Preferred Language
Articles
/
LhfKupABVTCNdQwCa5AE
A Proposed Blockchain-Based Digital-Identity Management using ERC 725/735
...Show More Authors

In modern technology, the ownership of electronic data is the key to securing their privacy and identity from any trace or interference. Therefore, a new identity management system called Digital Identity Management, implemented throughout recent years, acts as a holder of the identity data to maintain the holder’s privacy and prevent identity theft. Therefore, an overwhelming number of users have two major problems, users who own data and third-party applications will handle it, and users who have no ownership of their data. Maintaining these identities will be a challenge these days. This paper proposes a system that solves the problem using blockchain technology for Digital Identity Management systems. Blockchain is a powerful technique to build a digital identity in chain matters that enables a secure environment. The idea of Blockchain is to distribute the data across multiple devices in a cryptographic way, which will reduce the ability to an impossible level. Therefore, in this paper a proposed Digital Identity based on Blockchain (ERC 725, and ERC 735) with MD6 as a hashing algorithm will be implemented in a Secure smart contract can prevent function calls from being carried out until the sender has received confirmation from a reliable issuer; for example, we might include a feature that restricts smart contract interactions to legitimate users only. Many additional use cases are possible with ERC-725, including multi-sig execution approvals and contract call verification in place of key validation.

View Publication Preview PDF
Quick Preview PDF
Publication Date
Mon Feb 13 2023
Journal Name
Journal Of Educational And Psychological Researches
A Proposed Strategy to Develop Postgraduate Studies at King Khalid University to Support the Achievement of the Kingdom's 2030 Vision
...Show More Authors

Abstract

The aim of this research is to formulate a proposed strategy for developing graduate studies at King Khalid University to support the achievement of the Kingdom's vision (2030). The research used the descriptive survey approach. The research community consisted of all graduate students at King Khalid University. The research was conducted on a random sample included (623) Male and female students, this research relied on the questionnaire as the main tool for collecting its data. The results revealed that the research sample believes that all the proposals included in this research are very important for the development of postgraduate studies at King Khalid University to support the achievement of the K

... Show More
View Publication Preview PDF
Publication Date
Wed Sep 28 2022
Journal Name
Journal Of The College Of Education For Women
A Proposed Program from the Perspective of the General Practice of Social Work to Overcome Husbands' Violence Against Their Wives
...Show More Authors

Husbands’ violence towards their wives is one of the greatly important issues in social sciences. Accordingly, the current study aims at determining the levels of violence practiced by husbands towards their wives to propose a professional program from the perspective of the general practice of social work to overcome such a phenomenon. The study is descriptive in nature, where the researcher has used a comprehensive social survey method. To achieve the goal of the study, the researcher has prepared a questionnaire that consisted of two parts. The first part contains the primary data of the two sections, and the second contains (38) phrases distributed over four axes to measure the levels and types of violence among the sample’s memb

... Show More
View Publication Preview PDF
Crossref
Publication Date
Tue Nov 29 2022
Journal Name
Journal Of Accounting And Financial Studies ( Jafs )
A proposed form for the Combined Assurance report and its impact In achieving sustainable development in the Iraqi economic units
...Show More Authors

Despite the importance of sustainable development and its dimensions in developing performance and supporting competitive advantage in economic units, there is a gap and lack of coordination between Combined Assurance  providers (management, internal audit, external audit) to report on sustainable development, and the research aims to propose a model for the Combined Assurance report to achieve development sustainable development in the Iraqi economic units, especially the Baghdad Municipality, enables assurance providers to coordinate efforts that lead to the achievement of Combined Assurance, The research found the proposed model for the Combined Assurance report in achieving sustainable development in the Iraqi economic units, es

... Show More
View Publication Preview PDF
Publication Date
Tue Jun 30 2020
Journal Name
Journal Of Economics And Administrative Sciences
The role of Techno strategy of Information management in achieving administrative innovation : A case study in the college of Management and Economics / University of Kirkuk
...Show More Authors

The present research aims to identify and define the basic dimensions of the information management strategy and the administrative creativity in the Faculty of Management and Economics / the University of Kirkuk, as well as the role played by the dimensions of the information technology management strategy in achieving the administrative innovation in the college and the research problem was formulated in several questions. The research problem was formulated in several questions centered on the correlation between the research variables, and the research was based on a major hypothesis and five sub-hypotheses emerged from which it was subjected to several tests to ensure its validity. The researcher used the descriptive-analyti

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Tue Jul 01 2014
Journal Name
Computer Engineering And Intelligent Systems
Static Analysis Based Behavioral API for Malware Detection using Markov Chain
...Show More Authors

Researchers employ behavior based malware detection models that depend on API tracking and analyzing features to identify suspected PE applications. Those malware behavior models become more efficient than the signature based malware detection systems for detecting unknown malwares. This is because a simple polymorphic or metamorphic malware can defeat signature based detection systems easily. The growing number of computer malwares and the detection of malware have been the concern for security researchers for a large period of time. The use of logic formulae to model the malware behaviors is one of the most encouraging recent developments in malware research, which provides alternatives to classic virus detection methods. To address the l

... Show More
Publication Date
Tue Sep 08 2020
Journal Name
Baghdad Science Journal
CTJ: Input-Output Based Relation Combinatorial Testing Strategy Using Jaya Algorithm
...Show More Authors

Software testing is a vital part of the software development life cycle. In many cases, the system under test has more than one input making the testing efforts for every exhaustive combination impossible (i.e. the time of execution of the test case can be outrageously long). Combinatorial testing offers an alternative to exhaustive testing via considering the interaction of input values for every t-way combination between parameters. Combinatorial testing can be divided into three types which are uniform strength interaction, variable strength interaction and input-output based relation (IOR). IOR combinatorial testing only tests for the important combinations selected by the tester. Most of the researches in combinatorial testing

... Show More
View Publication
Publication Date
Mon May 01 2023
Journal Name
Indonesian Journal Of Electrical Engineering And Computer Science
Comparison hybrid techniques-based mixed transform using compression and quality metrics
...Show More Authors

Image quality plays a vital role in improving and assessing image compression performance. Image compression represents big image data to a new image with a smaller size suitable for storage and transmission. This paper aims to evaluate the implementation of the hybrid techniques-based tensor product mixed transform. Compression and quality metrics such as compression-ratio (CR), rate-distortion (RD), peak signal-to-noise ratio (PSNR), and Structural Content (SC) are utilized for evaluating the hybrid techniques. Then, a comparison between techniques is achieved according to these metrics to estimate the best technique. The main contribution is to improve the hybrid techniques. The proposed hybrid techniques are consisting of discrete wavel

... Show More
View Publication
Scopus (1)
Scopus Crossref
Publication Date
Wed Feb 01 2023
Journal Name
Baghdad Science Journal
3-D Packing in Container using Teaching Learning Based Optimization Algorithm
...Show More Authors

The paper aims to propose Teaching Learning based Optimization (TLBO) algorithm to solve 3-D packing problem in containers. The objective which can be presented in a mathematical model is optimizing the space usage in a container. Besides the interaction effect between students and teacher, this algorithm also observes the learning process between students in the classroom which does not need any control parameters. Thus, TLBO provides the teachers phase and students phase as its main updating process to find the best solution. More precisely, to validate the algorithm effectiveness, it was implemented in three sample cases. There was small data which had 5 size-types of items with 12 units, medium data which had 10 size-types of items w

... Show More
View Publication Preview PDF
Scopus Clarivate Crossref
Publication Date
Fri Sep 30 2016
Journal Name
Australian Journal Of Basic And Applied Sciences
Programming Exam Questions Classification Based On Bloom’s Taxonomy Using Grammatical Rule
...Show More Authors

Preview PDF
Publication Date
Tue May 30 2023
Journal Name
Iraqi Journal Of Science
Entropy-Based Feature Selection using Extra Tree Classifier for IoT Security
...Show More Authors

      The Internet of Things (IoT) is a network of devices used for interconnection and data transfer. There is a dramatic increase in IoT attacks due to the lack of security mechanisms. The security mechanisms can be enhanced through the analysis and classification of these attacks. The multi-class classification of IoT botnet attacks (IBA) applied here uses a high-dimensional data set. The high-dimensional data set is a challenge in the classification process due to the requirements of a high number of computational resources. Dimensionality reduction (DR) discards irrelevant information while retaining the imperative bits from this high-dimensional data set. The DR technique proposed here is a classifier-based fe

... Show More
View Publication Preview PDF
Scopus Crossref