Blockchain is an innovative technology that has gained interest in all sectors in the era of digital transformation where it manages transactions and saves them in a database. With the increasing financial transactions and the rapidly developed society with growing businesses many people looking for the dream of a better financially independent life, stray from large corporations and organizations to form startups and small businesses. Recently, the increasing demand for employees or institutes to prepare and manage contracts, papers, and the verifications process, in addition to human mistakes led to the emergence of a smart contract. The smart contract has been developed to save time and provide more confidence while dealing, as well as to cover the security aspects of digital management and to solve negotiation concerns. The smart contract was employed in creating a distributed ledger to eliminate the need for centralization. In this paper, a simple prototype has been implemented for the smart contract integrated with blockchain which is simulated in a local server with a set of nodes. Several security objectives, such as confidentiality, authorization, integrity, and non-repudiation, have been achieved in the proposed system. Besides, the paper discussed the importance of using the Blockchain technique, and how it contributed to the management of transactions in addition to how it was implemented in highly transparent real-estate scenarios. The smart contract was employed in creating a distributed ledger to eliminate the need for centralization. The elliptic-curve public key has been adopted as an alternative for the RSA in a signature generation/verification process and encryption protocol. For secure transactions, The Secure Socket Layer (SSL) also has been adopted as a secure layer in the web browser. The results have been investigated and evaluated from different aspects and the implementation was in a restricted environment. Experiments showed us the complexity of time and cost when using the (ECC) algorithm and using (RSA) algorithm depending on the size and length of the key. So if the size of the key in (ECC) equals (160) bits, and it corresponds to (1024) bits in (RSA), which is equivalent to 40% for (ECC) and 30% for (RSA). As a result, the (ECC) algorithm is complex, its key is smaller and the process of generating the key is faster, so it has achieved a high level of security.
ABSTRACT University college libraries are one of the most important information institutions for all researchers during their research and study life, they seeks to provide information sources such as; books, periodicals, theses, databases, Inquiry service and answering questions services in various disciplines to achieve its goals. In 2020, college libraries of all types stepped up to meet the needs of their users' as they responded to the impacts of COVID-19, also extended necessary lifelines to community members facing job losses, healthcare crises, and remote work and learning during an unprecedented and uncertain time. The research aim to identifying the services provided to the postgraduate students users at University of Baghdad coll
... Show MoreSome geological phenomena as landslides and the mobilization of the accumulated rocks or soil are discussed in this research by using projectiles that cause mobility and falling of these land masses which are present at the top of mountains and edges of roads and streets to avoid accidents and human disasters which will occur if they are left falling by effect of climate or vibrating factors that are produced by performing dams, bridges and reservoirs. According to the different divisions of land masses groups, primary and secondary, which depend on type of movement and material arrangement that form the mobile masses, this research had shown the effect of projectiles for every type of cannons on the mobility of every groups of these rocks
... Show MoreAbstract
Disturbs the social system in any society specially in Iraq other than
other Islamic and Arabic countries. That is according to the abnormal
conditions that Iraq has past through as wars and blockage, and lastly the
invasion. Therefore it has been necessary to put this phenomenon under
study and analysis to discover Juvenile Delinquency is one of the most
prominent social phenomenon that the important reasons behind it, and trying
to treat what can be treated of the effects of it upon society.
This study is mainly concerned with the explaining the social factors
leading toward juvenile delinquency trying to crystallize the problem of the
study in the following question: (What are the psychological,
The objective of this research paper is two-fold. The first is a precise reading of the theoretical underpinnings of each of the strategic approaches: "Market approach" for (M. Porter), and the alternative resource-based approach (R B V), advocates for the idea that the two approaches are complementary. Secondly, we will discuss the possibility of combining the two competitive strategies: cost leadership and differentiation. Finally, we propose a consensual approach that we call "dual domination".
The present study was designed to indicate the influence of the feeding plate on the nutritional and general health problems of the isolated cleft palate infants. For this study fourteen infants were taken, their ages between one day to one week, refered from cosmetic surgery and palate center to cleft lip and palate rehabilitation center in institute of technical medical / Baghdad for feeding plate purpose . Four infants put them as normal group; all those infants were subjected during (6th) month to evaluate the body weight, feeding problem and the respiratory infection. According to tables and figures this study showed a gradual improvement in nutritional problem including (feeding problem, body weight) and health problem (such as respir
... Show MoreThis research aims to use chemical reaction to determine some of beta lactam antibiotics which include cephalexin and ceftriaxone in some pharmaceuticals by formation Prussian Blue complexes and using them for the UV-Vis., determination of drugs at wavelengths range (700- 720)nm by reaction them with FeCl3 in the presence of reagent K3[Fe(CN)6] in acid media . The optimal experimental conditions for the complex formation have been studied such as volume of HCl , K3[Fe(CN)6] , FeCl3 ,temperature and reaction time .Analytical figures of merits obtained on applying the developed procedure for cephalexin and ceftriaxone resp. are Linearity,(2-10),(1-7)?g.ml-1 LOD(0.0601,0.0330) ?g.ml-1. The de
... Show MoreUse Almtafr axis to study the response component that isolates gave a positive response to the use of standard Almtafr which leads to lower the temperature and the number of cells at a temperature suitable Rifampicin resistant less than that TJ and similarly reflected on the frequency of mutations induced
The aim of this research is to investigation the optimization of the machining parameters (spindle speed, feed rate, depth of cut, diameter of cutter and number of flutes of cutter) of surface roughness for free-form surface of composite material (Aluminum 6061 reinforced boron carbide) by using HSS uncoated flat end mill cutters which are rare use of the free-form surface. Side milling (profile) is the method used in this study by CNC vertical milling machine. The purpose of using ANFIS to obtain the better prediction of surface roughness values and decreased of the error prediction value and get optimum machining parameters by using Taguchi method for the best surface roughness at spindle speed 4500 r.p.m, 920mm/rev feed rate, 0.6mm de
... Show More