The paradigm and domain of data security is the key point as per the current era in which the data is getting transmitted to multiple channels from multiple sources. The data leakage and security loopholes are enormous and there is need to enforce the higher levels of security, privacy and integrity. Such sections incorporate e-administration, long range interpersonal communication, internet business, transportation, coordinations, proficient correspondences and numerous others. The work on security and trustworthiness is very conspicuous in the systems based situations and the private based condition. This examination original copy is exhibiting the efficacious use of security based methodology towards the execution with blockchain programming utilizing robustness and different devices. The blockchain based mix is currently days utilized for e-administrations and military applications for the noticeable security based applications. To work with the high performance approaches and algorithms, the blockchain technology is quite prominent and used in huge performance aware patterns whereby the need to enforce the security is there. The work integrates the usage patterns of blockchain technologies so that the overall security and integrity can be improved in which there is immutability and strength based algorithms for enforce the security measures.
The stress(Y) – strength(X) model reliability Bayesian estimation which defines life of a component with strength X and stress Y (the component fails if and only if at any time the applied stress is greater than its strength) has been studied, then the reliability; R=P(Y<X), can be considered as a measure of the component performance. In this paper, a Bayesian analysis has been considered for R when the two variables X and Y are independent Weibull random variables with common parameter α in order to study the effect of each of the two different scale parameters β and λ; respectively, using three different [weighted, quadratic and entropy] loss functions under two different prior functions [Gamma and extension of Jeffery
... Show MoreThe problem of rapid population growth is one of the main problems effecting countries of the world the reason for this the growth in different environment areas of life commercial, industrial, social, food and educational. Therefore, this study was conducted on the amount of potable water consumed using two models of the two satellite and aerial images of the Kadhimiya District-block 427 and Al-Shu,laa district-block 450 in Baghdad city for available years in the Secretariat of Baghdad (2005, 2011,2013,2015). Through the characteristics of geographic information systems, which revealed the spatial patterns of urban creep by determining the role and buildings to be created, which appear in the picture for the
... Show MoreData centric techniques, like data aggregation via modified algorithm based on fuzzy clustering algorithm with voronoi diagram which is called modified Voronoi Fuzzy Clustering Algorithm (VFCA) is presented in this paper. In the modified algorithm, the sensed area divided into number of voronoi cells by applying voronoi diagram, these cells are clustered by a fuzzy C-means method (FCM) to reduce the transmission distance. Then an appropriate cluster head (CH) for each cluster is elected. Three parameters are used for this election process, the energy, distance between CH and its neighbor sensors and packet loss values. Furthermore, data aggregation is employed in each CH to reduce the amount of data transmission which le
... Show MoreThe study aimed to know the degree of availability of integrated preparation criteria in the Arabic Teacher training Program in Syrian universities from the viewpoint of university students of the Educational qualification diploma, and the degree of availability of these standards in the outputs of the preparation program. To achieve the Goals of the study, a list of integrated preparation criteria was prepare comprising (110) indicators, distributed to (11) criteria. The list was applied to a randomly chosen sample of (45) educational qualification diploma students. The results of the study showed that the Standards for integrated preparation are provided in a medium degree overall in the program for preparing teachers of Arabic languag
... Show MoreThe study aimed to identify the degree of availability of design Thinking Indicators in The content of the Arabic Language Curricula at the secondary stage in the Syrian Arab Republic; to achieve the goal of the study. The researcher used the Descriptive Approach based on the analysis method according to the Cognitive Theory. The study tools consist of a list of Design Thinking Indicators and a Content Analysis Tool. The researcher completed the Validity and Reliability procedures for the tools. After applying them, the results of the study resulted in the following: Greater Interest than other sub-skills. The results also showed a Divergence of care for the sub-skills and the Difference in their recurrence rate, and the Omission of some
... Show MoreMunicipalities.
Abstract
The purpose of this research is to measure the impact of regulatory flexibility dimensions (formal and authoritarian procedures) to achieve response to the requirements of high performance dimensions (the effective recruitment, intensive training, motivate employees, participation of workers) in the general municipal Directorate as one of the directorates of the Ministry of Municipalities and Public Works. For the purpose of this measure it has been selected sample composed of 88 individuals from the research community represents the levels of assistant general manager of department heads and managers of people and some of the staff to answer the questionnaire prepared for the purpose Hama
... Show MoreThe use of real-time machine learning to optimize passport control procedures at airports can greatly improve both the efficiency and security of the processes. To automate and optimize these procedures, AI algorithms such as character recognition, facial recognition, predictive algorithms and automatic data processing can be implemented. The proposed method is to use the R-CNN object detection model to detect passport objects in real-time images collected by passport control cameras. This paper describes the step-by-step process of the proposed approach, which includes pre-processing, training and testing the R-CNN model, integrating it into the passport control system, and evaluating its accuracy and speed for efficient passenger flow
... Show More