Blockchain is an innovative technology that has gained interest in all sectors in the era of digital transformation where it manages transactions and saves them in a database. With the increasing financial transactions and the rapidly developed society with growing businesses many people looking for the dream of a better financially independent life, stray from large corporations and organizations to form startups and small businesses. Recently, the increasing demand for employees or institutes to prepare and manage contracts, papers, and the verifications process, in addition to human mistakes led to the emergence of a smart contract. The smart contract has been developed to save time and provide more confidence while dealing, as well as to cover the security aspects of digital management and to solve negotiation concerns. The smart contract was employed in creating a distributed ledger to eliminate the need for centralization. In this paper, a simple prototype has been implemented for the smart contract integrated with blockchain which is simulated in a local server with a set of nodes. Several security objectives, such as confidentiality, authorization, integrity, and non-repudiation, have been achieved in the proposed system. Besides, the paper discussed the importance of using the Blockchain technique, and how it contributed to the management of transactions in addition to how it was implemented in highly transparent real-estate scenarios. The smart contract was employed in creating a distributed ledger to eliminate the need for centralization. The elliptic-curve public key has been adopted as an alternative for the RSA in a signature generation/verification process and encryption protocol. For secure transactions, The Secure Socket Layer (SSL) also has been adopted as a secure layer in the web browser. The results have been investigated and evaluated from different aspects and the implementation was in a restricted environment. Experiments showed us the complexity of time and cost when using the (ECC) algorithm and using (RSA) algorithm depending on the size and length of the key. So if the size of the key in (ECC) equals (160) bits, and it corresponds to (1024) bits in (RSA), which is equivalent to 40% for (ECC) and 30% for (RSA). As a result, the (ECC) algorithm is complex, its key is smaller and the process of generating the key is faster, so it has achieved a high level of security.
Background: Periodontitis and type 2 diabetes mellitus are both considered as a chronic disease that affect many people and have an interrelationship in their pathogenesis. Objective: The aim is to evaluate the salivary levels of interleukin-17 (IL-17) and galectin-3 in patients with periodontitis and type-2 diabetes mellitus. Materials and Methods: The samples were gathered from 13 healthy (control group) and 75 patients split into 3 groups, 25 patients with type 2 diabetes mellitus and healthy periodontium (T2DM group), 25 patients with generalized periodontitis (P group), and 25 patients with generalized periodontitis and type 2 diabetes mellitus (P-T2DM group). Clinical periodontal parameters were documented. The concentration of IL-17
... Show MoreBackground: Anti-oxidants are used as supplements to counteract the over production of free radicals in periodontal disease.Co-Q10 functions as an intercellular antioxidant by acting as a primary scavenger of free radicals (FRs) and reactive oxygen species (ROS), this study aimed to evaluate the effect of intra pocket application of perio Q gel (coenzyme Q10) alone and as adjunct to scaling and root planing on the periodontal clinical parameters in the treatment of patients with chronic periodontitis and compare the better improvement on the clinical periodontal parameters among different treatment modalities at 3 and 6 weeks. Materials and methods: A total of 323 sites with pocket depth (5-8) mm in patients with chronic periodontitis were
... Show MoreThe predatory bush crickets Saga ephippigera Fischer Von Waldheim, 1846 is the largest Iraqi orthopterans and one of the most active and successful predators in the Kurdistan region. The nymphs and adults prey on all the stages of various species of insects. Twelve adult specimens were collected from Erbil Province during May 2018 and June 2021. Morphological structures of the adult insects were described and illustrated in details; important taxonomic characteristics of body regions with their appendages were chosen; and the results indicated the importance of morphological characteristics which confirmed the identification of this species correctly.
A field experiment was conducted in an agricultural field in Al-Hindia district, Karbala governorate in a silty clay soil during the year 2020. The research included a study of two factors, the first is the depth of plowing at two levels, namely 13 and 20 cm, which represented the main blocks. The second is the tire inflation pressure at two levels, namely (70 and 140 kPa), which represented the secondary blocks. Slippage percentage, field efficiency, leaf area, and 300 grain weight were studied. The experiment was carried out using a split-plot system under a Randomized complete block design, at three replications. The tillage depth of 13 cm exceeds/transcend by giving it the least slippage of (11.01%), the highest field efficiency of (50.
... Show Morein this paper copper oxide (cuO thin films were prepared by the method of vacum thermal evaporation a pressure.
Background Bilateral cleft lip deformity is much more difficult to correct than unilateral cleft lip deformity. The complexity of the deformity and the sensitive relationships between the arrangement of the muscles and the characteristics of the external lip necessitate a comprehensive preoperative plan for management. The purpose of this study was to evaluate the repair of bilateral cleft lip using the Byrd modification of the traditional Millard and Manchester methods. A key component of this repair technique is focused on reconstruction of the central tubercle.
Methods Fourteen patients with mean age of 5.7 months presented with bilateral cleft lip deformity and were operated on using a mod
... Show MoreA single step extraction-cleanup procedure using porous membrane-protected micro-solid phase extraction (μ-SPE) in conjunction with liquid chromatography–tandem mass spectrometry for the extraction and determination of aflatoxins (AFs) B1, B2, G1 and G2 from food was successfully developed. After the extraction, AFs were desorbed from the μ-SPE device by ultrasonication using acetonitrile. The optimum extraction conditions were: sorbent material, C8; sorbent mass, 20 mg; extraction time, 90 min; stirring speed, 1000 rpm; sample volume, 10 mL; desorption solvent, acetonitrile; solvent volume, 350 μL and ultrasonication period, 25 min without salt addition. Under the optimum conditions, enrichment factor of 11, 9, 9 and 10 for AFG2, AFG1
... Show More