In modern technology, the ownership of electronic data is the key to securing their privacy and identity from any trace or interference. Therefore, a new identity management system called Digital Identity Management, implemented throughout recent years, acts as a holder of the identity data to maintain the holder’s privacy and prevent identity theft. Therefore, an overwhelming number of users have two major problems, users who own data and third-party applications will handle it, and users who have no ownership of their data. Maintaining these identities will be a challenge these days. This paper proposes a system that solves the problem using blockchain technology for Digital Identity Management systems. Blockchain is a powerful technique to build a digital identity in chain matters that enables a secure environment. The idea of Blockchain is to distribute the data across multiple devices in a cryptographic way, which will reduce the ability to an impossible level. Therefore, in this paper a proposed Digital Identity based on Blockchain (ERC 725, and ERC 735) with MD6 as a hashing algorithm will be implemented in a Secure smart contract can prevent function calls from being carried out until the sender has received confirmation from a reliable issuer; for example, we might include a feature that restricts smart contract interactions to legitimate users only. Many additional use cases are possible with ERC-725, including multi-sig execution approvals and contract call verification in place of key validation.
The research synthesis variables of competitive advantage and the mechanism achieved by focusing on knowledge abilities and strategic of the administrative leadership, and governments and the developed countries took the racing frantically and my destiny to invest more money and resources to development of wealth and human knowledge is so choice investment winner always and who Aaikhyee never, because God Almighty give humans the abilities of all other creatures and that these abilities varying from person to person, there is the problem of search provoking questions about the essence of what it's about research and both sides theoretical and field, the objective of this research
... Show MoreIn accounting studies, more than one method is used to measure income and balance sheets elements. One of these methods is called the fair value, which use to determine the assets and liabilities ad it includes the benefits or self-satisfaction ability. This paper aims to focus on the importance of fair value as a basis of accounting measurement and its effects to achieve the relevant characteristics by using the equation is used by (Kythreotis) in his research, And Also , Editing this equation depending on the financial data and information of Iraqi Banks as a case.
phenomenon in the Arab women's contemporary literature, but it is rare in Iraqi women's
literature and falls short to the level of the phenomenon until now. Perhaps this is one of the
main reasons that caused the reluctance of researchers to study it, and this is probably the first
academic research in this field.
This research followed the discourse of Autobiography of women in Iraq, depending on the
two factors of charter and reference of the elements of Philippe Lejeune’s definition of the
genre of Autobiography, without focusing on narrative method, so it handled notes,
memories, diaries and biography of the other and counted all under the genre of the
Biography.
It came in three sections, the first follo
This research aims to shed light on the necessity of establishing an information security management system through which banking security risks are managed in the light of the ISO (IEC 27001) standard, through which bank departments seek to demonstrate the management of their security systems and their controls in accordance with the specifications of the standard to obtain an internationally recognized security certificate And the need for senior management in banks to an independent person with scientific and practical qualification and who has accredited certificates in the field of information technology for the purpose of helping them to verify the level of compatibility between the policies and procedures applied and the p
... Show MoreThis competition between competing forces, organized into axes with conflicting objectives, is reflected in all regional affairs and the goals and interests of countries within them, including Iraq. Among the most important aspects impacted by the repercussions of international and regional competition in the region is Iraqi national security, based on its vital importance in preserving the sovereignty and entity of the Iraqi state, protecting the interests and cohesion of the state and people, ensuring and defending their present and future, and interacting with various regional and international activities. The Kurdistan Region, as an important part of Iraq with its own unique characteristics, may be one of the most important regi
... Show MoreThe research aims to shed light on the financing structure, which is one of the important pillars of financial management in the commercial banking sector, which enhances its financial position through financing its various investments, which is one of the pillars of the successful economy of the commercial banking sector. in which country. The contents of the research variables, which were represented by the independent variable, financing structure, the dependent variable, and investment decisions in commercial banks, which the researcher tried to address, as the research began with a basic variable that depends on diagnosing the impact of the financin
... Show MoreThe security of information represent the available protection of information and its component and guaranty the its safety and confidentiality. The absent or lack or stop of security of information and without maximum benefit may lead to lose confidence and make it burden on the company. So we must protect the company and information from the damages which may lead to the frailer of performance and loses of the company and its workers. So the security of information considered one of the potential and controlling basis to protect individuals and companies from the damages. To insure the security and confidentiality of information there are delicate, proper and trusted ways, like FIRE WALL, PASS WORD, SYPHAR
... Show MoreNominal ellipsis is a linguistic phenomenon found in English and Arabic .It is
based on leaving out a part of a nominal construction or more for the sake of good
style , compactness and connectedness .This phenomenon is found in the language of
the Glorious Qur’an .The study in hand is concerned with how translators handle
translating Qur’anic verses which contain ellipted nouns , i ,e. , to what extent the
translated Qur’anic verses are close to the original ones , and to what extent their
translations serve understanding the meanings of the glorious verses while at the
same time maintaining their beauty in style. The study aims at shedding light on
nominal ellipsis in English and Arabic .The study undertak
يسعى البحث إلى الاهتمام بإحدى الوظائف المهمة في إدارة الموارد البشرية وهي تقويم الأداء التي تواجه مجموعة من الانتقادات والآراء السلبية، اذ ظهر في الأّونة الأخيرة أنموذج جديد يمكن إن يتجاوز تلك السلبيات وهو أنموذج التغذية العكسية المتعدد المصادر درجة .وقد حاول الباحثان توظيف هذا المفهوم في اثنتين من المنظمات العامة العراقية هما (دائرة كهرباء الوسط) التابعة لوزارة الكهرباء
و (دائرة الماء والمجاري) ال