Preferred Language
Articles
/
joe-411
Construction of Graduation Certificate Issuing System Based on Digital Signature Technique
...Show More Authors

With the development of computer architecture and its technologies in recent years, applications like e-commerce, e-government, e-governance and e-finance are widely used, and they act as active research areas. In addition, in order to increase the quality and quantity of the ordinary everyday transactions, it is desired to migrate from the paper-based environment to a digital-based computerized environment. Such migration increases efficiency, saves time, eliminates paperwork, increases safety and reduces the cost in an organization. Digital signatures are playing an essential role in many electronic and automatic based systems and facilitate this migration. The digital signatures are used to provide many services and solutions that would not have been possible by the conventional hand-written signature.

In the educational environment, the process of issuing the graduation certificates can no longer be restricted to the traditional methods. Hence, a computerized system for issuing certificates of graduation in an electronic form is needed and desired. This paper proposes a Graduation Certificates Issuing System (GCIS) based on digital signature technology. In doing so, this research highlights the state-of-the-art and the art-of-the-practice for some existing digital signature-based systems in the literatures. In addition, eight intertwined elected services are identified, namely: message authentication, entity authentication, integrity, non-repudiation, time stamping, distinguished signing authorities, delegating signing capability and supporting workflow systems. Moreover, this research examines nine existing systems, showing their merits and demerits in terms of these elected services. Furthermore, the research describes the architectural design using the Unified Modeling Language (UML) and provides the concrete implementation of the proposed GCIS. The GCIS is implemented using Visual Basic.Net programming language and SQL Server database management system.

           

 

View Publication Preview PDF
Quick Preview PDF
Publication Date
Tue Apr 22 2025
Journal Name
Journal Of Engineering
Design and Implementation of ICT-Based Recycle-Rewarding System for Green Environment
...Show More Authors

View Publication
Publication Date
Thu May 30 2024
Journal Name
Iraqi Journal Of Science
A Review Study on Forgery and Tamper Detection Techniques in Digital Images
...Show More Authors

Digital tampering identification, which detects picture modification, is a significant area of image analysis studies. This area has grown with time with exceptional precision employing machine learning and deep learning-based strategies during the last five years. Synthesis and reinforcement-based learning techniques must now evolve to keep with the research. However, before doing any experimentation, a scientist must first comprehend the current state of the art in that domain. Diverse paths, associated outcomes, and analysis lay the groundwork for successful experimentation and superior results. Before starting with experiments, universal image forensics approaches must be thoroughly researched. As a result, this review of variou

... Show More
View Publication
Scopus Crossref
Publication Date
Thu Feb 01 2024
Journal Name
Journal Of Engineering
Public Procurement Crisis of Iraq and its Impact on Construction Projects
...Show More Authors

 

The public procurement crisis in Iraq plays a fundamental role in the delay in the implementation of construction projects at different stages of project bidding (pre, during, and after). The procurement system of any country plays an important role in economic growth and revival. The paper aims to use the fuzzy logic inference model to predict the impact of the public procurement crisis (relative importance index and Likert scale) was carried out at the beginning to determine the most important parameters that affect construction projects, the fuzzy analytical hierarchy process (FAHP) to set up, and finally, the fuzzy decision maker's (FDM) verification of the parameter for comparison with reality. Sixty-five

... Show More
View Publication Preview PDF
Crossref
Publication Date
Fri Jan 01 2021
Journal Name
Professional Safety
Shedding Light on the Concept of Social Equity in SUSTAINABLE CONSTRUCTION
...Show More Authors

Publication Date
Mon Mar 07 2022
Journal Name
Construction Research Congress 2022
Impact of Green Construction on Safety Performance in the Built Environment
...Show More Authors

View Publication
Scopus Crossref
Publication Date
Fri Apr 20 2018
Journal Name
Iaes International Journal Of Artificial Intelligence (ij-ai)
Optimization of Digital Histopathology Image Quality
...Show More Authors

One of the biomedical image problems is the appearance of the bubbles in the slide that could occur when air passes through the slide during the preparation process. These bubbles may complicate the process of analysing the histopathological images. The objective of this study is to remove the bubble noise from the histopathology images, and then predict the tissues that underlie it using the fuzzy controller in cases of remote pathological diagnosis. Fuzzy logic uses the linguistic definition to recognize the relationship between the input and the activity, rather than using difficult numerical equation. Mainly there are five parts, starting with accepting the image, passing through removing the bubbles, and ending with predict the tissues

... Show More
View Publication Preview PDF
Scopus (3)
Crossref (1)
Scopus Crossref
Publication Date
Sun Nov 07 2021
Journal Name
Review Of International Geographical Education Online
Assessment of Information Security Risk Management System based on ISO/IEC27005 in the Independent High Electoral Commission: A Case Study
...Show More Authors

The current research aims to study the extent to which the Independent High Electoral Commission applies to information security risk management by the international standard (ISO / IEC27005) in terms of policies, administrative and technical procedures, and techniques used in managing information security risks, based on the opinions of experts in the sector who occupy positions (General Manager The directorate, department heads and their agents, project managers, heads of divisions, and those authorized to access systems and software). The importance of the research comes by giving a clear picture of the field of information security risk management in the organization in question because of its significant role in identifying risks and s

... Show More
View Publication Preview PDF
Scopus
Publication Date
Tue Aug 15 2023
Journal Name
Al-academy
Digital modeling and its technical variables in contemporary interior design
...Show More Authors

The current research sheds light on an important aspect of the great and rapid development in the field of science and technology and modern manufacturing methods as a result of the scientific revolution resulting from the accelerated cognitive development, which prompted designers in general and interior design in particular to exploit and invest in digital technology and the development of digital control in the process of designing the industrial product for the purpose of creativity and innovation through these digital programs Digital models achieve the requirements and desires of the interior designer according to the creative skill using modern software with high efficiency And extreme accuracy that is consistent with the requirem

... Show More
View Publication Preview PDF
Crossref
Publication Date
Tue Jan 17 2023
Journal Name
Mesopotamian Journal Of Cyber Security
The Purpose of Cybersecurity Governance in the Digital Transformation of Public Services and Protecting the Digital Environment
...Show More Authors

The process of digital transformation is considered one of the most influential matters in circulation at the present time, as it seeks to integrate computer-based technologies into the public services provided by companies or institutions. To achieve digital transformation, basics and points must be established, while relying on a set of employee skills and involving customers in developing this process. Today, all governments are seeking electronic transformation by converting all public services into digital, where changes in cybersecurity must be taken into account, which constitutes a large part of the priorities of nations and companies. The vulnerability to cyberspace, the development of technologies and devices, and the use

... Show More
View Publication
Crossref (18)
Crossref
Publication Date
Mon Jun 19 2023
Journal Name
Journal Of Engineering
Design and Implementation ofICT-Based Recycle-Rewarding System for Green Environment
...Show More Authors

This paper proposes a collaborative system called Recycle Rewarding System (RRS), and focuses on the aspect of using information communication technology (ICT) as a tool to promote greening. The idea behind RRS is to encourage recycling collectors by paying them for earning points. In doing so, both the industries and individuals reap the economical benefits of such system. Finally, and more importantly, the system intends to achieve a green environment for the Earth. This paper discusses the design and implementation of the RRS, involves: the architectural design, selection of components, and implementation issues. Five modules are used to construct the system, namely: database, data entry, points collecting and recording, points reward

... Show More
View Publication Preview PDF
Crossref (2)
Crossref