Blockchain is an innovative technology that has gained interest in all sectors in the era of digital transformation where it manages transactions and saves them in a database. With the increasing financial transactions and the rapidly developed society with growing businesses many people looking for the dream of a better financially independent life, stray from large corporations and organizations to form startups and small businesses. Recently, the increasing demand for employees or institutes to prepare and manage contracts, papers, and the verifications process, in addition to human mistakes led to the emergence of a smart contract. The smart contract has been developed to save time and provide more confidence while dealing, as well as to cover the security aspects of digital management and to solve negotiation concerns. The smart contract was employed in creating a distributed ledger to eliminate the need for centralization. In this paper, a simple prototype has been implemented for the smart contract integrated with blockchain which is simulated in a local server with a set of nodes. Several security objectives, such as confidentiality, authorization, integrity, and non-repudiation, have been achieved in the proposed system. Besides, the paper discussed the importance of using the Blockchain technique, and how it contributed to the management of transactions in addition to how it was implemented in highly transparent real-estate scenarios. The smart contract was employed in creating a distributed ledger to eliminate the need for centralization. The elliptic-curve public key has been adopted as an alternative for the RSA in a signature generation/verification process and encryption protocol. For secure transactions, The Secure Socket Layer (SSL) also has been adopted as a secure layer in the web browser. The results have been investigated and evaluated from different aspects and the implementation was in a restricted environment. Experiments showed us the complexity of time and cost when using the (ECC) algorithm and using (RSA) algorithm depending on the size and length of the key. So if the size of the key in (ECC) equals (160) bits, and it corresponds to (1024) bits in (RSA), which is equivalent to 40% for (ECC) and 30% for (RSA). As a result, the (ECC) algorithm is complex, its key is smaller and the process of generating the key is faster, so it has achieved a high level of security.
This paper performance for preparation and identification of six new complexes of a number of transition metals Cr (lII), Mn (I1), Fe (l), Co (II), Ni (I1), Cu (Il) with: N - (3,4,5-Trimethoxy phenyl-N - benzoyl Thiourea (TMPBT) as a bidentet ligand. The prepared complexes have been characterized, identified on the basis of elemental analysis (C.H.N), atomic absorption, molar conductivity, molar-ratio ,pH effect study, I. Rand UV spectra studies. The complexes have the structural formula ML2X3 for Cr (III), Fe (III), and ML2X2 for Mn (II), Ni (II), and MLX2 for Co (Il) , Cu (Il).
The electron correlation for inter-shells (1s 2p), (1s 3p) and (1s 3d) was described by the inter-particle radial distribution function f(r12). It was evaluated for Li-atom in the different excited states (1s2 2p), (1s2 3p) and (1s2 3d) using Hartree-Fock approximation (HF). The inter particle expectation values for these shells were also evaluated. The calculations were performed using Mathcad 14 program.
أختبرت في هذه الدراسه حساسيه اختبار فرط الحساسية المتأخر وعلاقته ببعض معايير الخمج باللشمانيا في مجموعتين من حيوانات الهامستر المحقونه و كالآتي : حقنت المجموعة الأولى بطفيلي اللشمانيا الأحشائيه الحيه بينما حقنت المجموعةالثانية بلقاح عالق اللشمانيا الجلديه المقتولة بالحرارة . اظهرت المجموعه الثانيه اعلى معدل في تفاعل فرط الحساسية المتأخر(1.5 ±0.23ملم) , واقل المعدلات في كل من معامل الطحال (2.02±0.15) , طول الط
... Show MoreThe study used analytical and descriptive methodology in ministry of education and educational institutions in Baghdad. While the digital transformation was studied as independent variable with four dimensions, knowledge creation on the other hand was examined as dependent variable with five dimensions .The study aims to unearth the digital transformation and its reflections on knowledge creation as well as to identify the digital roles of educational institutions. Furthermore, the study sought to identify the reflections of digital transformation in the education system, particularly the ministry of education.
The event of crossing the barriers is one of the Power Games activities that have received great attention in the field of researches. Which led to ma..
Objectives: The study objectives are to determine the impact of education program upon the academic nurses'
practice concerning documentation of nursing sheets, and to find out the relationship between nurses knowledge
and their demographic characteristics, which include age, sex, and years of experience in medical and surgical
wards.
Methodology: A quasi- experimental study was carried out at the medical and surgical wards in teaching
hospitals in Sulaimani governorate from the beginning of March up to June 2007٠
To reach the objectives of the study anon-probability (purposive) sample of (25) academic nurses who work in
the medical and surgical wards in teaching hospitals.
The data were collected through the use
Marketing Intelligence is one of the important methods of collecting information about competitors ' products and changes in customers ' tastes and needs that contribute to determining the policies to be followed in product development.
The problem of research, which seeks to be answered by the extent to which the companies in question have the appropriate and effective mechanisms to develop their products, and the nature of the relationship between the components of marketing intelligence and new product development policies. The importance of research is determined by the importance of obtaining important and necessary information to make the appropriate decision on the development of the new product an
... Show MoreThree nematodes : Amidostomum acutum , Epomidiostomum uncinatum and Hadjelia truncata , were recovered from the gizzards of wintering mallard collected at two sites in central Iraq. A brief description of the parasites along with some notes on their infection rate, prevalence and discussion with the pertinent literature are provided.