The consensus algorithm is the core mechanism of blockchain and is used to ensure data consistency among blockchain nodes. The PBFT consensus algorithm is widely used in alliance chains because it is resistant to Byzantine errors. However, the present PBFT (Practical Byzantine Fault Tolerance) still has issues with master node selection that is random and complicated communication. The IBFT consensus technique, which is enhanced, is proposed in this study and is based on node trust value and BLS (Boneh-Lynn-Shacham) aggregate signature. In IBFT, multi-level indicators are used to calculate the trust value of each node, and some nodes are selected to take part in network consensus as a result of this calculation. The master node is chosen from among them based on which node has the highest trust value, it transforms the BLS signature process into the information interaction process between nodes. Consequently, communication complexity is reduced, and node-to-node information exchange remains secure. The simulation experiment findings demonstrate that the IBFT consensus method enhances transaction throughput rate by 61% and reduces latency by 13% when compared to the PBFT algorithm.
Abstract
health organizations are trying to introduce services of high quality and efficiency which requires applying some standards of nursing career to improve nursing service quality in the hospital, which provides an essential data base key to diagnosis the negative and positive part in nursing services to guarantee the quality of services presented . The aim of this study is to evaluated the quality of nursing service through stating the indicators of nursing career standards by comparing the reality of the a hospital with what should standards . In addition , adapting nursing career standards with what is suitable for hos
... Show Moreالمقدمة ومنهجية البحث
تتفق أغلب الأدبيات ومنها المحاسبية, بأن الخطوة الأولى في وضع وتقييم أي نظام إداري أو محاسبي هي في صياغة أهداف ذلك النظام لما لذلك من أهمية في توفير معيار للحكم على كفاءة التطبيق من عدمه.
وتعرف الأهداف بأنها (النهايات التي تعمل أو توجه النشاطات باتجاهها أو هي النهايات التي تطمح النشاطات تحقيقها). ( 1 ) ..,
كما تعرف أيضا بأنها (الأ
... Show MorePro-inflammatory cytokines play an important role in intercellular communications. In the last two decades, many cytokines have been identified in human milk. These cytokines are variable according to different conditions such as pathogenic infections which strongly stimulated the immune response. The present study aims to determine of IL1β and TNF-α in Toxoplasma gondii-free and infected women in an attempt to clarify the impacts of the infections on cytokines especially in mother's milk. The serum and milk sample were collected from 96 samples (48 for seropositive and 48 for seronegative). To confirm the Toxoplasma gondii infection; enzyme linked immunofluorescence assay (ELIFA) was used to detect anti-Toxoplasma Ig
... Show Moreيهدف البحث إلى استقصاء أثر دراسة طالبات كلية العلوم للبنات في جامعة بغداد لمقرر التلوث البيئي في تنمية اتجاهاتهن البيئية، وذلك من خلال التعرّف على النمو في المستوى العام لاتجاهات الطالبات البيئية والكشف عن الفروق الإحصائية في اتجاهاتهن قبل وبعد دراسة المقرر.
وقد تألفت عينة البحث من(50) طالبة من طالبات قسم الفيزياء / الفيزياء الطبية المرحلة الأولى في كلية العلوم للبنات- جامعة بغداد. اعتمدت ا
... Show MoreSteganography is the art of secret communication. Its purpose is to hide the presence of information, using, for example, images as covers. The frequency domain is well suited for embedding in image, since hiding in this frequency domain coefficients is robust to many attacks. This paper proposed hiding a secret image of size equal to quarter of the cover one. Set Partitioning in Hierarchal Trees (SPIHT) codec is used to code the secret image to achieve security. The proposed method applies Discrete Multiwavelet Transform (DMWT) for cover image. The coded bit stream of the secret image is embedded in the high frequency subbands of the transformed cover one. A scaling factors ? and ? in frequency domain control the quality of the stego
... Show MoreContent-based image retrieval has been keenly developed in numerous fields. This provides more active management and retrieval of images than the keyword-based method. So the content based image retrieval becomes one of the liveliest researches in the past few years. In a given set of objects, the retrieval of information suggests solutions to search for those in response to a particular description. The set of objects which can be considered are documents, images, videos, or sounds. This paper proposes a method to retrieve a multi-view face from a large face database according to color and texture attributes. Some of the features used for retrieval are color attributes such as the mean, the variance, and the color image's bitmap. In add
... Show MoreThe software-defined network (SDN) is a new technology that separates the control plane from data plane for the network devices. One of the most significant issues in the video surveillance system is the link failure. When the path failure occurs, the monitoring center cannot receive the video from the cameras. In this paper, two methods are proposed to solve this problem. The first method uses the Dijkstra algorithm to re-find the path at the source node switch. The second method uses the Dijkstra algorithm to re-find the path at the ingress node switch (or failed link).
... Show MoreCybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a
... Show More