The consensus algorithm is the core mechanism of blockchain and is used to ensure data consistency among blockchain nodes. The PBFT consensus algorithm is widely used in alliance chains because it is resistant to Byzantine errors. However, the present PBFT (Practical Byzantine Fault Tolerance) still has issues with master node selection that is random and complicated communication. The IBFT consensus technique, which is enhanced, is proposed in this study and is based on node trust value and BLS (Boneh-Lynn-Shacham) aggregate signature. In IBFT, multi-level indicators are used to calculate the trust value of each node, and some nodes are selected to take part in network consensus as a result of this calculation. The master node is chosen from among them based on which node has the highest trust value, it transforms the BLS signature process into the information interaction process between nodes. Consequently, communication complexity is reduced, and node-to-node information exchange remains secure. The simulation experiment findings demonstrate that the IBFT consensus method enhances transaction throughput rate by 61% and reduces latency by 13% when compared to the PBFT algorithm.
Steganography is the art of secret communication. Its purpose is to hide the presence of information, using, for example, images as covers. The frequency domain is well suited for embedding in image, since hiding in this frequency domain coefficients is robust to many attacks. This paper proposed hiding a secret image of size equal to quarter of the cover one. Set Partitioning in Hierarchal Trees (SPIHT) codec is used to code the secret image to achieve security. The proposed method applies Discrete Multiwavelet Transform (DMWT) for cover image. The coded bit stream of the secret image is embedded in the high frequency subbands of the transformed cover one. A scaling factors ? and ? in frequency domain control the quality of the stego
... Show MoreThe software-defined network (SDN) is a new technology that separates the control plane from data plane for the network devices. One of the most significant issues in the video surveillance system is the link failure. When the path failure occurs, the monitoring center cannot receive the video from the cameras. In this paper, two methods are proposed to solve this problem. The first method uses the Dijkstra algorithm to re-find the path at the source node switch. The second method uses the Dijkstra algorithm to re-find the path at the ingress node switch (or failed link).
... Show MoreCybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a
... Show MoreMany organizations today are interesting to implementing lean manufacturing principles that should enable them to eliminating the wastes to reducing a manufacturing lead time. This paper concentrates on increasing the competitive level of the company in globalization markets and improving of the productivity by reducing the manufacturing lead time. This will be by using the main tool of lean manufacturing which is value stream mapping (VSM) to identifying all the activities of manufacturing process (value and non-value added activities) to reducing elimination of wastes (non-value added activities) by converting a manufacturing system to pull instead of push by applying some of pull system strategies a
... Show Moreيرمي هذا البحث الى تعرف اثر استراتيجية تعليم الاقران في تصحيح الفهم الخاطئ للمفاهيم الجغرافية لدى طالبات الصف الاول متوسط
ABSTRUCT
The main aim of this research has been associated with the study of relationship between competitive intelligence and strategic risk, and to deduct their specific trends, which are interpreted as predicted by research hypotheses according to a review of literature including prior studies. The basic theme of these hypotheses is related to the probability that declining levels of strategic risk and competitive positions of industrial companies is dependent upon the growing capacity to stay ahead of competitors in the market.
A purposive non-random
... Show Moreالتنمية المستدامة حق لكل البشرية وأنها مفهوم ٌ مركب من عنصرين هما التنمية واالستدامة مهمين متالصقين أي ال يوجد تنمية دون استدامة وال العكس يصح، وأنها تمتلك العديد دراسات سياسية وإستراتيجية من األهداف ويبرز هدف الـ)القضاء على الفقر، والقضاء على الجوع( ومن أهم أهدافها، هذه الظاهرة بارزة في المجتمع العراقي بسبب الحروب واالزمات المتكررة فيه وحاالت الحصار االقتصادي، وكذلك بسبب عدم توزيع موارده بشكل عادل من قبل
... Show Morethe history of Damascus by Ibn ' asaakir d. 571 a.h. 1272 m from local histories books concerned with male citizen narrators, to distinguish between rate and Rob them, this book is more a history of Islamic heritage books on Islamic City, and if we know that Ibn ' asaakir translated it for personal
يهدف البحث إلى معرفة ما هيه اخلاقيات مهنة العاملين في المكتبات وتحديث متطلباتهم الضرورية من المهنة لكي يسمو بأخلاقياتها ، وهل هذه الاخلاقيات متوافرة في العاملين في مكتباتنا الجامعية ضمن حدود الدراسة ؟ ومن ادوات جمع البيانات : استمارة بالاخلاقيات وزعت على مجموعة من الاساتذة و استبانة وزعت على من المكتبات الجامعية . وكان مجتمع الدراسة العاملون في المكتبات المركزية الأولى والثانية لجامعة بغداد والمكتبة المرك
... Show More