Blockchain technology relies on cryptographic techniques that provide various advantages, such as trustworthiness, collaboration, organization, identification, integrity, and transparency. Meanwhile, data analytics refers to the process of utilizing techniques to analyze big data and comprehend the relationships between data points to draw meaningful conclusions. The field of data analytics in Blockchain is relatively new, and few studies have been conducted to examine the challenges involved in Blockchain data analytics. This article presents a systematic analysis of how data analytics affects Blockchain performance, with the aim of investigating the current state of Blockchain-based data analytics techniques in research fields and
... Show MoreAt atmospheric pressure and at a frequency of 9.1 kHz, a constructed magnetically stabilized tornado gliding arc discharge (MSGAD) system was utilized in this study to generate a non-thermal plasma with an alternating voltage source from 2,4,6,8 to 10 kV. Argon gas was used to generate the arc plasma with an adjustable flow rate using a flow meter regulator to stabilize the gas flow rate to 2 L/min. A gliding plasma discharge is achieved by a magnetic field for the purpose of a planned investigation. The influence of the magnetically stabilized tornado gliding arc discharge parameters such as magnetic field and applied voltage on microscopic tornado plasma parameters was studied. The electron temperature1was measured using a Boltzmann plot
... Show MoreAn in-depth experimental study of the matrix effect of antifreeze (ethylene glycol) and water contamination of engine oil through FT-IR spectroscopy. With a comparison of the percent by volume concentration of contaminated fresh 15W-40 engine oil, there appeared to be a noticeable reduction in the O–H stretching signal in the infrared spectrum when ethylene glycol based antifreeze was included as a contaminant. The contaminants of distilled water, a 50/50 mixture of water and commercial ethylene glycol antifreeze, and straight ethylene glycol antifreeze were compared and a signal reduction in the O–H stretch was clearly evident when glycol was present. Doubling the volume of the 50/50 mixture as compared to water alone still res
... Show MoreThe Ratawi Oil Field (ROF) is one of Iraq's most important oil fields because of its significant economic oil reserves. The major oil reserves of ROF are in the Mishrif Formation. The main objective of this paper is to assess the petrophysical properties, lithology identification, and hydrocarbon potential of the Mishrif Formation using interpreting data from five open-hole logs of wells RT-2, RT-4, RT-5, RT-6, and RT-42. Understanding reservoir properties allows for a more accurate assessment of recoverable oil reserves. The rock type (limestone) and permeability variations help tailor oil extraction methods, extraction methods and improving recovery techniques. The petrophysical properties were calculated using Interactive Petroph
... Show MoreThis study is achieved in the local area in Eridu oil field, where the Mishrif Formation is considered the main productive reservoir. The Mishrif Formation was deposited during the Cretaceous period in the secondary sedimentary cycle (Cenomanian-Early Turonian as a part of the Wasia Group a carbonate succession and widespread throughout the Arabian Plate. There are four association facies are identified in Mishrif Formation according the microfacies analysis: FA1-Deep shelf facies association (Outer Ramp); FA2-Slope (Middle Ramp); FA3-Reef facies (Shoal) association (Inner ramp); FA4-Back Reef facies association. Sequence stratigraphic analysis show there are three stratigraphic surfaces based on the abrupt changing in depositional
... Show MoreThe Internet is providing vital communications between millions of individuals. It is also more and more utilized as one of the commerce tools; thus, security is of high importance for securing communications and protecting vital information. Cryptography algorithms are essential in the field of security. Brute force attacks are the major Data Encryption Standard attacks. This is the main reason that warranted the need to use the improved structure of the Data Encryption Standard algorithm. This paper proposes a new, improved structure for Data Encryption Standard to make it secure and immune to attacks. The improved structure of Data Encryption Standard was accomplished using standard Data Encryption Standard with a new way of two key gene
... Show More