The consensus algorithm is the core mechanism of blockchain and is used to ensure data consistency among blockchain nodes. The PBFT consensus algorithm is widely used in alliance chains because it is resistant to Byzantine errors. However, the present PBFT (Practical Byzantine Fault Tolerance) still has issues with master node selection that is random and complicated communication. The IBFT consensus technique, which is enhanced, is proposed in this study and is based on node trust value and BLS (Boneh-Lynn-Shacham) aggregate signature. In IBFT, multi-level indicators are used to calculate the trust value of each node, and some nodes are selected to take part in network consensus as a result of this calculation. The master node is chosen from among them based on which node has the highest trust value, it transforms the BLS signature process into the information interaction process between nodes. Consequently, communication complexity is reduced, and node-to-node information exchange remains secure. The simulation experiment findings demonstrate that the IBFT consensus method enhances transaction throughput rate by 61% and reduces latency by 13% when compared to the PBFT algorithm.
Magical realism potential bulwark plastic art and literature، and won great fame and Research cash innumerable، and like other currents of literary found his outlet in the art of cinema، quoted cinema of literature magical realism and influenced his concepts، and Arab cinema، it was necessary to have a vulnerability to stream، either Tools employing magical realism، unintentionally since the early beginnings dating back to the time of World Wars I and II، or in deliberate more mature in the twenty-first century، due to the emergence of film-makers more aware and culture، and more friction global currents.
But this raises a number of problems that need to be addressed from the maker of
ت نايبتسلاا ثحابلا مدختسا دقو ,ةيداصتقلاا تادحولا ةميق ىلع انوروك ةحئاج لظ يف يلخادلا قيقدتلا ريثأت ةيداصتقلاا تادحولا فادها قيقحت يف مهسي يلخادلا قيقدتلا نا ثحبلا تاجاتنتسا مها تناكو , ثحبلا تاريغتم نيب ةقلاعلا نايبل رطاخملا ةرادأو اهتءافكو اهتيلعاف نيسحتو قيقدتلا عقوم زيزعت ىلع لمعلا تايصوتلا مها تناكو امك, ةمكوحلا تايلمعو ةباقرلاو قيقحتل رارمتسأب ئراوطلا ططخ ثيدحتو ةبقارمو ةحضاو تازفحم ءاشناو ةلمتحم
... Show MoreThe concept of narration stems from the connotation of continuous communication through which narration is manifested as a message that is exchanged between the sender and the recipient, and that narration is an educational conceptual necessity, representing the philosophy of intellectual inclusion achieved in a direct speech to the mind, but it is encapsulated in a colorful frame that attracts the soul and attracts attention, and the graphic narration is a speech A visual based on the basis of interference and sequence of the event in weaving the elements in a consensual way through a continuous communication process that begins with the embodiment of an event - an important event - to the recipient, in which an intellectual employment
... Show MoreThe topic of the partnership between the public and private sectors with great interest by researchers around the world after making sure that the process of economic and social development depends on a combination of resources and energies and expertise of both the public and private sectors in the creation and operation of the various projects , the economic development of the growing proved the failure of both sectors in achieving greater economic growth Klaaly separately in many countries , especially developing countries with a socialist approach , led one way or another to adopt most of the countries economic reform programs promoted by international organizations and institutions ( such as the IMF and the World Bank ) of i
... Show MoreThis article introduces a numerical study on heat exchange and corrosion coefficients of Zinc–water nanofluid stream in a circular tube fitted with swirl generator utilizing CFD emulation. Different forms of swirl generator which have the following properties of plain twisted tape (PTT) and baffle wings twisted tape (BTT) embeds with various ratio of twisting (y = 2.93, 3.91 and 4.89), baffle inclination angles (β = 0°, - 30° and 30) joined with 1%, 1.5% and 2% volume fraction of ZnO nanofluid were utilized for simulation. The results demonstrated that the heat and friction coefficients conducted by these two forms of vortex generator raised with Reynolds number, twist ratio and baffle inclination angles decreases. Likewise, t
... Show MoreAbstract
The objective of image fusion is to merge multiple sources of images together in such a way that the final representation contains higher amount of useful information than any input one.. In this paper, a weighted average fusion method is proposed. It depends on using weights that are extracted from source images using counterlet transform. The extraction method is done by making the approximated transformed coefficients equal to zero, then taking the inverse counterlet transform to get the details of the images to be fused. The performance of the proposed algorithm has been verified on several grey scale and color test images, and compared with some present methods.
... Show MoreIn a resource-limited world, there is an urgent need to develop new economic models, from the traditional unsustainable industrial model of product consumption and disposal, to a new model based on the concepts of sustainability in its comprehensive sense, the so-called circular economy, using fewer resources in manufacturing processes and changing practices in product disposal to waste, by removing its use, recycling and manufacturing to start another manufacturing process. In an era of intense competition in domestic and global markets, the importance of the circular economy is highlighted in its ability to strengthen the competitiveness of enterprises in those markets, by reducing the cost and increasing the quality of the pro
... Show MoreSince the Internet has been more widely used and more people have access to multimedia content, copyright hacking, and piracy have risen. By the use of watermarking techniques, security, asset protection, and authentication have all been made possible. In this paper, a comparison between fragile and robust watermarking techniques has been presented to benefit them in recent studies to increase the level of security of critical media. A new technique has been suggested when adding an embedded value (129) to each pixel of the cover image and representing it as a key to thwart the attacker, increase security, rise imperceptibility, and make the system faster in detecting the tamper from unauthorized users. Using the two watermarking ty
... Show MoreThis paper develops a fuzzy multi-objective model for solving aggregate production planning problems that contain multiple products and multiple periods in uncertain environments. We seek to minimize total production cost and total labor cost. We adopted a new method that utilizes a Zimmermans approach to determine the tolerance and aspiration levels. The actual performance of an industrial company was used to prove the feasibility of the proposed model. The proposed model shows that the method is useful, generalizable, and can be applied to APP problems with other parameters.