The consensus algorithm is the core mechanism of blockchain and is used to ensure data consistency among blockchain nodes. The PBFT consensus algorithm is widely used in alliance chains because it is resistant to Byzantine errors. However, the present PBFT (Practical Byzantine Fault Tolerance) still has issues with master node selection that is random and complicated communication. The IBFT consensus technique, which is enhanced, is proposed in this study and is based on node trust value and BLS (Boneh-Lynn-Shacham) aggregate signature. In IBFT, multi-level indicators are used to calculate the trust value of each node, and some nodes are selected to take part in network consensus as a result of this calculation. The master node is chosen from among them based on which node has the highest trust value, it transforms the BLS signature process into the information interaction process between nodes. Consequently, communication complexity is reduced, and node-to-node information exchange remains secure. The simulation experiment findings demonstrate that the IBFT consensus method enhances transaction throughput rate by 61% and reduces latency by 13% when compared to the PBFT algorithm.
تناول البحث اثر النساء في البيت العباسي وتأثيرهن الثقافي والعلمي في التراث البغدادي ، وانعكاسه على الواقع الاجتماعي الذي يعد بحد ذاته مظهر من مظاهر الانسجام والتلاحم بين الماضي والحاضر إذ تركن أثرا بارزا في الحضارة والعلم وأسهمن بصورة مباشره او غير مباشره في دعم وتطور الحضارة العربية الإسلامية .
الشيخ الحاج محمد الأمين، من الشخصيات التي كتبت بعلامات بارزة تاريخ شعبها والمنطقة، من خلال مقاومة الاحتلال الفرنسي الصليبي في السودان الغربي، ونشره الاسلام بين القبائل الوثنية، القاطنة هناك و قيادة حركة قومية إسلامية لإعادة أمجاد الشعب السراكولا ،وإحياء إمبراطورية غانا الإسلامية والتي كانت تشكل الجزء الأغلب من السودان الغربي.
The current study aims to investigate the second cycle students’ motives for using electronic games in Oman. The sample consisted of (570) students, (346 males and 224 females). The participants completed an open-ended question which was analyzed based on ground theory. The results showed that (46.820%) of the males and (77.678) of the females played electronic games for pleasure, entertainment, and fun. This first category of motivation got the highest percentage of frequency (58.947%). The motive to become a hacker, a popular YouTuber got the lowest percentage (2.280%). Other students’ motives toward playing electronic games included: filling the leisure time, overcoming boredom, feeling adventures, getting science fiction and chal
... Show MoreGraph is a tool that can be used to simplify and solve network problems. Domination is a typical network problem that graph theory is well suited for. A subset of nodes in any network is called dominating if every node is contained in this subset, or is connected to a node in it via an edge. Because of the importance of domination in different areas, variant types of domination have been introduced according to the purpose they are used for. In this paper, two domination parameters the first is the restrained and the second is secure domination have been chosn. The secure domination, and some types of restrained domination in one type of trees is called complete ary tree are determined.
This search aimed to show a series of converses that our prophet [peace be upon him] call ,some of them , (Kufraa) , and explain the meaning of (AI-kufr) that called on some works , so does it mean the apparent part or the pronunciation of(Al-Kufr) has another meanings ?
يأخذ هذا النوع من الدراسات أهميته في مجال الدراسات التاريخية لاسيما انه يقوم على أساس البحث والتقصي عن بعض الظواهر في المعاجم كونها تمثل المصدر الأساسي الذي وجدنا فيه الجزء الأعظم من تلك المادة المفقودة لكتاب النبات لابو حنيفة الدينوري.
In regression testing, Test case prioritization (TCP) is a technique to arrange all the available test cases. TCP techniques can improve fault detection performance which is measured by the average percentage of fault detection (APFD). History-based TCP is one of the TCP techniques that consider the history of past data to prioritize test cases. The issue of equal priority allocation to test cases is a common problem for most TCP techniques. However, this problem has not been explored in history-based TCP techniques. To solve this problem in regression testing, most of the researchers resort to random sorting of test cases. This study aims to investigate equal priority in history-based TCP techniques. The first objective is to implement
... Show MoreThe aim of this paper is to present a new methodology to find the private key of RSA. A new initial value which is generated from a new equation is selected to speed up the process. In fact, after this value is found, brute force attack is chosen to discover the private key. In addition, for a proposed equation, the multiplier of Euler totient function to find both of the public key and the private key is assigned as 1. Then, it implies that an equation that estimates a new initial value is suitable for the small multiplier. The experimental results show that if all prime factors of the modulus are assigned larger than 3 and the multiplier is 1, the distance between an initial value and the private key
... Show More