Blockchain is an innovative technology that has gained interest in all sectors in the era of digital transformation where it manages transactions and saves them in a database. With the increasing financial transactions and the rapidly developed society with growing businesses many people looking for the dream of a better financially independent life, stray from large corporations and organizations to form startups and small businesses. Recently, the increasing demand for employees or institutes to prepare and manage contracts, papers, and the verifications process, in addition to human mistakes led to the emergence of a smart contract. The smart contract has been developed to save time and provide more confidence while dealing, as well as to cover the security aspects of digital management and to solve negotiation concerns. The smart contract was employed in creating a distributed ledger to eliminate the need for centralization. In this paper, a simple prototype has been implemented for the smart contract integrated with blockchain which is simulated in a local server with a set of nodes. Several security objectives, such as confidentiality, authorization, integrity, and non-repudiation, have been achieved in the proposed system. Besides, the paper discussed the importance of using the Blockchain technique, and how it contributed to the management of transactions in addition to how it was implemented in highly transparent real-estate scenarios. The smart contract was employed in creating a distributed ledger to eliminate the need for centralization. The elliptic-curve public key has been adopted as an alternative for the RSA in a signature generation/verification process and encryption protocol. For secure transactions, The Secure Socket Layer (SSL) also has been adopted as a secure layer in the web browser. The results have been investigated and evaluated from different aspects and the implementation was in a restricted environment. Experiments showed us the complexity of time and cost when using the (ECC) algorithm and using (RSA) algorithm depending on the size and length of the key. So if the size of the key in (ECC) equals (160) bits, and it corresponds to (1024) bits in (RSA), which is equivalent to 40% for (ECC) and 30% for (RSA). As a result, the (ECC) algorithm is complex, its key is smaller and the process of generating the key is faster, so it has achieved a high level of security.
The transition states that Iraq economy lived it after 2003, and the change in tools used by monetary policy based on C.B.I law 56 in 2004, under the especially situation for the economy (structural imbalances and the weakness of banking & financial sector).
The monetary policy adopted the inflation targeting policy to mantain the monetary stability in the economy and considered it an incubator for future growth. It used the exchange rate as a nominal anchor to achieve the goal (because the rentier of economy, finance Shallowness & separation between real sector and finance sector, all this cause the normal channel to transfer the effect of monetary policy (interest rate) ineffective.
... Show Morethe first part of the research involves investigate the aspect of the radiation superposed on the one bright soliton pulse propagated on ideal single mode
The Strait of Malacca is one of the waterways of strategic, political, and economic importance. This strait has an increasing importance to its neighboring countries. The Strait of Malacca is very important for China, especially in the field of energy supply security, as the vast ma jority of energy supplies come to China through this strait. China seeks to ensure its security, especially in light of the cooperation of countries that look forward to this strait as well as the United States, and what the United States may cause to China, as many of them are at war with China over the China Sea, not to mention the countries that overlook it. The importance of the research emerges from the basic idea that the strategic importance of the Strait
... Show MoreAbstract The study aims to clarify the value of auditing economic units and how it can be measured, which is one of the most important challenges to matching the Value Relevance of Accounting Information. The problem of the study was identified with questions that revolve around the extent to which it is possible to measure the value of auditing in Iraqi economic units and the extent to which the value of auditing affects the adequacy of accounting information. Through reviewing the studies discussing this topic, it was found that auditing can provide value through the performance of the auditor and adding value to the economic unit subject to audit. The study recommended the need to study the situational factors of auditing, whether exter
... Show MoreOyster mushroom (Pleurotus ostreatus (Jacq. ex Fr.) P. Kumm.) is involved in the destruction of dead wood which is the main place of settlement of several living organisms. After humification, dead wood also becomes an important component of forest soils.
The purpose of the research is to study temperature and moisture conditions of extensive cultivation of oyster mushrooms on various wood substrates. To accomplish this goal, the following tasks were set: to determine the amount of effective stress temperatures and moisture content of substrates and their influence on the appearance of fruiting bodies of the oyster mushroom; to study the features of the extensive culti
... Show MoreThis research deals with the effect of constructive conflict of the organizational identification .These relatively recent subjects have relative importance in the field of administration and they have strong effect in the success of organizations .The objective of this research is to detect the level of the constructive conflict and the organizational identification in the center of The Ministry of Planning. So, two major hypotheses were formulated The first are searched the correlation between the constructive conflict and the organizational identification and it emerged with four sub-hypotheses searched the correlation among every dimension of the constructive conflict with the organizational identification .The second major h
... Show More