The consensus algorithm is the core mechanism of blockchain and is used to ensure data consistency among blockchain nodes. The PBFT consensus algorithm is widely used in alliance chains because it is resistant to Byzantine errors. However, the present PBFT (Practical Byzantine Fault Tolerance) still has issues with master node selection that is random and complicated communication. The IBFT consensus technique, which is enhanced, is proposed in this study and is based on node trust value and BLS (Boneh-Lynn-Shacham) aggregate signature. In IBFT, multi-level indicators are used to calculate the trust value of each node, and some nodes are selected to take part in network consensus as a result of this calculation. The master node is chosen from among them based on which node has the highest trust value, it transforms the BLS signature process into the information interaction process between nodes. Consequently, communication complexity is reduced, and node-to-node information exchange remains secure. The simulation experiment findings demonstrate that the IBFT consensus method enhances transaction throughput rate by 61% and reduces latency by 13% when compared to the PBFT algorithm.
Simulation of the Linguistic Fuzzy Trust Model (LFTM) over oscillating Wireless Sensor Networks (WSNs) where the goodness of the servers belonging to them could change along the time is presented in this paper, and the comparison between the outcomes achieved with LFTM model over oscillating WSNs with the outcomes obtained by applying the model over static WSNs where the servers maintaining always the same goodness, in terms of the selection percentage of trustworthy servers (the accuracy of the model) and the average path length are also presented here. Also in this paper the comparison between the LFTM and the Bio-inspired Trust and Reputation Model for Wireless Sensor Network
... Show MoreWriting plays an effective role in developing one's thinking and
enhancing Learning. It is, in fact, a means of widening one's own views about
the world for the numerous uses that it can serve (Samuel, 1988:28).
In regard to the unquestionable significance of writing in the teaching –
Learning process, the traditional approach seems to be far from being able to
put such significance into practice. Traditionalists give priority to formulating
students' ideas before using prescribed rhetorical framework and then
submitting the written product for grading. Emphasis is, therefore, limited to the
prewriting stage where a certain topic is explored, and the role of the teacher is
confined to assigning the topic and
This work reports the development of an analytical method for the simultaneous analysis of three fluoroquinolones; ciprofloxacin (CIP), norfloxacin (NOR) and ofloxacin (OFL) in soil matrix. The proposed method was performed by using microwave-assisted extraction (MAE), solid-phase extraction (SPE) for samples purification, and finally the pre-concentrated samples were analyzed by HPLC detector. In this study, various organic solvents were tested to extract the test compounds, and the extraction performance was evaluated by testing various parameters including extraction solvent, solvent volume, extraction time, temperature and number of the extraction cycles. The current method showed a good linearity over the concentration ranging from
... Show MoreDengke Naniura is a traditional food from Sumatera Utara, Indonesia, that is produced through fermenting process, and this food is believed to contain high probiotics. The objective of the current research is to determine the potential of LAB as a probiotic that has been obtained from Dengke Naniura. Dengke Naniura was traditionally prepared from Cyprinus carpio. Four LABs have been successfully isolated from Dengke Naniura, such as D7DA3, D7B3, D7DBF and D7DN3. Those four LAB isolates were identified as Lactobacillus sp. This result has been confirmed by the non-spore forming bacterium, non-motile, and Gram-positive. Also, it has been supported by biochemical test, for the example Voges Proskauer, catalase test, Methyl
... Show MoreAbstract
Although the rapid development in reverse engineering techniques, 3D laser scanners can be considered the modern technology used to digitize the 3D objects, but some troubles may be associate this process due to the environmental noises and limitation of the used scanners. So, in the present paper a data pre-processing algorithm has been proposed to obtain the necessary geometric features and mathematical representation of scanned object from its point cloud which obtained using 3D laser scanner (Matter and Form) through isolating the noised points. The proposed algorithm based on continuous calculations of chord angle between each adjacent pair of points in point cloud. A MATLAB program has been built t
... Show MoreThe current study aimed to measure the attitudes of female teachers towards the use of digital learning and the degree of possessing their digital education skills. The study sample consisted of (180) workers with disabilities (mental disability، auditory impairment، visual disability، hyperactivity and distraction. To achieve the goals of the study, the transformation measure was used towards digital education for people with disabilities. The study reached the following results: the availability of digital learning skills among workers with disabilities. The study concluded with a series of recommendations including holding Training courses to keep up with the challenges of educational trends and modern technology in this area.
The research goes to clarifying the system of values in dialogue with the violator through an inspection of our cultural heritage, and our inherent religious values. Al-Rashidah, and this position is represented in their various and varied dialogues with the Kharijites, whether that was at the beginning of their appearance - as is the case in the dialogue of Ali and Ibn Abbas, may God be pleased with them - or after the formation of their teams and the strength of their thorns, as in the dialogue of Ibn al-Zubayr and Jabir bin Abdullah, may God be pleased with them.
In these dialogues, I found important values in the dialogue, which it is good to draw upon and work on, especially with the extremist currents in our tim
... Show MoreIt is believed that Organizations around the world should be prepared for the transition to IPv6 and make sure they have the " know how" to be able to succeed in choosing the right migration to start time. This paper focuses on the transition to IPv6 mechanisms. Also, this paper proposes and tests a deployment of IPv6 prototype within the intranet of the University of Baghdad (BUniv) using virtualization software. Also, it deals with security issues, improvements and extensions of IPv6 network using firewalls, Virtual Private Network ( VPN), Access list ( ACLs). Finally, the performance of the obtainable intrusion detection model is assessed and compared with three approaches.
The simulation of passively Q-switching is four non – linear first order differential equations. The optimization of passively Q-switching simulation was carried out using the constrained Rosenbrock technique. The maximization option in this technique was utilized to the fourth equation as an objective function; the parameters, γa, γc and β as were dealt with as decision variables. A FORTRAN program was written to determine the optimum values of the decision variables through the simulation of the four coupled equations, for ruby laser Q–switched by Dy +2: CaF2.For different Dy +2:CaF2 molecules number, the values of decision variables was predicted using our written program. The relaxation time of Dy +2: CaF2, used with ruby was
... Show More