Preferred Language
Articles
/
bsj-8164
Secure Smart Contract Based on Blockchain to Prevent the Non-Repudiation Phenomenon
...Show More Authors

Blockchain is an innovative technology that has gained interest in all sectors in the era of digital transformation where it manages transactions and saves them in a database. With the increasing financial transactions and the rapidly developed society with growing businesses many people looking for the dream of a better financially independent life, stray from large corporations and organizations to form startups and small businesses. Recently, the increasing demand for employees or institutes to prepare and manage contracts, papers, and the verifications process, in addition to human mistakes led to the emergence of a smart contract. The smart contract has been developed to save time and provide more confidence while dealing, as well as to cover the security aspects of digital management and to solve negotiation concerns. The smart contract was employed in creating a distributed ledger to eliminate the need for centralization. In this paper, a simple prototype has been implemented for the smart contract integrated with blockchain which is simulated in a local server with a set of nodes. Several security objectives, such as confidentiality, authorization, integrity, and non-repudiation, have been achieved in the proposed system. Besides, the paper discussed the importance of using the Blockchain technique, and how it contributed to the management of transactions in addition to how it was implemented in highly transparent real-estate scenarios. The smart contract was employed in creating a distributed ledger to eliminate the need for centralization. The elliptic-curve public key has been adopted as an alternative for the RSA in a signature generation/verification process and encryption protocol. For secure transactions, The Secure Socket Layer (SSL) also has been adopted as a secure layer in the web browser. The results have been investigated and evaluated from different aspects and the implementation was in a restricted environment. Experiments showed us the complexity of time and cost when using the (ECC) algorithm and using (RSA) algorithm depending on the size and length of the key. So if the size of the key in (ECC) equals (160) bits, and it corresponds to (1024) bits in (RSA), which is equivalent to 40% for (ECC) and 30% for (RSA). As a result, the (ECC) algorithm is complex, its key is smaller and the process of generating the key is faster, so it has achieved a high level of security.

Scopus Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Tue Jan 01 2019
Journal Name
J. Mech. Cont.& Math. Scis
The Use of Non-Parametric Methods to Estimate Density Functions of Copulas
...Show More Authors

Publication Date
Thu Dec 27 2018
Journal Name
Revue Académique De La Recherche Juridique
The Scope of the Judge’s Authority in Completing a Contract and the Limitations Thereon – A Comparative Study
...Show More Authors

The contractual imbalance is perceived today by the majority of the doctrine as being one of the pitfalls to the execution of the contracts. As a result, most legislations grant judges the power to intervene to restore it. Granting the judge the power to complete the contract raises the question of the extent to which the judge can obtain such power. Is it an absolute authority that is not limited? If so, is it a broad discretion in which the judge operates in his conscience, or is it a power of limited scope by specific legal texts and conventions? This is what we will try to answer in this research.

View Publication
Publication Date
Fri Jan 01 2021
Journal Name
Ieee Access
IFFT-Based Microwave Non-Destructive Testing for Delamination Detection and Thickness Estimation
...Show More Authors

View Publication
Scopus (15)
Crossref (14)
Scopus Clarivate Crossref
Publication Date
Fri Jul 25 2025
Journal Name
Modern Sport
The Impact of an AI-Supported Smart HIIT Program on Cardiovascular Fitness and Physical Performance
...Show More Authors

View Publication
Crossref
Publication Date
Sun Jan 01 2023
Journal Name
Corporate Governance And Organizational Behavior Review
Impact of the electronic internal auditing based on IT governance to reduce auditing risk
...Show More Authors

This paper analysed the effect of electronic internal auditing (EIA) based on the Control Objectives for Information and Related Technologies (COBIT) framework. Organisations must implement an up-to-date accounting information system (AIS) capable of meeting their auditing requirements. Electronic audit risk (compliance assessment, control assurance, and risk assessment) is a development by Weidenmier and Ramamoorti (2006) to improve AIS. In order to fulfil the study’s objectives, a questionnaire was prepared and distributed to a sample comprising 120 employees. The employees were financial managers, internal auditors, and workers involved in the company’s information security departments in the General Company for Electricity D

... Show More
View Publication
Scopus (35)
Crossref (19)
Scopus Crossref
Publication Date
Tue Jun 01 2021
Journal Name
Political Sciences Journal
The European Union and the Extremist Right Phenomenon: Brexit as a Model
...Show More Authors

The European Unit has never been affected by a serious phenomena as the phenomena of the advancing of the far right parties. Though these parties vary in their impact in their original countries, they agree on one important issue which is the deconstruction of the European unit and limiting its supernational powers. These increasing popular parties aim at more national independence in decision making away from the decisions taken by Brussels. Moreover, they criticize the financial and administrative corruption accompanied many of the rescuing procedures directed for example towards countries like Greece and Spain during the international economic crisis. This failure nourishes many of the negative feelings against the European unit which

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun Jun 02 2019
Journal Name
Journal Of The College Of Languages (jcl)
The Phenomenon of Euphemism in the Translon Activity: Эвфемизм в переводческой деятельности
...Show More Authors

The Phenomenon of Euphemism in the Translon Activity Euphemism is the replacement of a harsh word with a less harsh or more acceptable   one.   Most   languages   are   affected   by   ideological,   cultural, social,   or   religious   perspectives   which   in   turn   would   reflect   different linguistic levels. On such a basis, translation is affected by its medium,i.e. language, and consequently what is acceptably expressed by a nation may   not  be  acceptable by another.   In   this paper, we try   to  

... Show More
View Publication Preview PDF
Publication Date
Wed Feb 20 2019
Journal Name
Political Sciences Journal
Illegal migration and the European Union " a perusal of securing the phenomenon"
...Show More Authors

Abstract This study seeks to deal academically with how the EU treats clandestine immigration, through adopting a purley security approach, based on the European understanding of security threats posed to the security of communities and States in EU at all levels. So they agreed upon criminalizing this threat within the bloc while using repressive tools and steps to limit illegal immigrants flow to European territories. Accordingly, the EU gave the phenomen a security character. So it takes it from low politics level , that of employment and economic field to that of high politics, as a new security problem lying within a new security language embraced by ruling European elites, in other words EU touched on this issue as a speech act emp

... Show More
View Publication Preview PDF
Crossref
Publication Date
Tue Dec 05 2023
Journal Name
Baghdad Science Journal
Further Results on (a, d) -total Edge Irregularity Strength of Graphs
...Show More Authors

Consider a simple graph   on vertices and edges together with a total  labeling . Then ρ is called total edge irregular labeling if there exists a one-to-one correspondence, say  defined by  for all  where  Also, the value  is said to be the edge weight of . The total edge irregularity strength of the graph G is indicated by  and is the least  for which G admits   edge irregular h-labeling.  In this article,   for some common graph families are examined. In addition, an open problem is solved affirmatively.

View Publication Preview PDF
Scopus (1)
Scopus Crossref
Publication Date
Wed Oct 25 2023
Journal Name
College Of Islamic Sciences
Provisions for a Muslim to be naturalized with the citizenship of non-Muslim countries
...Show More Authors

Praise to Allah, Lord of the Worlds. Thank you very much. Blessed. As his face should be majestic and great. His authority, and may peace and blessings be upon our master Muhammad, a perpetual blessing until the Day of Judgment

And upon the God of purity, His righteous companions, and those who follow them in righteousness until the Day of Judgment. But after:-

Anyone who looks into the history of nations, peoples, and the conditions of human beings will see that naturalization as a person’s affiliation to a particular state is something that happened only in recent centuries. In ancient times, a person’s loyalty was to the tribe to which the person belonged, and he was integrated into it and attributed to it, and in

... Show More
View Publication Preview PDF