prevent identity theft. Therefore, an overwhelming number of users have two major problems, users who own data and third-party applications will handle it, and users who have no ownership of their data. Maintaining these identities will be a challenge these days. This paper proposes a system that solves the problem using blockchain technology for Digital Identity Management systems. Blockchain is a powerful technique to build a digital identity in chain matters that enables a secure environment. The idea of Blockchain is to distribute the data across multiple devices in a cryptographic way, which will reduce the ability to an impossible level. Therefore, in this paper a proposed Digital Identity based on Blockchain (ERC 725, and ERC 735) with MD6 as a hashing algorithm will be implemented in a Secure smart contract can prevent function calls from being carried out until the sender has received confirmation from a reliable issuer; for example, we might include a feature that restricts smart contract interactions to legitimate users only. Many additional use cases are possible with ERC-725, including multi-sig execution approvals and contract call verification in place of key validation.

View Publication Preview PDF
Quick Preview PDF
Publication Date
Wed Jan 19 2022
Journal Name
International Journal Of Inventions In Engineering & Science Technology
Biodiversity in the Northern Region using GIS and Remote Sensing
...Show More Authors

Biodiversity, biological diversity, biological diversity, biological diversity, biological diversity, biological diversity, biological diversity (by developmental factors) environmental factors and environmental factors environmental factors and environmental factors and environmental factors Correlation between biology and the succession of geological and historical factors of living organisms and geological and historical factors to the site and what It is surrounded by natural and tourist attractions and the pursuit of scientific methods in order to advance the studies of biological diversity in the region .

Publication Date
Fri Mar 01 2019
Journal Name
Al-khwarizmi Engineering Journal
Improving Wear Properties of 392 Al Alloy Using Centrifugal Casting
...Show More Authors

The microstructure and wear properties of 392 Al alloy with different Mg contents were studied using centrifugal casting. All melted alloys were heated to 800 ºC and poured into the preheated centrifugal casting mold (200-250 ºC) at different mould rotational speeds (1500, 1900 and 2300 r.p.m).  It is clear from the results obtained that wear rate was dependent on the Mg content, applied load and mould rotational speed. Furthermore, wear test showed that the minimum wear rate was found in the inner layer of produced rings at mould rotational speed of 1900 r.p.m and Mg content of 5%.

 

View Publication Preview PDF
Publication Date
Sun Apr 01 2018
Journal Name
Iraqi Journal Of Science
Estimation of The Zenith Path Delay using RTK-DGPS measurements
...Show More Authors

In this paper, the method of estimating the variation of Zenith Path Delay (ZPD) estimation method will be illustrate and evaluate using Real Time Kinematic Differential Global Positioning System (RTK-DGPS). The GPS provides a relative method to remotely sense atmospheric water vapor in any weather condition. The GPS signal delay in the atmosphere can be expressed as ZPD. In order to evaluate the results, four points had been chosen in the university of Baghdad campus to be rover ones, with a fixed Base point. For each rover position a 155 day of coordinates measurements was collected to overcome the results. Many models and mathematic calculations were used to extract the ZPD using the Matlab environment. The result shows that the ZPD valu

... Show More
View Publication Preview PDF
Scopus Crossref
Publication Date
Sun Jul 01 2012
Journal Name
Journal Of Computer Science
Peer-to-Peer Video Conferencing Using Hybrid Content Distribution Model
...Show More Authors

View Publication
Scopus (4)
Crossref (1)
Scopus Crossref
Publication Date
Thu Feb 01 2018
Journal Name
Journal Of Computational And Theoretical Nanoscience
Controlling of Robot Hand by Using Microcontroller with Visual Basic
...Show More Authors

The robot arm is the most popular robotic form used in industry. Thus, it is crucial to make a system programming which could controlled the movement of each part in the industrial robot to make it works properly. One of the simplest models of the robot arm is EDARM ED-7100 which has a controller to control the movement of the robot arm manually. In this study, the robot controller has been redesigned in order to improve this robot's function. The new controller system used AT89S52 microcontroller which has wire connected to the robot hand. A function has been added with this controller to improve the system of controlling and becomes better than the previous system (only manually). The functions of the new system include three mo

... Show More
View Publication
Scopus Crossref
Publication Date
Mon Oct 30 2023
Journal Name
Iraqi Journal Of Science
Arabic Cyberbullying Detection Using Support Vector Machine with Cuckoo Search
...Show More Authors

      Cyberbullying is one of the biggest electronic problems that takes multiple forms of harassment using various social media. Currently, this phenomenon has become very common and is increasing, especially for young people and adolescents. Negative comments have a significant and dangerous impact on society in general and on adolescents in particular. Therefore, one of the most successful prevention methods is to detect and block harmful messages and comments. In this research, negative Arabic comments that refer to cyberbullying will be detected using a support vector machine algorithm. The term frequency-inverse document frequency vectorizer and the count vectorizer methods were used for feature extraction, and the results wer

... Show More
View Publication Preview PDF
Scopus Crossref
Publication Date
Tue Jan 01 2019
Journal Name
Indian Journal Of Public Health Research & Development
Anterior Loop Presence and Extension Using Cone-Beam Computed Tomography
...Show More Authors

View Publication
Scopus (1)
Crossref (1)
Scopus Crossref
Publication Date
Fri Dec 25 2020
Journal Name
Al-nahrain Journal For Engineering Sciences
Comparison Sequences of Pick and Place System Controlled Using PLC
...Show More Authors

Pick and place system is one of the significant employments of modern robots utilized in industrial environments. The objective of this research is to make a comparison of time sequences by combining multiple axes of sequences. A pick-place system implemented with pneumatic linear double-acting cylinders to applicator in automated systems processes for manufacturing. The challenge of 3-axes movement control was achieved using the PLC (Programmable Logic Controller) controller such that the merging between two or three axes was achieved according to the selected sequence of the program. The outcomes show the contrasted sequences and the reference in a constant velocity. The main variable parameter is the number of steps for each sequ

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun Jan 08 2017
Journal Name
International Journal Of Information Technology And Computer Science
Adaptive Modeling of Urban Dynamics during Armada Event using CDRs
...Show More Authors

View Publication
Crossref
Publication Date
Sun Apr 30 2023
Journal Name
Iraqi Journal Of Science
Automatic Numeral Recognition System Using Local Statistical and Geometrical Features
...Show More Authors

     Optical Character Recognition (OCR) research includes computer vision, artificial intelligence, and pattern recognition. Character recognition has garnered a lot of attention in the last decade due to its broad variety of uses and applications, including multiple-choice test data, business documents (e.g., ID cards, bank notes, passports, etc.), and automatic number plate recognition. This paper introduces an automatic recognition system for printed numerals. The automatic reading system is based on extracting local statistical and geometrical features from the text image. Those features are represented by eight vectors extracted from each digit. Two of these features are local statistical (A, A th), and six are local

... Show More
View Publication Preview PDF
Scopus Crossref