Preferred Language
Articles
/
bsj-8164
Secure Smart Contract Based on Blockchain to Prevent the Non-Repudiation Phenomenon
...Show More Authors

Blockchain is an innovative technology that has gained interest in all sectors in the era of digital transformation where it manages transactions and saves them in a database. With the increasing financial transactions and the rapidly developed society with growing businesses many people looking for the dream of a better financially independent life, stray from large corporations and organizations to form startups and small businesses. Recently, the increasing demand for employees or institutes to prepare and manage contracts, papers, and the verifications process, in addition to human mistakes led to the emergence of a smart contract. The smart contract has been developed to save time and provide more confidence while dealing, as well as to cover the security aspects of digital management and to solve negotiation concerns. The smart contract was employed in creating a distributed ledger to eliminate the need for centralization. In this paper, a simple prototype has been implemented for the smart contract integrated with blockchain which is simulated in a local server with a set of nodes. Several security objectives, such as confidentiality, authorization, integrity, and non-repudiation, have been achieved in the proposed system. Besides, the paper discussed the importance of using the Blockchain technique, and how it contributed to the management of transactions in addition to how it was implemented in highly transparent real-estate scenarios. The smart contract was employed in creating a distributed ledger to eliminate the need for centralization. The elliptic-curve public key has been adopted as an alternative for the RSA in a signature generation/verification process and encryption protocol. For secure transactions, The Secure Socket Layer (SSL) also has been adopted as a secure layer in the web browser. The results have been investigated and evaluated from different aspects and the implementation was in a restricted environment. Experiments showed us the complexity of time and cost when using the (ECC) algorithm and using (RSA) algorithm depending on the size and length of the key. So if the size of the key in (ECC) equals (160) bits, and it corresponds to (1024) bits in (RSA), which is equivalent to 40% for (ECC) and 30% for (RSA). As a result, the (ECC) algorithm is complex, its key is smaller and the process of generating the key is faster, so it has achieved a high level of security.

Scopus Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Sun Jun 30 2019
Journal Name
Journal Of The College Of Law /al-nahrain University
The content of contract Study in the light of French legislative decree no. 131-2016 of 10 February 2016
...Show More Authors

Of the new concepts introduced by the decree of the amendment of the French Civil Code No. 131-2016 issued on 10 February 2016, which raised a debate in jurisprudence both at the level of French jurisprudence or the Arab, the concept of (the content of the contract), which seems to have emerged from the appearance of new legal articles ( 1162-1171) is the cornerstone of the contract and the contract in the contract, the two pillars which, over the course of 200 years and a half, have been one of the main pillars of the codification of Napoleon. Is that the decree of amendment has already abandoned these two pillars, or most of what he did is a change in terminology while preserving the content of these two pillars implicitly, this is what w

... Show More
View Publication
Publication Date
Wed Feb 20 2019
Journal Name
Political Sciences Journal
Iraq's foreign policy and the regional context, the input of instability and mechanisms of normalization
...Show More Authors

Iraq has suffered since 1991 from international sanctions imposed on it by the dictatorial regime that existed at the time, invading Kuwait, which led to the decline of the status of Iraq and the isolation of international and regional (Arab) and clear Iraq as a strange entity living within its regional environment, after April 2003 did not change much In fact, there were no signs of détente before the Arab League summit in Baghdad in 2011, and the signs of a break in the stalemate in inter-relations over the past years have become evident. Disruption and refraction was not high (Islamic Republic of Iran, Turkey, Syrian Arab Republic, Hashemite Kingdom of Jordan, Saudi Arabia, Kuwait). Each side is governed by perceptions about Iraq, es

... Show More
View Publication Preview PDF
Crossref
Publication Date
Wed Oct 25 2023
Journal Name
College Of Islamic Sciences
Provisions for a Muslim to be naturalized with the citizenship of non-Muslim countries
...Show More Authors

Praise to Allah, Lord of the Worlds. Thank you very much. Blessed. As his face should be majestic and great. His authority, and may peace and blessings be upon our master Muhammad, a perpetual blessing until the Day of Judgment

And upon the God of purity, His righteous companions, and those who follow them in righteousness until the Day of Judgment. But after:-

Anyone who looks into the history of nations, peoples, and the conditions of human beings will see that naturalization as a person’s affiliation to a particular state is something that happened only in recent centuries. In ancient times, a person’s loyalty was to the tribe to which the person belonged, and he was integrated into it and attributed to it, and in

... Show More
View Publication Preview PDF
Publication Date
Fri Sep 01 2023
Journal Name
Al-khwarizmi Engineering Journal
Tracked Robot Control with Hand Gesture Based on MediaPipe
...Show More Authors

Hand gestures are currently considered one of the most accurate ways to communicate in many applications, such as sign language, controlling robots, the virtual world, smart homes, and the field of video games. Several techniques are used to detect and classify hand gestures, for instance using gloves that contain several sensors or depending on computer vision. In this work, computer vision is utilized instead of using gloves to control the robot's movement. That is because gloves need complicated electrical connections that limit user mobility, sensors may be costly to replace, and gloves can spread skin illnesses between users. Based on computer vision, the MediaPipe (MP) method is used. This method is a modern method that is discover

... Show More
View Publication Preview PDF
Scopus (4)
Crossref (4)
Scopus Crossref
Publication Date
Tue Aug 15 2023
Journal Name
Journal Of Economics And Administrative Sciences
Industries Based on the Petrochemical Industry in Iraq-Plastics Industry as a Model
...Show More Authors

This study came to discuss the subject of industries dependent on petrochemical industries in Iraq (plastic as a model) during the period 2005–2020, and the study concluded that the plastic industries contribute to areas of advancement and progress and opportunities to deal efficiently with the challenges posed by the new variables, the most important of which is the information revolution. communications and trade liberalization, and this is what contributes to the competitiveness of these industries. And because the petrochemical industry in Iraq has an active role in establishing plastic industrial clusters and clusters of micro, small, and medium industries by providing the necessary feedstock for these industries in various fields

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Thu Nov 01 2018
Journal Name
Journal Of Economics And Administrative Sciences
The research is based on a thesis not discussed: Test the strategy of the General Organization based on the model Wichler and Bakov A case study at the Iraqi Ministry of Interior
...Show More Authors

The study aimed at identifying the strategic gaps in the actual reality of the management of public organizations investigated to determine the strategy used based on the study model. The study relied on the variable of the general organization strategy in its dimensions (the general organization strategy, the organization's political strategy and the defense strategy of the organization) The sample of the study was (General Directorate of Traffic, Civil Status Directorate and Civil Defense Directorate), formations affiliated to the Ministry of the Interior, for the importance of the activity carried out by these public organizations by providing them In order to translate the answers into a quantitative expression in the analysi

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun Feb 25 2024
Journal Name
Baghdad Science Journal
Facial Emotion Images Recognition Based On Binarized Genetic Algorithm-Random Forest
...Show More Authors

Most recognition system of human facial emotions are assessed solely on accuracy, even if other performance criteria are also thought to be important in the evaluation process such as sensitivity, precision, F-measure, and G-mean. Moreover, the most common problem that must be resolved in face emotion recognition systems is the feature extraction methods, which is comparable to traditional manual feature extraction methods. This traditional method is not able to extract features efficiently. In other words, there are redundant amount of features which are considered not significant, which affect the classification performance. In this work, a new system to recognize human facial emotions from images is proposed. The HOG (Histograms of Or

... Show More
View Publication Preview PDF
Scopus (7)
Crossref (6)
Scopus Crossref
Publication Date
Fri Dec 30 2022
Journal Name
Journal Of The College Of Education For Women
The Existential Psychological Crisis Among Battered Women to Non-Battered Women in the Republic of Yemen
...Show More Authors

The research deals with a very important issue that affects women, an important segment of the society. This is because women are the basis of the family and the pillar of the society. Thus, the aim of the research is to examine the level and dimensions of the emotional and existential psychological crisis at the sample of the study. It further aims to investigate the statistical significant difference at the level of (0.05) regarding the feeling of the existential psychological crisis among battered and non-battered women. To reveal the objectives of the study, the researcher applied the existential psychological crisis scale to a sample of (72) women, divided into two groups: (35) battered women, who have been chosen purposefully. Thos

... Show More
View Publication Preview PDF
Crossref
Publication Date
Tue Jun 01 2021
Journal Name
Political Sciences Journal
The European Union and the Extremist Right Phenomenon: Brexit as a Model
...Show More Authors

The European Unit has never been affected by a serious phenomena as the phenomena of the advancing of the far right parties. Though these parties vary in their impact in their original countries, they agree on one important issue which is the deconstruction of the European unit and limiting its supernational powers. These increasing popular parties aim at more national independence in decision making away from the decisions taken by Brussels. Moreover, they criticize the financial and administrative corruption accompanied many of the rescuing procedures directed for example towards countries like Greece and Spain during the international economic crisis. This failure nourishes many of the negative feelings against the European unit which

... Show More
View Publication Preview PDF
Crossref
Publication Date
Wed Feb 20 2019
Journal Name
Political Sciences Journal
Illegal migration and the European Union " a perusal of securing the phenomenon"
...Show More Authors

Abstract This study seeks to deal academically with how the EU treats clandestine immigration, through adopting a purley security approach, based on the European understanding of security threats posed to the security of communities and States in EU at all levels. So they agreed upon criminalizing this threat within the bloc while using repressive tools and steps to limit illegal immigrants flow to European territories. Accordingly, the EU gave the phenomen a security character. So it takes it from low politics level , that of employment and economic field to that of high politics, as a new security problem lying within a new security language embraced by ruling European elites, in other words EU touched on this issue as a speech act emp

... Show More
View Publication Preview PDF
Crossref