The paradigm and domain of data security is the key point as per the current era in which the data is getting transmitted to multiple channels from multiple sources. The data leakage and security loopholes are enormous and there is need to enforce the higher levels of security, privacy and integrity. Such sections incorporate e-administration, long range interpersonal communication, internet business, transportation, coordinations, proficient correspondences and numerous others. The work on security and trustworthiness is very conspicuous in the systems based situations and the private based condition. This examination original copy is exhibiting the efficacious use of security based methodology towards the execution with blockchain programming utilizing robustness and different devices. The blockchain based mix is currently days utilized for e-administrations and military applications for the noticeable security based applications. To work with the high performance approaches and algorithms, the blockchain technology is quite prominent and used in huge performance aware patterns whereby the need to enforce the security is there. The work integrates the usage patterns of blockchain technologies so that the overall security and integrity can be improved in which there is immutability and strength based algorithms for enforce the security measures.
Some of the issues that have become common in our society recently after the Americans entered our country and were rubbed by some security agencies: obtaining some information from children, and the serious consequences that may lead to the lives of innocent people, became common interrogation of some security agencies and rely on their words.
There are significant cases where their testimony needs to be heard, such as their presence in some places where incidents are not witnessed by others, such as schools or being witnesses to certain crimes.
I saw the study of this case in the light of Sharia and law
This paper shows the characteristics of temperature and adsorbed (water vapor) mass rate distribution in the adsorber unit which is the key part to any adsorption refrigeration system. The temperature profiles of adsorption/desorption phases (Dynamic Sorption) are measured experimentally under the operating conditions of 90oC hot water temperature, 30oC cooling water temperature, 35oC adsorption temperature and cycle time of 40 min. Based on the temperature profiles, The mass transfer equations for the annulus adsorbent bed are solved to obtain the distribution of adsorption velocity and adsorbate concentration using non-equilibrium
model. The relation between the adsorption velocity with time is investigated during the process of ads
Objectives To assess the feasibility and accuracy of a new prototype robotic implant system for the placement of zygomatic implants in edentulous maxillary models. Methods The study was carried out on eight plastic models. Cone beam computed tomographs were captured for each model to plan the positions of zygomatic implants. The hand-eye calibration technique was used to register the dynamic navigation system to the robotic spaces. A total of 16 zygomatic implants were placed, equally distributed between the anterior and the posterior parts of the zygoma. The placement of the implants (ZYGAN®, Southern Implants) was carried out using an active six-jointed robotic arm (UR3e, Universal Robots) guided by the dynamic navigation coordinate tran
... Show MoreIn order to specify the features of higher education process and its quantitative and qualitative development in Iraq ; one should look back at its historical process and the need of interesting with it .
Accordingly , there will be a chance for verifying the demand of the Iraqi society according to the political , social , and cultural changes especially during the national governance (1932 – 1958 ) .
For depicting the most important quantitative and qualitative development of this kind of education the period of 1932 -1958 , and since there is no previous study that tackled this topic , here comes the need of writing this paper .
After historical
... Show MoreThe research focuses on addressing one of the most important concepts of modern management that deal with the relationship between government institutions and stakeholders, Which now occupies a special significance in trends modern management, a concept of corporate governance it takes the internal mechanisms due to its key role and is important in the process of corporate governance and looking for building Effective mechanisms for this concept in light of laws and regulations that are available in the local environment and on the functioning of government institutions, Search has been applied in the Federal Board of Supreme Audit of Iraq (BSA) due to its particular importance as an institution control and as a awaits the societ
... Show MoreThe expansion in water projects implementations in Turkey and Syria becomes of great concern to the workers in the field of water resources management in Iraq. Such expansion with the absence of bi-lateral agreement between the three riparian countries of Tigris and Euphrates Rivers; Turkey, Syria and Iraq, is expected to lead to a substantially reduction of water inflow to the territories of Iraq. Accordingly, this study consists of two parts: first part is aiming to study the changes of the water inflow to the territory of Iraq, at Turkey and Syria borders, from 1953 to 2009; the results indicated that the annual mean inflow in Tigris River was decreased from 677 m3/sec to 526 m3/sec, after operating Turkey reserv
... Show MoreModern civilization increasingly relies on sustainable and eco-friendly data centers as the core hubs of intelligent computing. However, these data centers, while vital, also face heightened vulnerability to hacking due to their role as the convergence points of numerous network connection nodes. Recognizing and addressing this vulnerability, particularly within the confines of green data centers, is a pressing concern. This paper proposes a novel approach to mitigate this threat by leveraging swarm intelligence techniques to detect prospective and hidden compromised devices within the data center environment. The core objective is to ensure sustainable intelligent computing through a colony strategy. The research primarily focusses on the
... Show MoreAccurate predictive tools for VLE calculation are always needed. A new method is introduced for VLE calculation which is very simple to apply with very good results compared with previously used methods. It does not need any physical property except each binary system need tow constants only. Also, this method can be applied to calculate VLE data for any binary system at any polarity or from any group family. But the system binary should not confirm an azeotrope. This new method is expanding in application to cover a range of temperature. This expansion does not need anything except the application of the new proposed form with the system of two constants. This method with its development is applied to 56 binary mixtures with 1120 equili
... Show MoreAn analytical approach based on field data was used to determine the strength capacity of large diameter bored type piles. Also the deformations and settlements were evaluated for both vertical and lateral loadings. The analytical predictions are compared to field data obtained from a proto-type test pile used at Tharthar –Tigris canal Bridge. They were found to be with acceptable agreement of 12% deviation.
Following ASTM standards D1143M-07e1,2010, a test schedule of five loading cycles were proposed for vertical loads and series of cyclic loads to simulate horizontal loading .The load test results and analytical data of 1.95
... Show More