Blockchain is an innovative technology that has gained interest in all sectors in the era of digital transformation where it manages transactions and saves them in a database. With the increasing financial transactions and the rapidly developed society with growing businesses many people looking for the dream of a better financially independent life, stray from large corporations and organizations to form startups and small businesses. Recently, the increasing demand for employees or institutes to prepare and manage contracts, papers, and the verifications process, in addition to human mistakes led to the emergence of a smart contract. The smart contract has been developed to save time and provide more confidence while dealing, as well as to cover the security aspects of digital management and to solve negotiation concerns. The smart contract was employed in creating a distributed ledger to eliminate the need for centralization. In this paper, a simple prototype has been implemented for the smart contract integrated with blockchain which is simulated in a local server with a set of nodes. Several security objectives, such as confidentiality, authorization, integrity, and non-repudiation, have been achieved in the proposed system. Besides, the paper discussed the importance of using the Blockchain technique, and how it contributed to the management of transactions in addition to how it was implemented in highly transparent real-estate scenarios. The smart contract was employed in creating a distributed ledger to eliminate the need for centralization. The elliptic-curve public key has been adopted as an alternative for the RSA in a signature generation/verification process and encryption protocol. For secure transactions, The Secure Socket Layer (SSL) also has been adopted as a secure layer in the web browser. The results have been investigated and evaluated from different aspects and the implementation was in a restricted environment. Experiments showed us the complexity of time and cost when using the (ECC) algorithm and using (RSA) algorithm depending on the size and length of the key. So if the size of the key in (ECC) equals (160) bits, and it corresponds to (1024) bits in (RSA), which is equivalent to 40% for (ECC) and 30% for (RSA). As a result, the (ECC) algorithm is complex, its key is smaller and the process of generating the key is faster, so it has achieved a high level of security.
The aim of this study is to look at the potential of a local sustainable energy network in a pre-existing context to develop a novel design beneficial to the environment. Nowadays, the concept of smart cities is still in the developmental phase/stage andwe are currently residing in a transitional period, therefore it is very important to discover new solutions that show direct benefits the people may get from transforming their city from a traditional to a smart city. Using experience and knowledge of successful projects in various European and non-European smart cities, this study attempts to demonstrate the practical potential of gradually moving existing cities to t
... Show More In this paper the research represents an attempt of expansion in using the parametric and non-parametric estimators to estimate the median effective dose ( ED50 ) in the quintal bioassay and comparing between these methods . We have Chosen three estimators for Comparison. The first estimator is
( Spearman-Karber ) and the second estimator is ( Moving Average ) and The Third estimator is ( Extreme Effective Dose ) . We used a minimize Chi-square as a parametric method. We made a Comparison for these estimators by calculating the mean square error of (ED50) for each one of them and comparing it with the optimal the mean square
Secure information transmission over the internet is becoming an important requirement in data communication. These days, authenticity, secrecy, and confidentiality are the most important concerns in securing data communication. For that reason, information hiding methods are used, such as Cryptography, Steganography and Watermarking methods, to secure data transmission, where cryptography method is used to encrypt the information in an unreadable form. At the same time, steganography covers the information within images, audio or video. Finally, watermarking is used to protect information from intruders. This paper proposed a new cryptography method by using thre
... Show MoreThe research aims to shed light on the amount of proceeds annual tax for each of the way the contract total and percentage of completion method - see which is better - as well as the current problems arising from the application method of the contract in full in settling accounts tax - to identify problems - related to postpone settling accounts tax in accordance with the way the contract fully and determine the advantages and disadvantages of each of the methods through practical application , and then use the results as inputs to help in the decision to confirm the continuation of the GCT using a full decade in settling accounts tax for long-term construction contracts or forgo them.
Were the result of research the existence of
... Show MoreA computational investigation is carried out to describe the behaviour of reflected electrons upon a charged insulator sample and producing mirror effect images. A theoretical expression for the scanning electron path equation is derived concerning Rutherford scattering and some electrostatic aspects. The importance of the derived formula come from its correlation among some of the most important parameters that controls the mirror effect phenomena. These parameters, in fact, are the trapped charges, incident angle and the scanning potential which investigated by considering its influences on the incident electrons. A pervious experimental operation requirements are adopted for operating the introduced expression. However, the obtained r
... Show MoreAnalysis system of sports players is very important for individuals in weightlifting. Assessment of player and strength is important for the performance of weightlifting. This paper proposes an analytical method for weightlifters with check-by-frame video. This analysis system can compute the major steps of seven positions in both snatch and clean and jerk methods in frame-video weightlifting monitoring of movements. Each user can compute the major steps of the seven positions of Hu moments among two frames in the video during training, and the Euclidian distance can be computed for the Hu moment values and lifting moment values in the snatch and clean and jerk methods during training. The outcome of the proposed system shows on efficien
... Show MoreSmart cities are using innovative technological solutions to improve the quality of life and service that citizens and visitors receive. Defined as a digital or ecological city, its services depend on information and communication technology infrastructure, such as intelligent automated traffic systems, advanced security management Services, building systems, and the use of automation in offices and homes. The global trend now towards smart cities, sustainable and green cities and other cities, with different nomenclature, the common denominator is the comfort of the individual and the preservation of natural resources. Adopting smart, sustainable, green, or healthy cities is either t
Software Defined Network (SDN) is a new technology that separate the control plane from the data plane. SDN provides a choice in automation and programmability faster than traditional network. It supports the Quality of Service (QoS) for video surveillance application. One of most significant issues in video surveillance is how to find the best path for routing the packets between the source (IP cameras) and destination (monitoring center). The video surveillance system requires fast transmission and reliable delivery and high QoS. To improve the QoS and to achieve the optimal path, the SDN architecture is used in this paper. In addition, different routing algorithms are used with different steps. First, we eva
... Show MoreThis paper presents the results of investigating the vibrational characteristics of oblate dish with and without framed structure . A finite element method, was applied to the dynamic analysis of oblate spheroidal shell. Different types of elements were considered in one dimension and two dimensions. It was found that the natural frequencies of oblate shells had two types of behavior against increasing the shell thickness and eccentricity, which are the membrane mode and bending mode –Since – the membrane modes natural frequencies tend to increase with the increasing the eccentricity of oblate, while the bending modes natural frequencies decrease with the increasing the eccentricity till reach the optimum eccentricity.
... Show More