Blockchain is an innovative technology that has gained interest in all sectors in the era of digital transformation where it manages transactions and saves them in a database. With the increasing financial transactions and the rapidly developed society with growing businesses many people looking for the dream of a better financially independent life, stray from large corporations and organizations to form startups and small businesses. Recently, the increasing demand for employees or institutes to prepare and manage contracts, papers, and the verifications process, in addition to human mistakes led to the emergence of a smart contract. The smart contract has been developed to save time and provide more confidence while dealing, as well as to cover the security aspects of digital management and to solve negotiation concerns. The smart contract was employed in creating a distributed ledger to eliminate the need for centralization. In this paper, a simple prototype has been implemented for the smart contract integrated with blockchain which is simulated in a local server with a set of nodes. Several security objectives, such as confidentiality, authorization, integrity, and non-repudiation, have been achieved in the proposed system. Besides, the paper discussed the importance of using the Blockchain technique, and how it contributed to the management of transactions in addition to how it was implemented in highly transparent real-estate scenarios. The smart contract was employed in creating a distributed ledger to eliminate the need for centralization. The elliptic-curve public key has been adopted as an alternative for the RSA in a signature generation/verification process and encryption protocol. For secure transactions, The Secure Socket Layer (SSL) also has been adopted as a secure layer in the web browser. The results have been investigated and evaluated from different aspects and the implementation was in a restricted environment. Experiments showed us the complexity of time and cost when using the (ECC) algorithm and using (RSA) algorithm depending on the size and length of the key. So if the size of the key in (ECC) equals (160) bits, and it corresponds to (1024) bits in (RSA), which is equivalent to 40% for (ECC) and 30% for (RSA). As a result, the (ECC) algorithm is complex, its key is smaller and the process of generating the key is faster, so it has achieved a high level of security.
There has been a growing interest in the use of chaotic techniques for enabling secure communication in recent years. This need has been motivated by the emergence of a number of wireless services which require the channel to provide very low bit error rates (BER) along with information security. As more and more information is transacted over wireless media, there has been increasing criminal activity directed against such systems. This paper investigates the feasibility of using chaotic communications over Multiple-Input-Multiple-Output (MIMO) channels. We have studied the performance of differential chaos shift keying (DCSK) with 2×2 Alamouti scheme and 2×1 Alamouti scheme for different chaotic maps over additive white Gaussian noise (
... Show MoreThe study aimed to identify the reality of the application of the organizational equity empowerment at the Jordanian government institutions from the viewpoint of women employees in terms of each of the (delegation equity, training equity, appraisal equity, join in committees equity, participation in decision-making equity), and the impact of non-application of equity empowerment on performance.
Population of the study amounted (986) women employee, while the researcher distributed (340) questionnaire through a randomly sample method.
The study used the questionnaire as a tool to collect the data. And to ensure the reliability of the questionnaire has been calculated Cronbach's co
... Show MoreAttacking a transferred data over a network is frequently happened millions time a day. To address this problem, a secure scheme is proposed which is securing a transferred data over a network. The proposed scheme uses two techniques to guarantee a secure transferring for a message. The message is encrypted as a first step, and then it is hided in a video cover. The proposed encrypting technique is RC4 stream cipher algorithm in order to increase the message's confidentiality, as well as improving the least significant bit embedding algorithm (LSB) by adding an additional layer of security. The improvement of the LSB method comes by replacing the adopted sequential selection by a random selection manner of the frames and the pixels wit
... Show MoreABSTRACT
The research aims to study the effect of the commodity dumping phenomenon that Iraq suffered after 2003 on the consumption pattern of individuals, towards the acquisition of non-essential goods (luxury). To achieve our goal we relied on the questionnaire as a main tool for obtaining information related to the research, and it was distributed on a random sample of consumers in the city of Baghdad with 250 questionnaires. The answers of the research sample were analyzed using the statistical program (SPSS). The percentage weights and the factorial analysis method were used also to arrange the variables that affected on changing consumption patterns. The research reached a set of conclusions:
... Show MoreBackground: Osteoporosis is a skeletal defect manifested by a reduction of bone strength as a result of reduced bone mass to the extent that there is a higher risk of fracture even on minor trauma. Hysterectomy in a premenopausal woman is a well known cause of ovarian failure resulting in an increased risk of osteoporosis.
Objective : To clarify bisphosphonate's preventive effect on osteopenia and osteoporosis in premenopausal women after hysterectomy.
Type of the study: Cross –sectional study.
Method: 84 premenopausal females post hysterectomy aged between 40 – 50 years, were enrolled in this randomized controlled double blinded trail a
... Show MoreThe aim of this paper is to present a new methodology to find the private key of RSA. A new initial value which is generated from a new equation is selected to speed up the process. In fact, after this value is found, brute force attack is chosen to discover the private key. In addition, for a proposed equation, the multiplier of Euler totient function to find both of the public key and the private key is assigned as 1. Then, it implies that an equation that estimates a new initial value is suitable for the small multiplier. The experimental results show that if all prime factors of the modulus are assigned larger than 3 and the multiplier is 1, the distance between an initial value and the private key
... Show MoreThis paper proposes feedback linearization control (FBLC) based on function approximation technique (FAT) to regulate the vibrational motion of a smart thin plate considering the effect of axial stretching. The FBLC includes designing a nonlinear control law for the stabilization of the target dynamic system while the closedloop dynamics are linear with ensured stability. The objective of the FAT is to estimate the cubic nonlinear restoring force vector using the linear parameterization of weighting and orthogonal basis function matrices. Orthogonal Chebyshev polynomials are used as strong approximators for adaptive schemes. The proposed control architecture is applied to a thin plate with a large deflection that stimulates the axial loadin
... Show MoreThe Current Research Seeks To Identify The Possibility Of Unifying The Private Drinking Stations In The Session In A Single Station In Order To Prevent Pollution. In Order To Achieve The Goal Of The Current Research, The Researcher Followed The Descriptive Survey Approach. The Researcher Identified The Research Community As Working In Institutions Related To Drinking Water Filtering In The Governorate Of Baghdad, And In Order To Collect Data And Information Necessary To Answer The Study's Question (Is It Possible To Supply Private Drinking Stations With One Station?) Researcher Designed A Questionnaire Consisting Of (10) Paragraphs Measuring Aspects Of This Topic, And Applied It To A Sample Of Employees And Workers Amounted To (200) People,
... Show MoreThis work deals with the effect of adding aluminum nanoparticles on the mechanical properties, micro-hardness and porosity of memory-shape alloys (Cu-Al-Ni). These alloys have wide applications in various industrial fields such as (high damping compounds and self-lubricating applications). The samples are manufactured using the powder metallurgy method, which involved pressing in only one direction and sintered in a furnace surrounded by an inert gas. Four percentages (0%, 5%, 10%, and 15%) of aluminum nanoparticles were fabricated, which depended on the weight of aluminum powder (13%) in the sample under study. To find out which phase is responsible for the reliability of the formation of this type of alloy and its porosity, X-ray diffr
... Show MoreAW Ali T, Journal of the Faculty of Medicine, 2015 - Cited by 3