The consensus algorithm is the core mechanism of blockchain and is used to ensure data consistency among blockchain nodes. The PBFT consensus algorithm is widely used in alliance chains because it is resistant to Byzantine errors. However, the present PBFT (Practical Byzantine Fault Tolerance) still has issues with master node selection that is random and complicated communication. The IBFT consensus technique, which is enhanced, is proposed in this study and is based on node trust value and BLS (Boneh-Lynn-Shacham) aggregate signature. In IBFT, multi-level indicators are used to calculate the trust value of each node, and some nodes are selected to take part in network consensus as a result of this calculation. The master node is chosen from among them based on which node has the highest trust value, it transforms the BLS signature process into the information interaction process between nodes. Consequently, communication complexity is reduced, and node-to-node information exchange remains secure. The simulation experiment findings demonstrate that the IBFT consensus method enhances transaction throughput rate by 61% and reduces latency by 13% when compared to the PBFT algorithm.
The recent escalation in Southeast Asia showed that the region is on the verge of political and economic crises through the United States and its allies imposing economic sanctions against China, and a military escalation that may begin with China’s invasion of Taiwan, especially since two-thirds of the American forces in the world are located in the Taiwan Strait and the South China Sea.
The United States claims that it is ready to defend the island of Taiwan in the event of the start of Chinese military operations, but the reality shows that the United States supports Taiwan militarily by equipping it with modern weapons to defend itself. Supporting Taiwan economically by engaging it in trade agreements with US allies in the r
... Show MoreThe researcher of human history finds that the first social relations on earth were represented by the violence of Adam, peace be upon him, Cain and Abel. Violence has been a phenomenon of life and society. The history of history is full of all forms of violence and its forms. It speaks of cruelty, oppression and states. History began, in some of its chapters, written with the blood of the victims. It is a testimony to the cruelty of human beings. His human nature and his sin have played a major role that can not be overlooked in the development of important and fundamental developments in some historical turning points where violence was a necessity for life, and its launching change, renewal and reform, and major revolutions in human h
... Show MoreScheduling Timetables for courses in the big departments in the universities is a very hard problem and is often be solved by many previous works although results are partially optimal. This work implements the principle of an evolutionary algorithm by using genetic theories to solve the timetabling problem to get a random and full optimal timetable with the ability to generate a multi-solution timetable for each stage in the collage. The major idea is to generate course timetables automatically while discovering the area of constraints to get an optimal and flexible schedule with no redundancy through the change of a viable course timetable. The main contribution in this work is indicated by increasing the flexibility of generating opti
... Show MoreBreast cancer is the most repeatedly detected cancer category and the second reason cause of cancer-linked deaths among women worldwide. Tumor bio-indictor is a term utilized to describe possible indicators for carcinoma diagnosis, development and progression. The goal of this study is to evaluate part of some cytokines and biomarkers for both serum and saliva samples in breast cancer then estimate their potential value in the early diagnosis of breast cancer by doing more researches in saliva, and utilizing saliva instead of blood (serum and plasma) in sample collection from patients. Serum and salivary samples were taken from 72 patients with breast cancer and 45 healthy controls, in order to investigate the following
... Show Moreمن أجل فهم دور سلطنة عُمان في المفاوضات الإقليمية والوساطة وحل النزاعات يجب تقدير سياستها الخارجية، والتي سيتم تقييمها من أجل فهم كيفية نشأتها وتشكلها وأثر ذلك على مواقفها السياسية طوال سنوات حكم السلطان الراحل قابوس بن سعيد. وتقع عُمان في منطقة مضطربة، وقد طُلب منها في عدة مناسبات أن تعمل كمفاوض أو وسيط في الصراعات الإقليمية. سيبحث هذا البحث في كيفية قيام السلطنة بالوساطة الدولية، خاصة في الصراع الأمريكي
... Show Moreتحقق القراءةُ التَّناصيَّة قيمة موضوعيَّة للدرسِ النَّقديّ المعاصر؛ بمؤثراتها الثَّقافيَّة، والمعرفيَّة، لأنَّ الإبداعَ من سمات التُّراث الشِّعري في العصر الوسيط، وهو مسرحٌ لتداخلات نصِّيَّة مع مصادر متعددة دينيَّة، وأدبيَّة، وتاريخيَّة أداء ومضامين؛ يأتي اختيارُ (التَّناص مع الحديث النَّبوي في شعر صفيّ الدِّين الحلّي)؛ بوصفه امتدادًا شعريَّا أصيلًا لحضارة راقية معطاء
... Show MoreData Driven Requirement Engineering (DDRE) represents a vision for a shift from the static traditional methods of doing requirements engineering to dynamic data-driven user-centered methods. Data available and the increasingly complex requirements of system software whose functions can adapt to changing needs to gain the trust of its users, an approach is needed in a continuous software engineering process. This need drives the emergence of new challenges in the discipline of requirements engineering to meet the required changes. The problem in this study was the method in data discrepancies which resulted in the needs elicitation process being hampered and in the end software development found discrepancies and could not meet the need
... Show MoreThe study aims at investigating the effectiveness of the Virtual Library Technology, in developing the achievement of the English Language Skills in the Center of Development and Continuous Education, in comparison with the individual learning via personal computer to investigate the students' attitude towards the use of both approaches. The population of the study includes the participants in the English Language course arranged in the Center. The sample includes 60 students who were randomly chosen from the whole population (participants in English Courses for the year 2009-2010). The sample is randomly chosen and divided into two experimental groups. The first group has learned through classroom technology; while the other group has l
... Show MoreSoftware testing is a vital part of the software development life cycle. In many cases, the system under test has more than one input making the testing efforts for every exhaustive combination impossible (i.e. the time of execution of the test case can be outrageously long). Combinatorial testing offers an alternative to exhaustive testing via considering the interaction of input values for every t-way combination between parameters. Combinatorial testing can be divided into three types which are uniform strength interaction, variable strength interaction and input-output based relation (IOR). IOR combinatorial testing only tests for the important combinations selected by the tester. Most of the researches in combinatorial testing appli
... Show MoreThis paper aims to prove an existence theorem for Voltera-type equation in a generalized G- metric space, called the -metric space, where the fixed-point theorem in - metric space is discussed and its application. First, a new contraction of Hardy-Rogess type is presented and also then fixed point theorem is established for these contractions in the setup of -metric spaces. As application, an existence result for Voltera integral equation is obtained.