Preferred Language
Articles
/
LhfKupABVTCNdQwCa5AE
A Proposed Blockchain-Based Digital-Identity Management using ERC 725/735
...Show More Authors

In modern technology, the ownership of electronic data is the key to securing their privacy and identity from any trace or interference. Therefore, a new identity management system called Digital Identity Management, implemented throughout recent years, acts as a holder of the identity data to maintain the holder’s privacy and prevent identity theft. Therefore, an overwhelming number of users have two major problems, users who own data and third-party applications will handle it, and users who have no ownership of their data. Maintaining these identities will be a challenge these days. This paper proposes a system that solves the problem using blockchain technology for Digital Identity Management systems. Blockchain is a powerful technique to build a digital identity in chain matters that enables a secure environment. The idea of Blockchain is to distribute the data across multiple devices in a cryptographic way, which will reduce the ability to an impossible level. Therefore, in this paper a proposed Digital Identity based on Blockchain (ERC 725, and ERC 735) with MD6 as a hashing algorithm will be implemented in a Secure smart contract can prevent function calls from being carried out until the sender has received confirmation from a reliable issuer; for example, we might include a feature that restricts smart contract interactions to legitimate users only. Many additional use cases are possible with ERC-725, including multi-sig execution approvals and contract call verification in place of key validation.

View Publication Preview PDF
Quick Preview PDF
Publication Date
Sun Jan 01 2023
Journal Name
International Journal Of Research In Social Sciences & Humanities
HRM Management Approaches, With a Focus on Employee Centric Approach: A Case Study In The Rafidain Bank In Iraq
...Show More Authors

This research attempts to shed light on a topic that is considered one of the most important topics of HRMs management, which is the Employee centric approach by examining its philosophy and understanding . To achieve the goal, the research relied on the philosophical analytical method, which is one of the approaches used in theoretical studies. The research reached a set of conclusions, the most important of which are the theoretical studies that addressed this entry in the English language and the lack of it in the Arabic language, according to the researcher's knowledge. The research reached a set of recommendations, the most important of which was that this approach needs more research, analysis and study at the practical and th

... Show More
View Publication
Crossref
Publication Date
Sun Jul 24 2022
Journal Name
Journal Of The Faculty Of Medicine Baghdad
Traumatic Haemothorax: Diagnostic approaches and surgical management: diagnostic approaches and surgical management
...Show More Authors

 

Background: Traumatic haemothorax is a collection of blood within the pleural cavity due to a penetrating or blunt injury leading to blood accumulation inside the pleural space with its respiratory and hemodynamic consequences.

Objectives: Is to retrospectively study eighty victims of traumatic haemothorax regarding their age, gender, types of injury, and their sequel, as well as the methods of investigation, treatment modality (conservative or operative) and their outcome.  

Patients and methods: The data of 80 patients with traumatic haemothorax admitted to Ibn AL-Nnafees teaching hospital from (1st of August 2018 to 30th. of September 2019), w

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Wed Jun 01 2011
Journal Name
Journal Of Economics And Administrative Sciences
Diagnosis of the reality of marketing knowledge management"A survey of the views of a sample of telecom operatorsIn the city of Sulaymaniyah "
...Show More Authors

This research aimed to diagnose the perception based on Telecommunications of Iraq to the importance of activating knowledge management marketing in possession, as well as Indication of impediments to activate the management of marketing knowledge in the researched companies, also aimed to show the extent of the existence of significant differences in perception based on Telecommunications Iraqi importance of activating the management marketing knowledge in possession. To achieve the objectives of this research, the questionnaire was developed and distributed to a sample of telecommunications companies in the city of Sulaimaniya, was selected on the criterion according to the company's life in terms of seniority in the telecommunication

... Show More
View Publication Preview PDF
Crossref
Publication Date
Mon Apr 01 2019
Journal Name
Journal Of Educational And Psychological Researches
Life Management Strategies among Mosul University Academics
...Show More Authors

The study aims to measure life management (in its various approaches) among   university academics and to identify the differences among life management strategies (in its various approaches) in regard of gender (male, female), field of education (scientific, humanitarian) and title (assistant lecturer, lecturer, assistant professor, and professor). The study sample consisted of (246) male and female academics from four colleges (Arts, Science, Science education, and Humanitarian Science Education). To achieve the goals of the study, the researchers used the Freund & Baltes (2002) life-management strategies scale after translating it and determining its parameters of reliability and validity. The statistical analysis of the

... Show More
View Publication Preview PDF
Publication Date
Mon Aug 31 2015
Journal Name
Journal Of Theoretical And Applied Information Technology
EXAM QUESTIONS CLASSIFICATION BASED ON BLOOM’S TAXONOMY COGNITIVE LEVEL USING CLASSIFIERS COMBINATION
...Show More Authors

Preview PDF
Scopus (57)
Scopus
Publication Date
Wed May 09 2018
Journal Name
International Journal Of Advanced Computer Science And Applications
New Techniques to Enhance Data Deduplication using Content based-TTTD Chunking Algorithm
...Show More Authors

View Publication
Scopus (11)
Crossref (8)
Scopus Crossref
Publication Date
Wed Jan 12 2022
Journal Name
Iraqi Journal Of Science
Face Detection by Using OpenCV’s Viola-Jones Algorithm based on coding eyes
...Show More Authors

Facial identification is one of the biometrical approaches implemented for identifying any facial image with the use of the basic properties of that face. In this paper we proposes a new improved approach for face detection based on coding eyes by using Open CV's Viola-Jones algorithm which removes the falsely detected faces depending on coding eyes. The Haar training module in Open CV is an implementation of the Viola-Jones framework, the training algorithm takes as input a training group of positive and negative images, and generates strong features in the format of an XML file which is capable of subsequently being utilized for detecting the wanted face and eyes in images, the integral image is used to speed up Haar-like features calc

... Show More
View Publication Preview PDF
Publication Date
Sat Apr 30 2022
Journal Name
Iraqi Journal Of Science
Biometric Identification System Based on Contactless Palm-Vein Using Residual Attention Network
...Show More Authors

Palm vein recognition technology is a one of the most effective biometric technologies for personal identification. Palm acquisition techniques are either contact-based or contactless-based. The contactless-based palm vein system is considered more accurate and efficient when used in modern applications, but it may suffer from problems like pose variations and the delay in the matching process. This paper proposes a contactless-based identification system for palm vein that involves two main steps; First, the central region of the palm is cropped using fast extract region of interest algorithm, then the features are extracted and classified using altered structure of Residual Attention Network, which is a developed version of convolution

... Show More
View Publication Preview PDF
Scopus (2)
Crossref (1)
Scopus Crossref
Publication Date
Fri Jun 24 2022
Journal Name
Iraqi Journal Of Science
Steganography Based on Arabic Language Texts by Kashida Using STRI As RNG
...Show More Authors

One of the primary problems in internet is security, mostly when computer utilization is increasing in all social and business areas. So, the secret communications through public and private channels are the major goal of researchers. Information hiding is one of methods to obtain a security communication medium and protecting the data during transmission.
This research offers in a new method using two levels to hide, the first level is hiding by embedding and addition but the second level is hiding by injection. The first level embeds a secret message in one bit in the LSB in the FFT and the addition of one kashida. Subtraction of two random images (STRI) is RNG to find positions for hiding within the text. The second level is the in

... Show More
View Publication Preview PDF
Publication Date
Mon Dec 18 2017
Journal Name
Al-khwarizmi Engineering Journal
Path Planning of an autonomous Mobile Robot using Swarm Based Optimization Techniques
...Show More Authors

This paper presents a meta-heuristic swarm based optimization technique for solving robot path planning. The natural activities of actual ants inspire which named Ant Colony Optimization. (ACO) has been proposed in this work to find the shortest and safest path for a mobile robot in different static environments with different complexities. A nonzero size for the mobile robot has been considered in the project by taking a tolerance around the obstacle to account for the actual size of the mobile robot. A new concept was added to standard Ant Colony Optimization (ACO) for further modifications. Simulations results, which carried out using MATLAB 2015(a) environment, prove that the suggested algorithm outperforms the standard version of AC

... Show More
View Publication Preview PDF
Crossref (18)
Crossref