The consensus algorithm is the core mechanism of blockchain and is used to ensure data consistency among blockchain nodes. The PBFT consensus algorithm is widely used in alliance chains because it is resistant to Byzantine errors. However, the present PBFT (Practical Byzantine Fault Tolerance) still has issues with master node selection that is random and complicated communication. The IBFT consensus technique, which is enhanced, is proposed in this study and is based on node trust value and BLS (Boneh-Lynn-Shacham) aggregate signature. In IBFT, multi-level indicators are used to calculate the trust value of each node, and some nodes are selected to take part in network consensus as a result of this calculation. The master node is chosen from among them based on which node has the highest trust value, it transforms the BLS signature process into the information interaction process between nodes. Consequently, communication complexity is reduced, and node-to-node information exchange remains secure. The simulation experiment findings demonstrate that the IBFT consensus method enhances transaction throughput rate by 61% and reduces latency by 13% when compared to the PBFT algorithm.
The paper aims to propose Teaching Learning based Optimization (TLBO) algorithm to solve 3-D packing problem in containers. The objective which can be presented in a mathematical model is optimizing the space usage in a container. Besides the interaction effect between students and teacher, this algorithm also observes the learning process between students in the classroom which does not need any control parameters. Thus, TLBO provides the teachers phase and students phase as its main updating process to find the best solution. More precisely, to validate the algorithm effectiveness, it was implemented in three sample cases. There was small data which had 5 size-types of items with 12 units, medium data which had 10 size-types of items w
... Show MorePraise be to Allah and peace and blessings be upon our Prophet Muhammad and on his family and companions
Yet,
The prophets (peace be upon them) urged all thevalues and one of these is the value of work which is of a great importance, that all nations have gathered against us as the eaters gather at a bowl. One of the reasons of our weakness and the strength of our enemy is that we have neglected the value of work. And rather a large number of ignorant and uneducatedpeople started to believe that the means of living, triumph, gaining power, and establishing a civilization are given by Allah with neithergainingnoreffort from us. While we find in the past that Allah the Almighty narrated to us the story of Mary (Peace be upon her) and
In this paper, a method for hiding cipher text in an image file is introduced . The
proposed method is to hide the cipher text message in the frequency domain of the image.
This method contained two phases: the first is embedding phase and the second is extraction
phase. In the embedding phase the image is transformed from time domain to frequency
domain using discrete wavelet decomposition technique (Haar). The text message encrypted
using RSA algorithm; then Least Significant Bit (LSB) algorithm used to hide secret message
in high frequency. The proposed method is tested in different images and showed success in
hiding information according to the Peak Signal to Noise Ratio (PSNR) measure of the the
original ima
The study aims to investigate the relationship between the gender diversity of board director, the accounting conservatism and firm value in Iraqi firms. The sample was represented by 30 Iraqi firms listed on the Iraqi market over the period 2017. The research was based on the main hypothesis that gender diversity has a positive relationship with conservatism and firm value, that conservatism as an intermediate variable will enhance the positive relationship between gender diversity and firm value. The study reached results that support the research hypotheses. The appointment of females to the board helps improve the provision of conservative accounting information and avoids overstate when reporting earnings. Based on these res
... Show MoreThe current research is a spectroscopic study of Coumarin 334 dissolved in methanol. The range of concentrations of the prepared stock solution was (3.39x10-9 to 2.03x10-8) M. Some optical characteristics of this dye were investigated such as absorbance and transmission spectra, absorption coefficient, refractive and extinction coefficients, oscillation and dispersion energies, and energy band gap. The absorbance spectra were recorded at 452 nm using Broad Band Cavity Enhanced Absorption Spectroscopy (BBCEAS) which depends on increasing the path length of the traveling light from the source to the detector. The minimum absorbance amount was 0.07 with a low concentration of 3.39x10-9 M. As a result, the ot
... Show MoreThe present paper, practical methods of professional translation, discusses the most important methods to achieve an accurate effective translation from the source language text to the equivalent target language text.
The present study suggests that practical translation like any literary activity is of six main stages that follow sequential order to achieve an accurate translation: (choosing the foreign text to be translated, the author of the text permission, the text translation, considering the title contextual meaning, reviewing the text translation, and finally finding a good publisher).
چکیده
پژوهش حاضر که با عنوان گامهای عملی یک ترجمهء حر
... Show MoreAbstract
In this work, two algorithms of Metaheuristic algorithms were hybridized. The first is Invasive Weed Optimization algorithm (IWO) it is a numerical stochastic optimization algorithm and the second is Whale Optimization Algorithm (WOA) it is an algorithm based on the intelligence of swarms and community intelligence. Invasive Weed Optimization Algorithm (IWO) is an algorithm inspired by nature and specifically from the colonizing weeds behavior of weeds, first proposed in 2006 by Mehrabian and Lucas. Due to their strength and adaptability, weeds pose a serious threat to cultivated plants, making them a threat to the cultivation process. The behavior of these weeds has been simulated and used in Invas
... Show MoreObjective(s): To determine the impact of psychological distress in women upon coping with breast cancer.
Methodology: A descriptive design is carried throughout the present study. Convenient sample of (60) woman with breast cancer is recruited from the community. Two instruments, psychological distress scale and coping scale are developed for the study. Internal consistency reliability and content validity are obtained for the study instruments. Data are collect through the application of the study instruments. Data are analyzed through the use of descriptive statistical data analysis approach and inferential statistical data analysis approach.
Results: The study findings depict that women with breast cancer have experien
... Show MoreMost of the big companies and especially the intillictual ones become a ware of an important fact, and That is, The intillictual capital in new global economy, is a new source for Them & This Valuable source exceed in importance. The other company's sources.
The Traditional disclouser systemes are unable to supply the decisions makers with the Fundimental information require to handel the on going operations which are based on Knowledge and intangible source. But the measuring of this source and the disclose for it in the financial Statements will lead to gain features Statements which will benefit all the parties and lead to make the value of the company great.
And as a resul
... Show MoreThe research aims to know the concept of politic behavior as one of the important behaviours in the different fields and sectors. It is considered to be part of the organizatial work to face the expected risks. It includes two group of factors personal (self –monitors, locus of control ,expectation s of success, perceived job alternatives)and organizational(promotion ,division resources,role ambiguity ,democratic decision)studied by the researcher in the frame of the relationship with the variable of display continuous trust matain which includes two variable (build trust mantain, display trust continuouness)through applied frame by random sample consists of (90)employee at Farouq State
... Show More