Preferred Language
Articles
/
bsj-9735
Optimizing Blockchain Consensus: Incorporating Trust Value in the Practical Byzantine Fault Tolerance Algorithm with Boneh-Lynn-Shacham Aggregate Signature
...Show More Authors

The consensus algorithm is the core mechanism of blockchain and is used to ensure data consistency among blockchain nodes. The PBFT consensus algorithm is widely used in alliance chains because it is resistant to Byzantine errors. However, the present PBFT (Practical Byzantine Fault Tolerance) still has issues with master node selection that is random and complicated communication. The IBFT consensus technique, which is enhanced, is proposed in this study and is based on node trust value and BLS (Boneh-Lynn-Shacham) aggregate signature. In IBFT, multi-level indicators are used to calculate the trust value of each node, and some nodes are selected to take part in network consensus as a result of this calculation. The master node is chosen from among them based on which node has the highest trust value, it transforms the BLS signature process into the information interaction process between nodes. Consequently, communication complexity is reduced, and node-to-node information exchange remains secure. The simulation experiment findings demonstrate that the IBFT consensus method enhances transaction throughput rate by 61% and reduces latency by 13% when compared to the PBFT algorithm.

Scopus Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Sat Dec 26 2020
Journal Name
International Journal Of Pharmaceutical Research
Complexes of Co(II), Cu(II), Ni(II), Pt(II) And Pd(II) with N 3 O-Chelating Ligand Incorporating Azo and Schiff Base Moieties: Synthesis, Spectroscopic, Thermal Decomposition, Theoretical Studies, and thermodynamic parameters
...Show More Authors

Publication Date
Mon Dec 01 2008
Journal Name
Journal Of Economics And Administrative Sciences
اختبار نسبة الامكان لاجل التساوي للمعلمات المحلية لـ لمجتمعات أسية مبنية على نوع لمراقبة العينات
...Show More Authors
  • Epstein, B., and sobel , M. (1954)."Some Thearems Relevant to life Testing from an Exponential population" Annals of Mathematical Statistics, 25, 373 – 381 .
  • Epstein, B., and Tsao, C.K.(1953) "Some Tests Based on Order Observation From Two Exponential Populations" Annals of Mathematical Statistics , 24 , 458 – 466 .
  • Hogg, R.V. and Tonis, E,A. (1963), "An Iterated procedure for Testing the Equality of several Exponential Distributions" Journal of the American Statistical Association, 58 , 435 – 443.
  • Kumar, S. , and patel , H. I. (1971) "ATest for the Comparision of two Exponential Disributions" Technometrics , 13 , 183 – 189 .<
... Show More
View Publication Preview PDF
Crossref
Publication Date
Tue Jan 30 2024
Journal Name
Iraqi Journal Of Science
Parallel Particle Swarm Optimization Algorithm for Identifying Complex Communities in Biological Networks
...Show More Authors

    Identification of complex communities in biological networks is a critical and ongoing challenge since lots of network-related problems correspond to the subgraph isomorphism problem known in the literature as NP-hard. Several optimization algorithms have been dedicated and applied to solve this problem. The main challenge regarding the application of optimization algorithms, specifically to handle large-scale complex networks, is their relatively long execution time. Thus, this paper proposes a parallel extension of the PSO algorithm to detect communities in complex biological networks. The main contribution of this study is summarized in three- fold; Firstly, a modified PSO algorithm with a local search operator is proposed

... Show More
View Publication Preview PDF
Scopus (4)
Crossref (1)
Scopus Crossref
Publication Date
Fri Dec 31 2021
Journal Name
Iraqi Journal Of Laser
Parametric Optimization for Fatigue Life of 6061-T6 Aluminum Thin Sheets Processed with High-Speed Laser Shock Peening
...Show More Authors

Abstract: Aluminum alloys grade 6061-T6 are characterized by their excellent properties and processing characteristics which make them ideal for varieties of industrial applications under cyclic loading, aluminum alloys show less fatigue life than steel alloys of similar strength. In the current study, a nanosecond fiber laser of maximum pulse energy up to 9.9 mJ was used to apply laser shock peening process (LSP) on aluminum thin sheets to introduce residual stresses in order to enhance fatigue life under cyclic loading Box-Behnken design (BBD) based on the design of experiments (DOE) was employed in this study for experimental design data analysis, model building and optimization The effect of working parameters spot size (ω), scannin

... Show More
View Publication Preview PDF
Publication Date
Wed Jan 01 2020
Journal Name
Iraqi National Journal Of Nursing Specialties
Effectiveness of an Educational Program in Enhancing Nurses’ Knowledge about Occupational Health Hazards
...Show More Authors

Objective: To determine the effectiveness of an Educational Program in Enhancing Nurse’s Knowledge about Occupational Health Hazards at Medical City Hospitals in Baghdad City.

Methodology: The present study employed a quasi-experimental design held at Medical City Hospitals in Baghdad City. A non-probability sample (convenience sample) consisted of (60) nurse. Data were collected by using a self-report questionnaire which consisted of six parts (a) socio-demographic characteristics (b) physical hazards knowledge (c) chemical hazards knowledge (d) biological hazards knowledge (e) psychological hazards knowledge and (f) mechanical hazards knowledge. Data were analyzed using the statistical packag

... Show More
View Publication Preview PDF
Publication Date
Wed Jan 01 2020
Journal Name
Journal Of Southwest Jiaotong University
IMPROVED STRUCTURE OF DATA ENCRYPTION STANDARD ALGORITHM
...Show More Authors

The Internet is providing vital communications between millions of individuals. It is also more and more utilized as one of the commerce tools; thus, security is of high importance for securing communications and protecting vital information. Cryptography algorithms are essential in the field of security. Brute force attacks are the major Data Encryption Standard attacks. This is the main reason that warranted the need to use the improved structure of the Data Encryption Standard algorithm. This paper proposes a new, improved structure for Data Encryption Standard to make it secure and immune to attacks. The improved structure of Data Encryption Standard was accomplished using standard Data Encryption Standard with a new way of two key gene

... Show More
Publication Date
Sun Mar 01 2015
Journal Name
Computer Systems Science & Engineering
Parameters' fine tuning of differential evolution algorithm
...Show More Authors

Most heuristic search method's performances are dependent on parameter choices. These parameter settings govern how new candidate solutions are generated and then applied by the algorithm. They essentially play a key role in determining the quality of the solution obtained and the efficiency of the search. Their fine-tuning techniques are still an on-going research area. Differential Evolution (DE) algorithm is a very powerful optimization method and has become popular in many fields. Based on the prolonged research work on DE, it is now arguably one of the most outstanding stochastic optimization algorithms for real-parameter optimization. One reason for its popularity is its widely appreciated property of having only a small number of par

... Show More
Scopus (7)
Scopus
Publication Date
Tue Aug 23 2022
Journal Name
Int. J. Nonlinear Anal. Appl.
Face mask detection based on algorithm YOLOv5s
...Show More Authors

Determining the face of wearing a mask from not wearing a mask from visual data such as video and still, images have been a fascinating research topic in recent decades due to the spread of the Corona pandemic, which has changed the features of the entire world and forced people to wear a mask as a way to prevent the pandemic that has calmed the entire world, and it has played an important role. Intelligent development based on artificial intelligence and computers has a very important role in the issue of safety from the pandemic, as the Topic of face recognition and identifying people who wear the mask or not in the introduction and deep education was the most prominent in this topic. Using deep learning techniques and the YOLO (”You on

... Show More
Publication Date
Fri May 01 2015
Journal Name
Journal Of Engineering
A Real-Coded Genetic Algorithm with System Reduction and Restoration for Rapid and Reliable Power Flow Solution of Power Systems
...Show More Authors

The paper presents a highly accurate power flow solution, reducing the possibility of ending at local minima, by using Real-Coded Genetic Algorithm (RCGA) with system reduction and restoration. The proposed method (RCGA) is modified to reduce the total computing time by reducing the system in size to that of the generator buses, which, for any realistic system, will be smaller in number, and the load buses are eliminated. Then solving the power flow problem for the generator buses only by real-coded GA to calculate the voltage phase angles, whereas the voltage magnitudes are specified resulted in reduced computation time for the solution. Then the system is restored by calculating the voltages of the load buses in terms

... Show More
View Publication Preview PDF
Publication Date
Tue Jan 01 2013
Journal Name
Journal Of Geochemical Exploration
Geochemical exploration using surveys of spring water, hydrocarbon and gas seepage, and geobotany for determining the surface extension of Abu-Jir Fault Zone in Iraq: A new way for determining geometrical shapes of computational simulation models
...Show More Authors

View Publication
Crossref (35)
Crossref