Blockchain is an innovative technology that has gained interest in all sectors in the era of digital transformation where it manages transactions and saves them in a database. With the increasing financial transactions and the rapidly developed society with growing businesses many people looking for the dream of a better financially independent life, stray from large corporations and organizations to form startups and small businesses. Recently, the increasing demand for employees or institutes to prepare and manage contracts, papers, and the verifications process, in addition to human mistakes led to the emergence of a smart contract. The smart contract has been developed to save time and provide more confidence while dealing, as well as to cover the security aspects of digital management and to solve negotiation concerns. The smart contract was employed in creating a distributed ledger to eliminate the need for centralization. In this paper, a simple prototype has been implemented for the smart contract integrated with blockchain which is simulated in a local server with a set of nodes. Several security objectives, such as confidentiality, authorization, integrity, and non-repudiation, have been achieved in the proposed system. Besides, the paper discussed the importance of using the Blockchain technique, and how it contributed to the management of transactions in addition to how it was implemented in highly transparent real-estate scenarios. The smart contract was employed in creating a distributed ledger to eliminate the need for centralization. The elliptic-curve public key has been adopted as an alternative for the RSA in a signature generation/verification process and encryption protocol. For secure transactions, The Secure Socket Layer (SSL) also has been adopted as a secure layer in the web browser. The results have been investigated and evaluated from different aspects and the implementation was in a restricted environment. Experiments showed us the complexity of time and cost when using the (ECC) algorithm and using (RSA) algorithm depending on the size and length of the key. So if the size of the key in (ECC) equals (160) bits, and it corresponds to (1024) bits in (RSA), which is equivalent to 40% for (ECC) and 30% for (RSA). As a result, the (ECC) algorithm is complex, its key is smaller and the process of generating the key is faster, so it has achieved a high level of security.
Nebivolol (NBH) is a third-generation B1-blocker with high selectivity and vasodilation activity. Nevertheless, nebivolol exhibits low oral bioavailability, which may adversely affect its efficacy. Recently, supersaturable self-nanoemulsion (Su-SNE) is an advanced SNE approach that can address low bioavailability The study aims to prepare nebivolol-loaded Su-SNE by reduction the amount of the prepared conventional SNE to half. Besides, an appropriate polymer type and concentration to prevent NBH precipitation upon oral administration have investigated.. A conventional self-nanoemulsion (formula A) was prepared by dissolving NBH in 500 mg vehicle mixture of imwitor®988: cremophor-EL: propylene glycol. Then, eight Su-SNE formul
... Show MoreThe using of the parametric models and the subsequent estimation methods require the presence of many of the primary conditions to be met by those models to represent the population under study adequately, these prompting researchers to search for more flexible models of parametric models and these models were nonparametric models.
In this manuscript were compared to the so-called Nadaraya-Watson estimator in two cases (use of fixed bandwidth and variable) through simulation with different models and samples sizes. Through simulation experiments and the results showed that for the first and second models preferred NW with fixed bandwidth fo
... Show MoreIn this research, several estimators concerning the estimation are introduced. These estimators are closely related to the hazard function by using one of the nonparametric methods namely the kernel function for censored data type with varying bandwidth and kernel boundary. Two types of bandwidth are used: local bandwidth and global bandwidth. Moreover, four types of boundary kernel are used namely: Rectangle, Epanechnikov, Biquadratic and Triquadratic and the proposed function was employed with all kernel functions. Two different simulation techniques are also used for two experiments to compare these estimators. In most of the cases, the results have proved that the local bandwidth is the best for all the
... Show MoreThe issue of image captioning, which comprises automatic text generation to understand an image’s visual information, has become feasible with the developments in object recognition and image classification. Deep learning has received much interest from the scientific community and can be very useful in real-world applications. The proposed image captioning approach involves the use of Convolution Neural Network (CNN) pre-trained models combined with Long Short Term Memory (LSTM) to generate image captions. The process includes two stages. The first stage entails training the CNN-LSTM models using baseline hyper-parameters and the second stage encompasses training CNN-LSTM models by optimizing and adjusting the hyper-parameters of
... Show MoreAbstract The present study was Conducted to evaluate the effect of amixture of three species of arbuscular mycorrhizal fungi ( Glomus etunicatum , G. leptotichum and Rhizophagus intraradices ) in inducing the non-enzymatic antioxidants of tomato roots infected with Fusarium oxysporum f.sp. Lycopersici wich cause Fusarial wilt disease , and planted for 10 weeks in the presence of the organic matter ( peatmose) , using pot cultures in aplastic green house , Results indicated significant reduction of disease incidence percentage and infection rate of roots infected with the pathogen 4 weaks after mycorrhizal colonization in all treatments ( single , dual and trial interactions) . on the other hand mycorrhizal colonization of the roots in the
... Show More
Natural convection in an annular space provided with metal foam fins attached to the inner cylinder is studied numerically. The metal foam fins made of copper were inserted in different axial sections with three fins in each section. The temperature of the inner cylinder is kept constant while the annular outer surface is adiabatic. The thickness effect of the inner pipe wall was considered. Naiver Stokes equation with Boussinesq approximation is used for the fluid regime while Brinkman-Forchheimer Darcy model is used for metal foam. In addition, the local thermal non-equilibrium condition in the energy equation of the porous media is presumed. The effect of Rayleigh numb |
Despite scholars’ attention on the typology of modality as a linguistic phenomenon, yet the use of modality across varieties of English is not well visible in communication-based researches that take semantics, pragmatics and discourse issues as the objects for their investigation. The paper generates its data from six M. A. dissertations from Nigerian University and equal number of the M. A. dissertations from Iraqi University to qualitatively and quantitatively investigate the contextual use of modality within the pragmatic perspective. The data analysis reveals that modality such as usuality, potentiality, necessity, probability and obligation in the dissertations encapsulates interpersonal and authorial voice in which the mean
... Show MoreThe Machine learning methods, which are one of the most important branches of promising artificial intelligence, have great importance in all sciences such as engineering, medical, and also recently involved widely in statistical sciences and its various branches, including analysis of survival, as it can be considered a new branch used to estimate the survival and was parallel with parametric, nonparametric and semi-parametric methods that are widely used to estimate survival in statistical research. In this paper, the estimate of survival based on medical images of patients with breast cancer who receive their treatment in Iraqi hospitals was discussed. Three algorithms for feature extraction were explained: The first principal compone
... Show MoreIn this paper, a shallow foundation (strip footing), 1 m in width is assumed to be constructed on fully saturated and partially saturated Iraqi soils, and analyzed by finite element method. A procedure is proposed to define the H – modulus function from the soil water characteristic curve which is measured by the filter paper method. Fitting methods are applied through the program (SoilVision). Then, the soil water characteristic curve is converted to relation correlating the void ratio and matric suction. The slope of the latter relation can be used to define the H – modulus function. The finite element programs SIGMA/W and SEEP/W are then used in the analysis. Eight nodded isoparametric quadrilateral elements are used for modeling
... Show MoreIn this paper, we deal with games of fuzzy payoffs problem while there is uncertainty in data. We use the trapezoidal membership function to transform the data into fuzzy numbers and utilize the three different ranking function algorithms. Then we compare between these three ranking algorithms by using trapezoidal fuzzy numbers for the decision maker to get the best gains