Blockchain is an innovative technology that has gained interest in all sectors in the era of digital transformation where it manages transactions and saves them in a database. With the increasing financial transactions and the rapidly developed society with growing businesses many people looking for the dream of a better financially independent life, stray from large corporations and organizations to form startups and small businesses. Recently, the increasing demand for employees or institutes to prepare and manage contracts, papers, and the verifications process, in addition to human mistakes led to the emergence of a smart contract. The smart contract has been developed to save time and provide more confidence while dealing, as well as to cover the security aspects of digital management and to solve negotiation concerns. The smart contract was employed in creating a distributed ledger to eliminate the need for centralization. In this paper, a simple prototype has been implemented for the smart contract integrated with blockchain which is simulated in a local server with a set of nodes. Several security objectives, such as confidentiality, authorization, integrity, and non-repudiation, have been achieved in the proposed system. Besides, the paper discussed the importance of using the Blockchain technique, and how it contributed to the management of transactions in addition to how it was implemented in highly transparent real-estate scenarios. The smart contract was employed in creating a distributed ledger to eliminate the need for centralization. The elliptic-curve public key has been adopted as an alternative for the RSA in a signature generation/verification process and encryption protocol. For secure transactions, The Secure Socket Layer (SSL) also has been adopted as a secure layer in the web browser. The results have been investigated and evaluated from different aspects and the implementation was in a restricted environment. Experiments showed us the complexity of time and cost when using the (ECC) algorithm and using (RSA) algorithm depending on the size and length of the key. So if the size of the key in (ECC) equals (160) bits, and it corresponds to (1024) bits in (RSA), which is equivalent to 40% for (ECC) and 30% for (RSA). As a result, the (ECC) algorithm is complex, its key is smaller and the process of generating the key is faster, so it has achieved a high level of security.
The Voluntary Obedience has great importance for the modern taxes systems and its management and this is meant the taxpayer whom in charge to pay of his taxes obligations voluntarily , he is very known of himself whereas he prepared his finishing accountings and present them as samples prepared by taxes management and settle the tax sum directly according to specified income , which has an impact to find end to tax evasion as result lead to increase the tax income and achieve the justice for the taxpayer and the state treasury
The study deals with an analysis of the contents of the publications of the campaign (Together to defeat Corona), which was established by the United Nations Development Program in Iraq in the face of the Covid 19 virus.The research problem raises a main question:What are the implications of the campaign (Together to defeat Corona) of the United Nations Development Program (Iraq office) in addressing the Covid-19 virus in Iraq?From this main question, several sub-questions emerged, which were answered by this study in its chapters and investigations, including regarding the contents of advertisements, photos and videos for the publications of the (Together to Defeat Corona) campaign for the United Nations Iraq Office on their Facebook pageA
... Show MoreThe phenomenon of negative behavior has studied as a social and psychological phenomenon that effect on the performance and life of workers inside and outside the organization. The adoption of this phenomenon is studied in terms of the role of the internal environment of the organization in addressing this behavior, being the variables belong to the field of organizational behavior to see the results of those variables on the Iraqi organizations, since the specificities of it differ from the rest of the Arab and foreign environments. Therefore, this study focused on testing the relationship of the internal environment of the organization and its role in addressing the negative behavior of the workers.
thi
... Show MoreAbstract
This research deals will the declared production planning operation in the general company of planting oils, which have great role in production operations management who had built mathematical model for correct non-linear programming according to discounting operation during raw materials or half-made materials purchasing operation which concentration of six main products by company but discount included just three products of raw materials, and there were six months taken from the 1st half of 2014 as a planning period has been chosen . Simulated annealing algorithm application on non-linear model which been more difficulty than possible solution when imposed restric
... Show MoreAn Intelligent Internet of Things network based on an Artificial Intelligent System, can substantially control and reduce the congestion effects in the network. In this paper, an artificial intelligent system is proposed for eliminating the congestion effects in traffic load in an Intelligent Internet of Things network based on a deep learning Convolutional Recurrent Neural Network with a modified Element-wise Attention Gate. The invisible layer of the modified Element-wise Attention Gate structure has self-feedback to increase its long short-term memory. The artificial intelligent system is implemented for next step ahead traffic estimation and clustering the network. In the proposed architecture, each sensing node is adaptive and able to
... Show MoreSeveral recent approaches focused on the developing of traditional systems to measure the costs to meet the new environmental requirements, including Attributes Based Costing (ABCII). It is method of accounting is based on measuring the costs according to the Attributes that the product is designed on this basis and according to achievement levels of all the Attribute of the product attributes. This research provides the knowledge foundations of this approach and its role in the market-oriented compared to the Activity based costing as shown in steps to be followed to apply for this Approach. The research problem in the attempt to reach the most accurate Approach in the measurement of the cost of products from th
... Show MoreModern civilization increasingly relies on sustainable and eco-friendly data centers as the core hubs of intelligent computing. However, these data centers, while vital, also face heightened vulnerability to hacking due to their role as the convergence points of numerous network connection nodes. Recognizing and addressing this vulnerability, particularly within the confines of green data centers, is a pressing concern. This paper proposes a novel approach to mitigate this threat by leveraging swarm intelligence techniques to detect prospective and hidden compromised devices within the data center environment. The core objective is to ensure sustainable intelligent computing through a colony strategy. The research primarily focusses on the
... Show MoreThe research aims to identify the reasons that lead to asymmetry of information between economic unity administration and the parties that use accounting information such as shareholders, So, the ability to reach to the solutions that would reduce this problem, these factors have been divided into two types: the first one is the internal factors which represent the administration's desire in order to expand the self-interest of getting the profits and increase the value and competitive entity and investors to obtaining greater returns for their shares, so the second type is the external factors, which represent the failer that occurs in the laws and regula
... Show MoreIn this paper, Bayes estimators of the parameter of Maxwell distribution have been derived along with maximum likelihood estimator. The non-informative priors; Jeffreys and the extension of Jeffreys prior information has been considered under two different loss functions, the squared error loss function and the modified squared error loss function for comparison purpose. A simulation study has been developed in order to gain an insight into the performance on small, moderate and large samples. The performance of these estimators has been explored numerically under different conditions. The efficiency for the estimators was compared according to the mean square error MSE. The results of comparison by MSE show that the efficiency of Bayes est
... Show MoreAfter the Napoleonic Code of 1804 came without any legal rules specific to the duration of the contract, and was content to refer to it in scattered legal texts, Legislative Decree No. 2016-131 came to establish a comprehensive legal system for the duration of the contract, starting from the period of its formation, through the period of its implementation, and ending with its continuation after the expiration of its term, in the third section of the fourth chapter related to the effects of the contract (Articles 1210 - 1215), relying on judicial precedents on the one hand - which are many, as will be shown through the research pages - and contractual practices on the other hand. Perhaps the main motive that prompted the French legislator t
... Show More