Preferred Language
Articles
/
bsj-8164
Secure Smart Contract Based on Blockchain to Prevent the Non-Repudiation Phenomenon
...Show More Authors

Blockchain is an innovative technology that has gained interest in all sectors in the era of digital transformation where it manages transactions and saves them in a database. With the increasing financial transactions and the rapidly developed society with growing businesses many people looking for the dream of a better financially independent life, stray from large corporations and organizations to form startups and small businesses. Recently, the increasing demand for employees or institutes to prepare and manage contracts, papers, and the verifications process, in addition to human mistakes led to the emergence of a smart contract. The smart contract has been developed to save time and provide more confidence while dealing, as well as to cover the security aspects of digital management and to solve negotiation concerns. The smart contract was employed in creating a distributed ledger to eliminate the need for centralization. In this paper, a simple prototype has been implemented for the smart contract integrated with blockchain which is simulated in a local server with a set of nodes. Several security objectives, such as confidentiality, authorization, integrity, and non-repudiation, have been achieved in the proposed system. Besides, the paper discussed the importance of using the Blockchain technique, and how it contributed to the management of transactions in addition to how it was implemented in highly transparent real-estate scenarios. The smart contract was employed in creating a distributed ledger to eliminate the need for centralization. The elliptic-curve public key has been adopted as an alternative for the RSA in a signature generation/verification process and encryption protocol. For secure transactions, The Secure Socket Layer (SSL) also has been adopted as a secure layer in the web browser. The results have been investigated and evaluated from different aspects and the implementation was in a restricted environment. Experiments showed us the complexity of time and cost when using the (ECC) algorithm and using (RSA) algorithm depending on the size and length of the key. So if the size of the key in (ECC) equals (160) bits, and it corresponds to (1024) bits in (RSA), which is equivalent to 40% for (ECC) and 30% for (RSA). As a result, the (ECC) algorithm is complex, its key is smaller and the process of generating the key is faster, so it has achieved a high level of security.

Scopus Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Tue Dec 31 2019
Journal Name
Journal Of Engineering
The Effect of Total Suspended Solids on the Electricity Generation in Microbial Fuel Cell Treating Actual Potato Chips Processing Wastewater
...Show More Authors

This study aimed to investigate the effect of total suspended solids (TSS) on the performance of a continuously operated dual-chamber microbial fuel cell (MFC) proceeded by primary clarifier to treat actual potato chips processing wastewater. The system was also tested in the absence of the primary clarifier and the results demonstrated a significant effect of TSS on the polarization curve of the MFC which was obtained by operating the graphite anodic electrode against Ag/AgCl reference electrode. The maximum observed power and current densities were decreased form 102.42 mW/m2 and 447.26 mA/m2 to 80.16 mW/m2 and 299.10 mA/m2, respectively due to the adverse effect of TSS. Also

... Show More
View Publication Preview PDF
Crossref (6)
Crossref
Publication Date
Tue Oct 01 2019
Journal Name
Biochemical And Cellular Archives
THE EFFECT OF TWIST EXPRESSION ON THE DEVELOPMENT OF CERVICAL CARCINOMA IN A GROUP OF IRAQI WOMEN INFECTED WITH HPV
...Show More Authors

Cervical carcinoma represent the second predominant cancer in female and there is a strong correlation between cervical cancer and the infection with high-risk types of HPV and expression the viral oncogenes. EMT is viewed as a vital advance in carcinoma development and ensuing metastasis. To evaluate correlation between the expression of Twist and HPV16 infection in a group of Iraqi patients with cervical carcinoma. A total of forty paraffin blocks included in this study which were divided into 30 sample of cervical cancer infected with HPV16and 10 sample of normal cervical tissues. The samples were subjected to immunohistochemical technique using Anti-Twist2 polyclonal antibody. The obtained data from this study indicate that majority of

... Show More
Scopus (6)
Scopus
Publication Date
Fri Jun 11 2021
Journal Name
Journal Of Baghdad College Of Dentistry
The effect of composite bonding spot size and location on the performance of poly-ether-ether-ketone (PEEK) retainer wires
...Show More Authors

Background: Poly-ether-ether-ketone(PEEK) has been introduced to many dental fields. Recently it was tested as a retainer wire‎ following orthodontic treatment. This study aimed to investigate the effect of changing the bonding spot size and location on the performance of PEEK retainer wires. Methods: A biomechanical study involving four three-dimensional finite element models was performed. The basic model was with a 0.8 mm cylindrical cross-section PEEK wire, bonded at the center of the lingual surface of the mandibular incisors with 4 mm in diameter composite spots. Two other models were designed with 3 mm and 5 mm composite sizes. The last model was created with the composite bonding spot of the canine away from the center

... Show More
Scopus (14)
Crossref (13)
Scopus Crossref
Publication Date
Wed Aug 30 2023
Journal Name
Al-kindy College Medical Journal
The Impact of using the Internet and Social Media on Sleep in a group of Secondary School Students from Baghdad
...Show More Authors

Background: Insufficient sleep due to excessive media use is linked to decrease physical activity, poor nutrition, obesity, and decreased overall health-related quality of life.

Objectives: To assess the effect of using the internet and social media on the sleep of 4th-stage secondary school students.

Subjects and Methods: Cross-sectional study with the analytic element; for 500 secondary school students, obtained by choosing two schools randomly from each of the six educational directorates, by using a structured questionnaire.

Result: Secondary scho

... Show More
View Publication Preview PDF
Scopus (4)
Crossref (2)
Scopus Crossref
Publication Date
Wed Oct 11 2023
Journal Name
Journal Of Educational And Psychological Researches
Cognitive Behavioral Therapy for Internet Addicts
...Show More Authors

The study aims to explore the effect of cognitive behavioral therapy on internet addiction among university students. The experimental method was used. The study population consisted of (100) university students (50 males, 50 females). The Research sample included (13) University students at Baghdad University addicted to the Internet (9 males, 4 females), divided into two groups:  a control group consisting of (6) individuals (4 males, 2 females) and an experimental sample consisting of (6) individuals (4 males, 2 females). The Scale of Internet Addiction by Young (1996), which was translated and modified into the Arabic language by (Moegel and Prism, 2016), was administered to the study sample. The sample was subjected to two sess

... Show More
View Publication Preview PDF
Publication Date
Thu Jul 01 2010
Journal Name
Political Sciences Journal
ملاحظات اولية على قانون الانتخابات ونتاجاتها
...Show More Authors

ملاحظات اولية على قانون الانتخابات ونتائجها

View Publication Preview PDF
Crossref
Publication Date
Mon Aug 01 2011
Journal Name
مجلة الحقوق كلية القانون الجامعة المستنصرية
اثر انعدام الاهلية على الشركة التضامنية
...Show More Authors

اثر انعدام الاهلية على الشركة التضامنية

Publication Date
Sun Feb 25 2024
Journal Name
Baghdad Science Journal
Containerized Event-Driven Microservice Architecture
...Show More Authors

Microservice architecture offers many advantages, especially for business applications, due to its flexibility, expandability, and loosely coupled structure for ease of maintenance. However, there are several disadvantages that stem from the features of microservices, such as the fact that microservices are independent in nature can hinder meaningful communication and make data synchronization more challenging. This paper addresses the issues by proposing a containerized microservices in an asynchronous event-driven architecture. This architecture encloses microservices in containers and implements an event manager to keep track of all the events in an event log to reduce errors in the application. Experiment results show a decline in re

... Show More
View Publication Preview PDF
Scopus (3)
Crossref (1)
Scopus Crossref
Publication Date
Wed Nov 02 2022
Journal Name
الجامعة العراقية
الحاجات الارشادية وعلاقتها بالانفتاح على الخبرة
...Show More Authors

Publication Date
Sat Nov 02 2024
Journal Name
العلوم القانونية والسياسية
الحروب والصراعات وتداعيتها على الامن الانساني
...Show More Authors

تعد الحروب و الصراعات واحدة من اقدم الظواىر التي عرفتها المجتمعات البشرية وان ىذه الظاىرة تجسدت في البداية على مستوى الصراعات الفردية عندما كانت ترتقي الى مستوى الاشتباك وكانت بدائية في وسائلها وادواتها ،وكما ان ظاىرة الحرب بدأت من الاسرة ومن ثم القبيلة والعشيرة وانتهت بالدولة ،اذ ان ظاىرة الحروب بشكلها التقليدي تأخذ شكلا تدميريا بعد ان تتطور ابعادىا القصوى وان حدوثها ىو تضارب مصالح واىداف الاطراف وانها ال

... Show More
Preview PDF