In modern technology, the ownership of electronic data is the key to securing their privacy and identity from any trace or interference. Therefore, a new identity management system called Digital Identity Management, implemented throughout recent years, acts as a holder of the identity data to maintain the holder’s privacy and prevent identity theft. Therefore, an overwhelming number of users have two major problems, users who own data and third-party applications will handle it, and users who have no ownership of their data. Maintaining these identities will be a challenge these days. This paper proposes a system that solves the problem using blockchain technology for Digital Identity Management systems. Blockchain is a powerful technique to build a digital identity in chain matters that enables a secure environment. The idea of Blockchain is to distribute the data across multiple devices in a cryptographic way, which will reduce the ability to an impossible level. Therefore, in this paper a proposed Digital Identity based on Blockchain (ERC 725, and ERC 735) with MD6 as a hashing algorithm will be implemented in a Secure smart contract can prevent function calls from being carried out until the sender has received confirmation from a reliable issuer; for example, we might include a feature that restricts smart contract interactions to legitimate users only. Many additional use cases are possible with ERC-725, including multi-sig execution approvals and contract call verification in place of key validation.
Many of mechanical systems are exposed to undesired vibrations, so designing an active vibration control (AVC) system is important in engineering decisions to reduce this vibration. Smart structure technology is used for vibration reduction. Therefore, the cantilever beam is embedded by a piezoelectric (PZT) as an actuator. The optimal LQR controller is designed that reduce the vibration of the smart beam by using a PZT element.
In this study the main part is to change the length of the aluminum cantilever beam, so keep the control gains, the excitation, the actuation voltage, and mechanical properties of the aluminum beam for each length of the smart cantilever beam and observe the behavior and effec
... Show MoreUsing the Internet, nothing is secure and as we are in need of means of protecting our data, the use of passwords has become important in the electronic world. To ensure that there is no hacking and to protect the database that contains important information such as the ID card and banking information, the proposed system stores the username after hashing it using the 256 hash algorithm and strong passwords are saved to repel attackers using one of two methods: -The first method is to add a random salt to the password using the CSPRNG algorithm, then hash it using hash 256 and store it on the website. -The second method is to use the PBKDF2 algorithm, which salts the passwords and extends them (deriving the password) before being ha
... Show MoreIn digital images, protecting sensitive visual information against unauthorized access is considered a critical issue; robust encryption methods are the best solution to preserve such information. This paper introduces a model designed to enhance the performance of the Tiny Encryption Algorithm (TEA) in encrypting images. Two approaches have been suggested for the image cipher process as a preprocessing step before applying the Tiny Encryption Algorithm (TEA). The step mentioned earlier aims to de-correlate and weaken adjacent pixel values as a preparation process before the encryption process. The first approach suggests an Affine transformation for image encryption at two layers, utilizing two different key sets for each layer. Th
... Show MoreSpraying pesticides is one of the most common procedures that is conducted to control pests. However, excessive use of these chemicals inversely affects the surrounding environments including the soil, plants, animals, and the operator itself. Therefore, researchers have been encouraged to...
Cloud point extraction is a simple, safe, and environmentally friendly technique for preparing many different kinds of samples. In this review, we discussed the CPE method and how to apply it to our environmental sample data. We also spoke about the benefits, problems, and likely developments in CPE. This process received a great deal of attention during preconcentration and extraction. It was used as a disconnection and follow-up improvement system before the natural mixtures (nutrients, polybrominated biphenyl ethers, pesticides, polycyclic sweet-smelling hydrocarbons, polychlorinated compounds, and fragrant amines) and inorganic mixtures were examined and many metals like (silver, lead, cadmium, mercury, and so on). We also find
... Show MoreThe research aimed to identify the effects of the modern of technology on translating the media term from English language to Arabic. and try to identify the use of the impact of foreign media terminologies on the Arabic media term, and to know the effect of the translation process on Arabic media terminologies.
This research is considered an analytical study by using survey study for 111 items and the results for the study as following:
1.High percentage of the (use of foreign terms work to low the level of production) was (68.13%) and average 3.55
2.The percentage of (The multiplicity of translation of the foreign term into Arabic effects on the opinions and cognitive ideas of the Arab researcher and affects the
... Show MoreImage Fusion is being used to gather important data from such an input image array and to place it in a single output picture to make it much more meaningful & usable than either of the input images. Image fusion boosts the quality and application of data. The accuracy of the image that has fused depending on the application. It is widely used in smart robotics, audio camera fusion, photonics, system control and output, construction and inspection of electronic circuits, complex computer, software diagnostics, also smart line assembling robots. In this paper provides a literature review of different image fusion techniques in the spatial domain and frequency domain, such as averaging, min-max, block substitution, Intensity-Hue-Saturation(IH
... Show MoreThis study aims at investigating the partial Islamic rules of preparing and distributing cartoons in order to issue an overall Islamic rul. To reach an end, descriptive and analytical approaches are adopted to clarify the nature of cartoons and other related concepts. The researcher, as well, with reference to verses of the Holy Quran, tradition (Hadith) and Islamic jurists, adopts a deductive approach to issue Islamic rules related to the industry of cartoons and it's distribution
The study consists of three sections. The first Section addresses the following issues: Definition animation; and related wordy. The second Section: Origin of Cartoon's history and it's negative and positive effects. The third Section: Islamic rules related
The most influential theory of ‘Politeness’ was formulated in 1978 and revised in 1987 by Brown and Levinson. ‘Politeness’, which represents the interlocutors’ desire to be pleasant to each other through a positive manner of addressing, was claimed to be a universal phenomenon. The gist of the theory is the intention to mitigate ‘Face’ threats carried by certain ‘Face’ threatening acts towards others.
‘Politeness Theory’ is based on the concept that interlocutors have ‘Face’ (i.e., self and public – image) which they consciously project, try to protect and to preserve. The theory holds that various politeness strategies are used to prot
... Show More