Blockchain is an innovative technology that has gained interest in all sectors in the era of digital transformation where it manages transactions and saves them in a database. With the increasing financial transactions and the rapidly developed society with growing businesses many people looking for the dream of a better financially independent life, stray from large corporations and organizations to form startups and small businesses. Recently, the increasing demand for employees or institutes to prepare and manage contracts, papers, and the verifications process, in addition to human mistakes led to the emergence of a smart contract. The smart contract has been developed to save time and provide more confidence while dealing, as well as to cover the security aspects of digital management and to solve negotiation concerns. The smart contract was employed in creating a distributed ledger to eliminate the need for centralization. In this paper, a simple prototype has been implemented for the smart contract integrated with blockchain which is simulated in a local server with a set of nodes. Several security objectives, such as confidentiality, authorization, integrity, and non-repudiation, have been achieved in the proposed system. Besides, the paper discussed the importance of using the Blockchain technique, and how it contributed to the management of transactions in addition to how it was implemented in highly transparent real-estate scenarios. The smart contract was employed in creating a distributed ledger to eliminate the need for centralization. The elliptic-curve public key has been adopted as an alternative for the RSA in a signature generation/verification process and encryption protocol. For secure transactions, The Secure Socket Layer (SSL) also has been adopted as a secure layer in the web browser. The results have been investigated and evaluated from different aspects and the implementation was in a restricted environment. Experiments showed us the complexity of time and cost when using the (ECC) algorithm and using (RSA) algorithm depending on the size and length of the key. So if the size of the key in (ECC) equals (160) bits, and it corresponds to (1024) bits in (RSA), which is equivalent to 40% for (ECC) and 30% for (RSA). As a result, the (ECC) algorithm is complex, its key is smaller and the process of generating the key is faster, so it has achieved a high level of security.
This paper studies the effects of stiffeners on shear lag in steel box girders with stiffened flanges. A three-dimensional linear finite element analysis using STAAD.Pro V8i program has been employed to evaluate and determine the actual top flange stress distribution and effective width in steel box girders. The steel plates of the flanges and webs have been modeled by four-node isoparametric shell elements, while the stiffeners have been modeled as beam elements. Different numbers (4, 8, and 15) for the steel stiffeners have been used in this study to establish their effects on the shear lag and longitudinal stresses in the flange. Using stiffeners reduced the magnitude of the top flange longitudinal stresses about 40%, but did
... Show MoreIn this research, the focus was on estimating the parameters on (min- Gumbel distribution), using the maximum likelihood method and the Bayes method. The genetic algorithmmethod was employed in estimating the parameters of the maximum likelihood method as well as the Bayes method. The comparison was made using the mean error squares (MSE), where the best estimator is the one who has the least mean squared error. It was noted that the best estimator was (BLG_GE).
The current study aimed to measure the attitudes of female teachers towards the use of digital learning and the degree of possessing their digital education skills. The study sample consisted of (180) workers with disabilities (mental disability، auditory impairment، visual disability، hyperactivity and distraction. To achieve the goals of the study, the transformation measure was used towards digital education for people with disabilities. The study reached the following results: the availability of digital learning skills among workers with disabilities. The study concluded with a series of recommendations including holding Training courses to keep up with the challenges of educational trends and modern technology in this area.
Due to the popularity of radar, receivers often “hear” a great number of other transmitters in
addition to their own return merely in noise. The dealing with the problem of identifying and/or
separating a sum of tens of such pulse trains from a number of different sources are often received on
the one communication channel. It is then of interest to identify which pulses are from which source,
based on the assumption that the different sources have different characteristics. This search deals with a
graphical user interface (GUI) to generate the radar pulse in order to use the required radar signal in any
specified location.
The husband’s discipline of his wife is a right prescribed by the Sharia, but it is conditioned discipline with conditions that make this discipline intended to preserve the family institution from disintegration and scattering, so the Islamic Sharia entrusted the husband, the guardian of the family, with the task of disciplining the disobedient and disobedient wife and deviating from the family’s values and constants of mutual respect and obedience in what is good. And a sense of responsibility. This discipline goes through three sequential stages, starting with exhortation and dialogue, passing through abandonment in the beds, and ending with beating. As for the sermon, it is a quiet dialogue followed by a threat of abandonme
... Show MoreThe main objective of this study is to measure the Impact of global financial crisis on some indicators of the Saudi Arabia's economy using the Mendel-Fleming model, the importance of the study applied by focusing on the theme of general equilibrium in the face of fluctuations in the global economy. Study used a descriptive approach and the methodology of econometrics to construct the model. Study used Eviews Program for data analysis. The Data was collected from the Saudi Arabian Monetary Agency, for the period (1997-2014).Stationery of the variables was checked by Augmented Dickey-Fuller (ADF) and Phillips Perron (PP) unit roots tests. And also the co-integration
... Show MoreThe goal of this research to identify a set of criteria that can be measured on the basis of which the effectiveness of the application of the Balanced Scorecard in the Jordanian Public Institutions in order to identify the basic requirements to ensure the application of balanced performance measures. The study population consisted of the staff of the Public Institution for Social Security - Irbid of directors of departments and heads of departments and administrative staff, was the use of a random sample of (50) an employee and the employee. The questionnaire was used as a tool to collect data, and as a result of subjecting these standards for the field test and the use of statistical analysis tools to the results of the study c
... Show MoreImposed on foreign oil companies from important sources in the financing of the general budget in most countries of the world income tax is considered as well as be used to achieve political, economic and social goals, and has developed the concept of the tax until it became play an important role in influencing the economic conditions of a country, and the aim of this research is to statement imposed on foreign oil companies operating in Iraq in the financing of the state budget income tax contribution, as well as clarify the contracts type contracts with these companies, which is in favor of Iraq, together with the Income Tax Law No. (19) for the year / 2010, and instructed No. (5) for the year / 2011, which organized the tax process s
... Show MoreHepatitis is one of the diseases that has become more developed in recent years in terms of the high number of infections. Hepatitis causes inflammation that destroys liver cells, and it occurs as a result of viruses, bacteria, blood transfusions, and others. There are five types of hepatitis viruses, which are (A, B, C, D, E) according to their severity. The disease varies by type. Accurate and early diagnosis is the best way to prevent disease, as it allows infected people to take preventive steps so that they do not transmit the difference to other people, and diagnosis using artificial intelligence gives an accurate and rapid diagnostic result. Where the analytical method of the data relied on the radial basis network to diagnose the
... Show MorePraise be to God, Lord of the worlds, and peace and blessings be upon our master Muhammad and his family and companions as follows:
For God Almighty has swapped for every age a group of religious scholars who give news to the narrators, so that they can lie against the Sunnah of the Mustafa, who is among those who memorized Ibn Al-Mulqin, as he followed the ruler in his book Al-Badr Al-Munir in the Hadith of Al-Sharh Al-Kabeer, and our research included two topics, which we explained in the first topic: The sequels in which the teacher's son Al-Malqin disagreed, and we discussed in the second topic: the followings in which Ibn Al-Malqin agreed to rule.
This research included important results, th