Blockchain is an innovative technology that has gained interest in all sectors in the era of digital transformation where it manages transactions and saves them in a database. With the increasing financial transactions and the rapidly developed society with growing businesses many people looking for the dream of a better financially independent life, stray from large corporations and organizations to form startups and small businesses. Recently, the increasing demand for employees or institutes to prepare and manage contracts, papers, and the verifications process, in addition to human mistakes led to the emergence of a smart contract. The smart contract has been developed to save time and provide more confidence while dealing, as well as to cover the security aspects of digital management and to solve negotiation concerns. The smart contract was employed in creating a distributed ledger to eliminate the need for centralization. In this paper, a simple prototype has been implemented for the smart contract integrated with blockchain which is simulated in a local server with a set of nodes. Several security objectives, such as confidentiality, authorization, integrity, and non-repudiation, have been achieved in the proposed system. Besides, the paper discussed the importance of using the Blockchain technique, and how it contributed to the management of transactions in addition to how it was implemented in highly transparent real-estate scenarios. The smart contract was employed in creating a distributed ledger to eliminate the need for centralization. The elliptic-curve public key has been adopted as an alternative for the RSA in a signature generation/verification process and encryption protocol. For secure transactions, The Secure Socket Layer (SSL) also has been adopted as a secure layer in the web browser. The results have been investigated and evaluated from different aspects and the implementation was in a restricted environment. Experiments showed us the complexity of time and cost when using the (ECC) algorithm and using (RSA) algorithm depending on the size and length of the key. So if the size of the key in (ECC) equals (160) bits, and it corresponds to (1024) bits in (RSA), which is equivalent to 40% for (ECC) and 30% for (RSA). As a result, the (ECC) algorithm is complex, its key is smaller and the process of generating the key is faster, so it has achieved a high level of security.
Huge efforts are being made to control the spread and impacts of the coronavirus pandemic using vaccines. However, willingness to be vaccinated depends on factors beyond the availability of vaccines. The aim of this study was three-folded: to assess children’s rates of COVID-19 Vaccination as reported by parents, to explore parents’ attitudes towards children’s COVID-19 vaccination, and to examine the factors associated with parents’ hesitancy towards children’s vaccination in several countries in the Eastern Mediterranean Region (EMR).
This paper proposes a novel method for generating True Random Numbers (TRNs) using electromechanical switches. The proposed generator is implemented using an FPGA board. The system utilizes the phenomenon of electromechanical switch bounce to produce a randomly fluctuated signal that is used to trigger a counter to generate a binary random number. Compared to other true random number generation methods, the proposed approach features a high degree of randomness using a simple circuit that can be easily built using off-the-shelf components. The proposed system is implemented using a commercial relay circuit connected to an FPGA board that is used to process and record the generated random sequences. Applying statistical testing on the exp
... Show MoreComputer programs are one of the most prominent features of technical progress in the field of information technology, which has raised many new issues that have not existed since the mid-twentieth century. and controls on the use of these programs by third parties, Controversy still exists about the legal nature of computer programs between those who believe that they are subject to the laws of patents and industrial property, and those who believe that they are subject to the laws of copyright protection and literary and artistic property, and the resulting difference in the scope of protection and rights established according to the legal system adopted in the application. This study comes to shed light on the legal nature of computer
... Show MoreAbstract\
preparation process of performance evaluation in organizations is of extreme importance, and under development in organizations and the opening of markets and technological developments in the industry and heightened competition among industrial organizations imposed systems are built for performance give a clear picture about performance and competition, And centered research problem in answering the following questions: Is performance evaluation system is available in Wasit State Company for Textile Industries(Research sample ), This research aims to assess the performance of policies and programs in the company, according to guide performance evaluation of programs and policies prepared by the Dutch Cou
... Show Moreבמחקר הזה ניתחנו מספר נאומים של שמעון פרס, אנחנו התמקדנו בהשפעה והשכנוע אצל שמעון פרס ואיך הוא יכול להעביר את המסרים של נאומיו בסגנון פרגמטי כדי להגיע ללבו של הציבור.
גם כן, התמקדנו בסגנון הפוליטי שהוא חושב כי התחום הזה צריך להיות ברור מול הציבור וגם כן מול דעת הקהל הבינלאומי מתוך השימוש במונחים בעלי השפעה ושכנוע להגיע למטרות המבוקשות.
במלים אחרות, שמעון פרס, לעתים, מתמקד בשפה מליצית ויעמוד הרב
... Show MoreВ статье рассматривается вопрос об использовании мультимедийных средств для оптимизации процесса формирования коммуникативной компетенции в иракской аудитории с привлечением компьютерных технологий. Статья посвящена использованию мультимедийных технологий и различных приемов формирования интереса к русскому языку. Включение в процесс обучения коммуникативно-значимого, аутентичн
... Show More