Blockchain is an innovative technology that has gained interest in all sectors in the era of digital transformation where it manages transactions and saves them in a database. With the increasing financial transactions and the rapidly developed society with growing businesses many people looking for the dream of a better financially independent life, stray from large corporations and organizations to form startups and small businesses. Recently, the increasing demand for employees or institutes to prepare and manage contracts, papers, and the verifications process, in addition to human mistakes led to the emergence of a smart contract. The smart contract has been developed to save time and provide more confidence while dealing, as well as to cover the security aspects of digital management and to solve negotiation concerns. The smart contract was employed in creating a distributed ledger to eliminate the need for centralization. In this paper, a simple prototype has been implemented for the smart contract integrated with blockchain which is simulated in a local server with a set of nodes. Several security objectives, such as confidentiality, authorization, integrity, and non-repudiation, have been achieved in the proposed system. Besides, the paper discussed the importance of using the Blockchain technique, and how it contributed to the management of transactions in addition to how it was implemented in highly transparent real-estate scenarios. The smart contract was employed in creating a distributed ledger to eliminate the need for centralization. The elliptic-curve public key has been adopted as an alternative for the RSA in a signature generation/verification process and encryption protocol. For secure transactions, The Secure Socket Layer (SSL) also has been adopted as a secure layer in the web browser. The results have been investigated and evaluated from different aspects and the implementation was in a restricted environment. Experiments showed us the complexity of time and cost when using the (ECC) algorithm and using (RSA) algorithm depending on the size and length of the key. So if the size of the key in (ECC) equals (160) bits, and it corresponds to (1024) bits in (RSA), which is equivalent to 40% for (ECC) and 30% for (RSA). As a result, the (ECC) algorithm is complex, its key is smaller and the process of generating the key is faster, so it has achieved a high level of security.
Background: Large amounts of oily wastewater and its derivatives are discharged annually from several industries to the environment. Objective: The present study aims to investigate the ability to remove oil content and turbidity from real oily wastewater discharged from the wet oil's unit (West Qurna 1-Crude Oil Location/ Basra-Iraq) by using an innovated electrocoagulation reactor containing concentric aluminum tubes in a monopolar mode. Methods: The influences of the operational variables (current density (1.77-7.07 mA/cm2) and electrolysis time (10-40 min)) were studied using response surface methodology (RSM) and Minitab-17 statistical program. The agitation speed was taken as 200 rpm. Energy and electrodes consumption had been studi
... Show MoreMutations in genes encoding proteins necessary for detoxifying oxidative stress products have been predicted to increase susceptibility to lung cancer (LC). Despite this, the association between waterpipe tobacco smoking (WP), genetic polymorphisms, and LC risk remains poorly understood. This is the first study to explore the relationship between WP tobacco smoking and these genetic factors. Previously, we investigated the association of GSTP1 SNPs (rs1695-A/G and rs1138272-C/T) with LC in Iraqi males who smoke WP. Here, we expanded our analysis to include GSTM1 (active/null) and GSTT1 (active/null) genotypes, both individually and in combination with GSTP1 SNPs. Multiplex PCR and RFLP-PCR assays were utilized to determine the genotypes of
... Show MoreIn this work, we have developed a model that describes the relationships between top predators (such as tigers, hyenas, and others), crop raiders (such as baboons, warthogs, and deer), and prey (such as deer) in the coffee forests of southwest Ethiopia. Various potential equilibrium points are identified. Additionally, the model's stability in the vicinity of these equilibrium points is examined. An investigation of the model's Hopf bifurcation is conducted concerning several significant parameters. It is found that prey species may be extinct due to a lower growth rate and consumption by top predators in the absence of human interference in the carrying capacity of prey. It is observed that top predators may be extinct due to human interfe
... Show MoreMature oil reservoirs surrounded with strong edge and bottom water drive aquifers experience pressure depletion and water coning/cresting. This laboratory research investigated the effects of bottom water drive and gas breakthrough on immiscible CO2-Assisted Gravity Drainage (CO2-AGD), focusing on substantial bottom water drive. The CO2-AGD method vertically separates the injected CO2 to formulate a gas cap and Oil. Visual experimental evaluation of CO2-AGD process performance was performed using a Hele-Shaw model. Water-wet sand was used for the experiments. The gas used for injection was pure CO2, and the “oleic” phase was n-decane with a negative spreading coefficient. The aqueous phase was deionized water. To evaluate the feasibilit
... Show MoreAromaticity, antiaromaticity and chemical bonding in the ground (S0), first singlet excited (S1) and lowest triplet (T1) electronic states of disulfur dinitride, S2N2, were investigated by analysing the isotropic magnetic shielding, σiso(r), in the space surrounding the molecule for each electronic state. The σiso(r) values were calculated by state-optimized CASSCF/cc-pVTZ wave functions with 22 electrons in 16 orbitals constructed from gauge-including atomic orbitals (GIAOs). The S1 and T1 electronic states were confirmed as 11Au and 13B3u, respectively, through linear response CC3/aug-cc-pVTZ calculations of the vertical excitation energies for eight singlet (S1–S8) and eight triplet (T1–T8) electronic states. The aromaticities of S
... Show MoreUrsolic acid (UA, 3 ?-hydroxy-urs-12-en-28-oic acid) are isomeric triterpenic acids. The high quantities of pentacyclic triterpenoids in Scabiosa species seems to be obvious and there is an evidence that most of pentacyclic triterpenoids that have been isolated are saponins. This is one of the most important characteristic of the genus Scabiosa, the main aglycones are ursolic acid and oleanolic acid. In the current study, isolation from the aerial part and roots of Scabiosa palaestina L. was performed using Preparative HPLC. Furthermore, detection and quantitation of ursolic acid was performed by high performance thin layer chromatography (HPTLC). The identification of isolated triterpenoid involves two methods including FT-IR coupl
... Show MoreIt is noted in the title that the paper studies the viewpoint in the novel The Dog and the Long Night by the Iranian novelist Shahranoush Parsi Pour and in the novel Alibaba's Sad Night by the Iraqi novelist Abdulkhaliq Ar-Rikabi. Both are well known novelists, and about whose stories and novels many critical books, MA theses, and Ph.D. dissertations have been written. Also, some of their literary works have won prizes. Here, the researcher shed light on the concept of viewpoint, its types, and its importance in novels in general. This was done along with tackling the two viewpoints in both novels, where similarities and differences were identified. For this end, the researcher has adopted the analytic-descriptive appro
... Show MoreActinopolyspora iraqiensis IQ-H1 is a novel strain of actinobacteria isolated from extremely halophilic soil samples in Iraq. The whole-genome sequence of this strain is deposited in the National Center for Biotechnology Information (NCBI) GenBank under the accession number NZ_AICW01000000. In this study, the genome features and the molecular phylogenetic tree of Act. iraqiensis IQ-H1are analyzed. The RAST tool was used for genome annotation. The genomic features were elucidated using QUAST tool. The circular genome map, and the core and pan-genome map of Act. iraqiensis IQ-H1 was generated using CGView and the GView tools respectively. The JSpeciesWS server was used for the tetranucleotide signature analysis a
... Show More