Blockchain has garnered the most attention as the most important new technology that supports recent digital transactions via e-government. The most critical challenge for public e-government systems is reducing bureaucracy and increasing the efficiency and performance of administrative processes in these systems since blockchain technology can play a role in a decentralized environment and execute a high level of security transactions and transparency. So, the main objectives of this work are to survey different proposed models for e-government system architecture based on blockchain technology implementation and how these models are validated. This work studies and analyzes some research trends focused on blockchain and the future of e-governance for connecting citizens and smart cities, such as Using Blockchain in the Notarial Office (NO), using blockchain technology in the management of police complaints, exploring blockchain-enabled end-to-end security e-voting, using blockchain and smart contract technology for trusted and safe property registration and record management, and using a blockchain-enabled Vehicle Certification (BVC) framework. Finally, this work has proven that the issue of transforming governments from the traditional system to electronic governments based on blockchain technology has become an inevitable matter of time.
The aim of the present study is to identify the level of prosoical behavior of Baghdad University's students and to recognize the differences between male and female students. Moreover, it also aims to identify the level of openness to experience for these students. A random sample of (123) students has been selected; 77 males and 46 females. Two scales have been used in the study. The Prosocialness scale for adults by Caprara. Et al (2005) has been translated into the Arabic language and relies on four types of actions (Helping, Sharing, Taking care, and feeling Empathetic with others) and the other scale is the Openness to Experience Scale, which is one of the Big Five Inventory by John and Srivastava (1999). The main results showed a
... Show MoreSince Internet Protocol version 6 is a new technology, insecure network configurations are inevitable. The researchers contributed a lot to spreading knowledge about IPv6 vulnerabilities and how to address them over the past two decades. In this study, a systematic literature review is conducted to analyze research progress in IPv6 security field following the Preferred Reporting Items for the Systematics Review and Meta-Analysis (PRISMA) method. A total of 427 studies have been reviewed from two databases, IEEE and Scopus. To fulfil the review goal, several key data elements were extracted from each study and two kinds of analysis were administered: descriptive analysis and literature classification. The results show positive signs of t
... Show MoreThe recent emergence of sophisticated Large Language Models (LLMs) such as GPT-4, Bard, and Bing has revolutionized the domain of scientific inquiry, particularly in the realm of large pre-trained vision-language models. This pivotal transformation is driving new frontiers in various fields, including image processing and digital media verification. In the heart of this evolution, our research focuses on the rapidly growing area of image authenticity verification, a field gaining immense relevance in the digital era. The study is specifically geared towards addressing the emerging challenge of distinguishing between authentic images and deep fakes – a task that has become critically important in a world increasingly reliant on digital med
... Show MoreThis article investigates how an appropriate chaotic map (Logistic, Tent, Henon, Sine...) should be selected taking into consideration its advantages and disadvantages in regard to a picture encipherment. Does the selection of an appropriate map depend on the image properties? The proposed system shows relevant properties of the image influence in the evaluation process of the selected chaotic map. The first chapter discusses the main principles of chaos theory, its applicability to image encryption including various sorts of chaotic maps and their math. Also this research explores the factors that determine security and efficiency of such a map. Hence the approach presents practical standpoint to the extent that certain chaos maps will bec
... Show MoreSorghum cultivation is often accompanied by low field emergence rates and weak seedlings, which may be due to genetic or environmental stress. A factorial experiment was conducted in the spring and fall seasons of 2022 using a randomized complete block design with split-plot arrangement and four replications. Planting dates (spring season: Feb. 15th, Mar. 1st, 15th, and Apr. 1st, 15th; fall season: Jun. 15th, Jul. 1st, 15th, and Aug. 1st, 15th) were allocated to the main plots. Seeds stimulation treatments (35% banana peel extract + 100 mg L-1 citric acid and distilled water soaking treatment only) were allocated to the subplots. The interaction treatment (banana peel extract + citric acid) with the planting date of April 15 showed the high
... Show MoreThere is a mutual relationship between the form of a text and its meaning so as separating these two or devaluating the role of one of them leads to the absence of the value therein. Thus, a translation is important as to how it relates the details of a text. That is, the text has special features which go beyond form, and these set out its distinctiveness. Here, we tackle Saleh al-Jafari's Arabic translation of "Rubbayat al-Khayyam" of Naysapour descriptively and analytically by depending on extracts from the original text. This translation is evaluated on the basis of Spanish critic Maria Carmen Valero Garces. Herein, we discuss the effectiveness of this theory in the criticism of literary texts. It has been concluded that al-Jaf
... Show Morethe Current research aims to identify the psychological stressors coping strategies and their relationship to the cognitive motivation among Al-Anbar University students through the following hypotheses: 1) no statistically significant differences at a level (0.05) among the sample according to the instrumental support strategy depending on the variable type and specialization, 2) No statistically significant differences at a level (0.05) among the sample in regard of coping avoiding strategy depending on the variable type and specialization, 3) There is no statistically significant difference at a level (0.05) in cognitive motivation level among Al-Anbar University students, 4) No statistically significant differences at a level (0.05)
... Show MoreThe present search aims to develop a test for selective attention, cognitive load and thinking mistakes and measuring these concepts among Baghdad university students. To make a comparison between the selective attention, cognitive load, and the mistakes of thinking among students in term of gender. To identify the relationship among the selective attention, cognitive load and the mistakes of thinking of university students. To achieve these purposes, the searcher has developed a test for selective attention, cognitive load, and the mistakes of thinking. Then, these tools were applied to a sample of (200) university students were selected from (21) college. The researcher used t-test of one sample, t-test of two independent
... Show MoreAgricultural lands have great importance in people's lives, and their exploitation has a great impact on strengthening the national economy. Therefore, countries have given great importance to this sector, and because of the importance of this sector, the state has given large areas of these lands to the farmers to invest in agriculture, and among these farmers are those who died and left behind children who took up crafts. Agriculture, for fear that these agricultural lands would be abandoned and turned into waste lands, a land system was introduced called (regular distribu- tion), which corresponds to (legitimate inheritance). Under this system, these lands were trans- ferred to the children of farmers who died so that the process of inve
... Show MoreSocietal security is regarded as a basic need for human society through which the stability, progress and prosperity of the nation is measured. It is the guarantor of the safety of individuals and groups from various internal and external dangers, based on the protection of the three pillars: the individual, the family, and society. For decades, Iraq has witnessed the phenomenon of political instability, represented by its entry into several wars, starting with the 1948 war, leading up to the American war on Iraq in 2003. Then, those wars were followed by an era in which corruption and terrorism spread, and this, in turn, led to the fragmentation of the national will and the division of Iraqi public opinion regarding many regional and inte
... Show More