Preferred Language
Articles
/
bsj-8164
Secure Smart Contract Based on Blockchain to Prevent the Non-Repudiation Phenomenon
...Show More Authors

Blockchain is an innovative technology that has gained interest in all sectors in the era of digital transformation where it manages transactions and saves them in a database. With the increasing financial transactions and the rapidly developed society with growing businesses many people looking for the dream of a better financially independent life, stray from large corporations and organizations to form startups and small businesses. Recently, the increasing demand for employees or institutes to prepare and manage contracts, papers, and the verifications process, in addition to human mistakes led to the emergence of a smart contract. The smart contract has been developed to save time and provide more confidence while dealing, as well as to cover the security aspects of digital management and to solve negotiation concerns. The smart contract was employed in creating a distributed ledger to eliminate the need for centralization. In this paper, a simple prototype has been implemented for the smart contract integrated with blockchain which is simulated in a local server with a set of nodes. Several security objectives, such as confidentiality, authorization, integrity, and non-repudiation, have been achieved in the proposed system. Besides, the paper discussed the importance of using the Blockchain technique, and how it contributed to the management of transactions in addition to how it was implemented in highly transparent real-estate scenarios. The smart contract was employed in creating a distributed ledger to eliminate the need for centralization. The elliptic-curve public key has been adopted as an alternative for the RSA in a signature generation/verification process and encryption protocol. For secure transactions, The Secure Socket Layer (SSL) also has been adopted as a secure layer in the web browser. The results have been investigated and evaluated from different aspects and the implementation was in a restricted environment. Experiments showed us the complexity of time and cost when using the (ECC) algorithm and using (RSA) algorithm depending on the size and length of the key. So if the size of the key in (ECC) equals (160) bits, and it corresponds to (1024) bits in (RSA), which is equivalent to 40% for (ECC) and 30% for (RSA). As a result, the (ECC) algorithm is complex, its key is smaller and the process of generating the key is faster, so it has achieved a high level of security.

Scopus Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Wed Dec 11 2019
Journal Name
Journal Of The College Of Education For Women
Investigating Difficulties Faced by Iraqi EFL Learners in Identifying the Illocutionary Force of the Reduplicative Words
...Show More Authors

A reduplicative word is an important phenomenon in all language studies because it reflects many functions in language communication such as plurality, emphasis, contrast, imitation.  The various instances of reduplicative words in a particular language reflect the richness and uniqueness of that language. Moreover, such variation gives insights into both culture and thought. A reduplicative word is a linguistic phenomenon found in the syntactic, morphological, phonological and semantic levels. The current study aims at investigating the illocutionary force of English reduplicative words in some selected English colloquial utterances. To achieve this aim, an analytical -pragmatic approach has been used by adopting Searle’s (1979)

... Show More
View Publication Preview PDF
Publication Date
Sun Feb 15 2026
Journal Name
Journal Of Baghdad College Of Dentistry
An in vitro evaluation of fit of the crowns fabricated by zirconium oxide-based ceramic CAD/CAM systems, before and after porcelain firing cycles and after glaze cycles
...Show More Authors

Background: The objective of this in vitro study was to evaluate the vertical marginal fit of crowns fabricated with ZrO2 CAD/CAM, before and after porcelain firing cycles and after glaze cycles. Materials and Methods: An acrylic resin model of a left maxillary first molar was prepared and duplicated to have Nickel-Chromium master die. Ten die stone dies were sent to the CAD/CAM (Amann Girrbach) for crowns fabrication. Marginal gaps along vertical planes were measured at four indentations at the (mid mesial, mid distal, mid buccal, mid palatal) before (Time 0) and after porcelain firing cycles (Time 1) and after glaze cycles (Time 2) using a light microscope at a magnification of ×100. One way ANOVA LSD tests were performed to determine wh

... Show More
View Publication Preview PDF
Publication Date
Wed Apr 30 2025
Journal Name
Al-turath University College Multidisciplinary Journal
The Role of Nominalization in Social Media Discourse An English Corpus Based Analysis دور التعابير الاسمية في خطاب وسائل التواصل الاجتماعي : تحليل يعتمد البيانات المحوسبة في اللغة الانكليزية
...Show More Authors

The expansion of the social media environment has created its own linguistic realities which involve more colloquial communication and practical employment of language. This research focuses on nominalizations in detail, which are originally formed words that have been changed for a noun role. These nominalizations are examined within the context of Facebook posts. The research aims to discover the various nominalizations used and how often they appear in a large sample of data from Public Facebook Posts Corpora. Computational linguistics opened new fields of study and enabled researchers to study large amounts of data easily, making it easier to identify patterns. Two computational methods of identifying nominalization in a large dataset w

... Show More
Preview PDF
Publication Date
Sun Feb 15 2026
Journal Name
Journal Of Baghdad College Of Dentistry
The effect of different oral hygiene regimens on the quantity of cariogenic plaque on orthodontic bands with different attachments (A clinical photographic study)
...Show More Authors

Background: Fixed orthodontic appliances impede the maintenance of oral hygiene and result in plaque accumulation leads to enamel demineralization caused by acids produced by bacteria. Studies on plaque control strategies in orthodontic populations are limited. This might be caused by difficulties in the quantitative evaluation of dental plaque because the teeth have various levels of bracket coverage, and different tooth sizes and malocclusions, making the traditional categorical indices complex. The present study aims to evaluate the effect of different hygiene protocols on plaque quantity on bands with different attachments. Materials and method: Twenty patients had four bands within the orthodontic appliance. Then randomly divided into

... Show More
View Publication Preview PDF
Publication Date
Sun Jan 27 2019
Journal Name
Journal Of The College Of Education For Women
The Inauguration of Faisal Bin Al -husain as Iraq King (A Study of British Documents)
...Show More Authors

Husain as a king of Iraq.
This paper deals with the British communication with faisel . then Winston Churchill's speech in British common house .then fodlowed by arriving faisal to Iraq after that the referend um faisel .
The his claims of British maneuver lastly coronation on faisal & his inauguration as a king of Iraq.

View Publication Preview PDF
Publication Date
Mon Oct 28 2024
Journal Name
Anggaran : Jurnal Publikasi Ekonomi Dan Akuntansi
The Role Of Emotional Intelligence in The Board Of Directors and Its Impact On The Performance and Value Of Institutions and Conservative Practices In Light Of Crises (Applied Research On a Sample Of Banks Listed On ISX)
...Show More Authors

This research aims to underscore the significance of women's emotional intelligence in enhancing the effectiveness of the Board of Directors, a crucial component of internal governance, particularly during crises. Despite strides made in recent decades in appointing women to senior roles in government, business, and education, challenges persist in improving women's leadership opportunities, especially in developing countries. The study utilizes statistical methods, including Pearson's correlation, to analyze the relationships between variables within a sample of banks listed on the Iraqi securities market, comparing periods before and during the COVID-19 pandemic (2019 and 2020). The goal is to measure the impact of female emotiona

... Show More
View Publication
Crossref
Publication Date
Fri Jun 20 1930
Journal Name
College Of Islamic Sciences
Achieving the book of reaction to the end of   Book of alimony from the manuscript of the Forum of the Evangelist Sheikh Ibrahim bin Mohammed bin Ibrahim Halabi (P. 956 e
...Show More Authors

Achieving the Book of Return to the End of the Book of Alimony from the Manuscript of the Forum of the Abhar of the Sheikh (Abraham Bin
Muhammad ibn Ibrahim al-Halabi (d. 956 AH), who was a member of the Hanafi sect, was a long man
Fiqh, interpretation, modernity, Arab sciences, and readings
Hanafi as well as that he was Abid Zahid and the reason for his claim to this book that asked him some
He asked him to take advantage of it
Al-Hanafiya said, mentioning the sources from which he was taken, and presented his opinion and evidence on the correct
He mentioned the issues of the Hanafi jurisprudence in his book according to the chapters of the jurisprudence
Reaction is done to what you have achieved previously in the h

... Show More
View Publication Preview PDF
Publication Date
Sun Jun 01 2014
Journal Name
Baghdad Science Journal
Using Bernoulli Equation to Solve Burger's Equation
...Show More Authors

In this paper we find the exact solution of Burger's equation after reducing it to Bernoulli equation. We compare this solution with that given by Kaya where he used Adomian decomposition method, the solution given by chakrone where he used the Variation iteration method (VIM)and the solution given by Eq(5)in the paper of M. Javidi. We notice that our solution is better than their solutions.

View Publication Preview PDF
Crossref
Publication Date
Mon Jun 22 2020
Journal Name
Baghdad Science Journal
Using Evolving Algorithms to Cryptanalysis Nonlinear Cryptosystems
...Show More Authors

            In this paper, new method have been investigated using evolving algorithms (EA's) to cryptanalysis one of the nonlinear stream cipher cryptosystems which depends on the Linear Feedback Shift Register (LFSR) unit by using cipher text-only attack. Genetic Algorithm (GA) and Ant Colony Optimization (ACO) which are used for attacking one of the nonlinear cryptosystems called "shrinking generator" using different lengths of cipher text and different lengths of combined LFSRs. GA and ACO proved their good performance in finding the initial values of the combined LFSRs. This work can be considered as a warning for a stream cipher designer to avoid the weak points, which may be f

... Show More
View Publication Preview PDF
Scopus (10)
Crossref (1)
Scopus Clarivate Crossref
Publication Date
Wed Dec 11 2019
Journal Name
Aip Conference Proceedings
Quantization approach to steganography perceptual color spaces
...Show More Authors

In this study, we present a new steganography method depend on quantizing the perceptual color spaces bands. Four perceptual color spaces are used to test the new method which is HSL, HSV, Lab and Luv, where different algorithms to calculate the last two-color spaces are used. The results reveal the validity of this method as a steganoic method and analysis for the effects of quantization and stegano process on the quality of the cover image and the quality of the perceptual color spaces bands are presented.

View Publication Preview PDF
Scopus Clarivate Crossref