In modern technology, the ownership of electronic data is the key to securing their privacy and identity from any trace or interference. Therefore, a new identity management system called Digital Identity Management, implemented throughout recent years, acts as a holder of the identity data to maintain the holder’s privacy and prevent identity theft. Therefore, an overwhelming number of users have two major problems, users who own data and third-party applications will handle it, and users who have no ownership of their data. Maintaining these identities will be a challenge these days. This paper proposes a system that solves the problem using blockchain technology for Digital Identity Management systems. Blockchain is a powerful technique to build a digital identity in chain matters that enables a secure environment. The idea of Blockchain is to distribute the data across multiple devices in a cryptographic way, which will reduce the ability to an impossible level. Therefore, in this paper a proposed Digital Identity based on Blockchain (ERC 725, and ERC 735) with MD6 as a hashing algorithm will be implemented in a Secure smart contract can prevent function calls from being carried out until the sender has received confirmation from a reliable issuer; for example, we might include a feature that restricts smart contract interactions to legitimate users only. Many additional use cases are possible with ERC-725, including multi-sig execution approvals and contract call verification in place of key validation.
The art of preventing the detection of hidden information messages is the way that steganography work. Several algorithms have been proposed for steganographic techniques. A major portion of these algorithms is specified for image steganography because the image has a high level of redundancy. This paper proposed an image steganography technique using a dynamic threshold produced by the discrete cosine coefficient. After dividing the green and blue channel of the cover image into 1*3-pixel blocks, check if any bits of green channel block less or equal to threshold then start to store the secret bits in blue channel block, and to increase the security not all bits in the chosen block used to store the secret bits. Firstly, store in the cente
... Show MoreThe textile industries play a prominent role in reviving the national economy, but they are currently suffering from several problems, including the high costs of their activities, the low quality of their production processes, and accordingly, the hexagonal diffraction approach came to help analyze production activities to determine which of them are the most expensive and do not have a benefit or cost greater than Its benefit as a result of waste and losses that accompany its implementation. And by applying to the Iraqi mechanical carpet factory, the research reached several conclusions, the most important of which is the presence of several sources of waste and loss, such as activities and operations that do not add value, whi
... Show MoreAbstract
The aim of this research is to formulate a proposed strategy for developing graduate studies at King Khalid University to support the achievement of the Kingdom's vision (2030). The research used the descriptive survey approach. The research community consisted of all graduate students at King Khalid University. The research was conducted on a random sample included (623) Male and female students, this research relied on the questionnaire as the main tool for collecting its data. The results revealed that the research sample believes that all the proposals included in this research are very important for the development of postgraduate studies at King Khalid University to support the achievement of the K
... Show MoreDespite the importance of sustainable development and its dimensions in developing performance and supporting competitive advantage in economic units, there is a gap and lack of coordination between Combined Assurance providers (management, internal audit, external audit) to report on sustainable development, and the research aims to propose a model for the Combined Assurance report to achieve development sustainable development in the Iraqi economic units, especially the Baghdad Municipality, enables assurance providers to coordinate efforts that lead to the achievement of Combined Assurance, The research found the proposed model for the Combined Assurance report in achieving sustainable development in the Iraqi economic units, es
... Show MoreHusbands’ violence towards their wives is one of the greatly important issues in social sciences. Accordingly, the current study aims at determining the levels of violence practiced by husbands towards their wives to propose a professional program from the perspective of the general practice of social work to overcome such a phenomenon. The study is descriptive in nature, where the researcher has used a comprehensive social survey method. To achieve the goal of the study, the researcher has prepared a questionnaire that consisted of two parts. The first part contains the primary data of the two sections, and the second contains (38) phrases distributed over four axes to measure the levels and types of violence among the sample’s memb
... Show MoreIntroduction: Carrier-based gutta-percha is an effective method of root canal obturation creating a 3-dimensional filling; however, retrieval of the plastic carrier is relatively difficult, particularly with smaller sizes. The purpose of this study was to develop composite carriers consisting of polyethylene (PE), hydroxyapatite (HA), and strontium oxide (SrO) for carrier-based root canal obturation. Methods: Composite fibers of HA, PE, and SrO were fabricated in the shape of a carrier for delivering gutta-percha (GP) using a melt-extrusion process. The fibers were characterized using infrared spectroscopy and the thermal properties determined using differential scanning calorimetry. The elastic modulus and tensile strength tests were dete
... Show MorePlagiarism is becoming more of a problem in academics. It’s made worse by the ease with which a wide range of resources can be found on the internet, as well as the ease with which they can be copied and pasted. It is academic theft since the perpetrator has ”taken” and presented the work of others as his or her own. Manual detection of plagiarism by a human being is difficult, imprecise, and time-consuming because it is difficult for anyone to compare their work to current data. Plagiarism is a big problem in higher education, and it can happen on any topic. Plagiarism detection has been studied in many scientific articles, and methods for recognition have been created utilizing the Plagiarism analysis, Authorship identification, and
... Show More