Preferred Language
Articles
/
bsj-8164
Secure Smart Contract Based on Blockchain to Prevent the Non-Repudiation Phenomenon
...Show More Authors

Blockchain is an innovative technology that has gained interest in all sectors in the era of digital transformation where it manages transactions and saves them in a database. With the increasing financial transactions and the rapidly developed society with growing businesses many people looking for the dream of a better financially independent life, stray from large corporations and organizations to form startups and small businesses. Recently, the increasing demand for employees or institutes to prepare and manage contracts, papers, and the verifications process, in addition to human mistakes led to the emergence of a smart contract. The smart contract has been developed to save time and provide more confidence while dealing, as well as to cover the security aspects of digital management and to solve negotiation concerns. The smart contract was employed in creating a distributed ledger to eliminate the need for centralization. In this paper, a simple prototype has been implemented for the smart contract integrated with blockchain which is simulated in a local server with a set of nodes. Several security objectives, such as confidentiality, authorization, integrity, and non-repudiation, have been achieved in the proposed system. Besides, the paper discussed the importance of using the Blockchain technique, and how it contributed to the management of transactions in addition to how it was implemented in highly transparent real-estate scenarios. The smart contract was employed in creating a distributed ledger to eliminate the need for centralization. The elliptic-curve public key has been adopted as an alternative for the RSA in a signature generation/verification process and encryption protocol. For secure transactions, The Secure Socket Layer (SSL) also has been adopted as a secure layer in the web browser. The results have been investigated and evaluated from different aspects and the implementation was in a restricted environment. Experiments showed us the complexity of time and cost when using the (ECC) algorithm and using (RSA) algorithm depending on the size and length of the key. So if the size of the key in (ECC) equals (160) bits, and it corresponds to (1024) bits in (RSA), which is equivalent to 40% for (ECC) and 30% for (RSA). As a result, the (ECC) algorithm is complex, its key is smaller and the process of generating the key is faster, so it has achieved a high level of security.

Scopus Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Sun Dec 01 2013
Journal Name
Journal Of Accounting And Financial Studies ( Jafs )
Obstacles in Marketing Comprehensive Automobile Insurance Policy: بحث أستطلاعي في شركة التأمين الوطنية
...Show More Authors

Comprehensive automobile insurance is considered as an important branches in the portfolio of National Insurance Company in Iraq .Due to the continous accidents the company is endeavouring to   this market.

    The company faces several obstacles and limitations in marketing the policies of this portfolio due to certain factors and influences beyond the control of the company and others internal mainly connected with the reduction of the marketing programmes of the company .

    The target of this study is  to focus the light  upon the interal factors which can be gorerned by the company,confronted and solved.

 

View Publication Preview PDF
Publication Date
Thu Jan 16 2020
Journal Name
Journal Of Accounting And Financial Studies ( Jafs )
Obstacles in Marketing Comprehensive Automobile Insurance Policy: بحث أستطلاعي في شركة التأمين الوطنية
...Show More Authors

Comprehensive automobile insurance is considered as an important insurance which is managing by National Insurance Company due to the continuous accidents the company is endeavoring to this market not for trading motives only but also to increase the insurance awareness of people and insurance benefit for other insurance portfolios .On this basis the researcher had chosen her subject ( obstacles in marketing comprehensive automobile Insurance policy ) the company faces several obstacles and limitations in marketing the policies of this portfolio due to certain factors and influences beyond the mainly connected with the reduction of marketing programmes of the company . the aim of this study is to shade the light upon the internal factors

... Show More
View Publication Preview PDF
Publication Date
Sat Oct 20 2018
Journal Name
Journal Of Economics And Administrative Sciences
The effects of trade policy on the diversification of Iraqi exports after 2003 compared to the Malaysian experience
...Show More Authors

Abstract

        The Issue of trade policy is one of the most important topics that researchers have been interested in because of its important role in the economy over the ages. This importance has increased due to the increasing of commercial operations at different levels in both developing and developed countries Foreign trade is one of the means of achieving economic development through the economic surpluses resulting from exports and imports, as it is an important pillar of the economy in general and the Iraqi economy in particular, in light of the transformation process that took place for the Iraqi economy in various fields due to the implement

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Sat Jul 31 2021
Journal Name
Brain Sciences
Robust EEG Based Biomarkers to Detect Alzheimer’s Disease
...Show More Authors

Biomarkers to detect Alzheimer’s disease (AD) would enable patients to gain access to appropriate services and may facilitate the development of new therapies. Given the large numbers of people affected by AD, there is a need for a low-cost, easy to use method to detect AD patients. Potentially, the electroencephalogram (EEG) can play a valuable role in this, but at present no single EEG biomarker is robust enough for use in practice. This study aims to provide a methodological framework for the development of robust EEG biomarkers to detect AD with a clinically acceptable performance by exploiting the combined strengths of key biomarkers. A large number of existing and novel EEG biomarkers associated with slowing of EEG, reductio

... Show More
View Publication Preview PDF
Scopus (28)
Crossref (26)
Scopus Clarivate Crossref
Publication Date
Fri Jan 31 2025
Journal Name
Joiv : International Journal On Informatics Visualization
RC5 Performance Enhancement Based on Parallel Computing
...Show More Authors

This study aims to enhance the RC5 algorithm to improve encryption and decryption speeds in devices with limited power and memory resources. These resource-constrained applications, which range in size from wearables and smart cards to microscopic sensors, frequently function in settings where traditional cryptographic techniques because of their high computational overhead and memory requirements are impracticable. The Enhanced RC5 (ERC5) algorithm integrates the PKCS#7 padding method to effectively adapt to various data sizes. Empirical investigation reveals significant improvements in encryption speed with ERC5, ranging from 50.90% to 64.18% for audio files and 46.97% to 56.84% for image files, depending on file size. A substanti

... Show More
View Publication
Scopus Crossref
Publication Date
Sun Jan 01 2006
Journal Name
Journal Of Educational And Psychological Researches
دور الأسرة في ظاهرة جنوح الأحداث
...Show More Authors

تعد الاسرة إحدى الوحدات الاجتماعية التي تهيئ الجيل المتطلع للحياة وهم الاطفال، وهي المهد الطبيعي للطبقة البشرية التي تباشر وتواجه اثراً هاماً تكوين الشخصية والسلوك الاجتماعي والخلقي ، وهي نقطة الوصول والتفاعل بين البيولوجي والاجتماعي وعنها ينشأ التفاعل النفساني ، وشبكة العلاقات الاسرية والعلاقات الخارجية المجتمعة . ومن خلال معاييرها وقيمها ينشأ السلوك سوياً كان ام مرضياً ( جانحاً ) ، ومشكلة جنوح الا

... Show More
View Publication Preview PDF
Publication Date
Sun Jan 01 2023
Journal Name
Advances In The Theory Of Nonlinear Analysis And Its Application
The Influence of the Magnetic Domain on The Peristaltic Motion of The Non-Newtonian Fluid in A Curved Tube
...Show More Authors

View Publication
Scopus Crossref
Publication Date
Tue Mar 31 2015
Journal Name
Al-khwarizmi Engineering Journal
Influence of Coating with Some Natural Based Materials on the Erosion Wear Behavior of Glass Fiber Reinforced Epoxy Resin
...Show More Authors

Abstract 

In the present study, composites were prepared by Hand lay-up molding. The composites constituents were epoxy resin as a matrix, 6% volume fractions of glass fibers (G.F) as reinforcement and 3%, 6% volume fractions of preparation natural material (Rice Husk Ash, Carrot Powder, and Sawdust) as filler. Studied the erosion wear behavior and coating by natural wastes (Rice Husk Ash) with epoxy resin after erosion. The results showed the non – reinforced epoxy have lower resistance erosion than natural based material composites and the specimen (Epoxy+6%glass fiber+6%RHA) has higher resistance erosion than composites reinforced with carrot powder and sawdust  at 30cm , angle 60

... Show More
View Publication Preview PDF
Publication Date
Sun Jul 02 2017
Journal Name
Journal Of Educational And Psychological Researches
اثر تصميم تعليمي قائم على ستراتيجية التعليم من اجل الفهم في تحصيل مادة الرياضيات لدى طالبات الصف الخامس العلمي
...Show More Authors

The objective of the current research is to identify the effective of the suggested instructional design that based on the teaching strategy for understanding in achievement for students(girls) of mathematics in the fifth grads secondary school. To achieve the research goal, the empirical research method is depended. In this method a realistic empirical design pre-test of two equivalent sets to determine the students’ grade is used. The following zero hypotheses is formulated “There is no statistical difference for the faction at 0.05 between the mean grad for the students of the empirical group who studied the subject using the Instructional design based on the teaching strategy for understanding and those who studied the same subje

... Show More
View Publication Preview PDF
Publication Date
Wed Feb 10 2016
Journal Name
Scientific Reports
Experimental demonstration on the deterministic quantum key distribution based on entangled photons
...Show More Authors

As an important resource, entanglement light source has been used in developing quantum information technologies, such as quantum key distribution(QKD). There are few experiments implementing entanglement-based deterministic QKD protocols since the security of existing protocols may be compromised in lossy channels. In this work, we report on a loss-tolerant deterministic QKD experiment which follows a modified “Ping-Pong”(PP) protocol. The experiment results demonstrate for the first time that a secure deterministic QKD session can be fulfilled in a channel with an optical loss of 9 dB, based on a telecom-band entangled photon source. This exhibits a conceivable prospect of ultilizing entanglement light source in real-life fiber-based

... Show More
View Publication
Scopus (17)
Crossref (16)
Scopus Clarivate Crossref