Requirement-Driven Generation of Distributed Ledger Architectures
...Show More Authors
In this study, an improved process was proposed for the synthesis of structure-controlled Cu2O nanoparticles, using a simplified wet chemical method at room temperature. A chemical solution route was established to synthesize Cu2O crystals with various sizes and morphologies. The structure, morphology, and optical properties of Cu2O nanoparticles were analyzed by X-ray diffraction, SEM (scanning electron microscope), and UV-Vis spectroscopy. By adjusting the aqueous mixture solutions of NaOH and NH2OH•HCl, the synthesis of Cu2O crystals with different morphology and size could be realized. Strangely, it was found that the change in the ratio of de-ionized water and NaOH aqueous solution led to the synthesis of Cu2O crystals of differen
... Show More<span>Distributed denial-of-service (DDoS) attack is bluster to network security that purpose at exhausted the networks with malicious traffic. Although several techniques have been designed for DDoS attack detection, intrusion detection system (IDS) It has a great role in protecting the network system and has the ability to collect and analyze data from various network sources to discover any unauthorized access. The goal of IDS is to detect malicious traffic and defend the system against any fraudulent activity or illegal traffic. Therefore, IDS monitors outgoing and incoming network traffic. This paper contains a based intrusion detection system for DDoS attack, and has the ability to detect the attack intelligently, dynami
... Show MoreImpairment of financial assets defined according to IFRS 9 as the difference between all contractual cash flows that are due to an entity in accordance with the contract and all the cash flows that the entity expects to receive, the entity should estimates all the cash flows through looking to the contract terms during the life time period of the assets or for shorter period if possible, the cash flow should include the amounts of selling any collateral taken or any other enhancement. On the other hand, the Central bank of Iraq guidelines regards impairment differ from the IFRS 9 that’s does not consider the collateral value on calculating the impairment that’s effects on the net profit through recognizing exaggerated loss an
... Show MoreTwo field experiments were conducted at two different texture sites. The first site of the fields of AlMed-hateya Agriculture Division / Babil Governorate. The second site of the fields of Al-Nouriah Research Station / Ministry of Agriculture, the factors of the study in the two sites included several factors. The first factor includes two irrigation systems: sprinkler irrigation and surface irrigation. The second factor is the method of cultivation which includes the method of cultivation with basin and furrowing. The third factor is the type of the cultivated crop which includes a local variety (Fajr 3) and a hybrid variety (Drakma). The actual water consumption for the sprinkler irrigation system reached (587.13 and 637.62) mm season-1 f
... Show MoreToday, the architecture field is witnessing a noticeable evolution regarding the used tools that the designer should invest in a peculiar way that is made available in architecture through the concept of synergy generally and algorithmic synergy specifically. The synergy is meant to study and analyze the cooperative behavior of complex systems and self-organizing systems that leads to different outputs referred to by the synergy as the (whole), which is bigger than the sum of parts and in architecture, it's translated as the architectural form. This point resulted in a need of a specific study regarding the concept of synergy that focuses on the cooperative, synergistic relations within the trilogy of (form, structure, and material) and
... Show MoreMany image processing and machine learning applications require sufficient image feature selection and representation. This can be achieved by imitating human ability to process visual information. One such ability is that human eyes are much more sensitive to changes in the intensity (luminance) than the color information. In this paper, we present how to exploit luminance information, organized in a pyramid structure, to transfer properties between two images. Two applications are presented to demonstrate the results of using luminance channel in the similarity metric of two images. These are image generation; where a target image is to be generated from a source one, and image colorization; where color information is to be browsed from o
... Show MoreVol. 6, Issue 1 (2025)
Municipal solid waste generation in Babylon Governorate is often affected by changes in lifestyles, population growth, social and cultural habits and improved economic conditions. This effect will make it difficult to plan and draw up future plans for solid waste management.In this study, municipal solid waste was divided into residential and commercial solid wastes. Residential solid wastes were represented by household wastes, while commercial solid wastes included commercial, institutional and municipal services wastes.For residential solid wastes, the relational stratified random sampling was implemented, that is the total population should be divided into clusters (socio-income level), a random sample was taken in e
... Show MoreDue to the popularity of radar, receivers often “hear” a great number of other transmitters in
addition to their own return merely in noise. The dealing with the problem of identifying and/or
separating a sum of tens of such pulse trains from a number of different sources are often received on
the one communication channel. It is then of interest to identify which pulses are from which source,
based on the assumption that the different sources have different characteristics. This search deals with a
graphical user interface (GUI) to generate the radar pulse in order to use the required radar signal in any
specified location.