Preferred Language
Articles
/
bsj-9735
Optimizing Blockchain Consensus: Incorporating Trust Value in the Practical Byzantine Fault Tolerance Algorithm with Boneh-Lynn-Shacham Aggregate Signature
...Show More Authors

The consensus algorithm is the core mechanism of blockchain and is used to ensure data consistency among blockchain nodes. The PBFT consensus algorithm is widely used in alliance chains because it is resistant to Byzantine errors. However, the present PBFT (Practical Byzantine Fault Tolerance) still has issues with master node selection that is random and complicated communication. The IBFT consensus technique, which is enhanced, is proposed in this study and is based on node trust value and BLS (Boneh-Lynn-Shacham) aggregate signature. In IBFT, multi-level indicators are used to calculate the trust value of each node, and some nodes are selected to take part in network consensus as a result of this calculation. The master node is chosen from among them based on which node has the highest trust value, it transforms the BLS signature process into the information interaction process between nodes. Consequently, communication complexity is reduced, and node-to-node information exchange remains secure. The simulation experiment findings demonstrate that the IBFT consensus method enhances transaction throughput rate by 61% and reduces latency by 13% when compared to the PBFT algorithm.

Scopus Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Thu May 31 2018
Journal Name
الاستاذ للعلوم الانسانية والاجتماعية
Tolerance between Christianity and Islam
...Show More Authors

The Christian religion came in love and co-existence with all human beings, united in the minds of its people, including the great creation to form a strong unit of high ethics that contributes to the unity among the members of society and coexistence in security, peace and love of harmony.

Preview PDF
Publication Date
Sun Sep 01 2013
Journal Name
Journal Of Economics And Administrative Sciences
Measure the impact of the age structure of the population on the gross domestic product in Iraq
...Show More Authors

   يهدف البحث إلى التعرف على The research aims to identify the effect ofاثر التركيب العمري للسكان على الناتج المحلي الإجمالي في العراق وتحديد الفئات العمرية من أطفال ومنتجين أي من هم في سن العمل والمسنين لأهمية ذلك لإغراض التخطيط الاقتصادي.إنeffectofeee age structure of the population on GDP in Iraq and determine the age groups of children and any of the producers wham are of working age and the elderly of the importance for the purposes of economic planning. نسبة الفئة العمرية Proportion of the age group (00- -4 4سنوات اقتربت من

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun Mar 01 2020
Journal Name
Baghdad Science Journal
A Comparative Study on the Double Prior for Reliability Kumaraswamy Distribution with Numerical Solution
...Show More Authors

This work, deals with Kumaraswamy distribution. Kumaraswamy (1976, 1978) showed well known probability distribution functions such as the normal, beta and log-normal but in (1980) Kumaraswamy developed a more general probability density function for double bounded random processes, which is known as Kumaraswamy’s distribution. Classical maximum likelihood and Bayes methods estimator are used to estimate the unknown shape parameter (b). Reliability function are obtained using symmetric loss functions by using three types of informative priors two single priors and one double prior. In addition, a comparison is made for the performance of these estimators with respect to the numerical solution which are found using expansion method. The

... Show More
View Publication Preview PDF
Scopus (3)
Crossref (1)
Scopus Clarivate Crossref
Publication Date
Fri Feb 02 2024
Journal Name
Iraqi Journal Of Science
Using Sensitivity Analysis in Linear Programming with Practical Physical Applications
...Show More Authors

Linear programming currently occupies a prominent position in various fields and has wide applications, as its importance lies in being a means of studying the behavior of a large number of systems as well. It is also the simplest and easiest type of models that can be created to address industrial, commercial, military and other dilemmas. Through which to obtain the optimal quantitative value. In this research, we dealt with the post optimality solution, or what is known as sensitivity analysis, using the principle of shadow prices. The scientific solution to any problem is not a complete solution once the optimal solution is reached. Any change in the values of the model constants or what is known as the inputs of the model that will chan

... Show More
Preview PDF
Publication Date
Thu Apr 25 2019
Journal Name
Iraqi Journal Of Market Research And Consumer Protection
MEASUREMENT OF CHEMICAL AND PHYSICAL PROPERTIES IN SOME MINERAL WATER SAMPLES FILLED IN THE MARKETS OF THE PROVINCE OF NAJAF AND COMPARE WITH THE IRAQI AND INTERNATIONAL RATIOS.: MEASUREMENT OF CHEMICAL AND PHYSICAL PROPERTIES IN SOME MINERAL WATER SAMPLES FILLED IN THE MARKETS OF THE PROVINCE OF NAJAF AND COMPARE WITH THE IRAQI AND INTERNATIONAL RATIOS.
...Show More Authors

In this research, a selection of some mineral water was selected on the basis of being the most marketed by the owners of shops in Najaf province, with six types, where daily samples of this water were taken by 50 ml for two months from (1/11/2018 -1/1/2019). The following ions concentrations were measured (Br-, Cl-, F-, NO3-, SO42-, Na+, K+, Ca2+, Mg2+), pH and the electrical conductivity were measured and the results were compared with the allowable rates according to the international organizations. It was noted that they conform to international and Iraqi standards.

View Publication Preview PDF
Publication Date
Tue Dec 01 2015
Journal Name
Journal Of Economics And Administrative Sciences
A Comparison Between Some Estimator Methods of Linear Regression Model With Auto-Correlated Errors With Application Data for the Wheat in Iraq
...Show More Authors

This research a study model of linear regression problem of autocorrelation of random error is spread when a normal distribution as used in linear regression analysis for relationship between variables and through this relationship can predict the value of a variable with the values of other variables, and was comparing methods (method of least squares, method of the average un-weighted, Thiel method and Laplace method) using the mean square error (MSE) boxes and simulation and the study included fore sizes of samples (15, 30, 60, 100). The results showed that the least-squares method is best, applying the fore methods of buckwheat production data and the cultivated area of the provinces of Iraq for years (2010), (2011), (2012),

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun Feb 10 2019
Journal Name
Iraqi National Journal Of Nursing Specialties
Self-Esteem and its Relationship with the Age, Gender and academic Achievement among the students of the south Iraq Colleges of Nursing
...Show More Authors

Abstract
Objectives: this study aims to: (1). Assess self-esteem level and academic achievement for students of nursing colleges in southern Iraq. (2). Determine the relationship between levels of self-esteem and academic achievement of the student in the first semester. (3). Identify differences of self-esteem with gender and different age groups.
Methodology: a sample of (426 students) was purposively selected then collected by using a questionnaire which consisted of: I- Sociodemographic characteristics for assessing some important aspects of students, II- Rosenberg's Self-Esteem Scale (RSES) III- Iraq Grading Scale for assessing student achievement. Finally statistical analysis (SPSS) for data processing.
Results: study resu

... Show More
View Publication Preview PDF
Publication Date
Mon Jun 01 2015
Journal Name
Journal Of Economics And Administrative Sciences
independence of the central banks with a focus on measuring the independence of the central bank of Jordan
...Show More Authors

The main topic of this study is central around the independence of Jordanian central bank and the extent of the effectiveness at the bank in leading the monetary policy without interferences or pressures from side of the government.  the degree of independence of Jordanian central bank was  based on the following based hypothesis following ,there is relationship between the independence of the central bank and the legislative and economical indices. the most important recommendations are degree of independence of the Jordan central bank 43.5% is a good one, but it possible to reach a higher degree than this one by to making some modification on the Jordanian central bank law and by the central bank should be more rigid

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun Feb 03 2019
Journal Name
Journal Of Accounting And Financial Studies ( Jafs )
Anti-Money Laundering Protection procedures in Commercial With establishment of a Proposal from work to Audit banks
...Show More Authors

Concurrently with the technological development that the world is witnessing the crime of money laundering to evolve faster and with multiple methods and its economic, political and social impacts raised increasingly. And for phenomenon dangerous the international community in recent years is keen to be considered combating money laundering as a general indication whereby verification of the international response the stats and its banks and financial institutions with international requirements mandated in this aspect, so the increasing interest the governments of countries in the laws and procedures that contribute to the reduction of the phenomenon of money laundering and avoid legislation economy and the banking and financial sectors

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sat Aug 03 2024
Journal Name
Proceedings Of Ninth International Congress On Information And Communication Technology
Offline Signature Verification Based on Neural Network
...Show More Authors

The investigation of signature validation is crucial to the field of personal authenticity. The biometrics-based system has been developed to support some information security features.Aperson’s signature, an essential biometric trait of a human being, can be used to verify their identification. In this study, a mechanism for automatically verifying signatures has been suggested. The offline properties of handwritten signatures are highlighted in this study which aims to verify the authenticity of handwritten signatures whether they are real or forged using computer-based machine learning techniques. The main goal of developing such systems is to verify people through the validity of their signatures. In this research, images of a group o

... Show More