Blockchain is an innovative technology that has gained interest in all sectors in the era of digital transformation where it manages transactions and saves them in a database. With the increasing financial transactions and the rapidly developed society with growing businesses many people looking for the dream of a better financially independent life, stray from large corporations and organizations to form startups and small businesses. Recently, the increasing demand for employees or institutes to prepare and manage contracts, papers, and the verifications process, in addition to human mistakes led to the emergence of a smart contract. The smart contract has been developed to save time and provide more confidence while dealing, as well as to cover the security aspects of digital management and to solve negotiation concerns. The smart contract was employed in creating a distributed ledger to eliminate the need for centralization. In this paper, a simple prototype has been implemented for the smart contract integrated with blockchain which is simulated in a local server with a set of nodes. Several security objectives, such as confidentiality, authorization, integrity, and non-repudiation, have been achieved in the proposed system. Besides, the paper discussed the importance of using the Blockchain technique, and how it contributed to the management of transactions in addition to how it was implemented in highly transparent real-estate scenarios. The smart contract was employed in creating a distributed ledger to eliminate the need for centralization. The elliptic-curve public key has been adopted as an alternative for the RSA in a signature generation/verification process and encryption protocol. For secure transactions, The Secure Socket Layer (SSL) also has been adopted as a secure layer in the web browser. The results have been investigated and evaluated from different aspects and the implementation was in a restricted environment. Experiments showed us the complexity of time and cost when using the (ECC) algorithm and using (RSA) algorithm depending on the size and length of the key. So if the size of the key in (ECC) equals (160) bits, and it corresponds to (1024) bits in (RSA), which is equivalent to 40% for (ECC) and 30% for (RSA). As a result, the (ECC) algorithm is complex, its key is smaller and the process of generating the key is faster, so it has achieved a high level of security.
The pretreatment process can be considered one of the important processes in wastewater treatment, especially coagulation process to decrease the strength of many pollutants. This paper focused on using powdered date seeds as natural coagulant in addition to chemical coagulants (alum and ferric chloride) to find the optimum dosage of each coagulant that makes efficient removal of turbidity and chemical oxygen demand (COD) from domestic wastewater as a pretreatment process, then finding the optimum combined dosages of date seeds with alum, date seeds with ferric chloride that make efficient removal for both pollutants. Concerning turbidity, the optimum dosage for date seeds, alum and ferric chloride were 40 mg/l (79%), 70
... Show MoreThe problem of generated waste as a result of the implementation of construction projects, has been aggravated recently because of construction activity experienced by the world, especially Iraq, which is going through a period of reconstruction, where construction waste represents (20-40%) of the total generated waste and has a negative effect on the environment and economic side of the project. In addition, the rate of consumpted amounts of natural resources are estimated to be about 40% in the construction industry, so it became necessary to reduce waste and to be manage well. This study aims to identify the key factors affecting waste management through the various phases of the project, and this is accom
... Show MoreBackground: Medicinal plants that possess antimicrobial and antioxidant properties have garnered significant attention for their role in maintaining food quality, improving safety, and impeding spoilage. They also can aid in controlling food contamination risks and augmenting the nutritional value of foods. Objective: The study aimed to obtain botanical extracts possessing antimicrobial capabilities and use them to inhibit the growth of molds and yeasts. Additionally, these extracts are aimed at prolonging product shelf life by harnessing their antioxidant attributes. Methods: Several microorganisms, including E. coli and Pseudomonas, were subjected to testing. Ethanolic alcohol, chloroform, and essential oil extracts were prepared;
... Show MoreThe melting duration in the photovoltaic/phase-change material (PV/PCM) system is a crucial parameter for thermal energy management such that its improvement can realize better energy management in respect to thermal storage capabilities, thermal conditions, and the lifespan of PV modules. An innovative and efficient technique for improving the melting duration is the inclusion of an exterior metal foam layer in the PV/PCM system. For detailed investigations of utilizing different metal foam configurations in terms of their convective heat transfer coefficients, the present paper proposes a newly developed mathematical model for the PV/PCM–metal foam assembly that can readily be implemented with a wide range of operating condition
... Show MoreThe new compounds of pyrazolines were synthesized from the reaction of different acid hydrazide with ethylacetoacetate and ethanol under reflux. These compounds were obtained from many sequence reactions. The 4-acetyl-5-methyl-2,4-dihydro-3H-pyrazol-3-one compounds synthesized from the reaction of 5-methyl-2,4-dihydro-3H-pyrazol-3-one with acetyl chloride in calcium hydroxide and 1,4-dioxane. Finaly, Schiff bases were prepared via condensation reaction of products of mono- and tri ketone derivatives[IV]a, b with phenyl hydrazines as presented in (Scheme 1, 2). The synthesized compounds were identification by using FTIR, NMR and Mass spectroscopy (of some of them).
Since the Internet has been more widely used and more people have access to multimedia content, copyright hacking, and piracy have risen. By the use of watermarking techniques, security, asset protection, and authentication have all been made possible. In this paper, a comparison between fragile and robust watermarking techniques has been presented to benefit them in recent studies to increase the level of security of critical media. A new technique has been suggested when adding an embedded value (129) to each pixel of the cover image and representing it as a key to thwart the attacker, increase security, rise imperceptibility, and make the system faster in detecting the tamper from unauthorized users. Using the two watermarking ty
... Show MoreChronic kidney disease is one of the leading public health problems that affect millions of women and men worldwide.
This study aims to examine the effect of deep breathing to reduce discomfort amongst patient undergoing haemodialysis (HD).
This randomised controlled experimental study was conducted consisted of 108 patients (54 in each group) who undergoing HD in hospitalised adults’ patients between November 2024 an