The consensus algorithm is the core mechanism of blockchain and is used to ensure data consistency among blockchain nodes. The PBFT consensus algorithm is widely used in alliance chains because it is resistant to Byzantine errors. However, the present PBFT (Practical Byzantine Fault Tolerance) still has issues with master node selection that is random and complicated communication. The IBFT consensus technique, which is enhanced, is proposed in this study and is based on node trust value and BLS (Boneh-Lynn-Shacham) aggregate signature. In IBFT, multi-level indicators are used to calculate the trust value of each node, and some nodes are selected to take part in network consensus as a result of this calculation. The master node is chosen from among them based on which node has the highest trust value, it transforms the BLS signature process into the information interaction process between nodes. Consequently, communication complexity is reduced, and node-to-node information exchange remains secure. The simulation experiment findings demonstrate that the IBFT consensus method enhances transaction throughput rate by 61% and reduces latency by 13% when compared to the PBFT algorithm.
The support qualitative information regards as an additional step in the process of decision-making where the method following by companies to provide information help in the creation of value because it is very important to deliver information to investors about their stratigies and what happen truly inside the companies i.e. every case relating with the expectations of stockhotslder and the prices of markets depending on those expectation ,and if the matter isn’t that there will be lack of confidence thate couldn’t be backed again. The decisions of the investors effected by security ,economic ,political, psychological, emotional ,and financial factors .
... Show MoreThe objective of this study is to apply Artificial Neural Network for heat transfer analysis of shell-and-tube heat exchangers widely used in power plants and refineries. Practical data was obtained by using industrial heat exchanger operating in power generation department of Dura refinery. The commonly used Back Propagation (BP) algorithm was used to train and test networks by divided the data to three samples (training, validation and testing data) to give more approach data with actual case. Inputs of the neural network include inlet water temperature, inlet air temperature and mass flow rate of air. Two outputs (exit water temperature to cooling tower and exit air temperature to second stage of air compressor) were taken in ANN.
... Show MoreImage is an important digital information that used in many internet of things (IoT) applications such as transport, healthcare, agriculture, military, vehicles and wildlife. etc. Also, any image has very important characteristic such as large size, strong correlation and huge redundancy, therefore, encrypting it by using single key Advanced Encryption Standard (AES) through IoT communication technologies makes it vulnerable to many threats, thus, the pixels that have the same values will be encrypted to another pixels that have same values when they use the same key. The contribution of this work is to increase the security of transferred image. This paper proposed multiple key AES algorithm (MECCAES) to improve the security of the tran
... Show MoreAs we know the transportation studies regarded as one of a very
important and difficult studies and one of its difficulties created from the
process of data updating therefore the researcher well facing many difficulties
to balancing between the old data on collecting new data.
The research present an opinion which is summarized by: can we use
the old data after we updated and used it as alternatives? Or the researcher
must collect new data to complete their research which indicate to the present
situation and some times they cant complete their studies because of the
security, economic, temporally difficulties.
The research used two kinds of data, the old data which belong to the
period (1998) and new data
Laser etching may be an alternative to acid etching of enamel and dentin. Several characteristics of irradiated dental hard tissues have been considered advantageous, microscopically rough surfaces without demineralization, open dentinal tubules without smear layer production and dentin surface sterilization. The aim of this study is to determine and compare histology the microleakage in class V cavity restored with a light cured composite after conditioning the samples(tooth surface) with 1-acid etching, 2-Q-switched Nd:YAG Laser etching and finally 3- acid and laser etching. Materials and methods: Twenty four non carious human extracted teeth were used in this study. The samples were equally grouped into four groups of six teeth each.
... Show MoreCurrent research included preparation, characterization of some new chitosan- hydroxy benzaldehyde-Schiff bases with maleic anhydride. The present study aimed to the synthesis and characterization of novel chitosan Schiff base compounds using para- hydroxy benzaldeh and maleic anhydride. The derivative of the schiff-chitosan base, which is associated with different drugs, has been replaced with different amino and hydroxy drugs. The derivative is characterized by different analytical techniques. The results of FT-IR studies clearly indicate construction of the chief amine group in chitosan and the emergence of new bands that correspond to the association of maleic anhydride with the chitosan base. TGA, 1
... Show MoreA three-stage learning algorithm for deep multilayer perceptron (DMLP) with effective weight initialisation based on sparse auto-encoder is proposed in this paper, which aims to overcome difficulties in training deep neural networks with limited training data in high-dimensional feature space. At the first stage, unsupervised learning is adopted using sparse auto-encoder to obtain the initial weights of the feature extraction layers of the DMLP. At the second stage, error back-propagation is used to train the DMLP by fixing the weights obtained at the first stage for its feature extraction layers. At the third stage, all the weights of the DMLP obtained at the second stage are refined by error back-propagation. Network structures an
... Show MoreOne of the most difficult issues in the history of communication technology is the transmission of secure images. On the internet, photos are used and shared by millions of individuals for both private and business reasons. Utilizing encryption methods to change the original image into an unintelligible or scrambled version is one way to achieve safe image transfer over the network. Cryptographic approaches based on chaotic logistic theory provide several new and promising options for developing secure Image encryption methods. The main aim of this paper is to build a secure system for encrypting gray and color images. The proposed system consists of two stages, the first stage is the encryption process, in which the keys are genera
... Show More