Blockchain is an innovative technology that has gained interest in all sectors in the era of digital transformation where it manages transactions and saves them in a database. With the increasing financial transactions and the rapidly developed society with growing businesses many people looking for the dream of a better financially independent life, stray from large corporations and organizations to form startups and small businesses. Recently, the increasing demand for employees or institutes to prepare and manage contracts, papers, and the verifications process, in addition to human mistakes led to the emergence of a smart contract. The smart contract has been developed to save time and provide more confidence while dealing, as well as to cover the security aspects of digital management and to solve negotiation concerns. The smart contract was employed in creating a distributed ledger to eliminate the need for centralization. In this paper, a simple prototype has been implemented for the smart contract integrated with blockchain which is simulated in a local server with a set of nodes. Several security objectives, such as confidentiality, authorization, integrity, and non-repudiation, have been achieved in the proposed system. Besides, the paper discussed the importance of using the Blockchain technique, and how it contributed to the management of transactions in addition to how it was implemented in highly transparent real-estate scenarios. The smart contract was employed in creating a distributed ledger to eliminate the need for centralization. The elliptic-curve public key has been adopted as an alternative for the RSA in a signature generation/verification process and encryption protocol. For secure transactions, The Secure Socket Layer (SSL) also has been adopted as a secure layer in the web browser. The results have been investigated and evaluated from different aspects and the implementation was in a restricted environment. Experiments showed us the complexity of time and cost when using the (ECC) algorithm and using (RSA) algorithm depending on the size and length of the key. So if the size of the key in (ECC) equals (160) bits, and it corresponds to (1024) bits in (RSA), which is equivalent to 40% for (ECC) and 30% for (RSA). As a result, the (ECC) algorithm is complex, its key is smaller and the process of generating the key is faster, so it has achieved a high level of security.
A new Schiff bases ligand 4- ((2-hyolroxy phenylimino) methyl) -2, 6-dimethoxyphenol derived from condensation of 2- amino phenol with 4-hydroxy -3, 5-dimethoxy benzaldehyde have been synthesized and characterized by spectroscopy, spectra, Mass spectrum and elemental microanalysis (C.H.N). Metal Complexes with ions have been also synthesized and characterized spectroscopic methods spectroscopy, flame atomic absorption, molar conductivity measurements and magnetic susceptibility. These studies indicate that the moler ratio for the complexes. The complexes showed characteristics octahedral geometry with the (O,N) ligand coordinated in bidentate mode while with showed square planer. The enzyme activity of the ligand and i
... Show MoreThe levels of circulating angiogenic and anti-angiogenic factors, namely vascular endothelial growth factor–A (VEGF-A) and soluble vascular endothelial growth factor receptor-1 (sVEGFR-1), have been linked to the development of renal dysfunction due to the proliferation of microvasculature within the kidneys of type 2 diabetic (T2DM) patients. The study aims to scrutinize serum levels of VEGF and sVEGFR-1 in a sample of Iraqi diabetic nephropathy patients to support their reliability as markers for the prediction of nephropathy in type 2 diabetes mellitus patients as well as to assess the ACE inhibitor’s effect on the levels of these two markers. Method: The ninety participants of this case-control study were split into three gr
... Show MoreObjectives: The study aimed to clarify the role of Al-Sayyid Al-Ajall and his family in the service of the Mongol Empire. They worked to develop its administrative and military institutions, benefiting from their extensive experience in administration, politics, economics, and urban affairs. Due to their capabilities, they received the patronage of Genghis Khan and subsequent generations, earning the confidence of the ruling Mongol authority. As a result, they were granted significant powers within the state. Methods: The study relied on the analytical method to analyze historical texts, compare them with others, and discuss them accurately. Results: The study yielded several results, including the minister's keen interes
... Show MoreAbstract\
The value chain analysis is main tools to achieve effective and efficient cost management; it requires a depth and comprehensive understanding for all internal and external activities associated with creating value. Supply chain as apart of value chain, that means managing it in active and efficient can achieve great results when adopting a comprehensive and integrated performance for these two chains activities. The research aims to identify possible ways to integrate the performance of value and supply chains of the sample" Kufa-cement plant" and determine the effect of this integration in enhancing customer value. The research arrival that logical and integrated analysis of value and supply chains helps
... Show MoreThe world faces, in the last years of the last century and the beginning
of the current century i.e. the 21st century, a great expansion and a large
openness on new worlds in studies differ in their development, detection of
thinking methods and practice of mental processes.
The recent studies have proved an increase in the scientific
achievement among students through the presence of new techniques one of
which is Landa Organizing and Exploring Model concerning Physiology that
deals with various body organs.
This research aims at identifying the effectiveness of Landa Model on
the achievement of the Technical Medicine Institute students in Physiology so
as to be sure of the following nil hypothesis: there i
Results showed high efficiency of the predator Chrysoperla carnea (Stephens) to attack and consume nymphal instars and adults of cabbage aphid, Brevicoryne brassicae (L.).The total average of the nymphal instars consumed by the larval stage of predator were 308.67, 285.9, 198.77, 154.7 for 1st ,2nd ,3rd ,4th nymphal instars respectively .While it was 110,107.9 for apterae and alatae respectively . Also, predation efficiency increases with the progress of the larval instars up to the third (last) which was the most voracious .The 1st instar nymph consumed by the larvae of the predator were 47,80,181.67 nymphs ,with predation rate of 14.71% , 23.75% and 50.13% for 1st ,2nd and 3rd larval instars
This paper aims to study the rate of star formation (SFR) in luminous infrared galaxies at different wavelengths using distance measurement techniques (dl, dm) and to know which methods are the most accurate to determine the rate of star formation as we present through this research the results of the statistical analysis (descriptive statistics) for a sample of luminous infrared galaxies. The data used in this research were collected from the NASA Extragalactic Database (NED) and HYPERLEDA, then used to calculate the star formation rate and indicate the accuracy of the distance methods used (dl, dm). Two methods were tested on Hα, OII, FIR, radio continuum at 1.4 GHz, FUV, NUV, and total (FUV + FIR). The results showed that the dl
... Show MoreKlebsiella pneumoniae is among the most frequent microorganisms isolated from infections of burn wounds. This cross-sectional study aimed to investigate the distribution of multi-drug resistant (MDR) K. pneumoniae in two burn hospitals and the antibiotic resistance profile in different burn regions of the same patient. It was performed in two hospitals (Al-Zahraa and Al-Karama) in Al-Kut, Iraq, between January and May 2022. Totally, 100 burn swabs were collected from 40 patients of both genders suffering from burn wound infections, with ages ranging between 3 and 50 years. Klebsiella pneumoniae were isolated and identified using conventional methods followed by VITEK®2 system and confirmed via polymerase chain reaction targeting t
... Show More