Preferred Language
Articles
/
alkej-861
High Transaction Rates Performance Evaluation for Secure E-government Based on Private Blockchain Scheme

 

The implementation of technology in the provision of public services and communication to citizens, which is commonly referred to as e-government, has brought multitude of benefits, including enhanced efficiency, accessibility, and transparency. Nevertheless, this approach also presents particular security concerns, such as cyber threats, data breaches, and access control. One technology that can aid in mitigating the effects of security vulnerabilities within e-government is permissioned blockchain. This work examines the performance of the hyperledger fabric private blockchain under high transaction loads by analyzing two scenarios that involve six organizations as case studies. Several parameters, such as transaction send rate, blockchain size, batch timeout, organization number, and the number of clients, were modified in the two scenarios. The gradual addition of organizations was also observed to determine the impact of multi-organization on the throughput, latency, and scalability of the system. By increasing the block size to approximately 100 transactions per block, acceptable performance and latency results are attained. The throughput and latency findings are accepted for three or four organizations, but when many organizations are added, throughput and latency begin to suffer from poor performance. Also, many tests show that increased block timeout for high sending rates positively affects the throughput and latency.

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Fri Jan 26 2024
Journal Name
Iraqi Journal Of Science
A Secure Session Management Based on Threat Modeling

A session is a period of time linked to a user, which is initiated when he/she arrives at a web application and it ends when his/her browser is closed or after a certain time of inactivity. Attackers can hijack a user's session by exploiting session management vulnerabilities by means of session fixation and cross-site request forgery attacks.
Very often, session IDs are not only identification tokens, but also authenticators. This means that upon login, users are authenticated based on their credentials (e.g., usernames/passwords or digital certificates) and issued session IDs that will effectively serve as temporary static passwords for accessing their sessions. This makes session IDs a very appealing target for attackers. In many c

... Show More
View Publication Preview PDF
Publication Date
Thu Jan 14 2021
Journal Name
Iraqi Journal Of Science
Network Authentication Protocol Based on Secure Biometric NIDN

In this paper an authentication based finger print biometric system is proposed with personal identity information of name and birthday. A generation of National Identification Number (NIDN) is proposed in merging of finger print features and the personal identity information to generate the Quick Response code (QR) image that used in access system. In this paper two approaches are dependent, traditional authentication and strong identification with QR and NIDN information. The system shows accuracy of 96.153% with threshold value of 50. The accuracy reaches to 100% when the threshold value goes under 50.

Scopus Crossref
View Publication Preview PDF
Publication Date
Thu May 10 2018
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
E-Government Public Cloud Model (EGPCM)

   The concept of implementing e-government systems is growing widely all around the world and becoming an interest to all governments. However, governments are still seeking for effective ways to implement e-government systems properly and successfully. As services of e-government increased and citizens’ demands expand, the e-government systems become more costly to satisfy the growing needs. The cloud computing is a technique that has been discussed lately as a solution to overcome some problems that an e-government implementation or expansion is going through. This paper is a proposal of a  new model for e-government on basis of cloud computing. E-Government Public Cloud Model EGPCM, for e-government is related t

... Show More
Crossref
View Publication Preview PDF
Publication Date
Sun Sep 01 2019
Journal Name
Journal Of Legal Sciences
Government Hospitals lease contract for the private sector In Iraqi law

The contract for iease public hospitals to the private sector is one of the administrative contracts in which all the elements of the administrative contract are available. It is signed by the administration represented by the Minister of Health. It is presented to a public hospital which is one of the public facilities that provide medical services. The Ministry of Health may also apply to the Leased Hospital. It may also amend the contract in accordance with the public interest, in addition to the possibility of dissolving the contract without recourse to the courts in case the tenant violates the terms of the contract, The State resorted to it in the event that it is unable to provide medical services within the required range, as it

... Show More
Crossref
View Publication Preview PDF
Publication Date
Mon Aug 01 2022
Journal Name
Baghdad Science Journal
A Novel Technique for Secure Data Cryptosystem Based on Chaotic Key Image Generation

The advancements in Information and Communication Technology (ICT), within the previous decades, has significantly changed people’s transmit or store their information over the Internet or networks. So, one of the main challenges is to keep these information safe against attacks. Many researchers and institutions realized the importance and benefits of cryptography in achieving the efficiency and effectiveness of various aspects of secure communication.This work adopts a novel technique for secure data cryptosystem based on chaos theory. The proposed algorithm generate 2-Dimensional key matrix having the same dimensions of the original image that includes random numbers obtained from the 1-Dimensional logistic chaotic map for given con

... Show More
Scopus (7)
Crossref (1)
Scopus Clarivate Crossref
View Publication Preview PDF
Publication Date
Tue Nov 19 2024
Journal Name
Al-anbar University Journal Of Law And Political Sciences
View Publication
Publication Date
Tue Oct 23 2018
Journal Name
Journal Of Economics And Administrative Sciences
The role of the government accounting system in preparing performance reports for government units

The purpose of this study is to assess the performance of government units (Iraqi hospitals) by trying to determine the possibility of the current governmental accounting system to provide information on the performance reports of government units. In order to improve the efficiency of hospital resources management, the services provided by the hospital should be subject to performance measurement and evaluation The importance of the health sector in the provision of services, in order to raise the efficiency of the performance of services provided by government units has reached the researcher a set of conclusions, the most important

  1. The financial reports produced by the accounting s

... Show More
Crossref (1)
Crossref
View Publication Preview PDF
Publication Date
Sun Jan 01 2023
Journal Name
Computers, Materials & Continua
Scopus (1)
Crossref (17)
Scopus Clarivate Crossref
View Publication
Publication Date
Thu Sep 01 2016
Journal Name
Indonesian Journal Of Electrical Engineering And Computer Science
Scopus (3)
Scopus
Publication Date
Fri Jan 01 2021
Journal Name
Journal Of Engineering
A Proposed Adaptive Bitrate Scheme Based on Bandwidth Prediction Algorithm for Smoothly Video Streaming

A robust video-bitrate adaptive scheme at client-aspect plays a significant role in keeping a good quality of video streaming technology experience. Video quality affects the amount of time the video has turned off playing due to the unfilled buffer state. Therefore to maintain a video streaming continuously with smooth bandwidth fluctuation, a video buffer structure based on adapting the video bitrate is considered in this work. Initially, the video buffer structure is formulated as an optimal control-theoretic problem that combines both video bitrate and video buffer feedback signals. While protecting the video buffer occupancy from exceeding the limited operating level can provide continuous video str

... Show More
Crossref (1)
Crossref
View Publication Preview PDF