The consensus algorithm is the core mechanism of blockchain and is used to ensure data consistency among blockchain nodes. The PBFT consensus algorithm is widely used in alliance chains because it is resistant to Byzantine errors. However, the present PBFT (Practical Byzantine Fault Tolerance) still has issues with master node selection that is random and complicated communication. The IBFT consensus technique, which is enhanced, is proposed in this study and is based on node trust value and BLS (Boneh-Lynn-Shacham) aggregate signature. In IBFT, multi-level indicators are used to calculate the trust value of each node, and some nodes are selected to take part in network consensus as a result of this calculation. The master node is chosen from among them based on which node has the highest trust value, it transforms the BLS signature process into the information interaction process between nodes. Consequently, communication complexity is reduced, and node-to-node information exchange remains secure. The simulation experiment findings demonstrate that the IBFT consensus method enhances transaction throughput rate by 61% and reduces latency by 13% when compared to the PBFT algorithm.
The field of translation studies is full of different types of social, economic, political, and literary translations as well as other types related to the life of the human being which are several, but the translation of the grammatical aspects is considered one of the important tasks that both of the translator and interpreter have to take in consideration, so as to get an translation so perfect and so correct as much as possible. One of the grammatical aspects that we have to know how to be translated correctly is the relative pronouns. And it’s about the relative pronouns translation from Spanish to Arabic turns my research work.
In this research, I will consider how to be translated the relat
... Show Moreاهتمت المجتمعات العالمية في الآونة الأخير بفئة الأطفال ، ورعاية الطفولة وذلك لما لها من أهمية كبيرة في مستقبل المجتمع ، وتنميتة وتقدمه . لأنها يعتمد عليها في تقدم وتطور المجتمع فـي جميع المجالات الاقتصادية والاجتماعية والثقافية . ومن هنا ارتبطت الطفولة بالحياة برباط عضوي فالأطفال براعم الحياة ومع هذه البراعم تستمر الحياة لذلك اهتمت دول العالم بوضع البرامج وعقد المؤتمرات من اجل النهوض
... Show Moreأستعمال التحليل الإحصائي لتقصي وضع الطفولة في العراق خلال الفترة 2006-2010
Steganography is the art of secret communication. Its purpose is to hide the presence of information, using, for example, images as covers. The frequency domain is well suited for embedding in image, since hiding in this frequency domain coefficients is robust to many attacks. This paper proposed hiding a secret image of size equal to quarter of the cover one. Set Partitioning in Hierarchal Trees (SPIHT) codec is used to code the secret image to achieve security. The proposed method applies Discrete Multiwavelet Transform (DMWT) for cover image. The coded bit stream of the secret image is embedded in the high frequency subbands of the transformed cover one. A scaling factors ? and ? in frequency domain control the quality of the stego
... Show MoreContent-based image retrieval has been keenly developed in numerous fields. This provides more active management and retrieval of images than the keyword-based method. So the content based image retrieval becomes one of the liveliest researches in the past few years. In a given set of objects, the retrieval of information suggests solutions to search for those in response to a particular description. The set of objects which can be considered are documents, images, videos, or sounds. This paper proposes a method to retrieve a multi-view face from a large face database according to color and texture attributes. Some of the features used for retrieval are color attributes such as the mean, the variance, and the color image's bitmap. In add
... Show MoreThe software-defined network (SDN) is a new technology that separates the control plane from data plane for the network devices. One of the most significant issues in the video surveillance system is the link failure. When the path failure occurs, the monitoring center cannot receive the video from the cameras. In this paper, two methods are proposed to solve this problem. The first method uses the Dijkstra algorithm to re-find the path at the source node switch. The second method uses the Dijkstra algorithm to re-find the path at the ingress node switch (or failed link).
... Show MoreCybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a
... Show Moreيهدف البحث الحالي التعرف على اسناتيجية هرم الافضلية في تحصيل طلاب الصف الثاني المتةسط لمادة الكيمياء ولتحقيق هدف البحث تم اتباع الننهج شبه التجريبي ذو الضبط الجزئي وتم تحديد مجتمع البحث بطلاب الصف الثاني في جميع المدارس المتوسطة والثانوية التابعة لمديرية تربية بابل قسم تربية المسيب