Blockchain is an innovative technology that has gained interest in all sectors in the era of digital transformation where it manages transactions and saves them in a database. With the increasing financial transactions and the rapidly developed society with growing businesses many people looking for the dream of a better financially independent life, stray from large corporations and organizations to form startups and small businesses. Recently, the increasing demand for employees or institutes to prepare and manage contracts, papers, and the verifications process, in addition to human mistakes led to the emergence of a smart contract. The smart contract has been developed to save time and provide more confidence while dealing, as well as to cover the security aspects of digital management and to solve negotiation concerns. The smart contract was employed in creating a distributed ledger to eliminate the need for centralization. In this paper, a simple prototype has been implemented for the smart contract integrated with blockchain which is simulated in a local server with a set of nodes. Several security objectives, such as confidentiality, authorization, integrity, and non-repudiation, have been achieved in the proposed system. Besides, the paper discussed the importance of using the Blockchain technique, and how it contributed to the management of transactions in addition to how it was implemented in highly transparent real-estate scenarios. The smart contract was employed in creating a distributed ledger to eliminate the need for centralization. The elliptic-curve public key has been adopted as an alternative for the RSA in a signature generation/verification process and encryption protocol. For secure transactions, The Secure Socket Layer (SSL) also has been adopted as a secure layer in the web browser. The results have been investigated and evaluated from different aspects and the implementation was in a restricted environment. Experiments showed us the complexity of time and cost when using the (ECC) algorithm and using (RSA) algorithm depending on the size and length of the key. So if the size of the key in (ECC) equals (160) bits, and it corresponds to (1024) bits in (RSA), which is equivalent to 40% for (ECC) and 30% for (RSA). As a result, the (ECC) algorithm is complex, its key is smaller and the process of generating the key is faster, so it has achieved a high level of security.
An investigation was conducted for the improvement of viscosity index of light lubricating oil fraction (40 stock)
obtained from vacuum distillation unit of lube oil plant of Daura Refinery, using solvent extraction process.
In this study furfural solvent was used to extract the undesirable materials which reduce the viscosity index of raw
lubricating oil fraction.
The studied effecting variables of extraction were extraction temperature range from 70 to 110°C, and solvent to oil
ratio range from 1:1 to 4:1 (wt/wt).
The n-d-M method was used for calculation of carbon distribution and structural group analysis of the raffinate
produced from furfural extraction.
Also the three component phase diagram for a mixed-ba
Abstract
This research aims to examine the correlation and the influence of Authentic Leadership on the contextual performance as a dependent variable, in the departments and Division of the iraqi Ministry of Foreign Affairs To try out with a number of recommendations that contribute to raising the level of contextual performance in the Ministry. Starting from the importance of research in public organizations and its Role in society, the researcher adopted the descriptive analytical approach in accomplishing this research, The 99 people responded exclusively comprehensively, based on questionnaire that is include 28-item, using interviews and field observations as
... Show MoreAbstract The present study on the prevalence of intestinal parasitic infection from July 2003 to July 2004 ,was conducted among children aged(less than 5 -14 )years attending AL-Daura Health Centre in Baghdad City .(350) specimen were choosen randomly and examined, 160(45.7%) of these were infected , 140 (87.5%) harboured one parasite while 20 (12.5%) harboured more than one parasite.190 (54.3%) were non infected with any of intestinal parasite . It was observed that the most common intestinal protozoa among children is Giardia lamblia, followed by Entamoeba histolytica and Blastocystis hominis with pre
This paper is concerned with finding solutions to free-boundary inverse coefficient problems. Mathematically, we handle a one-dimensional non-homogeneous heat equation subject to initial and boundary conditions as well as non-localized integral observations of zeroth and first-order heat momentum. The direct problem is solved for the temperature distribution and the non-localized integral measurements using the Crank–Nicolson finite difference method. The inverse problem is solved by simultaneously finding the temperature distribution, the time-dependent free-boundary function indicating the location of the moving interface, and the time-wise thermal diffusivity or advection velocities. We reformulate the inverse problem as a non-
... Show MoreChlorine disinfection is a globally used method to ensure the safety of drinking water. However, it has not always been successful against viruses and, therefore, it is important to find new methods to disinfect water. Seventeen different coliphages were isolated from the treated municipal wastewater. These coliphages and MS2 were treated with different dosages of chlorine in drinking water, and a combined chlorine/ultraviolet irradiation treatment for the chlorine-resistant coliphages. Chlorine disinfection with 0.3–0.5 mg/L total chlorine (free Cl-dosage 0.12–0.21 mg/L) for 10 min achieved 2.5–5.7 Log10-reductions for 11 sensitive coliphages. The six most resistant coliphages showed no reduction with these chlorine concentra
... Show MoreA mathematical eco-epidemiological model consisting of harvested prey–predator system involving fear and disease in the prey population is formulated and studied. The prey population is supposed to be separated into two groups: susceptible and infected. The susceptible prey grows logistically, whereas the infected prey cannot reproduce and instead competes for the environment’s carrying capacity. Furthermore, the disease is transferred through contact from infected to susceptible individuals, and there is no inherited transmission. The existence, positivity, and boundedness of the model’s solution are discussed. The local stability analysis is carried out. The persistence requirements are established. The global behavior of th
... Show MoreThe nephrotoxicity induced by methotrexate is a severe condition that greatly affects its therapeutic potential and has a significant inflammatory component. Fimasartan is an angiotensin receptor blocker that offers organ-protective effects and may be useful in mitigating renal injury. The present study explored the anti-inflammatory potential of two doses of fimasartan against methotrexate-mediated nephrotoxicity. Albino rats were intraperitoneally administered a single methotrexate (20 mg/kg). Intraperitoneal treatment with fimasartan (5 or 10 mg/kg/day) was initiated on day two after methotrexate injection and continued for seven consecutive days. Methotrexate significantly increased serum urea, creatinine, and NGAL concentrations. It al
... Show More