The consensus algorithm is the core mechanism of blockchain and is used to ensure data consistency among blockchain nodes. The PBFT consensus algorithm is widely used in alliance chains because it is resistant to Byzantine errors. However, the present PBFT (Practical Byzantine Fault Tolerance) still has issues with master node selection that is random and complicated communication. The IBFT consensus technique, which is enhanced, is proposed in this study and is based on node trust value and BLS (Boneh-Lynn-Shacham) aggregate signature. In IBFT, multi-level indicators are used to calculate the trust value of each node, and some nodes are selected to take part in network consensus as a result of this calculation. The master node is chosen from among them based on which node has the highest trust value, it transforms the BLS signature process into the information interaction process between nodes. Consequently, communication complexity is reduced, and node-to-node information exchange remains secure. The simulation experiment findings demonstrate that the IBFT consensus method enhances transaction throughput rate by 61% and reduces latency by 13% when compared to the PBFT algorithm.
Parental socialization trends impacting seriously on the growth of individual
personality and psychological health trends ,love, acceptance and on confidence help
children to grow as a person who loves other accept others and trust and negative parental
attitudes such as excess portents us or negligence . and the focusing and demonstrate a
negative impact on the growth of excess an mental health and family play a significant role in
a childes life we can see how many manifestation of compatibility or incompatibility thatappear on individual behaviors and achieve their success or failure in life be returned to the
of human relations that prevailed between the family members of children in various stages of
his life fi
This study proposed a biometric-based digital signature scheme proposed for facial recognition. The scheme is designed and built to verify the person’s identity during a registration process and retrieve their public and private keys stored in the database. The RSA algorithm has been used as asymmetric encryption method to encrypt hashes generated for digital documents. It uses the hash function (SHA-256) to generate digital signatures. In this study, local binary patterns histograms (LBPH) were used for facial recognition. The facial recognition method was evaluated on ORL faces retrieved from the database of Cambridge University. From the analysis, the LBPH algorithm achieved 97.5% accuracy; the real-time testing was done on thirty subj
... Show MoreThe variety of ideas and freedom of expression among the authors who are looking for everything new that serves the goals of musical and aesthetic expression, which calls for the use of traditional musical instruments with the great composition of musical instruments known as the orchestra represents a great challenge in several aspects. The incompetence of some of these instruments or limited capabilities or its costly method of performance sometimes forbids its use permanently in this great composition. It was necessary to have some problems facing the composer and the player on the one hand and the recipient on the other hand, who must be looking for perfection. Among those instruments that are used regularly in the works of the orche
... Show More<p>Photovoltaic (PV) systems are becoming increasingly popular; however, arc faults on the direct current (DC) side are becoming more widespread as a result of the effects of aging as well as the trend toward higher DC voltage levels, posing severe risk to human safety and system stability. The parallel arc faults present higher level of current as compared with the series arc faults, making it more difficult to spot the series arc. In this paper and for the aim of condition monitoring, the features of a DC series arc fault are analyzed by analysing the arc features, performing model’s simulation in PSCAD, and carrying out experimental studies. Various arc models are simulated and investigated; for low current arcs, the heur
... Show MoreIn this research, the problem of multi- objective modal transport was formulated with mixed constraints to find the optimal solution. The foggy approach of the Multi-objective Transfer Model (MOTP) was applied. There are three objectives to reduce costs to the minimum cost of transportation, administrative cost and cost of the goods. The linear membership function, the Exponential membership function, and the Hyperbolic membership function. Where the proposed model was used in the General Company for the manufacture of grain to reduce the cost of transport to the minimum and to find the best plan to transfer the product according to the restrictions imposed on the model.
Abstract\
The value chain analysis is main tools to achieve effective and efficient cost management; it requires a depth and comprehensive understanding for all internal and external activities associated with creating value. Supply chain as apart of value chain, that means managing it in active and efficient can achieve great results when adopting a comprehensive and integrated performance for these two chains activities. The research aims to identify possible ways to integrate the performance of value and supply chains of the sample" Kufa-cement plant" and determine the effect of this integration in enhancing customer value. The research arrival that logical and integrated analysis of value and supply chains helps
... Show MoreAbstract
This study aims at identifying the impact of the application of IFRS 15 "Revenue from contracts with customers on the quality of financial reporting, through application to faculty members in the accounting departments of Iraqi universities and auditors. The problem of the study was the multiplicity of accounting rules and standards Which deals with the issues of revenue recognition , as well as the lack of consistency of most of them with the common framework of financial accounting, which results in low quality of financial reporting in the current financial statements, where the formulation of one hypothesis was the lack of relationship of significant significance The application of IFRS 15 "Recognition of rev
... Show MoreWitnessing human societies with the turn of the century atheist twenty huge revolution in information , the result of scientific and technological developments rapidly in space science and communications , and that made the whole world is like a small village not linked by road as it was in ancient times, through the rapid transportation as was the case a few years ago , thanks to the remote sensing devices that roam in space observant everything on the ground , that the information networks that overflowed the world a tremendous amount of information provided for each inhabitants of the earth , which made this information requirement for human life and human survival and well-being , as it has allowed that information to humans opportun
... Show MoreObjective: The study aimed to assess the postoperative nurses' intervention for the patients with laparoscopic
cholecystectomy and to determine the relationship between Nurses' interventions and their demographic
characteristics.
Methodology: Quantitative design (a descriptive study) was started from 20th November 2012 up to 1st
September 2013. Non-probability (purposive sample) of (50) nurses, who were working in surgical wards, were
selected from Baghdad teaching hospitals (Baghdad Teaching Hospital, Digestives System and Liver Teaching
Hospital, AL-Kindy Teaching Hospital, and AL-Kadhimiyia Teaching Hospita). The data were collected through
the use of a constructed questionnaire, which consisted of two parts; the