Blockchain is an innovative technology that has gained interest in all sectors in the era of digital transformation where it manages transactions and saves them in a database. With the increasing financial transactions and the rapidly developed society with growing businesses many people looking for the dream of a better financially independent life, stray from large corporations and organizations to form startups and small businesses. Recently, the increasing demand for employees or institutes to prepare and manage contracts, papers, and the verifications process, in addition to human mistakes led to the emergence of a smart contract. The smart contract has been developed to save time and provide more confidence while dealing, as well as to cover the security aspects of digital management and to solve negotiation concerns. The smart contract was employed in creating a distributed ledger to eliminate the need for centralization. In this paper, a simple prototype has been implemented for the smart contract integrated with blockchain which is simulated in a local server with a set of nodes. Several security objectives, such as confidentiality, authorization, integrity, and non-repudiation, have been achieved in the proposed system. Besides, the paper discussed the importance of using the Blockchain technique, and how it contributed to the management of transactions in addition to how it was implemented in highly transparent real-estate scenarios. The smart contract was employed in creating a distributed ledger to eliminate the need for centralization. The elliptic-curve public key has been adopted as an alternative for the RSA in a signature generation/verification process and encryption protocol. For secure transactions, The Secure Socket Layer (SSL) also has been adopted as a secure layer in the web browser. The results have been investigated and evaluated from different aspects and the implementation was in a restricted environment. Experiments showed us the complexity of time and cost when using the (ECC) algorithm and using (RSA) algorithm depending on the size and length of the key. So if the size of the key in (ECC) equals (160) bits, and it corresponds to (1024) bits in (RSA), which is equivalent to 40% for (ECC) and 30% for (RSA). As a result, the (ECC) algorithm is complex, its key is smaller and the process of generating the key is faster, so it has achieved a high level of security.
Salah Al-Din Provence is an active agriculture and population region. One of its primary water sources is groundwater, which suffers from a lack of information regarding water quality and hydrochemistry. In order to study those missing variables, 27 samples from wells of shallow tubes were collected for analyzing the relevant physicochemical indices that help to produce the Schoeller index, Piper diagram, and Gibbs plot. Piper diagram revealed a hydrochemistry behavior of different values along with the groundwater samples. The chemistry of wells was controlled primarily by the evaporation process according to the Gibbs plot. The values of the Schoeller index of the studied samples stated that 59% of
The co-occurrence of metabolic syndrome with type 2 diabetes mellitus (T2DM) will potentiate the morbidity and mortality that may be associated with each case. Fasting triglycerides-glucose index (TyG index) has been recommended as a useful marker to predict metabolic syndrome. Our study aimed to introduce gender-specific cut-off values of triglycerides- glucose index for diagnosing metabolic syndrome associated with type 2 diabetes mellitus. The data were collected from Baghdad hospitals between May - December 2019. The number of eligible participants was 424. National cholesterol education program, Adult Treatment Panel III criteria were used to define metabolic syndrome. Measurement of fasting blood glucose, lipid pro
... Show MoreMineral fillers are a fundamental component of asphalt mastic and play a critical role in governing the mechanical performance and durability of flexible pavements. Variations in filler type and dosage can substantially alter mastic stiffness, deformation resistance, fatigue behavior, and adhesion. The objective of this study is to systematically evaluate the influence of mineral filler type and filler-to-asphalt (F/A) ratio on the rheological, fatigue, and adhesive performance of asphalt mastics. Three commonly used fillers; limestone dust, Portland cement, and hydrated lime were investigated at four F/A ratios (0.6, 0.8, 1.0, and 1.2). A comprehensive experimental program was conducted, including conventional binder characterization, Mult
... Show MoreIn the current digitalized world, cloud computing becomes a feasible solution for the virtualization of cloud computing resources. Though cloud computing has many advantages to outsourcing an organization’s information, but the strong security is the main aspect of cloud computing. Identity authentication theft becomes a vital part of the protection of cloud computing data. In this process, the intruders violate the security protocols and perform attacks on the organizations or user’s data. The situation of cloud data disclosure leads to the cloud user feeling insecure while using the cloud platform. The different traditional cryptographic techniques are not able to stop such kinds of attacks. BB84 protocol is the first quantum cry
... Show MoreThe paradigm and domain of data security is the key point as per the current era in which the data is getting transmitted to multiple channels from multiple sources. The data leakage and security loopholes are enormous and there is need to enforce the higher levels of security, privacy and integrity. Such sections incorporate e-administration, long range interpersonal communication, internet business, transportation, coordinations, proficient correspondences and numerous others. The work on security and trustworthiness is very conspicuous in the systems based situations and the private based condition. This examination original copy is exhibiting the efficacious use of security based methodology towards the execution with blockchain
... Show MoreColonialism as a movement was very popular in Europe more than two centuries before. It aimed at controlling and exploiting several countries in Africa and Asia in addition to imposing their power and control on uninhabited islands. It received adherence and criticism as well. There also appeared activists and nations who stood against it and its practices. English novels discussed this notion greatly by pointing out the bad practices of the colonizers and how the colonized received them. This paper explores two narrative fictions that tackle the different aspects of the term. While Defoe, in Robinson Crusoe (1719), shows a colonial European figure who expresses his superiority, Wells, in “The Country of the Blind” (1904), deconstructs
... Show MoreThe study included the collection of samples of raw cow milk to isolate Leuconostoc bacteria, samples were sub cultured on De-Man Rogosa Sharpe-Vancomycin medium, the pure colonies were selected and subjected to the cultural and microscopically tests, according to that 25 cocci bacterial isolates were obtained, then isolates were subjected to biochemical tests. Result of tests showed that 12 isolates belong to the genus Leuconostoc out of 25 cocci bacterial isolates, Vitek2 system was used as a supplementary step. Results of final identification showed that 3 sub species were obtained included Leuconostoc mesenteroides ssp. cremoris 9 out of 12 isolates, while it was 2 isolates of Leuconostoc mesenteroides ssp. mesenteroides and one isol
... Show MoreBackground: The purpose of this study is to investigate the relationship between the roots of the maxillary posterior teeth and the maxillary sinus using spiral computed tomography, and measured the distances between the roots of the maxillary posterior teeth and the sinus floor. Materials and Methods: The sample of the present study was a total of 120 Iraqi subject (60 males & 60 females) aged (20-60) years old, who admitted to spiral Computed Tomography scan unit in AL-Zahraa hospital in AL-Kut city to have Computed Tomography scan of the brain and paranasal sinuses who had complaints of headaches or with suspicion of sinusitis but without pathological findings in maxillary sinuses. From November 2012 to April 2013, CT sagittal reconstruc
... Show More