Blockchain technology relies on cryptographic techniques that provide various advantages, such as trustworthiness, collaboration, organization, identification, integrity, and transparency. Meanwhile, data analytics refers to the process of utilizing techniques to analyze big data and comprehend the relationships between data points to draw meaningful conclusions. The field of data analytics in Blockchain is relatively new, and few studies have been conducted to examine the challenges involved in Blockchain data analytics. This article presents a systematic analysis of how data analytics affects Blockchain performance, with the aim of investigating the current state of Blockchain-based data analytics techniques in research fields and exploring how specific features of this new technology may transform traditional business methods. The primary objectives of this study are to summarize the significant Blockchain techniques used thus far, identify current challenges and barriers in this field, determine the limitations of each paper that could be used for future development, and assess the extent to which Blockchain and data analytics have been effectively used to evaluate performance objectively. Moreover, we aim to identify potential future research paths and suggest new criteria in this burgeoning discipline through our review. Index Terms— Blockchain, Distributed Database, Distributed Consensus, Data Analytics, Public Ledger.
Total Quality Assurance Concept have appeared in Higher Education Institutions as a result of the continuous criticism for the lower quality of the outputs of these institutions and their inappropriacy to the needs of the job market. The faculty, i.e. teaching staff member, is one of the most important output for his/her responsibility to achieve the stated goals in higher education. This represents a problem that may influence the construction of society which has to limit his tasks, responsibilities, and competencies that should be found in a faculty, and evaluating his teaching profession in light of the prerequisites of the century to become an input to achieve quality assurance in Higher Education. Therefore, the present study aims
... Show MoreThis paper demonstrates an experimental and numerical study aimed at comparing the influence of openings of different configurations on the flexural behavior of reinforced concrete gable roof beams. The experimental program consisted of testing six simply supported gable beams subjected to mid-point concentrated load. The variable which has been investigated in this work was opening's configuration (quadrilateral or circular) with the same upper and lower chords depth. The results indicate improvement in the beams’ flexural behavior when circular openings were used compared with that of quadrilateral openings, represented by an increase in ultimate load capacity and a decrease in deflection at the service limit. Also, there was an
... Show MoreThis research aims to the possibility of evaluating the strategic performance of the State Board for Antiquities and Heritage (SBAH) using a balanced scorecard of four criteria (Financial, Customers, Internal Processes, and Learning and Growth). The main challenge was that the State Board use traditional evaluation in measuring employee performance, activities, and projects. Case study and field interviews methodology has been adopted in this research with a sample consisting of the Chairman of the State Board, 6 General Managers, and 7 Department Managers who are involved in evaluating the strategic performance and deciding the suitable answers on the checklists to analyze it according to the 7-points Likert scale. Data analysis re
... Show MoreThe excellent specifications of electrodes coated with lead dioxide material make it of great importance in the industry. So it was suggested this study, which includes electrodeposition of lead dioxide on graphite substrate, knowing that the electrodeposition of lead dioxide on graphite studied earlier in different ways.
In this work the deposition process for lead dioxide conducted using electrolytic solution containing lead nitrate concentration 0.72 M with the addition of some other material to the solution, such as copper nitrate, nickel nitrate, sodium fluoride and cetyl trimethyl ammonium bromide, but only in very small concentrations. As for the operating conditions, the effect of change potential and temperature as well
... Show MoreThe current research aimed to identify the level of moral identity and social affiliation among students exposed to shock pressures, as well as to reveal the relationship between these variables. To achieve these objectives, the researcher adopted the diagnostic tool for the measure of post-traumatic stress disorder (PDS-5) scale (Foa, 2013) translated to Arabic language by (Imran, 2017). The researcher also adopted the moral identity scale built by (Al-Bayati, 2015) and the measure of social affiliation built by (Al-Jashami, 2013), which were applied to a random sample of (200) male and female students chose from al Anbar University. They were exposed to shock pressures. The results of the research showed that the sample has an average
... Show MoreIn the present work, the focusing was on the study of the x-ray diffraction, dielectric constant, loses dielectric coefficient, tangent angle, alter- natively conductivity and morphology of PET/BaTio3. The PET/BaTio3 composite was prepared for polyethylene terephthalate PET polymer composite containing 0, 10, 20, 30, 40, 50, and 60 wt. % from Barium titanate BaTi03 powder. The composite of two materials leads to form mixing solution and hot-pressing method. The effect of BaTio3 on the structure and dielectric properties with morphology was studied on PET matrix polymer using XRD, LCR meter and SEM.
Symmetric cryptography forms the backbone of secure data communication and storage by relying on the strength and randomness of cryptographic keys. This increases complexity, enhances cryptographic systems' overall robustness, and is immune to various attacks. The present work proposes a hybrid model based on the Latin square matrix (LSM) and subtractive random number generator (SRNG) algorithms for producing random keys. The hybrid model enhances the security of the cipher key against different attacks and increases the degree of diffusion. Different key lengths can also be generated based on the algorithm without compromising security. It comprises two phases. The first phase generates a seed value that depends on producing a rand
... Show More