The existence of the Internet, networking, and cloud computing support a wide range of new technologies. Blockchain is one of these technologies; this increases the interest of researchers who are concerned with providing a safe environment for the circulation of important information via the Internet. Maintaining solidity and integrity of a blockchain’s transactions is an important issue, which must always be borne in mind. Transactions in blockchain are based on use of public and private keys asymmetric cryptography. This work proposes usage of users’ DNA as a supporting technology for storing and recovering their keys in case those keys are lost — as an effective bio-cryptographic recovery method. The RSA private key is responsible for maintaining the authenticity of the blocks’ wallets throughout any transaction related to any block of the blockchain. This framework can be used for a wide range of applications such as student registration systems at universities: in order to prevent the forging of student graduation certificates. The experimental results demonstrated robustness of the proposed solution, using a number of key sizes. The effectiveness of our approach is compared to that of elliptic curve cryptography keys. Our approach shows that the security and authentication needed for blockchain technology can be accomplished using DNA combined with an RSA private key. On the other hand, the standard EC cryptography shows poor performance against our suggested method as demonstrated in the discussion section.
Despite the multiplicity of institutions contributing to the decision-making process in the United States of America, they interact to crystallize positions regarding international and strategic situations. The formulation of the national security policy depends on a number of institutions that complement each other in order to achieve an advanced security situation. Thus, the decision reflects the process of interaction of the existing regulatory institutions. This is because the essence of the national security and achieving its requirements also stems from the existence of a coherent system of shared beliefs and principles in the American society. Besides, these elements are the bases for achieving
... Show MoreThe current study aims to examine the level of cognitive management requirement among the governmental secondary schools' managers in al-hial province in the kingdom of Saudi Arabia. To do this, the author designed a questionnaire comprised (20) item which was applied on (250) managers included (113) manager hold bachelor degree and (137) manager hold master degree. To carry out this study, the researcher utilized the descriptive approach. The findings revealed that a high level of cognitive management requirements among secondary schools' managers as well as there is a significant difference at the (0.05) level regarding degree type, but there is no a significant difference according to gender variable.
The objective of the research is to evaluate the risk management practices of the variables (risk management structure, risk management methods, key components of risk management) and their relation to the principled behavior of managers behavior(innovation, proactive, risk acceptance) By adopting the questionnaire as a main tool in collecting data from managers in the National and raq insurance companies of (50) officials Department manager, department administrator, unit administrator, and analyzed their answers using the SPSS In calculating arithmetic mean, standard deviation, percentage weight and simple correlation coefficient. The most prominent conclusions were:1.There is a positive trend in the sample in both companies and a high
... Show MoreThe research aims to present and discuss the accounting bases adopted in accounting for fixed assets in the public sector with an emphasis on its importance in the area of accountability and fixed assets management , based on a realistic problem associated with the use of cash basis accounting in the public sector in Iraq, which are difficult to provide accounting information useful for many users , including the same units and regulatory departments for the purposes of accountability and management of those assets. Search tool has been the organization questionnaire, its results show the importance of financial reporting for provide accounting information about fixed assets relate to the units of the public sector in Iraq fo
... Show MoreThe current research aims to verify the impact of digital leadership as an independent variable, in the effectiveness of crisis management as a response variable through centralizing strategic vigilance in the faculties of the University of Baghdad and its departments, and to investigate the level of interest of its leaders and subordinates in research variables, as well as coming up with recommendations that contribute to strengthening the practices of the three variables. In the university under study, and based on the researcher’s interest to diagnose the influence relationship between the variables, because of their importance in the university’s headquarters and its members on the one hand, and its refl
... Show MoreThe problem for the search to identify the role of loyal workers through (emotional loyalty, moral loyalty, continued loyalty) in enhancing the market share of the corporate center the human resource management strategies, namely (selection, training and development, and performance evaluation, and returns the system) for the parent company of cellular Allotsalat in Baghdad ,, and show the importance of research through the benefit to the company, through the importance of the search results, it draws the attention of decision-makers and those in charge of managing these human resources on the importance of those resources and work to develop them and keep them in order to increase their loyalty towards their organization and the
... Show MoreThe research aims to; identify the management of conflict as perceived by secondary school managers toward the directors of directorates of education in wassat province, identify functional performance as perceived by secondary school managers toward the directors of directorates of education in wassat province. Besides, explore the relationship between Conflict management and functional performance among the directors of directorates of education in wassat province. A descriptive approach deemed more appropriate with study design. As a tool to collect the data of current research, the author used a questionnaire. Spss tools were used for data analysis
Objective: This study aims to assess the level of nurse's knowledge regarding toxoplasmosis management
in pregnant women.
Methodology: A descriptive analytic study was carried out from January 2012 to March 2012. A sample of
(70)nurses who provide prenatal care to pregnant women at primary health care centers of AL-Adala,ALHindia,AL-Askary,AL-Jamea,AL-Ansar
and AL-Salam in AL-Najaf city. The questionnaire was self-completed
and included questions on sociodemographic characteristics and toxoplasmosis aspects.
Results: The findings of the study indicated that (44.3%) of nurses have moderate level of knowledge.
(32.9%) of nurses was with age ranging from 31-36 years. (74.3%) were male. (52.9%) were secondary
graduate
Objective: To determine the effectiveness of the Nursing Management Education Program upon the Nurse
Managers' Knowledge about planning in Nursing Management at Baghdad City Hospitals.
Methodology: A Quasi-experimental study in which a purposive "non-probability" sample of (50) Nurse
Managers was selected from Baghdad City Hospitals. These Managers were divided into two equal groups of
(25) Nurse Managers for each (study and control ones). A questionnaire was developed as a tool for data
collection. A pilot study was carried out to test the reliability of the questionnaire for the period from April 2nd to
June 20th 2007. The pre-post test approach was applied to the study and control groups as mean for the quasiexperime
Among many problems that reduced the performance of the network, especially Wide Area Network, congestion is one of these, which is caused when traffic request reaches or exceeds the available capacity of a route, resulting in blocking and less throughput per unit time. Congestion management attributes try to manage such cases. The work presented in this paper deals with an important issue that is the Quality of Service (QoS) techniques. QoS is the combination effect on service level, which locates the user's degree of contentment of the service. In this paper, packet schedulers (FIFO, WFQ, CQ and PQ) were implemented and evaluated under different applications with different priorities. The results show that WFQ scheduler gives acceptable r
... Show More