The consensus algorithm is the core mechanism of blockchain and is used to ensure data consistency among blockchain nodes. The PBFT consensus algorithm is widely used in alliance chains because it is resistant to Byzantine errors. However, the present PBFT (Practical Byzantine Fault Tolerance) still has issues with master node selection that is random and complicated communication. The IBFT consensus technique, which is enhanced, is proposed in this study and is based on node trust value and BLS (Boneh-Lynn-Shacham) aggregate signature. In IBFT, multi-level indicators are used to calculate the trust value of each node, and some nodes are selected to take part in network consensus as a result of this calculation. The master node is chosen from among them based on which node has the highest trust value, it transforms the BLS signature process into the information interaction process between nodes. Consequently, communication complexity is reduced, and node-to-node information exchange remains secure. The simulation experiment findings demonstrate that the IBFT consensus method enhances transaction throughput rate by 61% and reduces latency by 13% when compared to the PBFT algorithm.
Abstract
Value Added Tax (VAT) is one of the most important types of indirect taxes because of its advantages in achieving financial, economic and financial objectives. The introduction of VAT is part of the reform of the structure of the Lebanese public tax system aimed at reducing the fiscal deficit and resulting inflation, which still lacks a general consumption tax. There is also an urgent need to increase treasury revenues , Because of its broad tax base, as it imposes on the consumption of locally produced and imported goods, in addition to the role played by this tax in support of the local product &nbs
... Show MoreThis study aims to identify the amount of the effect of the ability to learn the individuals within the organization on the accumulation of intellectual capital and the role it plays in improving the performance of the organization, and to achieve that, the researcher designed a questionnaire to collect data and information from the surveyed respondents and analyzed using SPSS software, the study concluded after testing hypotheses to have a direct impact between the capacity for organizational learning and the accumulation of intellectual capital, which in turn affects the accumulation of intellectual capital as a positive and direct impact on the performance of the organization, al
... Show Moreيهدف البحث الى تطبيق تزامن تصميم عملية انتاج معجون الاسنان في مصنع المامون التابع للشركة العامة للمنتوجات الغذائية مع نظام تكاليف الجودة المطبق في الشركة لتحقيق الميزة التنافسية. وتمثلت مشكلة البحث في أن الشركة عينة البحث لا تستخدم نظام تكاليف الجودة بالتزامن مع تصميم عملية إنتاج هذا المنتج لاغراض تحقيق الميزة التنافسية حيث تواجه منتجات الشركة منافسة عالية في الاسواق المحلية. إن الشركة تطبق نظام تكاليف الج
... Show MoreIn this paper, we derive and prove the stability bounds of the momentum coefficient µ and the learning rate ? of the back propagation updating rule in Artificial Neural Networks .The theoretical upper bound of learning rate ? is derived and its practical approximation is obtained
The integration of decision-making will lead to the robust of its decisions, and then determination optimum inventory level to the required materials to produce and reduce the total cost by the cooperation of purchasing department with inventory department and also with other company,s departments. Two models are suggested to determine Optimum Inventory Level (OIL), the first model (OIL-model 1) assumed that the inventory level for materials quantities equal to the required materials, while the second model (OIL-model 2) assumed that the inventory level for materials quantities more than the required materials for the next period. &nb
... Show MoreAs s widely use of exchanging private information in various communication applications, the issue to secure it became top urgent. In this research, a new approach to encrypt text message based on genetic algorithm operators has been proposed. The proposed approach follows a new algorithm of generating 8 bit chromosome to encrypt plain text after selecting randomly crossover point. The resulted child code is flipped by one bit using mutation operation. Two simulations are conducted to evaluate the performance of the proposed approach including execution time of encryption/decryption and throughput computations. Simulations results prove the robustness of the proposed approach to produce better performance for all evaluation metrics with res
... Show Moreيهدف البحث الى دراسة تأثير مؤشرات الاستقرار المالي على قيمة اسهم القطاع المصرفي لسوق العراق للأوراق المالية ، اذ تعد مؤشرات الاستقرار المالي اداة مفيدة لفحص سلامة وصحة القطاع المصرفي , وكذلك اداء لقياس مؤشر الاستقرار المصرفي المتكون من اربع مؤشرات فرعية (مؤشر كفاية راس المال ، مؤشر جودة الموجودات ، مؤشر السيولة ، مؤشر الربحية) ومؤشر الاقتصاد الكلي ، ومؤشر سوق راس ، ومؤشر الدورة المالية للفترة (2015_2020) ، وتمثل ا
... Show MoreBecause of vulnerable threats and attacks against database during transmission from sender to receiver, which is one of the most global security concerns of network users, a lightweight cryptosystem using Rivest Cipher 4 (RC4) algorithm is proposed. This cryptosystem maintains data privacy by performing encryption of data in cipher form and transfers it over the network and again performing decryption to original data. Hens, ciphers represent encapsulating system for database tables
Abstract
Lightweight materials is used in the sheet metal hydroforming process, because it can be adapted to the manufacturing of complex structural components into a single body with high structural stiffness. Sheet hydroforming has been successfully developed in industry such as in the manufacturing of the components of automotive.The aim of this study is to simulate the experimental results ( such as the amount of pressure required to hydroforming process, stresses, and strains distribution) with results of finite element analyses (FEA) (ANSYS 11) for aluminum alloy (AA5652) sheets with thickness (1.2mm) before heat treatm
... Show MoreUsing watermarking techniques and digital signatures can better solve the problems of digital images transmitted on the Internet like forgery, tampering, altering, etc. In this paper we proposed invisible fragile watermark and MD-5 based algorithm for digital image authenticating and tampers detecting in the Discrete Wavelet Transform DWT domain. The digital image is decomposed using 2-level DWT and the middle and high frequency sub-bands are used for watermark and digital signature embedding. The authentication data are embedded in number of the coefficients of these sub-bands according to the adaptive threshold based on the watermark length and the coefficients of each DWT level. These sub-bands are used because they a
... Show More