Blockchain is an innovative technology that has gained interest in all sectors in the era of digital transformation where it manages transactions and saves them in a database. With the increasing financial transactions and the rapidly developed society with growing businesses many people looking for the dream of a better financially independent life, stray from large corporations and organizations to form startups and small businesses. Recently, the increasing demand for employees or institutes to prepare and manage contracts, papers, and the verifications process, in addition to human mistakes led to the emergence of a smart contract. The smart contract has been developed to save time and provide more confidence while dealing, as well as to cover the security aspects of digital management and to solve negotiation concerns. The smart contract was employed in creating a distributed ledger to eliminate the need for centralization. In this paper, a simple prototype has been implemented for the smart contract integrated with blockchain which is simulated in a local server with a set of nodes. Several security objectives, such as confidentiality, authorization, integrity, and non-repudiation, have been achieved in the proposed system. Besides, the paper discussed the importance of using the Blockchain technique, and how it contributed to the management of transactions in addition to how it was implemented in highly transparent real-estate scenarios. The smart contract was employed in creating a distributed ledger to eliminate the need for centralization. The elliptic-curve public key has been adopted as an alternative for the RSA in a signature generation/verification process and encryption protocol. For secure transactions, The Secure Socket Layer (SSL) also has been adopted as a secure layer in the web browser. The results have been investigated and evaluated from different aspects and the implementation was in a restricted environment. Experiments showed us the complexity of time and cost when using the (ECC) algorithm and using (RSA) algorithm depending on the size and length of the key. So if the size of the key in (ECC) equals (160) bits, and it corresponds to (1024) bits in (RSA), which is equivalent to 40% for (ECC) and 30% for (RSA). As a result, the (ECC) algorithm is complex, its key is smaller and the process of generating the key is faster, so it has achieved a high level of security.
After the year 2003, Iraq went through multiple waves of violence and at different levels on the security, intellectual, political and social levels. Behind that stood several motives and incentives to enable violence that represented the first axis of research, the most important of which was the political motives that circulated an atmosphere that politics against society and transformed power into a field of political brutality against the individual and the group at once. There are also cultural, intellectual, media and economic motives such as weak cultural independence, poverty, marginalization, unemployment and want, and the absence of a media discourse that rejects violence but incites it, on the other ha
... Show More
The most prominant goal aimed at by contemporary islamic ideology is to present Islam to the whole world as a message of God that establishes for man a supreme civilization to accomplish justice, peace, development and prosperity
This mission is hindered by many obstacles that create Islamic ideology crisis such as loss of Comprehensive unifying vision which led to the loss of correct vision. This resulted in a Weakness of Priority arrangement and national interests a accomplishment.
There is also a problem of the curriculum that teaches Islamic ideology .
Another problem is that of the concept taken from Islamic culture.
Also another Problem Is the lack of understanding of
... Show MoreObjective(s): to determine the effectiveness of instruction intervention upon multipara women's practices to
control stress incontinence.
Methodology: A quasi-experimental study was carried out from (2nd) April, 2010 to 15th June, 2010. Nonprobability
(purposive sample) of (60) multiparous women was selected from Baghdad Teaching Hospital and AlElwia
Maternity Teaching Hospital in Baghdad city, the sample was divided into two groups (30) women were
considered as a study group, and another (30) were considered as the control group. An instructional intervention
was applied on the study group, while the intervention was not applied on control group. A questionnaire was
resolve as a tool of data collection to suit the p
This study investigates the application of hydraulic acid fracturing to enhance oil production in the Mishrif Formation of the Al-Fakkah oilfield due to declining flow rates and wellhead pressures resulting from asphaltene deposition and inadequate permeability. Implementing acid fracturing, an established technique for low-permeability carbonate reserves, was essential due to the inadequacy of prior solvent cleaning and acidizing efforts. The document outlines the protocols established prior to and following the treatment, emphasizing the importance of careful oversight to guarantee safety and efficacy. In the MiniFrac treatment, 150 barrels of #30 cross-linked gel were injected at 25 barrels per minute, followed by an overflush wi
... Show MoreOwing to high antibacterial resistance of Pseudomonas aeruginosa, it could be considered as the main reason behind the nosocomial infections. P. aeruginosa has a well-known biofilm forming ability. The expression of polysaccharide encoding locus (pelA gene) by P. aeruginosa is essential for this ability. The purpose of the current research was to determine the biofilm formation in P. aeruginosa isolated from clinical samples and to evaluate the role of the selected PelA gene in biofilm formation using PCR method in Iraqi patients. Results revealed that 24 (96%) isolates were found to have the ability to form biofilm that was remarkably related to gentamicin resistance. Moreover, the pelA gene was found in all biofilm-producers. In c
... Show More
