The consensus algorithm is the core mechanism of blockchain and is used to ensure data consistency among blockchain nodes. The PBFT consensus algorithm is widely used in alliance chains because it is resistant to Byzantine errors. However, the present PBFT (Practical Byzantine Fault Tolerance) still has issues with master node selection that is random and complicated communication. The IBFT consensus technique, which is enhanced, is proposed in this study and is based on node trust value and BLS (Boneh-Lynn-Shacham) aggregate signature. In IBFT, multi-level indicators are used to calculate the trust value of each node, and some nodes are selected to take part in network consensus as a result of this calculation. The master node is chosen from among them based on which node has the highest trust value, it transforms the BLS signature process into the information interaction process between nodes. Consequently, communication complexity is reduced, and node-to-node information exchange remains secure. The simulation experiment findings demonstrate that the IBFT consensus method enhances transaction throughput rate by 61% and reduces latency by 13% when compared to the PBFT algorithm.
البرنامج النووي الايراني واشكالية العلاقة مع الولايات المتحدة الامريكية
the pursue of social systems history present to us solid evidence that the collapse of that systems be caused by either the stagnancy aftermath maturity or unreal intellectual foundation which lead to sudden collapse, while the capitalism can avoided that intellectual damages due to its dynamic system with appropriate auto adaptation mechanism and use it excellently in the right time.
The globalization had excrete (as one of the capitalism adaptation mechanism) its own targets and its methods in framework of multinationals corporations which consist with capitalism states that employed the international organizations to reconstruction the global economy to serve such targets. So the glob
... Show MoreThe principal components analysis is used in analyzing many economic and social phenomena; and one of them is related to a large group in our society who are the university instructors. This phenomenon is the delay occurred in getting university instructor to his next scientific title. And as the determination of the principal components number inside the principal components depends on using many methods, we have compared between three of these methods that are: (BARTLETT, SCREE DIAGRAM, JOLLIFFE).
We concluded that JOLLIFFE method was the best one in analyzing the studying phenomenon data among these three methods, we found the most distinguishing factors effecting on t
... Show Moreيهدف البحث إلى تحقيق عدد من الأهداف: الكشف عن مدى تفاعلية الجمهور إزاء استخدام التطبيقات الإعلانية في الفضائيات عبر أجهزة الهاتف المحمول. التعرف على تفضيلات الجمهور بين التطبيقات. الوقوف على أهم الموضوعات التي يفضل الجمهور التفاعل معها في التطبيقات الإعلانية. الكشف عن أبرز المعوقات التي تواجه مستخدمي التطبيقات الإعلانية في الفضائيات عبر الهاتف المحمول. الوقوف على مدى مساهمة التطبيقات الإعلانية في الفضائي
... Show MoreRoller-Compacted Concrete is a no-slump concrete, with no reinforcing steel, no forms, no finishing and wet enough to support compaction by vibratory rollers. Due to the effect of curing on properties and durability of concrete, the main purpose of this research is to study the effect of various curing methods (air curing, 7 days water curing, and permanent water curing) and porcelanite (local material used as an Internal Curing agent) with different replacement percentages of fine aggregate (volumetric replacement) on some properties of Roller-Compacted Concrete and to explore the possibility of introducing practical Roller-Compacted Concrete for road pavement with minimum requirement of curing. Specimens were sawed fro
... Show MoreWith the revolutionized expansion of the Internet, worldwide information increases the application of communication technology, and the rapid growth of significant data volume boosts the requirement to accomplish secure, robust, and confident techniques using various effective algorithms. Lots of algorithms and techniques are available for data security. This paper presents a cryptosystem that combines several Substitution Cipher Algorithms along with the Circular queue data structure. The two different substitution techniques are; Homophonic Substitution Cipher and Polyalphabetic Substitution Cipher in which they merged in a single circular queue with four different keys for each of them, which produces eight different outputs for
... Show MoreImpairment of financial assets defined according to IFRS 9 as the difference between all contractual cash flows that are due to an entity in accordance with the contract and all the cash flows that the entity expects to receive, the entity should estimates all the cash flows through looking to the contract terms during the life time period of the assets or for shorter period if possible, the cash flow should include the amounts of selling any collateral taken or any other enhancement. On the other hand, the Central bank of Iraq guidelines regards impairment differ from the IFRS 9 that’s does not consider the collateral value on calculating the impairment that’s effects on the net profit through recognizing exaggerated loss an
... Show MoreThe study was conducted during spring seasons of 2000 and 2001.The aim was to study the changes in the moisture content of sunflower plants during growth stages under hardening conditions to drought tolerance .Agricultural practices were made according to recommendation. Asplit-split plots design was used with three replications. The main plots included irrigation treatments:irrigation to100%(full irrigation),75and50%of available water. The sub plots were the cultivars Euroflor and Flame.The sub-sub plots represented four seed soaking treatments: Control (unsoaked), soaking in water ,Paclobutrazol solution(250ppm),and Pix solution(500ppm). The soaking continued for 24 hours then seeds were dried at room temperature until they regained t
... Show MoreValues are penetrating or interfering in the lives of individuals and groups and are connected to them in the sense of life itself, because they are closely linked to the motives of behavior, hopes and goals, and can be said that values are everything. The concept of values is one of the concepts that have received the attention of researchers from different disciplines. This has resulted in a kind of confusion and variation in use from one specialization to the other, and uses multiple uses within one specialization. Therefore, there is no uniform definition of values because they relate to individuals. Individuals differ in many things, such as perception,
... Show More