Preferred Language
Articles
/
bsj-8164
Secure Smart Contract Based on Blockchain to Prevent the Non-Repudiation Phenomenon
...Show More Authors

Blockchain is an innovative technology that has gained interest in all sectors in the era of digital transformation where it manages transactions and saves them in a database. With the increasing financial transactions and the rapidly developed society with growing businesses many people looking for the dream of a better financially independent life, stray from large corporations and organizations to form startups and small businesses. Recently, the increasing demand for employees or institutes to prepare and manage contracts, papers, and the verifications process, in addition to human mistakes led to the emergence of a smart contract. The smart contract has been developed to save time and provide more confidence while dealing, as well as to cover the security aspects of digital management and to solve negotiation concerns. The smart contract was employed in creating a distributed ledger to eliminate the need for centralization. In this paper, a simple prototype has been implemented for the smart contract integrated with blockchain which is simulated in a local server with a set of nodes. Several security objectives, such as confidentiality, authorization, integrity, and non-repudiation, have been achieved in the proposed system. Besides, the paper discussed the importance of using the Blockchain technique, and how it contributed to the management of transactions in addition to how it was implemented in highly transparent real-estate scenarios. The smart contract was employed in creating a distributed ledger to eliminate the need for centralization. The elliptic-curve public key has been adopted as an alternative for the RSA in a signature generation/verification process and encryption protocol. For secure transactions, The Secure Socket Layer (SSL) also has been adopted as a secure layer in the web browser. The results have been investigated and evaluated from different aspects and the implementation was in a restricted environment. Experiments showed us the complexity of time and cost when using the (ECC) algorithm and using (RSA) algorithm depending on the size and length of the key. So if the size of the key in (ECC) equals (160) bits, and it corresponds to (1024) bits in (RSA), which is equivalent to 40% for (ECC) and 30% for (RSA). As a result, the (ECC) algorithm is complex, its key is smaller and the process of generating the key is faster, so it has achieved a high level of security.

Scopus Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Sun Sep 06 2015
Journal Name
Baghdad Science Journal
Calculation of Radial Electron-Electron Distribution function and Expectation Values for Li-Atom in Excited States 1s 2p, 1s 3p and 1s 3d
...Show More Authors

The electron correlation for inter-shells (1s 2p), (1s 3p) and (1s 3d) was described by the inter-particle radial distribution function f(r12). It was evaluated for Li-atom in the different excited states (1s2 2p), (1s2 3p) and (1s2 3d) using Hartree-Fock approximation (HF). The inter particle expectation values for these shells were also evaluated. The calculations were performed using Mathcad 14 program.

View Publication Preview PDF
Crossref
Publication Date
Sat Dec 10 2022
Journal Name
مجلة دراسات تربوية
تحديات التحول الرقمي وبناء المعرفة في المؤسسة التربوية دراسة ميدانية في وزارة التربية
...Show More Authors

The study used analytical and descriptive methodology in ministry of education and educational institutions in Baghdad. While the digital transformation was studied as independent variable with four dimensions, knowledge creation on the other hand was examined as dependent variable with five dimensions .The study aims to unearth the digital transformation and its reflections on knowledge creation as well as to identify the digital roles of educational institutions. Furthermore, the study sought to identify the reflections of digital transformation in the education system, particularly the ministry of education.

View Publication
Publication Date
Wed Jul 16 2025
Journal Name
Al-nahrain Journal Of Science
اختبار فرط الحساسية المتأخر وعلاقتة بشدة الخمج لمستضدين مختلفين لجنس اللشمانيا
...Show More Authors

أختبرت في هذه الدراسه حساسيه اختبار فرط الحساسية المتأخر وعلاقته ببعض معايير الخمج باللشمانيا في مجموعتين من حيوانات الهامستر المحقونه و كالآتي : حقنت المجموعة الأولى بطفيلي اللشمانيا الأحشائيه الحيه بينما حقنت المجموعةالثانية بلقاح عالق اللشمانيا الجلديه المقتولة بالحرارة . اظهرت المجموعه الثانيه اعلى معدل في تفاعل فرط الحساسية المتأخر(1.5 ±0.23ملم)  , واقل المعدلات في كل من معامل الطحال (2.02±0.15) , طول الط

... Show More
View Publication Preview PDF
Publication Date
Mon Sep 25 2017
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Combining a Hill Encryption Algorithm and LSB Technique With Dispersed Way for Securing Arabic and English Text Messages Hidden in Cover Image
...Show More Authors

         In this paper a hybrid system was designed for securing transformed or stored text messages(Arabic and english) by embedding the message in a colored image as a cover file depending on LSB (Least Significant Bit) algorithm in a dispersed way and employing Hill data encryption algorithm for encrypt message before being hidden, A key of 3x3 was used for encryption with inverse for decryption, The system scores a good result for PSNR rate      ( 75-86) that differentiates according to  length of message and image resolution

View Publication Preview PDF
Publication Date
Fri May 31 2019
Journal Name
Journal Of Engineering
WSN-WCCS: A Wireless Sensor Network Wavelet Curve Ciphering System
...Show More Authors

With wireless sensor network (WSN) wide applications in popularity, securing its data becomes a requirement. This can be accomplished by encrypting sensor node data. In this paper a new an efficient symmetric cryptographic algorithm is presented. This algorithm is called wireless sensor network wavelet curve ciphering system (WSN-WCCS).  The algorithm idea based on discrete wavelet transformation to generate keys for each node in WSN.  It implements on hierarchical clustering WSN using LEACH protocol. Python programming language version 2.7 was used to create the simulator of WSN framework and implement a WSN-WCCS algorithm. The simulation result of the proposed WSN-WCCS with other symmetric algorithms has show

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Wed Feb 22 2023
Journal Name
Iraqi Journal Of Science
Improved Rijndael Algorithm by Encryption S-Box Using NTRU Algorithm
...Show More Authors

With the wide developments of computer science and applications of networks, the security of information must be increased and make it more complex. The most important issues is how to control and prevent unauthorized access to secure information, therefore this paper presents a combination of two efficient encryption algorithms to satisfy the purpose of information security by adding a new level of encryption in Rijndael-AES algorithm. This paper presents a proposed Rijndael encryption and decryption process with NTRU algorithm, Rijndael algorithm is important because of its strong encryption. The proposed updates are represented by encryption and decryption Rijndael S-Box using NTRU algorithm. These modifications enhance the degree of

... Show More
View Publication Preview PDF
Publication Date
Sun Sep 24 2017
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Combining a Hill Encryption Algorithm and LSB Technique With Dispersed Way for Securing Arabic and English Text Messages Hidden in Cover Image
...Show More Authors

         In this paper a hybrid system was designed for securing transformed or stored text messages(Arabic and english) by embedding the message in a colored image as a cover file depending on LSB (Least Significant Bit) algorithm in a dispersed way and employing Hill data encryption algorithm for encrypt message before being hidden, A key of 3x3 was used for encryption with inverse for decryption, The system scores a good result for PSNR rate      ( 75-86) that differentiates according to  length of message and image resolution.

View Publication Preview PDF
Publication Date
Mon Dec 31 2018
Journal Name
Iraqi Journal Of Market Research And Consumer Protection
ELEMENTS OF MARKETING MIX AND THEIR ROLE IN CONSUMER PERCEPTION OF BRAND IMAGE: A SURVEY OF SAMPLE OPINIONS FROM CONSUMERS OF ENIEM BRAND IN THE ALGERIAN MARKET.: ELEMENTS OF MARKETING MIX AND THEIR ROLE IN CONSUMER PERCEPTION OF BRAND IMAGE: A SURVEY OF SAMPLE OPINIONS FROM CONSUMERS OF ENIEM BRAND IN THE ALGERIAN MARKET.
...Show More Authors

The current research aimed to analyze the importance, correlation and the effect of independent variables represented by marketing variables on the dependent variable represented by local brand, through taking ENIEM as a model for this study, which represents a sensitive sector for the Algerian consumer. The results of the study evinced that the Algerian consumer has a positive image toward the brand ENIEM given marketing variables which has acquired considerable importance to this consumer. Also, the results of this study showed a statistically significant correlation between marketing variables and good perception toward the brand ENIEM, at the same time, the existence of a statistically significant effect for each of these variables o

... Show More
View Publication Preview PDF
Publication Date
Sat Aug 20 2022
Journal Name
مجلة العلوم القانونية
دراسة نقدية في محل العقد والالتزام
...Show More Authors

يعد موضوع المحل من المواضيع الشائكة في القانون المدني ، اذ ان هذا الموضوع رغم قدمه الا انه لازال يمثل ارضا خصبة للبحث ، اذ يوجد خلاف حول تحديد الكائن القانوني الذي يعد المحل ركنا فيه ، حيث اختلفت التشريعات في هذه المسألة ، فبعض التشريعات تذهب الى ان المحل ركن في العقد ، وبعضها يذهب الى ان المحل ركن في الالتزام ، وبعضها يذهب الى ان المحل ركن في العقد وركن في الالتزام وقد انتقل هذا الخلاف الى الفقه فظهر فيه عدة اتج

... Show More
Preview PDF
Publication Date
Tue Dec 01 2020
Journal Name
مجلة كامبريدج للبحوث العلمية
انعدام اثر العقد دراسة في القانون الفرنسي
...Show More Authors

يعد العقد من اهم مصادر الالتزام كونه الوسيلة الفاعلة التي يمكن من خلالها المتعاقد التحقق من مصالحه واهدافه مادامت لا تتعارض مع النظام العام ، ومتى مانشأ صحيحاً وفقاً للاركان والشروط التي يتطلبها القانون اصبح ملزماً لكلا طرفيه ، بحيث يخضعان بموجبه لقوة العقد ، وقد لا ينعقد وفقاً للسياق السابق بسبب عدم استكماله لشروط صحته فينعدم اثره بين المتعاقدين او الغير ، وتلك هي فكرة البحث .

Preview PDF