Blockchain is an innovative technology that has gained interest in all sectors in the era of digital transformation where it manages transactions and saves them in a database. With the increasing financial transactions and the rapidly developed society with growing businesses many people looking for the dream of a better financially independent life, stray from large corporations and organizations to form startups and small businesses. Recently, the increasing demand for employees or institutes to prepare and manage contracts, papers, and the verifications process, in addition to human mistakes led to the emergence of a smart contract. The smart contract has been developed to save time and provide more confidence while dealing, as well as to cover the security aspects of digital management and to solve negotiation concerns. The smart contract was employed in creating a distributed ledger to eliminate the need for centralization. In this paper, a simple prototype has been implemented for the smart contract integrated with blockchain which is simulated in a local server with a set of nodes. Several security objectives, such as confidentiality, authorization, integrity, and non-repudiation, have been achieved in the proposed system. Besides, the paper discussed the importance of using the Blockchain technique, and how it contributed to the management of transactions in addition to how it was implemented in highly transparent real-estate scenarios. The smart contract was employed in creating a distributed ledger to eliminate the need for centralization. The elliptic-curve public key has been adopted as an alternative for the RSA in a signature generation/verification process and encryption protocol. For secure transactions, The Secure Socket Layer (SSL) also has been adopted as a secure layer in the web browser. The results have been investigated and evaluated from different aspects and the implementation was in a restricted environment. Experiments showed us the complexity of time and cost when using the (ECC) algorithm and using (RSA) algorithm depending on the size and length of the key. So if the size of the key in (ECC) equals (160) bits, and it corresponds to (1024) bits in (RSA), which is equivalent to 40% for (ECC) and 30% for (RSA). As a result, the (ECC) algorithm is complex, its key is smaller and the process of generating the key is faster, so it has achieved a high level of security.
Abstract
The study aims to identify the extent to which the applied colleges at the University of Technology and Applied Sciences meet the comprehensive quality standards in light of the national education strategy for the 2040 Vision in the Sultanate of Oman. To do this, the researchers used the descriptive approach. They used a questionnaire as a tool for data collection that was applied to (237) administrators, academics, and support functions. The study found that the extent to which the applied colleges at the University of Technology and Applied Sciences meet the comprehensive quality standards in the light of the National Education Strategy 2040 in the Sultanate of Oman recorded a high range. The study als
... Show MoreIn this paper, we study the growth of solutions of the second order linear complex differential equations insuring that any nontrivial solutions are of infinite order. It is assumed that the coefficients satisfy the extremal condition for Yang’s inequality and the extremal condition for Denjoy’s conjecture. The other condition is that one of the coefficients itself is a solution of the differential equation .
Many production companies suffers from big losses because of high production cost and low profits for several reasons, including raw materials high prices and no taxes impose on imported goods also consumer protection law deactivation and national product and customs law, so most of consumers buy imported goods because it is characterized by modern specifications and low prices.
The production company also suffers from uncertainty in the cost, volume of production, sales, and availability of raw materials and workers number because they vary according to the seasons of the year.
I had adopted in this research fuzzy linear program model with fuzzy figures
... Show More— In light of the pandemic that has swept the world, the use of e-learning in educational institutions has become an urgent necessity for continued knowledge communication with students. Educational institutions can benefit from the free tools that Google provide and from these applications, Google classroom which is characterized by ease of use, but the efficiency of using Google classroom is affected by several variables not studied in previous studies Clearly, this study aimed to identify the use of Google classroom as a system for managing e-learning and the factors affecting the performance of students and lecturer. The data of this study were collected from 219 members of the faculty and students at the College of Administra
... Show MoreIn this study, we tackle the understudied area of Artificial Intelligence (AI) and its role in examining how modern revolutions may affect political systems across the Middle Eastern region. despite hundreds of studies documenting Middle Eastern uprisings over the past three decades, there has been little effort to harness AI to better understand or predict these multifaceted events. This study seeks to address this gap by assessing the performance of AI-intelligence in analyzing (broadly) revolutionary processes and their effects on regional political systems. The research uses a mixedmethod methodology that involves a systematic literature review of contemporary scholarly articles, and an analytics study using AI tools. Our results show t
... Show MoreIn this work, the impact of different geomagnetic storm events on the plasma-sphere layer (ionosphere layer) over the northern and southern hemisphere regions was investigated during solar cycle 23. To grasp the influence of geomagnetic storms on the behavior and variation of the critical frequency parameter of the F2 ionospheric layer (foF2), five geomagnetic storms (classified as great, severe, and strong), with Disturbance storm time (Dst) values <-100 nT were chosen. Four stations located in different mid-latitude regions in northern and southern hemispheres were designated, the northern stations are: Millstone Hill (42.6° N, 288.50° W) and Rome (41.90° N, 12.50° E) and the southern stations are: Port Stanley (-51.60° S,
... Show MoreAbstract:
The current research aims to demonstrate the relationship of correlation and influence between the independent variable strategic control through its dimensions represented by (organizational structure, human resources management, commitment to specialization, defining powers and responsibilities, values and integrity) and the dependent variable the performance of the insurance company, and the degree of arrangement of these dimensions according to their importance, as well as Detection of significant differences in the sample's response to the questionnaire paragraphs in the researched company, and the research problem
... Show MoreThe Video Assistant Referee (VAR) is a technology designed to review on- eld decisions through video footage in order to correct clear and critical refereeing errors. It enables the replay of key moments in slow motion to determine the correct naldecision,withcommunicationbetweenthevideoof cialsandtherefereeconductedviaheadset.Thesystem operates under the principle of "minimal interference, maximum bene t," intervening only in essential situations. This study aimedtoassessthecurrent implementationofVARintheIraqStarsFootballLeagueduringthe2023–2024season. To achieve this objective, the researchers employed a descriptive survey method involving a sample of 220 participants, including referees, coaches, players, assessors, academics, a
... Show More