Preferred Language
Articles
/
bsj-8164
Secure Smart Contract Based on Blockchain to Prevent the Non-Repudiation Phenomenon
...Show More Authors

Blockchain is an innovative technology that has gained interest in all sectors in the era of digital transformation where it manages transactions and saves them in a database. With the increasing financial transactions and the rapidly developed society with growing businesses many people looking for the dream of a better financially independent life, stray from large corporations and organizations to form startups and small businesses. Recently, the increasing demand for employees or institutes to prepare and manage contracts, papers, and the verifications process, in addition to human mistakes led to the emergence of a smart contract. The smart contract has been developed to save time and provide more confidence while dealing, as well as to cover the security aspects of digital management and to solve negotiation concerns. The smart contract was employed in creating a distributed ledger to eliminate the need for centralization. In this paper, a simple prototype has been implemented for the smart contract integrated with blockchain which is simulated in a local server with a set of nodes. Several security objectives, such as confidentiality, authorization, integrity, and non-repudiation, have been achieved in the proposed system. Besides, the paper discussed the importance of using the Blockchain technique, and how it contributed to the management of transactions in addition to how it was implemented in highly transparent real-estate scenarios. The smart contract was employed in creating a distributed ledger to eliminate the need for centralization. The elliptic-curve public key has been adopted as an alternative for the RSA in a signature generation/verification process and encryption protocol. For secure transactions, The Secure Socket Layer (SSL) also has been adopted as a secure layer in the web browser. The results have been investigated and evaluated from different aspects and the implementation was in a restricted environment. Experiments showed us the complexity of time and cost when using the (ECC) algorithm and using (RSA) algorithm depending on the size and length of the key. So if the size of the key in (ECC) equals (160) bits, and it corresponds to (1024) bits in (RSA), which is equivalent to 40% for (ECC) and 30% for (RSA). As a result, the (ECC) algorithm is complex, its key is smaller and the process of generating the key is faster, so it has achieved a high level of security.

Scopus Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Sun Aug 10 2025
Journal Name
Central Asian Journal Of Medical And Natural Science
Microbial Load Comparison Between Clinical and Non-Clinical Student Environments in Al-Kindy College of Medicine
...Show More Authors

The environmental surfaces hygiene of college premises like classrooms play role in spreading different pathogenic bacteria, furthermore a Medical students are often potential vectors for resistant bacteria to their entourage. This study aimed to assess bacterial contamination and their susceptibility to various antimicrobial agents in the educational classroom of Al-Kindy College of medicine in two classrooms: one occupied by clinical visitor and non-clinical visitor students to evaluate and determine its health risk. In this cross-sectional study, different sites of the educational classroom of Al-Kindy College of medicine were studied.  Ninety-sex Different swab samples were collected from 8 different sites of college across bot

... Show More
View Publication
Publication Date
Thu Oct 01 2020
Journal Name
Upstream Oil And Gas Technology
Integrated approach for non-Darcy flow in hydraulic fractures considering different fracture geometries and reservoir characteristics
...Show More Authors

Scopus (5)
Crossref (4)
Scopus Clarivate Crossref
Publication Date
Wed Jan 26 2022
Journal Name
Nanomaterials
Improved Melting of Latent Heat Storage Using Fin Arrays with Non-Uniform Dimensions and Distinct Patterns
...Show More Authors

Employing phase-change materials (PCM) is considered a very efficient and cost-effective option for addressing the mismatch between the energy supply and the demand. The high storage density, little temperature degradation, and ease of material processing register the PCM as a key candidate for the thermal energy storage system. However, the sluggish response rates during their melting and solidification processes limit their applications and consequently require the inclusion of heat transfer enhancers. This research aims to investigate the potential enhancement of circular fins on intensifying the PCM thermal response in a vertical triple-tube casing. Fin arrays of non-uniform dimensions and distinct distribution patterns were des

... Show More
View Publication
Scopus (49)
Crossref (52)
Scopus Clarivate Crossref
Publication Date
Mon Feb 01 2021
Journal Name
Journal Of Physics: Conference Series
Graphical password based mouse behavior technique
...Show More Authors
Abstract<p>This paper proposes a new password generation technique on the basis of mouse motion and a special case location recognized by the number of clicks to protect sensitive data for different companies. Two, three special locations click points for the users has been proposed to increase password complexity. Unlike other currently available random password generators, the path and number of clicks will be added by admin, and authorized users have to be training on it.</p><p>This method aims to increase combinations for the graphical password generation using mouse motion for a limited number of users. A mathematical model is developed to calculate the performance</p> ... Show More
View Publication
Scopus (12)
Crossref (5)
Scopus Crossref
Publication Date
Sat Dec 18 2021
Journal Name
Egyptian Journal Of Chemistry
Coumarin based-histone deactylace HADC inhibitors
...Show More Authors

Coumarins have been recognized as anticancer competitors. HDACis are one of the interesting issues in the field of antitumor research. In order to achieve an increased anticancer efficacy, a series of hybrid compounds bearing coumarin scaffolds have been designed and synthesized as novel HDACis, In this review we present a series of novel HDAC inhibitors comprising coumarin as a core e of cap group of HDAC inhibitors that have been designed, synthesized and assessed for their enzyme inhibitory activity as well as antiproliferative activity. Most of them exhibited potent HDAC inhibitory activity and significant cytotoxicity

View Publication
Scopus (3)
Scopus
Publication Date
Tue Feb 28 2017
Journal Name
Journal Of Engineering
Composite Techniques Based Color Image Compression
...Show More Authors

     Compression for color image is now necessary for transmission and storage in the data bases since the color gives a pleasing nature and natural for any object, so three composite techniques based color image compression is implemented to achieve image with high compression, no loss in original image, better performance and good image quality. These techniques are composite stationary wavelet technique (S), composite wavelet technique (W) and composite multi-wavelet technique (M). For the high energy sub-band of the 3rd  level of each composite transform in each composite technique, the compression parameters are calculated. The best composite transform among the 27 types is the three levels of multi-wavelet

... Show More
View Publication Preview PDF
Publication Date
Sun Dec 01 2002
Journal Name
Iraqi Journal Of Physics
New DCT-Based Image Hiding Technique
...Show More Authors

A new technique for embedding image data into another BMP image data is presented. The image data to be embedded is referred to as signature image, while the image into which the signature image is embedded is referred as host image. The host and the signature images are first partitioned into 8x8 blocks, discrete cosine transformed “DCT”, only significant coefficients are retained, the retained coefficients then inserted in the transformed block in a forward and backward zigzag scan direction. The result then inversely transformed and presented as a BMP image file. The peak signal-to-noise ratio (PSNR) is exploited to evaluate the objective visual quality of the host image compared with the original image.

View Publication Preview PDF
Publication Date
Wed Jun 01 2016
Journal Name
Journal Of Economics And Administrative Sciences
Modes of Knowledge acquisition and their reflections on the tacit knowledge A field study in Tuz General Hospital
...Show More Authors

This research aims to knowledge the extent of the application of Tuz General Hospital to the concept of tacit knowledge dimensions (mental models, intuition, experience, skill) and methods of acquiring knowledge dimensions (training, job rotation, work teams) and the measurement and analysis of the link and the kind of impact between the methods of acquiring knowledge and tacit knowledge of the Angels nursing in the researched hospital, and was the questionnaire primary means of collecting information adopted by the researcher that, the research sample of (90) individuals, including the Angels nursing, has been using the statistical program spss for the purpose of conducting statistical treatments, and through the diagnosis and m

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sat Jun 01 2019
Journal Name
Journal Of Economics And Administrative Sciences
Research Title: Strategic Orientation Reflections on Organizational Performance (Applied research in the Ministry of Defense / Inspector General)
...Show More Authors

The aim of the study was to study the implications of the strategic direction on organizational performance. The research was carried out in the Iraqi Ministry of Defense / Inspector General's Office for the purpose of identifying the nature of the relationship and the impact between the two variables. A sample of 60 people managers, department managers and directorates was targeted.

The researcher tried to test hypotheses in the first chapter, which was devoted to the methodology of research and previous studies and found the following: (1) validity of the first hypothesis of the existence of a relationship of positive significance of the strategic direction in its sub-dimensions with organizational perf

... Show More
View Publication Preview PDF
Crossref
Publication Date
Tue Dec 01 2020
Journal Name
Journal Of Economics And Administrative Sciences
The Impact of Envy on Workplace Stress A field Study of Faculty Staff at the Technical College of Management-Baghdad
...Show More Authors

The research aims to measure the impact of envy on job stress because the topic of envy represents a negative emotion that exists at all organizational levels, which may cause stress in the work environment.

The Research problem is represented by the lack of perception of most of the faculty staff on the negative effects of envy on their well-being in the Technical College of Management - Baghdad, and what is the impact level of envy on their job stress.

To achieve this, the scale of envy was based on two dimensions (being envied, Envying others), While the job stress scale was based on seven dimensions (workload, conflict role, Family factors, work environment, work relationships

... Show More
View Publication Preview PDF
Crossref