Blockchain is an innovative technology that has gained interest in all sectors in the era of digital transformation where it manages transactions and saves them in a database. With the increasing financial transactions and the rapidly developed society with growing businesses many people looking for the dream of a better financially independent life, stray from large corporations and organizations to form startups and small businesses. Recently, the increasing demand for employees or institutes to prepare and manage contracts, papers, and the verifications process, in addition to human mistakes led to the emergence of a smart contract. The smart contract has been developed to save time and provide more confidence while dealing, as well as to cover the security aspects of digital management and to solve negotiation concerns. The smart contract was employed in creating a distributed ledger to eliminate the need for centralization. In this paper, a simple prototype has been implemented for the smart contract integrated with blockchain which is simulated in a local server with a set of nodes. Several security objectives, such as confidentiality, authorization, integrity, and non-repudiation, have been achieved in the proposed system. Besides, the paper discussed the importance of using the Blockchain technique, and how it contributed to the management of transactions in addition to how it was implemented in highly transparent real-estate scenarios. The smart contract was employed in creating a distributed ledger to eliminate the need for centralization. The elliptic-curve public key has been adopted as an alternative for the RSA in a signature generation/verification process and encryption protocol. For secure transactions, The Secure Socket Layer (SSL) also has been adopted as a secure layer in the web browser. The results have been investigated and evaluated from different aspects and the implementation was in a restricted environment. Experiments showed us the complexity of time and cost when using the (ECC) algorithm and using (RSA) algorithm depending on the size and length of the key. So if the size of the key in (ECC) equals (160) bits, and it corresponds to (1024) bits in (RSA), which is equivalent to 40% for (ECC) and 30% for (RSA). As a result, the (ECC) algorithm is complex, its key is smaller and the process of generating the key is faster, so it has achieved a high level of security.
Crocidolomia binotalis (Cb) (Zeller) is one of the main pests of cabbage which is difficult for farmers to control in the Ijen Crater in Indonesia. The demand for cabbage in Indonesia is increasing every year, so intensification efforts are continuously being made. Farmers intensively use synthetic pesticides as the primary control of Cb. The purpose of this study is to examine several control agents that can be used as an alternative to synthetic pesticides. Then, it provides recommendations to Ijen Crater farmers to adapt in reducing the use of synthetic pesticides. The biopesticide used was based on the Nuclear Polyhedrosis Virus strains of Spodoptera litura (SlNPV) and Helicoverpa armigera (HaNPV), botanical pesticides, and
... Show MoreThe bubbled slab, a type of reinforced concrete (RC) slab with plastic voids, is an innovative design that employs a biaxial distribution of voiding formers within the slab to reduce the slab’s self-weight while preserving a load-carrying capacity that is approximately comparable to that of solid slabs. This paper presents a new approach for figuring out the effective critical shear perimeter of voided slabs using the reduced-volume concept of concrete. This approach aims to reduce the coefficient of variation of the current design standards, namely the ACI 318-19 and Eurocode 2, for assessing the slabs’ resistance to punching shear. Our experimental program investigated the impact of voiding former patterns and the location of
... Show MoreThe study aims to integrate the visually impaired people into the art connoisseur community through producing special print artworks to enable the visually impaired people to use their other senses to feel artworks by using artistic printing techniques through adding some prominent materials to the printing colors or making an impact that visually impaired people can perceive using their other senses. This study also aims to set up art exhibitions that display tangible works that can enable visually impaired people to feel artwork and understand its elements to enable them to feel it through other senses.
The study follows the experimental method, through using artistic printing techniques, which allow printing with prominent textur
This work describes an experimental setup to evaluate the photodynamictoxicity of 650 nm diode laser and 532 nm Frequency-doubled Q-Switched Nd:YAG laser on the growth of Candida albicans as well as the potential fungicidal effect when combining the laser irradiation with specific photosensitizers namely methylene blue, toluidine blue, acridine orange and safranin O. In this study the findings showed that the number of colony-forming units per millilitre (CFU/ml) of C. albicans decreased with increasing exposure time. In particular in the case of the frequency doubled Nd:YAG laser combined with safranin O, the best lethal effect occurred at 11 minutes exposure time with 2.26 J/cm² energy density (89.18% reduction) in comparison with the
... Show Moreorder to increase the level of security, as this system encrypts the secret image before sending it through the internet to the recipient (by the Blowfish method). As The Blowfish method is known for its efficient security; nevertheless, the encrypting time is long. In this research we try to apply the smoothing filter on the secret image which decreases its size and consequently the encrypting and decrypting time are decreased. The secret image is hidden after encrypting it into another image called the cover image, by the use of one of these two methods" Two-LSB" or" Hiding most bits in blue pixels". Eventually we compare the results of the two methods to determine which one is better to be used according to the PSNR measurs
Most companies use social media data for business. Sentiment analysis automatically gathers analyses and summarizes this type of data. Managing unstructured social media data is difficult. Noisy data is a challenge to sentiment analysis. Since over 50% of the sentiment analysis process is data pre-processing, processing big social media data is challenging too. If pre-processing is carried out correctly, data accuracy may improve. Also, sentiment analysis workflow is highly dependent. Because no pre-processing technique works well in all situations or with all data sources, choosing the most important ones is crucial. Prioritization is an excellent technique for choosing the most important ones. As one of many Multi-Criteria Decision Mak
... Show MorePMMA (Poly methyl methacrylate) is considered one of the most commonly used materials in denture base fabrication due to its ideal properties. Although, a major problem with this resin is the frequent fractures due to heavy chewing forces which lead to early crack and fracture in clinical use. The addition of nanoparticles as filler performed in this study to enhance its selected mechanical properties. The Nano-additive effect investigated in normal circumstances and under a different temperature during water exposure. First, tests applied on the prepared samples at room temperature and then after exposure to water bath at (20, 40, 60) C° respectively. SEM, PSD, EDX were utilized for samples evaluation in this study. Flexural
... Show MoreTotal Quality Assurance Concept have appeared in Higher Education Institutions as a result of the continuous criticism for the lower quality of the outputs of these institutions and their inappropriacy to the needs of the job market. The faculty, i.e. teaching staff member, is one of the most important output for his/her responsibility to achieve the stated goals in higher education. This represents a problem that may influence the construction of society which has to limit his tasks, responsibilities, and competencies that should be found in a faculty, and evaluating his teaching profession in light of the prerequisites of the century to become an input to achieve quality assurance in Higher Education. Therefore, the present study aims
... Show MoreProteus mirabilis is considered as a third common cause of catheter-associated urinary tract infection, with urease production, the potency of catheter blockage due to the formation of biofilm formation is significantly enhanced. Biofilms are major virulence factors expressed by pathogenic bacteria to resist antibiotics; in this concern the need for providing new alternatives for antibiotics is getting urgent need, This study aimed to explore whether green synthesized zinc oxide nanoparticles (ZnO NPs) can function as an anti-biofilm agent produced by P.mirabilis. Bacterial cells were capable of catalyzing the biosynthesis process by producing reductive enzymes. The nanoparticles were synthesized from cell free
... Show More
Abstract
Due to the lack of previous statistical study of the behavior of payments, specifically health insurance, which represents the largest proportion of payments in the general insurance companies in Iraq, this study was selected and applied in the Iraqi insurance company.
In order to find the convenient model representing the health insurance payments, we initially detected two probability models by using (Easy Fit) software:
First, a single Lognormal for the whole sample and the other is a Compound Weibull for the two Sub samples (small payments and large payments), and we focused on the compoun
... Show More