Blockchain technology relies on cryptographic techniques that provide various advantages, such as trustworthiness, collaboration, organization, identification, integrity, and transparency. Meanwhile, data analytics refers to the process of utilizing techniques to analyze big data and comprehend the relationships between data points to draw meaningful conclusions. The field of data analytics in Blockchain is relatively new, and few studies have been conducted to examine the challenges involved in Blockchain data analytics. This article presents a systematic analysis of how data analytics affects Blockchain performance, with the aim of investigating the current state of Blockchain-based data analytics techniques in research fields and exploring how specific features of this new technology may transform traditional business methods. The primary objectives of this study are to summarize the significant Blockchain techniques used thus far, identify current challenges and barriers in this field, determine the limitations of each paper that could be used for future development, and assess the extent to which Blockchain and data analytics have been effectively used to evaluate performance objectively. Moreover, we aim to identify potential future research paths and suggest new criteria in this burgeoning discipline through our review. Index Terms— Blockchain, Distributed Database, Distributed Consensus, Data Analytics, Public Ledger.
The Arab Islamic art was best known as pure abstraction or realism distorted from what is natural. The two styles, or one of them, was the most prominent in the Islamic arts, such as decoration, photography and architecture. The analogy that was prevalent in the non-Islamic world did not have a presence equivalent the aforementioned styles despite the great openness to the cultures of different countries, which characterized that stage, which resulted from the Islamic conquests, the conversion of many people to the Islamic faith, and their migration to the Islamic cities at the time, bringing with them their arts and methods of formulation. This makes us question the influential references that invite the Arab Muslim artist to follow the
... Show MoreThe study tries to answer several questions posed by the subject, one of the important: How the Internet promotes rumor? And what are the most Internet applications that promote rumor? And the practical ways to reduce these negative? Using the process of in vestige and reading theoretical heritage available in this field, and inferred the numbers and statistics marked the uses of the Internet and its applications over recent years, and the characteristics of each these tools in the field of collection, processing, and dissemination of information
The linguistic researcher reads a systematic crisis, idiomatic problems within the linguistic term coming to the Arab culture. Where most of them return back to problems of receiving these sciences which are represented by phenomena like the multiplicity linguistic term, disturbance translated idiomatic concept and its duality.
Aims of the research :
1-Initializing new textbooks to form linguistic project and Arabic linguistic theory.
2-Determination adjusted knowledge, concepts of Arabian heritage linguistics subject
3-Observation the causes of disturbance crisis of linguistic term and its relation to
... Show MoreAny person, regardless of his location in the air, whether he was kidnapped or trained, and then he performs a certain work, believes that his work is in vain, and by God, his deeds. I wonder if those who hold him in the first place will be safe in good form. He said that the essence of justice in the story is the story:
These are given the meaning we have fought in the fact that each group of. He went beyond creating a group of blocs, sects, and parties. If justice indicated one meaning, these relationships between people and peace would diminish. In fact, justice has only one concept, but there are several associations with it in the field of divorced one of these synonyms. However, the variation in racist drums in the encounte
... Show MoreThere are many developments in political, strategic aspects in the middle east either in
international field which represented by U.S.A as first polar in world or territorial field which
represent by Turkey and Iran, as territorial powers in the region, Turkish role is fit with
American position in order to draw new map of middle east, Turkey advocate new policy to
confirm its attitude in Euro peen Union and its relation with U.S.A.
Iran adopted policy of Expansion in Iraq, Yamen, Lebanon and Syria, in addition Iran
enlist all it efforts to develop its Nuclear program and enter Nuclear club which make Iran,
Super power in middle east and the world, each Turkey and Iran have certain attitudes toward
all political c
Background: Alteration in the expression of p53 tumor-suppressor protein is an event that occurs frequently in human cancer, but the practical implications of this phenomenon are yet to be fully exploited.
Objectives: to determine the value of p53 expression as a marker of tumor aggressiveness and the relationship between p53 over expression and clinico-pathologic variables in gastric adenocarcinoma.
Material & Methods: The expression of p53 was studied immunohisto-chemically in 10 cases with gastric dysplasia and 85 cases with gastric adenocarcinomas using formalin fixed, paraffin-embedded tissue samples. D07 a monoclonal antibody to p53 protein was used for the immunehistochemical analysis. The c
The widespread of internet allover the world, in addition to the increasing of the huge number of users that they exchanged important information over it highlights the need for a new methods to protect these important information from intruders' corruption or modification. This paper suggests a new method that ensures that the texts of a given document cannot be modified by the intruders. This method mainly consists of mixture of three steps. The first step which barrows some concepts of "Quran" security system to detect some type of change(s) occur in a given text. Where a key of each paragraph in the text is extracted from a group of letters in that paragraph which occur as multiply of a given prime number. This step cannot detect the ch
... Show MoreAbstract
This paper presents mechanical and electrical design, and implementation process of industrial robot, 3-DoF type SCARA (selective compliment assembly robot arm),with two rotations and one translation used for welding applications.The design process also included the controller design which was based on PLC(programmable logic controller) as well as selection of mechanical and electrical components.The challenge was to use the available components in Iraq with reasonable costs. The robot mentioned is fully automated using programmable logic controller PLC(Zelio type SR3-B261BD),with 16inputs and 10 outputs. The PLC was implemented in FBD logic to obtain three different automatic motions with hi
... Show MoreThis study uses the performance of the discretionary estimation models by using a sample of listed companies in the Netherlands and Germany. The actual accounting framework provides a wide opportunity for managers to influence data in financial reporting. The corporate reporting strategy, the way managers use their discretionary accounting, has a significant effect on the company's financial reporting. The authors contribute to the literature through enhancement to these models to accomplish better effects of identifying earnings management as well as to present evidence that is particular to the Dutch and German setting.
For this, we followed the methodology of Dechow, Sloan, and Sweeney (1995) and Chan
... Show MoreA fuzzy valued diffusion term, which in a fuzzy stochastic differential equation refers to one-dimensional Brownian motion, is defined by the meaning of the stochastic integral of a fuzzy process. In this paper, the existence and uniqueness theorem of fuzzy stochastic ordinary differential equations, based on the mean square convergence of the mathematical induction approximations to the associated stochastic integral equation, are stated and demonstrated.