Progression in Computer networks and emerging of new technologies in this field helps to find out new protocols and frameworks that provides new computer network-based services. E-government services, a modernized version of conventional government, are created through the steady evolution of technology in addition to the growing need of societies for numerous services. Government services are deeply related to citizens’ daily lives; therefore, it is important to evolve with technological developments—it is necessary to move from the traditional methods of managing government work to cutting-edge technical approaches that improve the effectiveness of government systems for providing services to citizens. Blockchain technology is among the modern technologies highly suitable for developing digital governance services, and its technological ability to sustain information stability is vital in digital governance systems since it improves integrity and transparency measures while preventing corruption. In this study, computer networking protocols are built to form a peer-to-peer network framework for managing official documents. using blockchain technology was built to illustrate how any element of government work may be developed using it. The suggested framework comprises the addition of a new official document, and the verification of an existing document. The system was created in socket programming using Java and tested the response times for many simultaneous requests. The system was tested using transactions per second (throughput) measurement. The result showed that the proposed system processed 200 document verification transactions within 50 seconds. In addition, the test of the proposed system presented the time required for document retrieval—about three seconds to answer 100 document retrieval transactions. Furthermore, the results of throughput were compared to the results of the same measurement of some popular applications such as bitcoin. And the result of the proposed system was within the average value of output throughput of the other compared applications.
The Contemporary Business Environment is Surrounded by many quick and continues variable and changes which has an effect on the economic units. These variables and changes like the high competition which need many tools to help them to continue and achieve The critical success. So to achieve this they have many competitive strategies like cost leadership strategy, differentiation strategy and focus strategy.
Budget is regarded one of main tools to execute objectives polices and programs of the economic units, beside show how the economic units had execute the available economic resources.
Activity based on budgeting is regarded one of the modern technique in the m
... Show MoreWith the premise that effective use of online instructional practices is of vital importance in classrooms, the current study aimed to examine the effects of using Moodle applications to develop instructors’ skills in designing electronic tests at Dhofar University. The sample of this study consisted of (25) instructors participated in the experimental group. The researchers implemented a quasi-experimental design with one group pre- and post-test; in addition, an observation card was implemented to measure the target skills related to test design. The research instruments were subjected to validity and reliability measures to ensure valid and reliable data and results. The study results showed that those instructors who participated i
... Show MoreAbstract
Knowing the amount of residual stresses and find technological solutions to minimize and control them during the production operation are an important task because great levels of deformation which occurs in single point incremental forming (SPIF), this induce highly non-uniform residual stresses. In this papera propose of a method for multilayer single point incremental forming with change in thickness of the top plate (0.5, 0.7, 0.9) mm and lubrication or material between two plates(polymer, grease, grease with graphite, mos2) to knowing an effect of this method and parameters on residual stresses for the bottom plates. Also compare these results for the
... Show MoreThe research is based on the basic idea that companies today are moving towards a new trend towards protecting the environment coupled with the increasing wareness of the pollution damage caused by these companies due to their operations and activities in the environment. The two main reasons that led the researchers to choose this subject is the need to adapt the companies themselves in response to successive developments, The great development was that companies moved from the sole economic responsibility of the business to social responsibility by emphasizing socially responsible profit. The problem of research is the knowledge of the availability of the dimensions of the green processing series in Kirkuk Cement Factory The re
... Show MoreThe Messengers and the Imam of the God-fearing, Muhammad is God, his family, and all of his companions. As for what comes after... Fainting is one of the involuntary symptoms and states that occur to a person when carrying out his life’s tasks suddenly due to his loss of sense and movement, so he loses consciousness for a period of time that is short or may be long, and the person is held accountable and responsible for every moment of his life. He is required to perform duties specified by Sharia law, such as prayer, fasting, and Hajj...and fainting prevents him from performing these actions. We must consider the opinions of jurists and know the legal implications resulting from it. It was said that a person has a capacity that enable
... Show MoreThe research aims to identify the tax policy strategy adopted in Iraq after the change of the tax system in 2003 and beyond, and then make a comparison of the two strategies on corporate data whether they are charged with progressive tax rates and after the change of the system as the tax rates became fixed, and then indicate the changes In the tax proceeds, and knowing the imensions of the approved tax policy, is it a tax reform strategy or a strategy to attract investments.The research started from the problem of exposure of the Iraqi tax system to several changes, as this led to a reflection on the technical organization of taxes, in terms of the tax rate.The descriptive analytical approach was chosen to study the actual reality of th
... Show MoreThe continuous advancement in the use of the IoT has greatly transformed industries, though at the same time it has made the IoT network vulnerable to highly advanced cybercrimes. There are several limitations with traditional security measures for IoT; the protection of distributed and adaptive IoT systems requires new approaches. This research presents novel threat intelligence for IoT networks based on deep learning, which maintains compliance with IEEE standards. Interweaving artificial intelligence with standardization frameworks is the goal of the study and, thus, improves the identification, protection, and reduction of cyber threats impacting IoT environments. The study is systematic and begins by examining IoT-specific thre
... Show MoreThis work examines numerically the effects of particle size, particle thermal conductivity and inlet velocity of forced convection heat transfer in uniformly heated packed duct. Four packing material (Aluminum, Alumina, Glass and Nylon) with range of thermal conductivity (from200 W/m.K for Aluminum to 0.23 W/m.K for Nylon), four particle diameters (1, 3, 5 and 7 cm), inlet velocity ( 0.07, 0.19 and 0.32 m/s) and constant heat flux ( 1000, 2000 and 3000 W/ m 2) were investigated. Results showed that heat transfer (average Nusselt number Nuav) increased with increasing packing conductivity; inlet velocity and heat flux, but decreased with increasing particle size.Also, Aluminum average Nusselt number is about (0.85,2.
... Show MoreAs an important resource, entanglement light source has been used in developing quantum information technologies, such as quantum key distribution(QKD). There are few experiments implementing entanglement-based deterministic QKD protocols since the security of existing protocols may be compromised in lossy channels. In this work, we report on a loss-tolerant deterministic QKD experiment which follows a modified “Ping-Pong”(PP) protocol. The experiment results demonstrate for the first time that a secure deterministic QKD session can be fulfilled in a channel with an optical loss of 9 dB, based on a telecom-band entangled photon source. This exhibits a conceivable prospect of ultilizing entanglement light source in real-life fiber-based
... Show More