Blockchain is an innovative technology that has gained interest in all sectors in the era of digital transformation where it manages transactions and saves them in a database. With the increasing financial transactions and the rapidly developed society with growing businesses many people looking for the dream of a better financially independent life, stray from large corporations and organizations to form startups and small businesses. Recently, the increasing demand for employees or institutes to prepare and manage contracts, papers, and the verifications process, in addition to human mistakes led to the emergence of a smart contract. The smart contract has been developed to save time and provide more confidence while dealing, as well as to cover the security aspects of digital management and to solve negotiation concerns. The smart contract was employed in creating a distributed ledger to eliminate the need for centralization. In this paper, a simple prototype has been implemented for the smart contract integrated with blockchain which is simulated in a local server with a set of nodes. Several security objectives, such as confidentiality, authorization, integrity, and non-repudiation, have been achieved in the proposed system. Besides, the paper discussed the importance of using the Blockchain technique, and how it contributed to the management of transactions in addition to how it was implemented in highly transparent real-estate scenarios. The smart contract was employed in creating a distributed ledger to eliminate the need for centralization. The elliptic-curve public key has been adopted as an alternative for the RSA in a signature generation/verification process and encryption protocol. For secure transactions, The Secure Socket Layer (SSL) also has been adopted as a secure layer in the web browser. The results have been investigated and evaluated from different aspects and the implementation was in a restricted environment. Experiments showed us the complexity of time and cost when using the (ECC) algorithm and using (RSA) algorithm depending on the size and length of the key. So if the size of the key in (ECC) equals (160) bits, and it corresponds to (1024) bits in (RSA), which is equivalent to 40% for (ECC) and 30% for (RSA). As a result, the (ECC) algorithm is complex, its key is smaller and the process of generating the key is faster, so it has achieved a high level of security.
The research aims to identify the extent of the impact of non-Iraqi trading of shares in the Iraq Stock Exchange on the overall financial investment in the market size. And it imposes a search and no statistically significant relationship between variable trading non-Iraqis, the size and the total volume of the market and took the search Iraq Stock Exchange sample to search being the only private place to trade securities in Iraq for the period of 2009- 2015 in order to see if there is a positive impact on the size of trading non-Iraqis or not. Search and adopted the annual reports issued by the Iraq Stock Exchange the main conclusion are:
Having a positive effect on the size of the trading of non-Iraqis in the financial vo
... Show MoreBackground: Diabetes mellitus is one of the commonest chronic disorders worldwide with a rapid rise in prevalence. In Iraq its prevalence is high especially in elderly age group. Patients with type 2 diabetes mellitus have higher vulnerability for complications, whether microvascular or macrovascular. Ocular complications are common in diabetes mellitus, and comprise diabetic retinopathy, diabetic papillopathy, cataract, glaucoma, dry eye disease and diabetic keratopathy. Diabetic keratopathy involves endothelial and epithelial tissues of the cornea, leading to persistent epithelial defect, corneal erosion, or corneal ulcers.
Aim of the Study: To compare the mean corneal endothelial cell count between patients wi
... Show MoreAbstract:
The research aims to shed light on the Corona pandemic and its repercussions on the global economy in general, and on the activities of Iraqi economic units in particular. It also aims to show the impact of the auditor’s reporting on the effects of the Corona pandemic on economic units and its reflection on the quality of his reporting. To achieve the objectives of the research, the researcher prepared a questionnaire according to the five-point Likert scale and took into account in its preparation compatibility with the characteristics of the study community, and that the target community for this questionnaire are the economic units listed in the Iraq Stock Exchange that have complet
... Show MoreCompression for color image is now necessary for transmission and storage in the data bases since the color gives a pleasing nature and natural for any object, so three composite techniques based color image compression is implemented to achieve image with high compression, no loss in original image, better performance and good image quality. These techniques are composite stationary wavelet technique (S), composite wavelet technique (W) and composite multi-wavelet technique (M). For the high energy sub-band of the 3 rd level of each composite transform in each composite technique, the compression parameters are calculated. The best composite transform among the 27 types is the three levels of multi-wavelet transform (MMM) in M technique wh
... Show MoreThe research aims to demonstrate the impact of TDABC as a strategic technology compatible with the rapid developments and changes in the contemporary business environment) on pricing decisions. As TDABC provides a new philosophy in the process of allocating indirect costs through time directives of resources and activities to the goal of cost, identifying unused energy and associated costs, which provides the management of economic units with financial and non-financial information that helps them in the complex and dangerous decision-making process. Of pricing decisions. To achieve better pricing decisions in light of the endeavor to maintain customers in a highly competitive environment and a variety of alternatives, the resear
... Show MoreIn this paper, a compact multiband printed dipole antenna is presented as a candidate for use in wireless communication applications. The proposed fractal antenna design is based on the second level tent transformation. The space-filling property of this fractal geometry permits producing longer lengths in a more compact size. Theoretical performance of this antenna has been calculated using the commercially available software IE3D from Zeland Software Inc. This electromagnetic simulator is based on the method of moments (MoM). The proposed dipole antenna has been found to possess a considerable size reduction compared with the conventional printed or wire dipole antenna designed at the same design frequency and using the same substrate
... Show MoreMarriage outside the court is a manifestation of the oppression that women are subjected to in Iraq its seriousness comes out of the consequences that it leads to The. It overlooks the age of the girl and her marriage in younger age or coerced to marry as it leads to neglecting the affordability of marital relationship as long as the marriage does not have any legal or material consequences. The present study aims to detect Characteristics of both wives, husbands and families Who agree to marry her daughters outside the court. And the reasons that lead them to marry outside the courts. It also aims to provide information on the circumstances of marriage and reasons for refusing to ratify it in court. The study was based on the sample soc
... Show MoreEnsuring security, integrity, and reliability of the election process consider as the main challenges in the electronic voting system. This paper describes the e-voting system by integrating the biometric authentication, advanced encryption, and watermarking techniques towards meeting such challenges. The system employs the fingerprint authentication by utilizing the Scale-Invariant Feature Transform (SIFT) for verifying the identity of the voter to ensure genuineness and non-repudiation of the service. The vote will be encrypted with the AES-GCM technique to be employed in securing the voting process, thus ensuring both data privacy and integrity. Hybrid Blind Watermarking employs the technique of Discrete Wavelet Transform (DWT) a
... Show More