Voting is one of the most fundamental components of a democratic society. In 2021 Iraq held the Council of Representatives (CoR) elections in 83 electoral constituencies in 19 governorates. Nonetheless, several significant issues arose during this election, including the problem of logistics distribution, the excessively long period of ballot counting, voters can't know if their votes were counted or if their ballots were tampered with, and the inconsistent regulation of vote counting. Blockchain technology, which was just invented, may offer a solution to these problems. This paper introduces an electronic voting system for the Iraq Council of Representatives elections that is based on a prototype of the permission hyperledger fabric blockchain. An immutable, distributed ledger maintained by all members of a network is what blockchain technology is all about. By authenticating each voter, the system can prevent voting fraud by making votes traceable and verifiable, hence decreasing the chance of unlawful activities and fraudulent ballots. This work investigates the influence of E-voting, specifically the voting phase workload, on the performance of the hyperledger fabric blockchain platform in terms of latency and throughput by altering transaction send rates (tps), block size, and block timeout.
The study aims at identifying the sources of information and explaining their role in e-learning from the viewpoint of the Iraqi college students. The researchers relied on the descriptive method of the survey method to collect data and know the point of view of undergraduate students from the Department of Information in the College of Arts / Tikrit University and the Department of Quranic Studies at the College of Arts / University of Baghdad. The questionnaire was used as an instrument of the study, the research sample is (120) students; each section has (60) male and female students. The study concluded that there are many types and forms of information sources that students receive through electronic educational platforms from text con
... Show MoreA novel method for Network Intrusion Detection System (NIDS) has been proposed, based on the concept of how DNA sequence detects disease as both domains have similar conceptual method of detection. Three important steps have been proposed to apply DNA sequence for NIDS: convert the network traffic data into a form of DNA sequence using Cryptography encoding method; discover patterns of Short Tandem Repeats (STR) sequence for each network traffic attack using Teiresias algorithm; and conduct classification process depends upon STR sequence based on Horspool algorithm. 10% KDD Cup 1999 data set is used for training phase. Correct KDD Cup 1999 data set is used for testing phase to evaluate the proposed method. The current experiment results sh
... Show MoreAnalysis system of sports players is very important for individuals in weightlifting. Assessment of player and strength is important for the performance of weightlifting. This paper proposes an analytical method for weightlifters with check-by-frame video. This analysis system can compute the major steps of seven positions in both snatch and clean and jerk methods in frame-video weightlifting monitoring of movements. Each user can compute the major steps of the seven positions of Hu moments among two frames in the video during training, and the Euclidian distance can be computed for the Hu moment values and lifting moment values in the snatch and clean and jerk methods during training. The outcome of the proposed system shows on efficien
... Show More<span>Distributed denial-of-service (DDoS) attack is bluster to network security that purpose at exhausted the networks with malicious traffic. Although several techniques have been designed for DDoS attack detection, intrusion detection system (IDS) It has a great role in protecting the network system and has the ability to collect and analyze data from various network sources to discover any unauthorized access. The goal of IDS is to detect malicious traffic and defend the system against any fraudulent activity or illegal traffic. Therefore, IDS monitors outgoing and incoming network traffic. This paper contains a based intrusion detection system for DDoS attack, and has the ability to detect the attack intelligently, dynami
... Show MoreIn this paper, we employ the maximum likelihood estimator in addition to the shrinkage estimation procedure to estimate the system reliability (
This paper deals with the design and implementation of an ECG system. The proposed system gives a new concept of ECG signal manipulation, storing, and editing. It consists mainly of hardware circuits and the related software. The hardware includes the circuits of ECG signals capturing, and system interfaces. The software is written using Visual Basic languages, to perform the task of identification of the ECG signal. The main advantage of the system is to provide a reported ECG recording on a personal computer, so that it can be stored and processed at any time as required. This system was tested for different ECG signals, some of them are abnormal and the other is normal, and the results show that the system has a good quality of diagno
... Show MoreThe primary issue addressed in this research revolves around identifying the interactive elements provided by the Twitter platform and understanding their utilization by digital newspapers with official accounts. These newspapers broadcast content in line with their policies. This study is classified within descriptive research that employed a survey method and content analysis tool. The methodology relies on the "how was it said?" approach to categorize the analysis. The research yielded the following results:
Twitter utilized numerous interactive elements for disseminating tweets, which include "text, branching links, hashtags, digital images, digital videos, digital audio, and digital polls." However, thes
In this paper, a robust adaptive sliding mode controller is designed for a mobile platform trajectory tracking. The mobile platform is an example of a nonholonomic mechanical system. The presence of holonomic constraints reduces the number of degree of freedom that represents the system model, while the nonholonomic constraints reduce the differentiable degree of freedom. The mathematical model was derived here for the mobile platform, considering the existence of one holonomic and two nonholonomic constraints imposed on system dynamics. The partial feedback linearization method was used to get the input-output relation, where the output is the error functions between the position of a certain point on the platform
... Show More