In modern technology, the ownership of electronic data is the key to securing their privacy and identity from any trace or interference. Therefore, a new identity management system called Digital Identity Management, implemented throughout recent years, acts as a holder of the identity data to maintain the holder’s privacy and prevent identity theft. Therefore, an overwhelming number of users have two major problems, users who own data and third-party applications will handle it, and users who have no ownership of their data. Maintaining these identities will be a challenge these days. This paper proposes a system that solves the problem using blockchain technology for Digital Identity Management systems. Blockchain is a powerful technique to build a digital identity in chain matters that enables a secure environment. The idea of Blockchain is to distribute the data across multiple devices in a cryptographic way, which will reduce the ability to an impossible level. Therefore, in this paper a proposed Digital Identity based on Blockchain (ERC 725, and ERC 735) with MD6 as a hashing algorithm will be implemented in a Secure smart contract can prevent function calls from being carried out until the sender has received confirmation from a reliable issuer; for example, we might include a feature that restricts smart contract interactions to legitimate users only. Many additional use cases are possible with ERC-725, including multi-sig execution approvals and contract call verification in place of key validation.
Mass transfer correlations for iron rotating cylinder electrode in chloride/sulphate solution, under isothermal and
controlled heat transfer conditions, were derived. Limiting current density values for the oxygen reduction reaction from
potentiostatic experiments at different bulk temperatures and various turbulent flow rates, under isothermal and heat
transfer conditions, were used for such derivation. The corelations were analogous to that obtained by Eisenberg et all
and other workers.
Rainwater harvesting could be a possible solution to decrease the consequences of water scarcity and energy deficiency in Iraq and the Kurdistan Region of Iraq (KRI). This study aims to calculate the water and energy (electricity) saved by rainwater harvesting for rooftops and green areas in Sulaimani city, KR, Iraq. Various data were acquired from different formal entities in Sulaimani city. Moreover, Google Earth and ArcMap 10.4 software were used for digitizing and calculating the total rooftop and green areas. The results showed that for the used runoff coefficients (0.8 and 0.95), the harvested rainwater volumes were 2901563 and 12197131 m³ during the study period (2005 – 2006) and (2019-2020). Moreover, by compa
... Show MoreThis study investigates the Linguistic and Conceptual equivalence of Conner’s Revised Scales when applied on a Sudanese sample. Sudanese parents and teachers completed behavior-rating scales on a stratified sample of 200 children. These instruments were based on Conner’s parent -48 and teacher-28 questionnaires. Following a reliable translation into Sudanese Arabic the test-retest reliability of the items and the internal consistency of the original Conner’s' revised scales were explored. The associations between scale scores and between parents and teachers scores were also examined. Both instruments displayed good reliability and the original Conners scales had satisfactory internal consistency. The inter-correlation sugg
... Show MoreCyber security is a term utilized for describing a collection of technologies, procedures, and practices that try protecting an online environment of a user or an organization. For medical images among most important and delicate data kinds in computer systems, the medical reasons require that all patient data, including images, be encrypted before being transferred over computer networks by healthcare companies. This paper presents a new direction of the encryption method research by encrypting the image based on the domain of the feature extracted to generate a key for the encryption process. The encryption process is started by applying edges detection. After dividing the bits of the edge image into (3×3) windows, the diffusions
... Show More: zonal are included in phraseological units, form metaphorical names for a person, give him various emotional and evaluative characteristics. This article examines the topic of zoomorphic metaphors that characterize a person in the Russian and Arabic languages in the aspect of their comparative analysis, since the comparative analysis of the metaphorical meanings of animalisms is an important method for studying cultural linguistics, since zoomorphic metaphors are a reflection of culture in a language.
Background: Impression materials, impression trays, and poured stone cast have been said to be the main source of cross infection between patients and dentists. However, it was observed that disinfection of the impression is not performed systematically in routine dental practice. Disinfection of alginates either by immersion or spray technique was found to cause dimensional inaccuracies, although with proper disinfection of alginates there were small dimensional changes. A variety of fluoride releasing products designed for topical use is currently available. Following their use, varied amount of fluoride is systemically absorbed depending on the fluoride concentration and the manner of its use. The objective of this study was to evaluate
... Show MoreAn inert matrix that is used to control the release of (PTX) was prepared using Eudragit RL100 and RSPM types as matrix forming agent . The matrices were prepared by either dry granulation(slugging) , or wet granulation method using chloroform as a solvent evaporation vehichle. The cumulative release was adjusted by using polyvinylpyrollidone (PVP) or ethylcellulose (EC) polymers .The results indicated that both methods of preparation were valid for incorporation PTX as a sustained release granules .Moreover ,the results revealed that best polymer used was Eudragit RSPM in 3:20 polymer drug ratio .Besides to that , the results indicated that the release profiles were affected by pH- medium&
... Show MoreNiO nanoparticle synthesis by chemical method and characterized by XRD with crystal size 11.72
nm and grain size 13 nm from FESEM image also NiO micro used ,two NiO as an additive to evaluate the
possibility of producing photodegradable polymers, the practical application of solid-phase photocatalytic
degradation of polyvinyl chloride (PVC- NiO composite films) was investigated. PVC has a negative impact
on the environment since its polymer degrades slowly, yet it has a wide range of industrial applications and
the amount used shows no evidence of diminishing use. Thus, a synthesis of modified PVC- NiO micro and
nano has been studied with 0, 50, 100, 150, 200, 250, and 300 (hours) as irradiation time a