Blockchain is an innovative technology that has gained interest in all sectors in the era of digital transformation where it manages transactions and saves them in a database. With the increasing financial transactions and the rapidly developed society with growing businesses many people looking for the dream of a better financially independent life, stray from large corporations and organizations to form startups and small businesses. Recently, the increasing demand for employees or institutes to prepare and manage contracts, papers, and the verifications process, in addition to human mistakes led to the emergence of a smart contract. The smart contract has been developed to save time and provide more confidence while dealing, as well as to cover the security aspects of digital management and to solve negotiation concerns. The smart contract was employed in creating a distributed ledger to eliminate the need for centralization. In this paper, a simple prototype has been implemented for the smart contract integrated with blockchain which is simulated in a local server with a set of nodes. Several security objectives, such as confidentiality, authorization, integrity, and non-repudiation, have been achieved in the proposed system. Besides, the paper discussed the importance of using the Blockchain technique, and how it contributed to the management of transactions in addition to how it was implemented in highly transparent real-estate scenarios. The smart contract was employed in creating a distributed ledger to eliminate the need for centralization. The elliptic-curve public key has been adopted as an alternative for the RSA in a signature generation/verification process and encryption protocol. For secure transactions, The Secure Socket Layer (SSL) also has been adopted as a secure layer in the web browser. The results have been investigated and evaluated from different aspects and the implementation was in a restricted environment. Experiments showed us the complexity of time and cost when using the (ECC) algorithm and using (RSA) algorithm depending on the size and length of the key. So if the size of the key in (ECC) equals (160) bits, and it corresponds to (1024) bits in (RSA), which is equivalent to 40% for (ECC) and 30% for (RSA). As a result, the (ECC) algorithm is complex, its key is smaller and the process of generating the key is faster, so it has achieved a high level of security.
The human being is a social being and human communication is a fundamental axis in the process of social interaction, and the characteristic of social shyness grows through the interaction of the individual with his environment. Identifying the level of shyness among university students, and identifying the differences in shyness among university students according to specialization (scientific, humanities). In order to achieve the objectives of the research, the researcher prepared a measure of shyness based on Zimbardo's theory, and the components that he identified are the (behavioral, cognitive, and emotional components). The validity and reliability were calculated using the Cronbach's alpha method, reaching (0.94), and the scale in
... Show MoreBACKGROUND: In 1972 complete description of the
inflammation of posterior third of the vocal cords was
done, with barium swallow confirming Gastro
Esophageal Disease [CRED] & subsequent successful
symptomatic treatment with antacid. The possible
association between GERD & chronic laryngitis was
initially known as acid laryngitis .2
*from the Department of ENT, Hawlear Medical College, Hawlear university. Department of ENT, Rezgary Teaching Hospital, Erbil.
Correspondence to :
Dr.Said Mustafa Said
Corespondence Address to : Dr.Said Mustafa Said _ E- mail: Email [email protected] Mob. 07504563829
Recived at : 15 th Dec 2009 Accepted at : 3ed Nov 2010
OBJECTIVE: To record the common presentat
... Show MoreIn the past two decades, maritime transport traffic has increased, especially in the case of container flow. The BAP (Berth Allocation Problem) (BAP) is a main problem to optimize the port terminals. The current manuscript explains the DBAP problems in a typical arrangement that varies from the conventional separate design station, where each berth can simultaneously accommodate several ships when their entire length is less or equal to length. Be a pier, serve. This problem was then solved by crossing the Red Colobuses Monkey Optimization (RCM) with the Genetic Algorithm (GA). In conclusion, the comparison and the computational experiments are approached to demonstrate the effectiveness of the proposed method contrasted with other
... Show MoreAbstract
People are supposed to use language harmoniously and compatibly. However, aggression may characterize much of human communication. Aggression has long been recognized as a negative anti-social issue that prevails in most personal interactions. If it abounds in familial communications, it is more dangerous due to its harmful effects on individuals, and consequently on societies. Aggression refers to all the instances in which we try to get our way without any consideration for others. Moriarty’s novel (2014), Big Little Lies, is argued to represent the patterns of aggressive communications. This study aims to find out the motivations behind aggressive language in familial communication in this
... Show MoreAbstract
That the reduction of costs for products and services provided by economic units is one of the main concerns at the present time to keep pace with competition in the markets, economic units are always striving to stay competitive in a modern business environment and achieve a competitive advantage, (TDABC) in the General Company for Electrical and Electronic Industries / Air cooler engine plant to reduce the costs facing the economic units under the circumstances of the Iraqi environment, especially the industrial, and the need for development events in traditional methods (TDABC) as a technology for reducing costs by relying on time guidelines. The research also concluded that the financial and non-financ
... Show MoreA sense of job security for divorced female teachers is one of the basic and very important requirements for enjoying the mental health that a person needs in order to be positive, balanced and productive. job security is one of the important things that workers must feel not only to ensure interaction and harmony between them and officials, but to ensure their satisfaction and increasing their motivation towards work, as job security is one of the most important indicators of job satisfaction and optimism in life, and it leads to the experience of psychological reassurance, which affects the building of individuals' personalities, the development of their intellectual competence and the identification of their psychological characteristic
... Show MoreAbstract
The current research aims to identify the negotiation behavior of administrative teachers, as well as to identify the significance of the differences in negotiation behavior according to the variables (gender, scientific title, length of service). After confirming the psychometric characteristics of (20) items, the researchers applied the scale to (400) male and female administrative teaching staff who were randomly selected from the University of Baghdad for the academic year 2021/2022. The results showed the following the research sample has a negotiating behavior. There are no statistically significant differences between gender, scientific title, and length of service in the means of negotiating beha
... Show MoreA variety of oxides were examined as additives to a V2O5/Al2O3 catalyst in order to enhance the catalytic performance for the vapor phase oxidation of toluene to benzoic acid. It was found that the modification with MoO3 greatly promoted the little reaction leading to improve catalyst performance in terms of toluene conversion and benzoic acid selectivity. The effect of catalyst surface area, catalyst promoters, reaction temperature, O2/toluene, steam/toluene, space velocity, and catalyst composition to catalyst performance were examined in order to increase the benzoic acid selectivity and yield.
Experimental research was carried out to investigate the performance of CFRP wrapping jackets used for retrofitting twelve square reinforced concrete (CR) column specimens damaged by exposure to fire flame, at different temperatures of 300, 500 and 700ºC, except for two specimens that were not burned. The specimens were then loaded axially till failure after gradual or sudden cooling. The specimens were divided into two groups containing two main reinforcement ratios, ρ= 0.0314 and ρ= 0.0542. This was followed by the retrofitting procedure that included wrapping all the specimens with two layers of CFRP fabric sheets. The test results of the retrofitted specimens showed that the fire damaged RC
... Show More