Blockchain is an innovative technology that has gained interest in all sectors in the era of digital transformation where it manages transactions and saves them in a database. With the increasing financial transactions and the rapidly developed society with growing businesses many people looking for the dream of a better financially independent life, stray from large corporations and organizations to form startups and small businesses. Recently, the increasing demand for employees or institutes to prepare and manage contracts, papers, and the verifications process, in addition to human mistakes led to the emergence of a smart contract. The smart contract has been developed to save time and provide more confidence while dealing, as well as to cover the security aspects of digital management and to solve negotiation concerns. The smart contract was employed in creating a distributed ledger to eliminate the need for centralization. In this paper, a simple prototype has been implemented for the smart contract integrated with blockchain which is simulated in a local server with a set of nodes. Several security objectives, such as confidentiality, authorization, integrity, and non-repudiation, have been achieved in the proposed system. Besides, the paper discussed the importance of using the Blockchain technique, and how it contributed to the management of transactions in addition to how it was implemented in highly transparent real-estate scenarios. The smart contract was employed in creating a distributed ledger to eliminate the need for centralization. The elliptic-curve public key has been adopted as an alternative for the RSA in a signature generation/verification process and encryption protocol. For secure transactions, The Secure Socket Layer (SSL) also has been adopted as a secure layer in the web browser. The results have been investigated and evaluated from different aspects and the implementation was in a restricted environment. Experiments showed us the complexity of time and cost when using the (ECC) algorithm and using (RSA) algorithm depending on the size and length of the key. So if the size of the key in (ECC) equals (160) bits, and it corresponds to (1024) bits in (RSA), which is equivalent to 40% for (ECC) and 30% for (RSA). As a result, the (ECC) algorithm is complex, its key is smaller and the process of generating the key is faster, so it has achieved a high level of security.
Computational study of three-dimensional laminar and turbulent flows around electronic chip (heat source) located on a printed circuit board are presented. Computational field involves the solution of elliptic partial differential equations for conservation of mass, momentum, energy, turbulent energy, and its dissipation rate in finite volume form. The k-ε turbulent model was used with the wall function concept near the walls to treat of turbulence effects. The SIMPLE algorithm was selected in this work. The chip is cooled by an external flow of air. The goals of this investigation are to investigate the heat transfer phenomena of electronic chip located in enclosure and how we arrive to optimum level for cooling of this chip. These par
... Show MoreThe Arab woman expressed the life of oppression that she suffers from in her masculine environment, as she expressed her linguistic abilities with eloquence and intelligence, as she did not neglect philosophy, wisdom, and exhortation
The Arab woman expressed the life of oppression that she suffers from in her masculine environment, as she expressed her linguistic abilities with eloquence and intelligence, as she did not neglect philosophy, wisdom,
ينقسم الاتجاه الأساسي الذي يجري مناقشته في هذه الورقة إلى مستويين: الأول يركز على تحديد مضمون العلاقة بين الشفافية والفساد، فضلا عن توضيح الدور الذي يمكن أن تؤديه أخلاقيات الأعمال، لتثار التساؤلات هي: هل أن الشفافية والفساد متغيرين مرتبطين معا؟ وهل تؤثر الشفافية في الفساد؟ وهل أن وجود الشفافية كفيل بإزاحة الفساد، أم نحتاج إلى شيء أخر يدعم عملية الشفافية؟ وإذا تم التحدث عن الشفافية كمصطلح بدون وجود مما
... Show MoreStill Financial institutions, including banks, a key target for money launderers to transfer illicit funds to the legitimate funds and by weaknesses in the internal audit procedures applied in the banks or through a lack of legal structure to combat this phenomenon in addition to the procedures by other regulations
T
... Show MoreThe research aims to identify the effect of teaching-learning design based on the constructivism theory on the life skills of middle stage students. The sample consisted of (60) students from one of the middle schools in Baghdad's governorate. The experimental group and control group consisted of 30 students for each group, the research tool was the life skills scale composed of (78) items. The scale proved its validity and reliability, which was found to be (0.85). The results showed a statistically significant difference in life skills between the two groups of research in favor of the experimental group, which studied the educational design according to models of constructivism theory compared to the usual method of teaching.
Abstract
This paper follows the growing interest and continuity of Islamic finance products worldwide, which has encouraged the formulation of financial institutions based on the concepts of Islamic Sharia in many countries of the world and is no longer limited to Islamic countries only, and Not exclusive to Muslims which is due to Islamic finance services and their ability to apply in non-Islamic societies, and perhaps what encouraged the development and progress of this industry Islamic history, which was attended by many different models With the development of trade's share between different countries as well as trips carried out by Muslims
... Show MoreThe media, especially the satellite channels in our time, are one of the most important pillars of daily life, public and private, for society and people, and are considered by sociologists and sociologists as one of the most important factors of social upbringing and the most important, as a result of the technological and technological development of the media as well as increasing their numbers and vertical and horizontal expansion locally, As well as entering into the lives of individuals and people and leading them to important sites within their interests and preferences, not to mention the long time spent exposure to those media and benefit from the programs offered or broadcast. , The problem of this research is that there is a l
... Show MoreA novel fractal design scheme has been introduced in this paper to generate microstrip bandpass filter designs with miniaturized sizes for wireless applications. The presented fractal scheme is based on Minkowski-like prefractal geometry. The space-filling property and self-similarity of this fractal geometry has found to produce reduced size symmetrical structures corresponding to the successive iteration levels. The resulting filter designs are with sizes suitable for use in modern wireless communication systems. The performance of each of the generated bandpass filter structures up to the 2nd iteration has been analyzed using a method of moments (MoM) based software IE3D, which is widely adopted in microwave research and in
... Show MoreMotives for public exposure to specialized sports satellite channels and the gratifications achieved about it - Research presented by (Dr. Dr. Laila Ali Jumaa), Imam Al-Kadhim College (peace be upon him) - Department of Information-2021.
The research aims to know the extent of public exposure to specialized sports satellite channels, and what gratifications are achieved from them, and to reach scientific results that give an accurate description of exposure, motives and gratifications verified by that exposure, and the research objectives are summarized in the following:
- Revealing the habits and patterns of public exposure to specialized sports satelli