Blockchain is an innovative technology that has gained interest in all sectors in the era of digital transformation where it manages transactions and saves them in a database. With the increasing financial transactions and the rapidly developed society with growing businesses many people looking for the dream of a better financially independent life, stray from large corporations and organizations to form startups and small businesses. Recently, the increasing demand for employees or institutes to prepare and manage contracts, papers, and the verifications process, in addition to human mistakes led to the emergence of a smart contract. The smart contract has been developed to save time and provide more confidence while dealing, as well as to cover the security aspects of digital management and to solve negotiation concerns. The smart contract was employed in creating a distributed ledger to eliminate the need for centralization. In this paper, a simple prototype has been implemented for the smart contract integrated with blockchain which is simulated in a local server with a set of nodes. Several security objectives, such as confidentiality, authorization, integrity, and non-repudiation, have been achieved in the proposed system. Besides, the paper discussed the importance of using the Blockchain technique, and how it contributed to the management of transactions in addition to how it was implemented in highly transparent real-estate scenarios. The smart contract was employed in creating a distributed ledger to eliminate the need for centralization. The elliptic-curve public key has been adopted as an alternative for the RSA in a signature generation/verification process and encryption protocol. For secure transactions, The Secure Socket Layer (SSL) also has been adopted as a secure layer in the web browser. The results have been investigated and evaluated from different aspects and the implementation was in a restricted environment. Experiments showed us the complexity of time and cost when using the (ECC) algorithm and using (RSA) algorithm depending on the size and length of the key. So if the size of the key in (ECC) equals (160) bits, and it corresponds to (1024) bits in (RSA), which is equivalent to 40% for (ECC) and 30% for (RSA). As a result, the (ECC) algorithm is complex, its key is smaller and the process of generating the key is faster, so it has achieved a high level of security.
Considering the science of speech in the light of its purposes is an accurate scientific study that looks at it from its reality in which it originated, and its topic that it dealt with and its goals that it sought, and it follows its main course in the directions of approving the belief and inferring it, and repelling the objections to it, and this study comes to show the realism of the science of speech in its emergence Its subject and method, since its launch was from the reality of the Islamic nation and based on its intellectual needs, so its presence was necessary in the life of the Islamic nation because of its role in facing the challenges faced by the Islamic faith, and the dangers it was exposed to as a result of the intellectu
... Show MoreIn pre- Islamic poetry, there are a lot of words that indicate
peacefulness of one sort of another, in addition to the inspirations of semantic
modeling in which the poet sets himself in various horizons.
Among these words: brother, comrade, friend, companion, lover,
people, prince, home, land, country, blessing, honesty, contract, company,
justice, thankfulness, forgiveness, pardoning, guest, goodness, faithfulness,
silence, death, peace,….
In addition, there are their derivatives from various aspects that indicate
peacefulness either directly or indirectly.
يهدف البحث إلى دراسة التحفظات على اتفاقية سيداو (الدول العربية أنموذجًا)، حيث يُعد نظام التحفظ على الاتفاقيات الدولية أحد المظاهر القانونية الحديثة في مجال العلاقات الدولية، والذي يقرّ بحق الدول في إبداء التحفظ على بعض أحكام الاتفاقيات الدولية، وفقًا للأحكام العامة التي حددتها المواد (19-23) من اتفاقية فيينا لقانون المعاهدات لعام 1969. وإذا كان حق الدول في التحفظ مكفولًا دوليًا، فإن الإشكالية القانونية تكمن في
... Show MoreThe aim of the current research is to explore the health, psychological, and social implications of Internet addiction. Internet addiction is a new type of addiction, which negatively affects an individual’s life and creates social problems, psychological and nervous disorders. The research is divided into three sections: The first section is devoted to the definition of the research and includes the research problem, its importance in addition to the objectives, and the search terms were defined in it. The second section included the concept of addiction on the Internet and the causes, symptoms of addiction, forms, and previous studies were reviewed. As for the third topic, it deals with the theories explaining Internet addiction and
... Show Moreان التحول في الحياة الاقتصادية الناتج عن التقدم التكنولوجي وتقنية المعلومات في مجالات الفضاء والتقدم في الاتصالات السلكية واللاسلكية والالكترونيات الدقيقة مكنت الشركات من ارسال كميات هائلة من البيانات بتكاليف منخفضة.
وان انتشار الشركات متعددة الجنسبة والتي سعت لتحقيق السيطرة على اقتصاديات العالم من خلال فروعها المنتشرة فتحتاج الى نظم للانتاج والتكاليف ونظم للمعلومات الادارية والمحاس
... Show MoreConcealment of the Offenders:
Its Conceptions, Evidence, Objectives, Criteria
This study discusses the concealment of the offenders, but also emphasize the importance of clarifying this concept. Furthermore, it differentiates between this concept and other relevant concepts. Moreover, this study explains that the ruling of the concealment of the offenders is required by sharia. This is evident by many proofs of the Quran and the Sunnah in addition to being in line with the sharia’s objectives.
Additionally, the study mentions several advantages to the concealment of an offender and the disadvantages of reporting an offender. Examples include ensuring the Islamic community cohesion, encouraging offe
... Show More