Preferred Language
Articles
/
bsj-8164
Secure Smart Contract Based on Blockchain to Prevent the Non-Repudiation Phenomenon
...Show More Authors

Blockchain is an innovative technology that has gained interest in all sectors in the era of digital transformation where it manages transactions and saves them in a database. With the increasing financial transactions and the rapidly developed society with growing businesses many people looking for the dream of a better financially independent life, stray from large corporations and organizations to form startups and small businesses. Recently, the increasing demand for employees or institutes to prepare and manage contracts, papers, and the verifications process, in addition to human mistakes led to the emergence of a smart contract. The smart contract has been developed to save time and provide more confidence while dealing, as well as to cover the security aspects of digital management and to solve negotiation concerns. The smart contract was employed in creating a distributed ledger to eliminate the need for centralization. In this paper, a simple prototype has been implemented for the smart contract integrated with blockchain which is simulated in a local server with a set of nodes. Several security objectives, such as confidentiality, authorization, integrity, and non-repudiation, have been achieved in the proposed system. Besides, the paper discussed the importance of using the Blockchain technique, and how it contributed to the management of transactions in addition to how it was implemented in highly transparent real-estate scenarios. The smart contract was employed in creating a distributed ledger to eliminate the need for centralization. The elliptic-curve public key has been adopted as an alternative for the RSA in a signature generation/verification process and encryption protocol. For secure transactions, The Secure Socket Layer (SSL) also has been adopted as a secure layer in the web browser. The results have been investigated and evaluated from different aspects and the implementation was in a restricted environment. Experiments showed us the complexity of time and cost when using the (ECC) algorithm and using (RSA) algorithm depending on the size and length of the key. So if the size of the key in (ECC) equals (160) bits, and it corresponds to (1024) bits in (RSA), which is equivalent to 40% for (ECC) and 30% for (RSA). As a result, the (ECC) algorithm is complex, its key is smaller and the process of generating the key is faster, so it has achieved a high level of security.

Scopus Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Thu Aug 31 2023
Journal Name
Journal Européen Des Systèmes Automatisés​
An IoT and Machine Learning-Based Predictive Maintenance System for Electrical Motors
...Show More Authors

The rise of Industry 4.0 and smart manufacturing has highlighted the importance of utilizing intelligent manufacturing techniques, tools, and methods, including predictive maintenance. This feature allows for the early identification of potential issues with machinery, preventing them from reaching critical stages. This paper proposes an intelligent predictive maintenance system for industrial equipment monitoring. The system integrates Industrial IoT, MQTT messaging and machine learning algorithms. Vibration, current and temperature sensors collect real-time data from electrical motors which is analyzed using five ML models to detect anomalies and predict failures, enabling proactive maintenance. The MQTT protocol is used for efficient com

... Show More
View Publication
Scopus (39)
Crossref (29)
Scopus Crossref
Publication Date
Sun Jul 01 2018
Journal Name
Ieee Transactions On Intelligent Transportation Systems
Real-Time Intersection-Based Segment Aware Routing Algorithm for Urban Vehicular Networks
...Show More Authors

High vehicular mobility causes frequent changes in the density of vehicles, discontinuity in inter-vehicle communication, and constraints for routing protocols in vehicular ad hoc networks (VANETs). The routing must avoid forwarding packets through segments with low network density and high scale of network disconnections that may result in packet loss, delays, and increased communication overhead in route recovery. Therefore, both traffic and segment status must be considered. This paper presents real-time intersection-based segment aware routing (RTISAR), an intersection-based segment aware algorithm for geographic routing in VANETs. This routing algorithm provides an optimal route for forwarding the data packets toward their destination

... Show More
View Publication
Scopus (70)
Crossref (62)
Scopus Clarivate Crossref
Publication Date
Tue Aug 01 2023
Journal Name
Baghdad Science Journal
Synthesis, Anticancer and Antibacterial Activity of Mannose-based bis-1,2,3-Triazole Derivatives
...Show More Authors

       In the current work, aromatic amines and alkyl halides have been converted to the corresponding azides 2a‒d and 4a-d by the reaction with sodium nitrite and sodium azide respectively for amines and sodium azide for halides. Then, dipropargyl ether derivative of D-mannose 8 has been synthesized from diacetone mannose that has been obtained by the treatment of D-mannose (5) with dry acetone in the presence of sulfuric acid. Then, aldol condensation has been used to prepare diol 7 from the mannose diacetonide 6. The reaction of compound 7 with propargyl bromide in alkaline media has been afforded dipropargyl

... Show More
View Publication Preview PDF
Scopus (5)
Crossref (2)
Scopus Crossref
Publication Date
Mon Nov 21 2022
Journal Name
Sensors
Deep Learning-Based Computer-Aided Diagnosis (CAD): Applications for Medical Image Datasets
...Show More Authors

Computer-aided diagnosis (CAD) has proved to be an effective and accurate method for diagnostic prediction over the years. This article focuses on the development of an automated CAD system with the intent to perform diagnosis as accurately as possible. Deep learning methods have been able to produce impressive results on medical image datasets. This study employs deep learning methods in conjunction with meta-heuristic algorithms and supervised machine-learning algorithms to perform an accurate diagnosis. Pre-trained convolutional neural networks (CNNs) or auto-encoder are used for feature extraction, whereas feature selection is performed using an ant colony optimization (ACO) algorithm. Ant colony optimization helps to search for the bes

... Show More
View Publication
Scopus (35)
Crossref (28)
Scopus Clarivate Crossref
Publication Date
Sun Feb 10 2019
Journal Name
Iraqi National Journal Of Nursing Specialties
Psychological Burdens of Children with Anorectal Malformation on Mothers at Pediatric Teaching Hospitals in Baghdad City
...Show More Authors

Objective(s): The main aim of the study is to determine the level of burden on mothers toward children with anorectal malformation.
Methodology: A descriptive study was carried out at Welfare Pediatric Teaching Hospital and Central Pediatric Teaching Hospital in Baghdad City. From November 15th, 2017 to April 29th, 2018. Convenient sample comprised of (140) children mothers with anorectal malformation were interviewed for the study. The instrument of study is composed of six domains related mothers' burden toward psychosocial burden as a result of child with anorectal malformation. Validity of the study instrument was determined through a panel of experts and the reliability of the questionnaire is determined in a pilot study among (1

... Show More
View Publication Preview PDF
Publication Date
Fri Jul 01 2011
Journal Name
Bulletin Of The Iraq Natural History Museum (p-issn: 1017-8678 , E-issn: 2311-9799)
CAVE DWELLING ANIMALS IN IRAQ PART 2: SYSTEMATIC NOTES ON THE NUTHATCH OF THE FAMILY SITTIDAE (AVESPASSERIFORMES) IN IRAQ WITH ADDING SOME IMPORTANT KNOWLEDGE TO THE NEST BUILDING OF SITTATEPHRONOTA SHARPE, FROM BESAN VALE HAWRAMAN SLOPE, IRAQI KURDISTAN
...Show More Authors

This paper is a review of the genus Sitta in Iraq, Five species of this genus are recognized
Sitta kurdistanica, S. neumayr, S. europaea, S.dresseri and S. tephronota. Geographical
distribution and systematic nots were given for separation and identification, also some notes
on nest building and nest sites of S. tephronota supporting by figures are presented.

View Publication Preview PDF
Publication Date
Sun Jan 20 2019
Journal Name
Iraqi Journal Of Market Research And Consumer Protection
EVALUATION OF SOME BIOChEMICAL LEVELS IN THE SERUM OF PROFESSORS EXPOSED TO CHEMICALS IN THE LABORATORIES OF THE UNIVERSITY OF SAMARRA: EVALUATION OF SOME BIOChEMICAL LEVELS IN THE SERUM OF PROFESSORS EXPOSED TO CHEMICALS IN THE LABORATORIES OF THE UNIVERSITY OF SAMARRA
...Show More Authors

A chemical study was carried out to evaluate the efficiency of the liver enzyme concertation and uric acid level and its antagonists in the serum of the professors exposed to chemicals in the laboratories of the University of Samarra and their comparison with the healthy people. The research included 25 samples of the exposed professors and 20 samples as a group of officers.

              The results of the current study showed a significant increase in the level of   AST, ALT in the serum of professors exposed to chemicals compared to healthy people. The results showed no significant increase in

... Show More
View Publication Preview PDF
Publication Date
Mon Apr 01 2024
Journal Name
Materials Science In Semiconductor Processing
Rational design of novel 0D/0D Bi2Sn2O7/CeO2 in the core-shell nanostructure for boosting the photocatalytic decomposition of antibiotics in wastewater: S-type-based mechanism
...Show More Authors

View Publication
Scopus (41)
Crossref (39)
Scopus Clarivate Crossref
Publication Date
Sat May 31 2025
Journal Name
Iraqi Journal For Computers And Informatics
Discussion on techniques of data cleaning, user identification, and session identification phases of web usage mining from 2000 to 2022
...Show More Authors

The data preprocessing step is an important step in web usage mining because of the nature of log data, which are heterogeneous, unstructured, and noisy. Given the scalability and efficiency of algorithms in pattern discovery, a preprocessing step must be applied. In this study, the sequential methodologies utilized in the preprocessing of data from web server logs, with an emphasis on sub-phases, such as session identification, user identification, and data cleansing, are comprehensively evaluated and meticulously examined.

View Publication Preview PDF
Crossref
Publication Date
Tue Jan 03 2017
Journal Name
World Journal Of Experimental Biosciences
Effect of Soil Extracts on Ability of Clinical Isolates of Pseudomonas aeruginosa and Staphylococcus aureus to Produce Biofilm in vitro
...Show More Authors

In present study the effect of soil extracts of different types of soil on ability of two clinical isolates, Pseudomonas aeruginosa and Staphylococcus aureus to form biofilm. The extract of soil was done by using sterile phosphate buffer saline and analyzed by Fourier Transform Infrared Spectroscopic (FTIR). Spectrophotometric method was used to check ability of the studied isolated bacteria to form biofilm on polystyrene microtiter plates. The data of FTIR showed very little difference was observed among extracts of three types of soil (soil contaminated with hydrocarbons; garden soil collected from gardens of al-jadrea, Baghdad and containers soil), but the highest difference was observed in the extract obtained from peat moss clay soil.

... Show More