Blockchain is an innovative technology that has gained interest in all sectors in the era of digital transformation where it manages transactions and saves them in a database. With the increasing financial transactions and the rapidly developed society with growing businesses many people looking for the dream of a better financially independent life, stray from large corporations and organizations to form startups and small businesses. Recently, the increasing demand for employees or institutes to prepare and manage contracts, papers, and the verifications process, in addition to human mistakes led to the emergence of a smart contract. The smart contract has been developed to save time and provide more confidence while dealing, as well as to cover the security aspects of digital management and to solve negotiation concerns. The smart contract was employed in creating a distributed ledger to eliminate the need for centralization. In this paper, a simple prototype has been implemented for the smart contract integrated with blockchain which is simulated in a local server with a set of nodes. Several security objectives, such as confidentiality, authorization, integrity, and non-repudiation, have been achieved in the proposed system. Besides, the paper discussed the importance of using the Blockchain technique, and how it contributed to the management of transactions in addition to how it was implemented in highly transparent real-estate scenarios. The smart contract was employed in creating a distributed ledger to eliminate the need for centralization. The elliptic-curve public key has been adopted as an alternative for the RSA in a signature generation/verification process and encryption protocol. For secure transactions, The Secure Socket Layer (SSL) also has been adopted as a secure layer in the web browser. The results have been investigated and evaluated from different aspects and the implementation was in a restricted environment. Experiments showed us the complexity of time and cost when using the (ECC) algorithm and using (RSA) algorithm depending on the size and length of the key. So if the size of the key in (ECC) equals (160) bits, and it corresponds to (1024) bits in (RSA), which is equivalent to 40% for (ECC) and 30% for (RSA). As a result, the (ECC) algorithm is complex, its key is smaller and the process of generating the key is faster, so it has achieved a high level of security.
Edward Albee's career extends to more than fifty years during which he has exposed different images of male and female protagonists mostly within the same frame; domestic instability. Albee's men and women are middle-class couples who find themselves entrapped in a meaningless world. Most, if not all, of Albee's men are detached from their wives due to existential problems or middle- age crises. Women, therefore find themselves obliged to sustain their husbands and marriages alone. Women in Albee's élan are cynical, frustrated, articulate as well as brave, strong and domineering.
Marriage Play is one of Albee’s works that tackled such image of these women. The play was comm
... Show MoreThis research proposes the application of the dragonfly and fruit fly algorithms to enhance estimates generated by the Fama-MacBeth model and compares their performance in this context for the first time. To specifically improve the dragonfly algorithm's effectiveness, three parameter tuning approaches are investigated: manual parameter tuning (MPT), adaptive tuning by methodology (ATY), and a novel technique called adaptive tuning by performance (APT). Additionally, the study evaluates the estimation performance using kernel weighted regression (KWR) and explores how the dragonfly and fruit fly algorithms can be employed to enhance KWR. All methods are tested using data from the Iraq Stock Exchange, based on the Fama-French three-f
... Show MoreThe objective of this research is to analyze the content of science textbook at the elementary level, according to the dimensions of sustainable development for the academic year (2015-2016). To achieve this goal has been to build a list with dimensions of sustainable development to be included in science textbooks in primary school, after seeing the collection of literature and research and studies, as has been reached to the list of the dimensions of the three sustainable development and social, economic and environmental in the initial image consisted of (63) the issue of sub-divided the three-dimensional, the menu and offered a group of arbitrators and specialists in curriculum and teaching methods, and thus the menu consiste
... Show MoreDNA, as the basis of every living cell, is one of the most important and influential scientific discoveries. This research aims to identify and compare the organizational DNA to the leadership practices of school principals in the Sultanate of Oman and to reveal the similarity between principals’ leadership practices and the structure of DNA. In addition, it intends to identify any statistically significant differences between the responses of the participants due to the study variables: gender, job title and experience. A questionnaire was designed and data were collected from a randomly selected sample composed of (100) teachers in the Sultanate of Oman. The study found limitless diversity in the characteristics of DNA of leadership
... Show MoreAccurate computation of the roughness coefficient is important in the studies of open channel flow. To measure and identify the hydraulic characteristics of the flow system, the model simulation is necessary to study and get the results of the hydraulic properties to specify Manning coefficient of the Euphrates River. In this study, the reach is extended along the Euphrates River from Haditha Dam to Ramadi Barrage with a distance of 169km. The HEC-RAS model was implemented to simulate the flow within the study reach. The geometry of the river was represented by more than two hundred cross-sections surveyed in 2013 and 2021. The model was calibrated using some observed discharges at the Heet gage station for records of th
... Show MoreThe aim of this paper is to estimate the concentrations of some heavy metals in Mohammed AL-Qassim Highway in Baghdad city for different distances by using the polynomial interpolation method for functions passing from the data, which is proposed by using the MATLAB software. The sample soil in this paper was taken from the surface layer (0-25 cm depth) at the two sides of the road with four distances (1.5, 10, 25 and 60 m) in each side of the road. Using this method, we can find the concentrations of heavy metals in the soil at any depth and time without using the laboratory, so this method reduces the time, effort and costs of conducting laboratory analyzes.
order to increase the level of security, as this system encrypts the secret image before sending it through the internet to the recipient (by the Blowfish method). As The Blowfish method is known for its efficient security; nevertheless, the encrypting time is long. In this research we try to apply the smoothing filter on the secret image which decreases its size and consequently the encrypting and decrypting time are decreased. The secret image is hidden after encrypting it into another image called the cover image, by the use of one of these two methods" Two-LSB" or" Hiding most bits in blue pixels". Eventually we compare the results of the two methods to determine which one is better to be used according to the PSNR measurs
Due to the energy crisis and the stringent environmental regulations, diesel engines are offering good hope for automotive vehicles. However, a lot of work is needed to reduce the diesel exhaust emissions and give the way for full utilization of the diesel fuel’s excellent characteristics.
A kind of cetane number improver has been proposed and tested to be used with diesel fuel as ameans of reducing exhaust emissions. The addition of (2-ethylhexyl nitrate) was designed to raise fuel cetane number to three stages, 50, 52 and 55 compared to the used conventional diesel fuel whose CN was 48.5. The addition of CN improver results in the decre
... Show MoreCrocidolomia binotalis (Cb) (Zeller) is one of the main pests of cabbage which is difficult for farmers to control in the Ijen Crater in Indonesia. The demand for cabbage in Indonesia is increasing every year, so intensification efforts are continuously being made. Farmers intensively use synthetic pesticides as the primary control of Cb. The purpose of this study is to examine several control agents that can be used as an alternative to synthetic pesticides. Then, it provides recommendations to Ijen Crater farmers to adapt in reducing the use of synthetic pesticides. The biopesticide used was based on the Nuclear Polyhedrosis Virus strains of Spodoptera litura (SlNPV) and Helicoverpa armigera (HaNPV), botanical pesticides, and
... Show MoreThis work describes an experimental setup to evaluate the photodynamictoxicity of 650 nm diode laser and 532 nm Frequency-doubled Q-Switched Nd:YAG laser on the growth of Candida albicans as well as the potential fungicidal effect when combining the laser irradiation with specific photosensitizers namely methylene blue, toluidine blue, acridine orange and safranin O. In this study the findings showed that the number of colony-forming units per millilitre (CFU/ml) of C. albicans decreased with increasing exposure time. In particular in the case of the frequency doubled Nd:YAG laser combined with safranin O, the best lethal effect occurred at 11 minutes exposure time with 2.26 J/cm² energy density (89.18% reduction) in comparison with the
... Show More