Blockchain is an innovative technology that has gained interest in all sectors in the era of digital transformation where it manages transactions and saves them in a database. With the increasing financial transactions and the rapidly developed society with growing businesses many people looking for the dream of a better financially independent life, stray from large corporations and organizations to form startups and small businesses. Recently, the increasing demand for employees or institutes to prepare and manage contracts, papers, and the verifications process, in addition to human mistakes led to the emergence of a smart contract. The smart contract has been developed to save time and provide more confidence while dealing, as well as to cover the security aspects of digital management and to solve negotiation concerns. The smart contract was employed in creating a distributed ledger to eliminate the need for centralization. In this paper, a simple prototype has been implemented for the smart contract integrated with blockchain which is simulated in a local server with a set of nodes. Several security objectives, such as confidentiality, authorization, integrity, and non-repudiation, have been achieved in the proposed system. Besides, the paper discussed the importance of using the Blockchain technique, and how it contributed to the management of transactions in addition to how it was implemented in highly transparent real-estate scenarios. The smart contract was employed in creating a distributed ledger to eliminate the need for centralization. The elliptic-curve public key has been adopted as an alternative for the RSA in a signature generation/verification process and encryption protocol. For secure transactions, The Secure Socket Layer (SSL) also has been adopted as a secure layer in the web browser. The results have been investigated and evaluated from different aspects and the implementation was in a restricted environment. Experiments showed us the complexity of time and cost when using the (ECC) algorithm and using (RSA) algorithm depending on the size and length of the key. So if the size of the key in (ECC) equals (160) bits, and it corresponds to (1024) bits in (RSA), which is equivalent to 40% for (ECC) and 30% for (RSA). As a result, the (ECC) algorithm is complex, its key is smaller and the process of generating the key is faster, so it has achieved a high level of security.
Concrete structures are exposed to aggressive environmental conditions that lead to corrosion of the embedded reinforcement and pre-stressing steel. Consequently, the safety of concrete structures may be compromised, and this requires a significant budgets to repair and maintain critical infrastructure. Prediction of structural safety can lead to significant reductions in maintenance costs by maximizing the impact of investments. The aim of this paper is to establish a framework to assess the reliability of existing post-tensioned concrete bridges. A time-dependent reliability analysis of an existing post-tensioned involving the assessment of Ynys-y-Gwas bridge has been presented in this study. The main cause of failure of this bridge was c
... Show MoreIntroduction and Aims: Job burnout such as occupational hazards that have been considered in recent years. This research aimed to investigate the relationship between religious beliefs and job burnout among nurses working in hospitals in Gonabad city in 2017. Materials and Methods: This study is cross-sectional and correlational study. The sample consisted of 100 nurses in Gonabad city who were selected using stratified randomized method. Using the Maslach job burnout and Alport religious beliefs Inventories, data were collected and were analyzed with SPSS version 16 and Pearson, Spearman and independent sample T tests were analyzed. Significant level was considered less than 0.05. Results: Average job burnout in nurses working in hospit
... Show MoreLimestones have considerable commercial importance because they are used as building stones and are widely used for flooring and interior and exterior facings. On the other hand, the reserve calculation reveals the economic effectiveness of the investigation. This study aims to calculate the reserve of the middle Miocene limestone for engineering purposes. The limestone beds of the Nfayil Formation in Central Iraq have been studied over 15 outcrop sections. The Nfayil bed has an average thickness of about 1.64 m, while the overburden has an average of about 0.93 m. The average bulk density of limestone is 2.1 gm/cm3 . Kriging and triangulation method has been adopted and used in the calculation and assessment of reserve. The industrial laye
... Show MoreIn this research a local adsorbent was prepared from waste tires using two-step pyrolysis method. In the carbonization process, nitrogen gas flow rate was 0.2L/min at carbonization temperature of 500ºC for 1h. The char products were then preceded to the activation process at 850°C under carbon dioxide (CO2) activation flow rate of 0.6L/min for 3h. The activation method produced local adsorbent material with a surface area and total pore volume as high as 118.59m2 /g and 0.1467cm3/g, respectively. The produced . local adsorbent (activated carbon) was used for adsorption of lead from aqueous solution. The continuous fixed bed column experiments were conducted. The adsorption capacity performance of prepared activated carbons in this work
... Show MoreTanqua anomala (von Linstow,1904) specimens were recovered, from the lining wall of the gastro-intestinal tract of the dice snake Natrix tessellate tessellate (Laurenti, 1768) collected in Baghdad city, central Iraq. Measurements of the males, females and a comparison of the nematode with other studies tabulated. Reporting of Tanqua anomala from this snake represents the first record for Iraq as well as a new host record.
This research work considers one of the authentic and most modern modes of storytelling, as employed by Garcia Marquez in one of his famous stories "An Old ManWith Enormous Wings" (1972). Technically, the work is divided into four parts: the first serves as an introduction to his literary works, his use of magic realism, and addresses mainly the interests of Arab readers; the second handles the development of modern short story through the perspective of realism, until the emergence of magic realism as a new style; the third deals with the origin, nature and development of this style, and his mastery of it; the fourth part tries to analyze the story and its plot, thoughts, characters, symbols and metaphors, in the light of the artistic p
... Show MoreAbstract:- Cyberspace is a new arena for conflict between international powers, especially since the cost of cyber-conflict is less than its traditional warfare counterparts regardless of the nature of the weapons used, whether traditional or non-traditional. Cyber conflict is necessarily based on strategies to deter, attack, and defend. The aim of the cybercrime conflict is to ensure the defensive sufficiency of the state, ensuring its national security and safeguarding its supreme interests. Despite Japan-China relations characterized by convergence and cooperation in post-Cold War economic spheres, Japan continues to retain the growing Chinese influence in East Asia. These variables prompted Japan to announce a hedging strategy due to un
... Show More