The paradigm and domain of data security is the key point as per the current era in which the data is getting transmitted to multiple channels from multiple sources. The data leakage and security loopholes are enormous and there is need to enforce the higher levels of security, privacy and integrity. Such sections incorporate e-administration, long range interpersonal communication, internet business, transportation, coordinations, proficient correspondences and numerous others. The work on security and trustworthiness is very conspicuous in the systems based situations and the private based condition. This examination original copy is exhibiting the efficacious use of security based methodology towards the execution with blockchain programming utilizing robustness and different devices. The blockchain based mix is currently days utilized for e-administrations and military applications for the noticeable security based applications. To work with the high performance approaches and algorithms, the blockchain technology is quite prominent and used in huge performance aware patterns whereby the need to enforce the security is there. The work integrates the usage patterns of blockchain technologies so that the overall security and integrity can be improved in which there is immutability and strength based algorithms for enforce the security measures.
In the present paper, an eco-epidemiological model consisting of diseased prey consumed by a predator with fear cost, and hunting cooperation property is formulated and studied. It is assumed that the predator doesn’t distinguish between the healthy prey and sick prey and hence it consumed both. The solution’s properties such as existence, uniqueness, positivity, and bounded are discussed. The existence and stability conditions of all possible equilibrium points are studied. The persistence requirements of the proposed system are established. The bifurcation analysis near the non-hyperbolic equilibrium points is investigated. Numerically, some simulations are carried out to validate the main findings and obtain the critical values of th
... Show MoreThe growing use of tele
This paper presents a new secret diffusion scheme called Round Key Permutation (RKP) based on the nonlinear, dynamic and pseudorandom permutation for encrypting images by block, since images are considered particular data because of their size and their information, which are two-dimensional nature and characterized by high redundancy and strong correlation. Firstly, the permutation table is calculated according to the master key and sub-keys. Secondly, scrambling pixels for each block to be encrypted will be done according the permutation table. Thereafter the AES encryption algorithm is used in the proposed cryptosystem by replacing the linear permutation of ShiftRows step with the nonlinear and secret pe
... Show MoreThe Security Council has an active role in addressing international crises and dealing with their causes. The Libyan crisis is one of the most important real tests of the Security Council and its role in maintaining international peace and security, as the Council has proven so far an ineffective role in resolving the crisis and dealing withtheir causes, which has prolonged its duration and increased its complexities and dangerous repercussions, perhaps the most prominent of which is the threat of the recently achieved cease-fire and the formation of a new transitional government led by Abdel Hamid al-Dabaiba, the growing significant obstacles facing the political process, foremost of which is the continued presence of foreign forces , m
... Show MoreThis study produces an image of theoretical and experimental case of high loading stumbling condition for hip prosthesis. Model had been studied namely Charnley. This model was modeled with finite element method by using ANSYS software, the effect of changing the design parameters (head diameter, neck length, neck ratio, stem length) on Charnley design, for stumbling case as impact load where the load reach to (8.7* body weight) for impact duration of 0.005sec.An experimental rig had been constructed to test the hip model, this rig consist of a wood box with a smooth sliding shaft where a load of 1 pound is dropped from three heights.
The strain produced by this impact is measured by using rosette strain gauge connected to Wheatstone
The higher education has become an enterprise integrate system that described as knowledge society, the essential part in its electronic and virtual format in the shadow of globalization challenges with its various dimensions . Until the logical ryles aboat a strategic partnership between the Iraqi higher education establishments and their international equivalent ones Strategic windows should be invested for the purpose of enhancing the quality of higher education in a sustainable way. This forms a challenge before the international education leaders on the social, operational and establishment's level to determinte knowledge gap, observing, diagnosing and processing in the present and future, e
... Show MoreIn this work, Co-Y-oxide Nano Structure is successfully synthesized via hydrothermal method. The XRD analysis, SEM analysis, optical, electrical and photo sensing properties have been investigated for Co3O4 and Co-Y-oxide thin films. The X-ray diffraction (XRD) analysis reveals that all films are polycrystalline in nature, having cubic structure. The SEM images of thin films clearly indicates that Co3O4 possesses nanosphere like structure and flower like for Co-Y-oxide. The optical properties show that the optical energy gap follows allowed direct electronic transition calculated using Tauc equation and it increases for Co-Y-oxide. The photo sensing properties of thin films are investigated as a function of time at different wavelengths to
... Show MoreThe study aimed to find out the degree of practicing Arabic language teachers in the preparatory stage of higher-order thinking skills from their point of view in the first, second and third Baghdad Rusafa directorates of education. The descriptive survey method was used. The study population consisted of teachers of the Arabic language in the directorates of Baghdad, Rusafa, First, Second and Third, and the sample number was (284) teachers. A questionnaire was built on higher-order thinking skills. The validity and reliability of the tool were verified, after which the scale was applied to the research sample of (116) schools and (168) teachers who were randomly selected from the schools affiliated to the Baghdad Education Directorates Rus
... Show MoreThe current research included (the evaluation of Information Security Management System on according to international standard (ISO / IEC 27001: 2013) in Iraqi Commission for Computers and Informatics), for the development of an administrative system for information security is considered a priority in the present day, and in the light of the organizations dependence on computers and information technology in work and communication with others. The international legitimacy (represented by the International Organization for standardization (ISO)) remains the basis for matching and commitment and the importance of the application of information Security Management System accordi
... Show MoreThe two parameters of Exponential-Rayleigh distribution were estimated using the maximum likelihood estimation method (MLE) for progressively censoring data. To find estimated values for these two scale parameters using real data for COVID-19 which was taken from the Iraqi Ministry of Health and Environment, AL-Karkh General Hospital. Then the Chi-square test was utilized to determine if the sample (data) corresponded with the Exponential-Rayleigh distribution (ER). Employing the nonlinear membership function (s-function) to find fuzzy numbers for these parameters estimators. Then utilizing the ranking function transforms the fuzzy numbers into crisp numbers. Finally, using mean square error (MSE) to compare the outcomes of the survival
... Show More