Progression in Computer networks and emerging of new technologies in this field helps to find out new protocols and frameworks that provides new computer network-based services. E-government services, a modernized version of conventional government, are created through the steady evolution of technology in addition to the growing need of societies for numerous services. Government services are deeply related to citizens’ daily lives; therefore, it is important to evolve with technological developments—it is necessary to move from the traditional methods of managing government work to cutting-edge technical approaches that improve the effectiveness of government systems for providing services to citizens. Blockchain technology is among the modern technologies highly suitable for developing digital governance services, and its technological ability to sustain information stability is vital in digital governance systems since it improves integrity and transparency measures while preventing corruption. In this study, computer networking protocols are built to form a peer-to-peer network framework for managing official documents. using blockchain technology was built to illustrate how any element of government work may be developed using it. The suggested framework comprises the addition of a new official document, and the verification of an existing document. The system was created in socket programming using Java and tested the response times for many simultaneous requests. The system was tested using transactions per second (throughput) measurement. The result showed that the proposed system processed 200 document verification transactions within 50 seconds. In addition, the test of the proposed system presented the time required for document retrieval—about three seconds to answer 100 document retrieval transactions. Furthermore, the results of throughput were compared to the results of the same measurement of some popular applications such as bitcoin. And the result of the proposed system was within the average value of output throughput of the other compared applications.
Issam al-Din al-Asfrani's footnote
On the interpretation of the oval
Imam
Issam al-Din Ibrahim Arbashah al-Asfrani
(Th 159 e)
Surah Al-Baqarah (verse 55-911)
In this paper, the theoretical cross section in pre-equilibrium nuclear reaction has been studied for the reaction at energy 22.4 MeV. Ericson’s formula of partial level density PLD and their corrections (William’s correction and spin correction) have been substituted in the theoretical cross section and compared with the experimental data for nucleus. It has been found that the theoretical cross section with one-component PLD from Ericson’s formula when doesn’t agree with the experimental value and when . There is little agreement only at the high value of energy range with the experimental cross section. The theoretical cross section that depends on the one-component William's formula and on-component corrected to spi
... Show MoreAbstract
The purpose of the present paper is to light on the relationship between jobs design, analysis and its reflections on reinforcing workers' vocational adjustment. The present paper aims to accomplish cognitive and applied goals, top of which, test of functional analysis ability to have effect upon workers' vocational adjustment via job design directly and indirectly owning to the virtual factor practiced by these practices on the sought organization. The problem of the present paper comes with many, the most important is the of how to bolster and back up worker's technical adjustment through good and accurate design for the job.
Based on this problem and goals as to expla
... Show MoreAbstract
Nowadays, the world adopts a philosophy that relates to environmental conservation. This philosophy can be achieved through providing environmentally friendly products while satisfying customers' needs as well. To attain that, a new systems and programs need to be applied in a scientific manner, and total quality environmental management (TQEM) is among these concepts. The research aimed to analyze the Relationship between (TQEM) Practices and its effect on Flexible Manufacturing in Badush factory. The research sample includes managers and head of divisions at top, middle and front line management levels which were (27) working in Badush factory. To achieve the objectives of the study, the descriptive anal
... Show MoreTelevision white spaces (TVWSs) refer to the unused part of the spectrum under the very high frequency (VHF) and ultra-high frequency (UHF) bands. TVWS are frequencies under licenced primary users (PUs) that are not being used and are available for secondary users (SUs). There are several ways of implementing TVWS in communications, one of which is the use of TVWS database (TVWSDB). The primary purpose of TVWSDB is to protect PUs from interference with SUs. There are several geolocation databases available for this purpose. However, it is unclear if those databases have the prediction feature that gives TVWSDB the capability of decreasing the number of inquiries from SUs. With this in mind, the authors present a reinforcement learning-ba
... Show MoreThe objective of the research is to identify the effect of an instructional design according to the active learning modelsالباحثين in the achievement of the students of the fifth grade, the instructional design was constructed according to the active learning models for the design of education. The research experience was applied for a full academic year (the first & the second term of 2017-2018). The sample consisted of 58 students, 28 students for the experimental group and 30 students for the control group. The experimental design was adopted with partial and post-test, the final achievement test consisted of (50) objectives and essays items on two terms, the validity of the test was verified by the adoption of the Kudoric
... Show MoreThe steganography (text in image hiding) methods still considered important issues to the researchers at the present time. The steganography methods were varied in its hiding styles from a simple to complex techniques that are resistant to potential attacks. In current research the attack on the host's secret text problem didn’t considered, but an improved text hiding within the image have highly confidential was proposed and implemented companied with a strong password method, so as to ensure no change will be made in the pixel values of the host image after text hiding. The phrase “highly confidential” denoted to the low suspicious it has been performed may be found in the covered image. The Experimental results show that the covere
... Show More