Blockchain is an innovative technology that has gained interest in all sectors in the era of digital transformation where it manages transactions and saves them in a database. With the increasing financial transactions and the rapidly developed society with growing businesses many people looking for the dream of a better financially independent life, stray from large corporations and organizations to form startups and small businesses. Recently, the increasing demand for employees or institutes to prepare and manage contracts, papers, and the verifications process, in addition to human mistakes led to the emergence of a smart contract. The smart contract has been developed to save time and provide more confidence while dealing, as well as to cover the security aspects of digital management and to solve negotiation concerns. The smart contract was employed in creating a distributed ledger to eliminate the need for centralization. In this paper, a simple prototype has been implemented for the smart contract integrated with blockchain which is simulated in a local server with a set of nodes. Several security objectives, such as confidentiality, authorization, integrity, and non-repudiation, have been achieved in the proposed system. Besides, the paper discussed the importance of using the Blockchain technique, and how it contributed to the management of transactions in addition to how it was implemented in highly transparent real-estate scenarios. The smart contract was employed in creating a distributed ledger to eliminate the need for centralization. The elliptic-curve public key has been adopted as an alternative for the RSA in a signature generation/verification process and encryption protocol. For secure transactions, The Secure Socket Layer (SSL) also has been adopted as a secure layer in the web browser. The results have been investigated and evaluated from different aspects and the implementation was in a restricted environment. Experiments showed us the complexity of time and cost when using the (ECC) algorithm and using (RSA) algorithm depending on the size and length of the key. So if the size of the key in (ECC) equals (160) bits, and it corresponds to (1024) bits in (RSA), which is equivalent to 40% for (ECC) and 30% for (RSA). As a result, the (ECC) algorithm is complex, its key is smaller and the process of generating the key is faster, so it has achieved a high level of security.
The presentwork is a theoretical study in the field of charged particle optics. It concentrates on the design of electrostatic enzil lens for focusing charge particles beams, using inverse method in designingthe electrostatic lens. The paraxial ray equation was solved to obtain the trajectory of the particles, the optical properties such as the focal length and spherical and chromatic aberration coefficients were determined. The shape of the electrode of the electrostatic lens were determined by solving poison equation and the results showed low values of spherical and chromatic aberrations, which are considered as good criteria for good design.
The research include a pulsed Nd: YAG Laser with (300µs) pulse duration in the TEM00 mode at (1.06µm) wavelength for energies between (0.5-3) J was employed to drill Brass material which is use in industrial applications. The process of drill was assisted by an electric field. This resulted in an increase in the hole aspect ratio by the value (45%) and decrease in the hole taper by the value (25%) of its value under ordinary drilling conditions using the same input energy.
This research aims to analyze the impact of effective manufacturing strategy on total productive maintenance. Effective manufacturing focuses on improving product quality, increasing productivity, and reducing costs, while total productive maintenance focuses on maintaining machines and equipment in good operational condition and high efficiency. The research seeks to understand how to achieve integration between these two dimensions to achieve excellent performance in manufacturing operations. The study was conducted using the General Company for Battery Manufacturing as a research community, with a sample size of 60 individuals. The research found significant results, including the fact that using an effective manufacturing strategy leads
... Show MoreCloud computing represents the most important shift in computing and information technology (IT). However, security and privacy remain the main obstacles to its widespread adoption. In this research we will review the security and privacy challenges that affect critical data in cloud computing and identify solutions that are used to address these challenges. Some questions that need answers are: (a) User access management, (b) Protect privacy of sensitive data, (c) Identity anonymity to protect the Identity of user and data file. To answer these questions, a systematic literature review was conducted and structured interview with several security experts working on cloud computing security to investigate the main objectives of propo
... Show MoreThis research came with the aim of showing the impact of governance mechanisms on tax avoidance practices, and in light of this, the financial data of the joint stock companies (industrial, service, agricultural, and hotels) listed in the Iraq Stock Exchange amounting to (35) companies were collected during the period (2009-2020). Through the financial reports published on the market website, multiple linear regression analysis was used as a tool to study the relationship between variables, and (Eviews 12) program was used for analysis and hypothesis testing. To achieve the objectives of the research,(administrative ownership, board size, board independence, women's membership) was adopted as an indicator of the dimensions of governance, an
... Show MoreThe objective of this paper is to study the stability of SIS epidemic model involving treatment. Two types of such eco-epidemiological models are introduced and analyzed. Boundedness of the system is established. The local and global dynamical behaviors are performed. The conditions of persistence of the models are derived.
The dried fruit peel of pomegranate in Punicaceae family was fractionated chromatographically on Sephadex-LH-20 column .Gallic acid (trihydroxybenzoic acid) and its related galloyl esters such as gallotannin(i.e. β-penta-O-galloyl–D-glucose) were obtained homogenously. Different concentrations of gallic acid and gallotannin were used to determine their inhibitory effect on human serum cholinesterase. The enzyme activity was measured according to the method reported by the WHO .The inhibitory effect of these compounds on the activity of human serum cholinesterase have been studied in vitro .The inhibitory effect was remarkably clear with increasing concentration of gallic acid .Whereas galloyl ester showed n
... Show MoreThe present study deals with the effect of teaching speaking Strategies (SS) on
EFL Iraqi College students. The use of speaking strategies not only solves learners’
communication problems, but also enhances the learner’s interaction in target language,
and improves their oral proficiency .The aim of the study is to find out the effect of
teaching SS used by EFL College students .The learner of the first stage is population of
the study at the Department of English, College of Education /Ibn-Rushd .The sample
consists of (60) students distributed on experimental group(A) as well as control
group(B) each group contains (30) students . In order to achieve the aim of the study,
questionnaire has been constructed t