Ensuring security, integrity, and reliability of the election process consider as the main challenges in the electronic voting system. This paper describes the e-voting system by integrating the biometric authentication, advanced encryption, and watermarking techniques towards meeting such challenges. The system employs the fingerprint authentication by utilizing the Scale-Invariant Feature Transform (SIFT) for verifying the identity of the voter to ensure genuineness and non-repudiation of the service. The vote will be encrypted with the AES-GCM technique to be employed in securing the voting process, thus ensuring both data privacy and integrity. Hybrid Blind Watermarking employs the technique of Discrete Wavelet Transform (DWT) and Discrete Cosine Transform (DCT) for embedding the encrypted vote into the colored watermark cover image. Increased robustness against attacks with maintained vote confidentiality is achieved through this approach. The experimental results proved its imperceptibility to reach a Peak Signal-to-Noise Ratio (PSNR) of 40.7 and Normalized Correlation (NC) of 1. Thus, the proposed system enhances the theoretical foundation of secure e-voting and provides an implementation strategy for a reliable and tamper-proof voting system.
The importance of the research lies in preparing an experimental curriculum according to a scientific method that will contribute to the development of the special strength(endurance the strength of arms) in order to contribute to the attempt to develop the basic skills of the national team players with the goal ball for the blind As for the research problem, it lies in the weakness of the strength endurance of the national team players with the goal ball for the blind, as the research problem is clearly evident in the last minutes of the match, as well as the former studies in the field of goal ball game for the blind at the country level The research aims to prepare special exercises for endurance of strength as well as t
... Show More
Abstract
This study aims to identify the degree to which the first cycle teachers use different feedback patterns in the e-learning system in addition to the differences in the degree of use according to specialization, teaching experience, and in-service training in the field of classroom assessment, as well as the interaction between them. The study sample consisted of (350) female teachers of the first cycle in government schools in Muscat Governorate for the academic year 2020/2021. The study used a questionnaire that contained four different patterns of feedback, which are reinforcement, informative, corrective, and interpretive feedback. The psychometric properties of the que
... Show MoreBackground: despite the rise in the incidence of renal cell carcinoma attributed to availability of medical imaging, a considerable decline in mortality is an association. Morbidity-wise, the shift from radical nephrectomy to partial nephrectomy is the trend for now. Multiple scoring systems have been introduced over the past decades to help surgeons choose between radical and partial nephrectomy. One commonly used system is the RENAL nephrometry score that was first introduced by Kutikov and Uzzo in 2009.
Objective: to evaluate the role of RENAL nephrometry scoring system in predicting the surgical technique to use to resect renal masses and associated perioperative outcomes.
... Show MorePhenol is one of the worst-damaging organic pollutants, and it produces a variety of very poisonous organic intermediates, thus it is important to find efficient ways to eliminate it. One of the promising techniques is sonoelectrochemical processing. However, the type of electrodes, removal efficiency, and process cost are the biggest challenges. The main goal of the present study is to investigate the removal of phenol by a sonoelectrochemical process with different anodes, such as graphite, stainless steel, and titanium. The best anode performance was optimized by using the Taguchi approach with an L16 orthogonal array. the degradation of phenol sonoelectrochemically was investigated with three process parameters: current de
... Show MoreBackground and Aim: due to the rapid growth of data communication and multimedia system applications, security becomes a critical issue in the communication and storage of images. This study aims to improve encryption and decryption for various types of images by decreasing time consumption and strengthening security. Methodology: An algorithm is proposed for encrypting images based on the Carlisle Adams and Stafford Tavares CAST block cipher algorithm with 3D and 2D logistic maps. A chaotic function that increases the randomness in the encrypted data and images, thereby breaking the relation sequence through the encryption procedure, is introduced. The time is decreased by using three secure and private S-Boxes rather than using si
... Show MoreKE Sharquie, SA Al-Mashhadani, A A Noaimi, RK Al-Hayani, SA Shubber, Iraqi Journal of Community Medicine, 2017 - Cited by 1
KE Sharquie, SA Al Mashhadani, AA Noaimi, RK Al-Hayani, SA Shubber, Iraqi Postgraduate Medical Journal, 2012 - Cited by 1