Progression in Computer networks and emerging of new technologies in this field helps to find out new protocols and frameworks that provides new computer network-based services. E-government services, a modernized version of conventional government, are created through the steady evolution of technology in addition to the growing need of societies for numerous services. Government services are deeply related to citizens’ daily lives; therefore, it is important to evolve with technological developments—it is necessary to move from the traditional methods of managing government work to cutting-edge technical approaches that improve the effectiveness of government systems for providing services to citizens. Blockchain technology is among the modern technologies highly suitable for developing digital governance services, and its technological ability to sustain information stability is vital in digital governance systems since it improves integrity and transparency measures while preventing corruption. In this study, computer networking protocols are built to form a peer-to-peer network framework for managing official documents. using blockchain technology was built to illustrate how any element of government work may be developed using it. The suggested framework comprises the addition of a new official document, and the verification of an existing document. The system was created in socket programming using Java and tested the response times for many simultaneous requests. The system was tested using transactions per second (throughput) measurement. The result showed that the proposed system processed 200 document verification transactions within 50 seconds. In addition, the test of the proposed system presented the time required for document retrieval—about three seconds to answer 100 document retrieval transactions. Furthermore, the results of throughput were compared to the results of the same measurement of some popular applications such as bitcoin. And the result of the proposed system was within the average value of output throughput of the other compared applications.
Existing literature suggests that construction worker safety could be optimized using emerging technologies. However, the application of safety technologies in the construction industry is limited. One reason for the constrained adoption of safety technologies is the lack of empirical information for mitigating the risk of a failed adoption. The purpose of this paper is to fill the research gap through identifying key factors that predict successful adoption of safety technologies.
In total, 26 key technology adoption predictors
Study of the development of an activated carbon nanotube catalyst for alkaline fuel cell technology. Through the prepared carbon nanotubes catalyst by an electrochemical deposition technique. Different analytical approaches such as X-ray diffraction (XRD) to determine the structural properties and Scanning Electron Microscope (SEM), were used to characterize, Mesh stainless steel catalyst substrate had an envelope structure and a large surface area. Voltages were also obtained at 1.83 V and current at 3.2 A of alkaline fuel cell. In addition, study the characterization of the electrochemical parameters.
Purpose: The research aims to study the measurement of the performance of accounting units level of the research sample by using the Federal quality Model European (EFQM) Design/methodology/approach: the (EFQM) which included seven dimensions "Leadership, Strategic Planning, External Focus, Information and Analysis, Faculty / Staff and Workplace Focus, Process Effectiveness & Outcomes and Achievements" And its effect on the Control Environment, which includes three dimensions: "Integrity, management philosophy and commitment to powers" . the sample is supervisory units of colleges affiliated with the University of Baghdad in Iraq, and a sample was chosen that included fifty-one individuals in the accounting departments.
... Show MoreBackground: Several pathologies of the oral cavity have been associated with stress. Dental students need to gain assorted proficiencies as theoretical knowledge, clinical proficiencies, and interpersonal dexterity which is accompanied with high level of stress. Uric acid is the major antioxidant in saliva. The aim of this study is to assess the dental caries experience among dental students with different levels of dental environment stress in relation to physicochemical characteristics of whole unstimulated saliva.
Materials and Methods: the total sample is composed of 300 dental students (73 males, 227 female) aged 22-23 years old, from collage of dentistry / university of Baghdad, from the 4t
... Show MoreThe research statement to the amount of the contribution of information and communication technology in the quality of tourism and hotel services, and determine the relationship between the impact of information and communication and the quality of tourism services technology, The importance of the research is to establish the philosophical thinking of the nature of variables, as a modern administrative terminology and employ them towards the quality of tourism and hotel services, the research dealt with a problem expressed by a number of intellectual and practical questions, Was formulated based on the current situation witnessed by the tourism sector and hotel in Iraq, and the real gap was the lack of awareness of the impo
... Show MoreThe study aims to display the scientific benefit offered by modern electronic programs for various scientific research methods, while determining the positive scientific role played by these programs in modernizing the methodologies and logic of scientific thinking, especially with the rapid development of the sciences and their curricula.
These programs link accurately with scientific results. The importance of the study is to provide practical mechanisms to highlight the scientific projection of the electronic programs in various steps of scientific research.
A case study was used for Tropes version 8.4, which analyzes written, audio and visual semantic texts and presents a set of statistical results that facilitate the difficult
In this paper, the goal of proposed method is to protect data against different types of attacks by unauthorized parties. The basic idea of proposed method is generating a private key from a specific features of digital color image such as color (Red, Green and Blue); the generating process of private key from colors of digital color image performed via the computing process of color frequencies for blue color of an image then computing the maximum frequency of blue color, multiplying it by its number and adding process will performed to produce a generated key. After that the private key is generated, must be converting it into the binary representation form. The generated key is extracted from blue color of keyed image then we selects a c
... Show MoreImage classification is the process of finding common features in images from various classes and applying them to categorize and label them. The main problem of the image classification process is the abundance of images, the high complexity of the data, and the shortage of labeled data, presenting the key obstacles in image classification. The cornerstone of image classification is evaluating the convolutional features retrieved from deep learning models and training them with machine learning classifiers. This study proposes a new approach of “hybrid learning” by combining deep learning with machine learning for image classification based on convolutional feature extraction using the VGG-16 deep learning model and seven class
... Show More