Blockchain is an innovative technology that has gained interest in all sectors in the era of digital transformation where it manages transactions and saves them in a database. With the increasing financial transactions and the rapidly developed society with growing businesses many people looking for the dream of a better financially independent life, stray from large corporations and organizations to form startups and small businesses. Recently, the increasing demand for employees or institutes to prepare and manage contracts, papers, and the verifications process, in addition to human mistakes led to the emergence of a smart contract. The smart contract has been developed to save time and provide more confidence while dealing, as well as to cover the security aspects of digital management and to solve negotiation concerns. The smart contract was employed in creating a distributed ledger to eliminate the need for centralization. In this paper, a simple prototype has been implemented for the smart contract integrated with blockchain which is simulated in a local server with a set of nodes. Several security objectives, such as confidentiality, authorization, integrity, and non-repudiation, have been achieved in the proposed system. Besides, the paper discussed the importance of using the Blockchain technique, and how it contributed to the management of transactions in addition to how it was implemented in highly transparent real-estate scenarios. The smart contract was employed in creating a distributed ledger to eliminate the need for centralization. The elliptic-curve public key has been adopted as an alternative for the RSA in a signature generation/verification process and encryption protocol. For secure transactions, The Secure Socket Layer (SSL) also has been adopted as a secure layer in the web browser. The results have been investigated and evaluated from different aspects and the implementation was in a restricted environment. Experiments showed us the complexity of time and cost when using the (ECC) algorithm and using (RSA) algorithm depending on the size and length of the key. So if the size of the key in (ECC) equals (160) bits, and it corresponds to (1024) bits in (RSA), which is equivalent to 40% for (ECC) and 30% for (RSA). As a result, the (ECC) algorithm is complex, its key is smaller and the process of generating the key is faster, so it has achieved a high level of security.
(Thimma) in Arabic means compact, and immunity. (People of Thimma) are the free non-Muslim people under Muslim rule. This includes Heavenly Religions people, i. e., Christian and Jews).
They have been called (People of Thimma) because they had paid (Jizyah: tribute) so they became safe for their souls, honor, properties at the custody of Muslims.
Islamic law had posed (Jizyah: tribute) upon the Jews and Christians who were living under Muslim rule as a reaction of not embracing Islam Faith against securing their rights and freedom.
Freedoms secured by Islam for the (People of Thimma) had been many, including the right of faith, not coercing them to be Muslim, the right to live, to possess properties, protect and secure them, the
In this research, the researchers attempted to reveal the non-verbal language in the Holy Qur'an through the hurt of the eye, its communicative effect, and its psychological significance in order to demonstrate the importance of this language. Fold the search ..
In this study, the use of non-thermal plasma theory to remove toxic gases emitted from a vehicle was experimentally investigated. A non-thermal plasma reactor was constructed in the form of a cylindrical tube made of Pyrex glass. Two stainless steel rods were placed inside the tube to generate electric discharge and plasma condition, by connecting with a high voltage power supply (up to 40 kV). The reactor was used to remove the contaminants of a 1.25-liter 4-cylinder engine at ambient conditions. Several tests have been carried out for a ranging speed from 750 to 4,500 rpm of the engine and varying voltages from 0 to 32 kV. The gases entering the reactor were examined by a gas analyzer and the gases concentration ratio
... Show MoreRotaviruses, a major cause of gastroenteritis in children worldwide accounts for around half a million deaths annually. Vaccine against the virus has been recommended by the WHO to be involved in the national immunization program.To evaluate the genetic characterization of rotavirus among children with acute gastroenteritis in Babylon province is warranted. Children complained of diarrhea with rotavirus infection detected in their stool were involved in the study. The age range was 10 months to 60 months and with retrogradechecking of rotavirus vaccine history. Rotavirus genotypes were detected by reverse transcription-polymerase chain reaction (RT-PCR).A total number of 40 children with rotavirus gastroenteritis were used to examine the
... Show MoreBackground: The surgical treatment of pilonidal sinus varies from wide excision and laying the wound open or excision with primary closure or excision with the use of skin graft in some special cases.
Objectives: The objectives of this study is to determine the efficacy of treating non complicated pilonidal sinus disease with minimal excision and primary closure technique, complications and recurrence rate.
Patients and methods: This is a prospective study conducted in shahid ahmed ismaiel hospital in rania – As sulaimania IRAQ during the period from December 2013 to January 2016 and was carried on one hundred (100) consecutive patients with non complicated non recurrent pilonidal sinus patients who were treated with minimal exci
يعد التقطيع الصوري من الاهداف الرئيسة والضرورية في المعالجات الصورية للصور الرقمية، فهو يسعى الى تجزئة الصور المدروسة الى مناطق متعددة اكثر نفعاً تلخص فيها المناطق ذات الافادة لصور الاقمار الصناعية، وهي صور متعددة الاطياف ومجهزة من الاقمار الصناعية باستخدام مبدأ الاستشعار عن بعد والذي اصبح من المفاهيم المهمة التي تُعتمد تطبيقاته في اغلب ضروريات الحياة اليومية، وخاصة بعد التطورات المتسارعة التي شهد
... Show MoreThe research aims to investigate the possibility of joint auditing in improving the market value of Iraqi companies listed on the Iraq Stock Exchange. The sample was represented by 10 Iraqi companies listed in the Iraq market for the period from 2014-2017 (2 years before implementation and 2 years after implementation) and the research was based on the idea that joint auditing enhances investor confidence and raises their level of security as a result of providing quality and reliable reports, and thus This indicates good news in the market that reflects on the performance of stocks and the market value of companies that adopt joint auditing. The results of the analysis indicate an improvement in the market value, but this improv
... Show MoreThis research aims to distinguish the reef environment from the non-reef environment. The Oligocene-Miocene-succussion in western Iraq was selected as a case study, represented by the reefal limestone facies of the Anah Formation (Late Oligocene) deposited in reef-back reef environments, dolomitic limestone of the Euphrates Formation (Early Miocene) deposited in open sea environments, and gypsiferous marly limestone of the Fatha Formation (Middle Miocene) deposited in a lagoonal environment. The content of the rare earth elements (REEs) (La, Ce, Pr, Nd, Sm, Eu, Gd, Tb, Dy, Er, Ho, Tm, Yb, Lu, and Y) in reef facies appear to be much lower than of those in the non-reef facies. The open sea facies have a low content of REEs due to bein
... Show MoreIn this paper, we designed a new efficient stream cipher cryptosystem that depend on a chaotic map to encrypt (decrypt) different types of digital images. The designed encryption system passed all basic efficiency criteria (like Randomness, MSE, PSNR, Histogram Analysis, and Key Space) that were applied to the key extracted from the random generator as well as to the digital images after completing the encryption process.
Often there is no well drilling without problems. The solution lies in managing and evaluating these problems and developing strategies to manage and scale them. Non-productive time (NPT) is one of the main causes of delayed drilling operations. Many events or possibilities can lead to a halt in drilling operations or a marginal decrease in the advancement of drilling, this is called (NPT). Reducing NPT has an important impact on the total expenditure, time and cost are considered one of the most important success factors in the oil industry. In other words, steps must be taken to investigate and eliminate loss of time, that is, unproductive time in the drilling rig in order to save time and cost and reduce wasted time. The data of
... Show More