Blockchain is an innovative technology that has gained interest in all sectors in the era of digital transformation where it manages transactions and saves them in a database. With the increasing financial transactions and the rapidly developed society with growing businesses many people looking for the dream of a better financially independent life, stray from large corporations and organizations to form startups and small businesses. Recently, the increasing demand for employees or institutes to prepare and manage contracts, papers, and the verifications process, in addition to human mistakes led to the emergence of a smart contract. The smart contract has been developed to save time and provide more confidence while dealing, as well as to cover the security aspects of digital management and to solve negotiation concerns. The smart contract was employed in creating a distributed ledger to eliminate the need for centralization. In this paper, a simple prototype has been implemented for the smart contract integrated with blockchain which is simulated in a local server with a set of nodes. Several security objectives, such as confidentiality, authorization, integrity, and non-repudiation, have been achieved in the proposed system. Besides, the paper discussed the importance of using the Blockchain technique, and how it contributed to the management of transactions in addition to how it was implemented in highly transparent real-estate scenarios. The smart contract was employed in creating a distributed ledger to eliminate the need for centralization. The elliptic-curve public key has been adopted as an alternative for the RSA in a signature generation/verification process and encryption protocol. For secure transactions, The Secure Socket Layer (SSL) also has been adopted as a secure layer in the web browser. The results have been investigated and evaluated from different aspects and the implementation was in a restricted environment. Experiments showed us the complexity of time and cost when using the (ECC) algorithm and using (RSA) algorithm depending on the size and length of the key. So if the size of the key in (ECC) equals (160) bits, and it corresponds to (1024) bits in (RSA), which is equivalent to 40% for (ECC) and 30% for (RSA). As a result, the (ECC) algorithm is complex, its key is smaller and the process of generating the key is faster, so it has achieved a high level of security.
Comprehensive automobile insurance is considered as an important branches in the portfolio of National Insurance Company in Iraq .Due to the continous accidents the company is endeavouring to this market.
The company faces several obstacles and limitations in marketing the policies of this portfolio due to certain factors and influences beyond the control of the company and others internal mainly connected with the reduction of the marketing programmes of the company .
The target of this study is to focus the light upon the interal factors which can be gorerned by the company,confronted and solved.
Comprehensive automobile insurance is considered as an important insurance which is managing by National Insurance Company due to the continuous accidents the company is endeavoring to this market not for trading motives only but also to increase the insurance awareness of people and insurance benefit for other insurance portfolios .On this basis the researcher had chosen her subject ( obstacles in marketing comprehensive automobile Insurance policy ) the company faces several obstacles and limitations in marketing the policies of this portfolio due to certain factors and influences beyond the mainly connected with the reduction of marketing programmes of the company . the aim of this study is to shade the light upon the internal factors
... Show MoreAbstract
The Issue of trade policy is one of the most important topics that researchers have been interested in because of its important role in the economy over the ages. This importance has increased due to the increasing of commercial operations at different levels in both developing and developed countries Foreign trade is one of the means of achieving economic development through the economic surpluses resulting from exports and imports, as it is an important pillar of the economy in general and the Iraqi economy in particular, in light of the transformation process that took place for the Iraqi economy in various fields due to the implement
... Show MoreBiomarkers to detect Alzheimer’s disease (AD) would enable patients to gain access to appropriate services and may facilitate the development of new therapies. Given the large numbers of people affected by AD, there is a need for a low-cost, easy to use method to detect AD patients. Potentially, the electroencephalogram (EEG) can play a valuable role in this, but at present no single EEG biomarker is robust enough for use in practice. This study aims to provide a methodological framework for the development of robust EEG biomarkers to detect AD with a clinically acceptable performance by exploiting the combined strengths of key biomarkers. A large number of existing and novel EEG biomarkers associated with slowing of EEG, reductio
... Show MoreThis study aims to enhance the RC5 algorithm to improve encryption and decryption speeds in devices with limited power and memory resources. These resource-constrained applications, which range in size from wearables and smart cards to microscopic sensors, frequently function in settings where traditional cryptographic techniques because of their high computational overhead and memory requirements are impracticable. The Enhanced RC5 (ERC5) algorithm integrates the PKCS#7 padding method to effectively adapt to various data sizes. Empirical investigation reveals significant improvements in encryption speed with ERC5, ranging from 50.90% to 64.18% for audio files and 46.97% to 56.84% for image files, depending on file size. A substanti
... Show Moreتعد الاسرة إحدى الوحدات الاجتماعية التي تهيئ الجيل المتطلع للحياة وهم الاطفال، وهي المهد الطبيعي للطبقة البشرية التي تباشر وتواجه اثراً هاماً تكوين الشخصية والسلوك الاجتماعي والخلقي ، وهي نقطة الوصول والتفاعل بين البيولوجي والاجتماعي وعنها ينشأ التفاعل النفساني ، وشبكة العلاقات الاسرية والعلاقات الخارجية المجتمعة . ومن خلال معاييرها وقيمها ينشأ السلوك سوياً كان ام مرضياً ( جانحاً ) ، ومشكلة جنوح الا
... Show MoreAbstract
In the present study, composites were prepared by Hand lay-up molding. The composites constituents were epoxy resin as a matrix, 6% volume fractions of glass fibers (G.F) as reinforcement and 3%, 6% volume fractions of preparation natural material (Rice Husk Ash, Carrot Powder, and Sawdust) as filler. Studied the erosion wear behavior and coating by natural wastes (Rice Husk Ash) with epoxy resin after erosion. The results showed the non – reinforced epoxy have lower resistance erosion than natural based material composites and the specimen (Epoxy+6%glass fiber+6%RHA) has higher resistance erosion than composites reinforced with carrot powder and sawdust at 30cm , angle 60
... Show MoreThe objective of the current research is to identify the effective of the suggested instructional design that based on the teaching strategy for understanding in achievement for students(girls) of mathematics in the fifth grads secondary school. To achieve the research goal, the empirical research method is depended. In this method a realistic empirical design pre-test of two equivalent sets to determine the students’ grade is used. The following zero hypotheses is formulated “There is no statistical difference for the faction at 0.05 between the mean grad for the students of the empirical group who studied the subject using the Instructional design based on the teaching strategy for understanding and those who studied the same subje
... Show MoreAs an important resource, entanglement light source has been used in developing quantum information technologies, such as quantum key distribution(QKD). There are few experiments implementing entanglement-based deterministic QKD protocols since the security of existing protocols may be compromised in lossy channels. In this work, we report on a loss-tolerant deterministic QKD experiment which follows a modified “Ping-Pong”(PP) protocol. The experiment results demonstrate for the first time that a secure deterministic QKD session can be fulfilled in a channel with an optical loss of 9 dB, based on a telecom-band entangled photon source. This exhibits a conceivable prospect of ultilizing entanglement light source in real-life fiber-based
... Show More