Preferred Language
Articles
/
bsj-8164
Secure Smart Contract Based on Blockchain to Prevent the Non-Repudiation Phenomenon
...Show More Authors

Blockchain is an innovative technology that has gained interest in all sectors in the era of digital transformation where it manages transactions and saves them in a database. With the increasing financial transactions and the rapidly developed society with growing businesses many people looking for the dream of a better financially independent life, stray from large corporations and organizations to form startups and small businesses. Recently, the increasing demand for employees or institutes to prepare and manage contracts, papers, and the verifications process, in addition to human mistakes led to the emergence of a smart contract. The smart contract has been developed to save time and provide more confidence while dealing, as well as to cover the security aspects of digital management and to solve negotiation concerns. The smart contract was employed in creating a distributed ledger to eliminate the need for centralization. In this paper, a simple prototype has been implemented for the smart contract integrated with blockchain which is simulated in a local server with a set of nodes. Several security objectives, such as confidentiality, authorization, integrity, and non-repudiation, have been achieved in the proposed system. Besides, the paper discussed the importance of using the Blockchain technique, and how it contributed to the management of transactions in addition to how it was implemented in highly transparent real-estate scenarios. The smart contract was employed in creating a distributed ledger to eliminate the need for centralization. The elliptic-curve public key has been adopted as an alternative for the RSA in a signature generation/verification process and encryption protocol. For secure transactions, The Secure Socket Layer (SSL) also has been adopted as a secure layer in the web browser. The results have been investigated and evaluated from different aspects and the implementation was in a restricted environment. Experiments showed us the complexity of time and cost when using the (ECC) algorithm and using (RSA) algorithm depending on the size and length of the key. So if the size of the key in (ECC) equals (160) bits, and it corresponds to (1024) bits in (RSA), which is equivalent to 40% for (ECC) and 30% for (RSA). As a result, the (ECC) algorithm is complex, its key is smaller and the process of generating the key is faster, so it has achieved a high level of security.

Scopus Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Sat Jun 01 2024
Journal Name
مجلة الدراسات المستدامة
المسؤولية المدنية الناشئة عن الاخلال بالالتزام بضمان سلامة الاشخاص في عقد التحاليل الطبية
...Show More Authors

Preview PDF
Publication Date
Sat Dec 01 2012
Journal Name
Journal Of Economics And Administrative Sciences
Application of “LIML_LVR” method practically according to the general formula K-CLASS on suggestion simultaneous equation
...Show More Authors

في هذا البحث نحاول تسليط الضوء على إحدى طرائق تقدير المعلمات الهيكلية لنماذج المعادلات الآنية الخطية والتي تزودنا بتقديرات متسقة تختلف أحيانا عن تلك التي نحصل عليها من أساليب الطرائق التقليدية الأخرى وفق الصيغة العامة لمقدرات K-CLASS. وهذه الطريقة تعرف بطريقة الإمكان الأعظم محدودة المعلومات "LIML" أو طريقة نسبة التباين الصغرى"LVR

... Show More
View Publication Preview PDF
Crossref
Publication Date
Tue Jan 01 2013
Journal Name
Journal Of The College Of Languages (jcl)
La (autoantonimia) Al-ḍdad en las lenguas, según la lingüística moderna
...Show More Authors

Los lingüistas no árabes suelen quedar perplejos a la hora de  interpretar el  fenómeno de Al-ḍdad, −normalmente traducido en español como palabras  autoantónimas (1)− en la lengua árabe, en el que los arabistas, y entre ellos los españoles, han quedado sombrosos ante este fenómeno. El jefe del tribunal de la defensa de mi tesis me pidió que le explicara este fenómeno según mi teoría “El esquema básico de la referencia”; pues me dijo que no podía  imaginar que una palabra tuviera dos significados opuestos, y en ese momento le expliqué la palabra albayn  البين que significa la separación,  o la relaciónel enlace que comentar

... Show More
View Publication Preview PDF
Publication Date
Tue Jan 01 2013
Journal Name
Journal Of The College Of Languages (jcl)
Phonological Metathesis in Iraqi Arabic Dialect: A Synchronic Perspective
...Show More Authors

Phonological metathesis can be defined as an alternation in the normal sequence of two sounds under certain conditions. The present paper is intended to give a detailed synchronic description of phonological metathesis in Iraqi Arabic dialect. For data collection, the researchers have adopted two naturalistic techniques, viz., observation and notes taking. A synchronic analysis is carried out to provide some evidence that describe the sequential change of phonological metathesis in the dialect under investigation. Such sequential changes of metathesized sounds are presented and tabulated. The study concludes with the following finding that this process is not limited to cases where two consonant sounds are transposed, but three consonant

... Show More
View Publication Preview PDF
Publication Date
Sat Jul 18 2020
Journal Name
College Of Islamic Sciences
ال ظاهرة اللجوء في ضوء العقيدة الاسلامية
...Show More Authors

البحث معني بظاهرة اللجوء من العالم الاسلامي الى العالم الغربي وما يحيط بهذه الظاهرة من تحديات سواء كانت سلبية او ايجابية والبحث يوضح احكام العقيدة الاسلامية للحكم على هذه الظاهرة التي اصبحت من النوازل في هذا العصر 

View Publication Preview PDF
Publication Date
Tue Aug 24 2021
Journal Name
Conference: The 5th International Multi-conference On Artificial Intelligence Technology (mcait 2021).
Text Encryption Based on DNA Cryptography, RNA, and Amino Acid
...Show More Authors

To achieve safe security to transfer data from the sender to receiver, cryptography is one way that is used for such purposes. However, to increase the level of data security, DNA as a new term was introduced to cryptography. The DNA can be easily used to store and transfer the data, and it becomes an effective procedure for such aims and used to implement the computation. A new cryptography system is proposed, consisting of two phases: the encryption phase and the decryption phase. The encryption phase includes six steps, starting by converting plaintext to their equivalent ASCII values and converting them to binary values. After that, the binary values are converted to DNA characters and then converted to their equivalent complementary DN

... Show More
Publication Date
Mon Jan 01 2024
Journal Name
Open Life Sciences
Evaluation of the role of some non-enzymatic antioxidants among Iraqi patients with non-alcoholic fatty liver disease
...Show More Authors
Abstract<p>Non-alcoholic fatty liver disease (NAFLD), characterized by hepatic fat accumulation in individuals consuming little or no alcohol, has become highly prevalent globally. Oxidative stress plays a central role in instigating inflammation and cell death pathways driving NAFLD progression. This case–control study aimed to elucidate the association between circulating levels of the pivotal non-enzymatic antioxidants – coenzyme Q10 and vitamins E and C – and liver injury parameters among 60 Iraqi NAFLD patients versus 30 healthy controls. NAFLD diagnosis entailed over 5% hepatic steatosis on ultrasound excluding other etiologies. Patients spanned three age groups: 20–29, 30–39, an</p> ... Show More
View Publication Preview PDF
Scopus Clarivate Crossref
Publication Date
Wed Dec 30 2015
Journal Name
College Of Islamic Sciences
Of non-Muslim minorities In the Muslim community
...Show More Authors

Of non-Muslim minorities In the Muslim community

View Publication Preview PDF
Publication Date
Wed Jan 01 2020
Journal Name
Italian Journal Of Pure And Applied Mathematics
The non-zero divisor graph of a ring
...Show More Authors

Scopus (6)
Scopus
Publication Date
Sat Dec 02 2017
Journal Name
Al-khwarizmi Engineering Journal
Design of a Programmable System for Failure Modes and Effect Analysis of Steam-Power Plant Based on the Fault Tree Analysis
...Show More Authors

In this paper, the system of the power plant has been investigated as a special type of industrial systems, which has a significant role in improving societies since the electrical energy has entered all kinds of industries, and it is considered as the artery of modern life.

   The aim of this research is to construct a programming system, which could be used to identify the most important failure modes that are occur in a steam type of power plants. Also the effects and reasons of each failure mode could be analyzed through the usage of this programming system reaching to the basic events (main reasons) that causing each failure mode. The construction of this system for FMEA is dependi

... Show More
View Publication Preview PDF