Preferred Language
Articles
/
Kxavs4sBVTCNdQwCWtd9
Iraqi Paradigm E-Voting System Based on Hyperledger Fabric Blockchain Platform
...Show More Authors

Voting is one of the most fundamental components of a democratic society. In 2021 Iraq held the Council of Representatives (CoR) elections in 83 electoral constituencies in 19 governorates. Nonetheless, several significant issues arose during this election, including the problem of logistics distribution, the excessively long period of ballot counting, voters can't know if their votes were counted or if their ballots were tampered with, and the inconsistent regulation of vote counting. Blockchain technology, which was just invented, may offer a solution to these problems. This paper introduces an electronic voting system for the Iraq Council of Representatives elections that is based on a prototype of the permission hyperledger fabric blockchain. An immutable, distributed ledger maintained by all members of a network is what blockchain technology is all about. By authenticating each voter, the system can prevent voting fraud by making votes traceable and verifiable, hence decreasing the chance of unlawful activities and fraudulent ballots. This work investigates the influence of E-voting, specifically the voting phase workload, on the performance of the hyperledger fabric blockchain platform in terms of latency and throughput by altering transaction send rates (tps), block size, and block timeout.

Scopus Crossref
View Publication
Publication Date
Tue Dec 23 2025
Journal Name
Ishraqat Tanmawia
Formation Engineering and Pedagogy of E-Learning in Light of Corona Pandemic
...Show More Authors

View Publication
Publication Date
Sun Mar 19 2023
Journal Name
Journal Of Educational And Psychological Researches
E-Learning and Its Relationship with Academic Passion among Middle School Students
...Show More Authors

Abstract

The current research aims to identify the level of E-learning among middle school students, the level of academic passion among middle school students, and the correlation between e-learning and academic passion among middle school students. In order to achieve the objectives of the research, the researcher developed two questionnaires to measure the variables of the study (e-learning and study passion) among students, these two tools were applied to the research sample, which was (380) male and female students in the first and second intermediate classes. The research concluded that there is a relationship between e-learning and academic passion among students.

View Publication Preview PDF
Publication Date
Tue Nov 07 1989
Journal Name
Proc. 5th Sci.conf./src
INACTIVATION OF B*- LACTAM ANTIBIOTICS AGAINST E. COLI BY VAMIN NUTRITIONAL SUPPLEMENTION
...Show More Authors

ABSTRACT Possible interference of vamin nutritional solution with the activity of several B-lactam antibiotics against E.coli was evaluated in vitro.In Minimal basal salts-glucose medium rapid growth inhibition of sensitive E. coli was induced by 4 µg/ml of ampicillin / cloxaillin, 8 µg/ml of ampicillin, 6 µg/ml of carbencillin, hostacillin, and cephalotin, and by 32 µg/ml of penicillin G and cloxacillin. Significant inactivation of up to 32 µg/ml of carbencillin, cephalotin, penicillin G, and hostacillin was induced by addition of 1:20 v/v vamin. This inactivation was due to the presence of specific amino acids in the mixture. Deletions of amino acids revealed that valine, leucine, isoleucine, tyrosine, tryptophan, phenylalanine, cys

... Show More
Publication Date
Fri Jun 30 2017
Journal Name
Acta Crystallographica Section E Crystallographic Communications
Crystal structure of (<i>E</i>)-4-benzylidene-6-phenyl-1,2,3,4,7,8,9,10-octahydrophenanthridine
...Show More Authors

The preparation of the title compound, C26H25N, was achieved by the condensation of an ethanolic mixture of benzaldehyde, cyclohexanone and ammonium acetate in a 2:1:1 molar ratio. There are two crystallographically independent molecules in the asymmetric unit. The two cyclohexyl rings adopt ananti-envelope conformation with the benzyl moiety adopting acisconformation with respect to the nitrogen atom of the phenanthridine segment. In the crystal, molecules are linked through C—H...N interactions into hydrogen-bonded chains that are further arranged into distinct layers by weak offset π–π interactions.

View Publication
Scopus (10)
Crossref (3)
Scopus Crossref
Publication Date
Tue Jan 30 2024
Journal Name
International Journal Of Engineering Pedagogy (ijep)
E-learning in the Cloud Computing Environment: Features, Architecture, Challenges and Solutions
...Show More Authors

The need to constantly and consistently improve the quality and quantity of the educational system is essential. E-learning has emerged from the rapid cycle of change and the expansion of new technologies. Advances in information technology have increased network bandwidth, data access speed, and reduced data storage costs. In recent years, the implementation of cloud computing in educational settings has garnered the interest of major companies, leading to substantial investments in this area. Cloud computing improves engineering education by providing an environment that can be accessed from anywhere and allowing access to educational resources on demand. Cloud computing is a term used to describe the provision of hosting services

... Show More
View Publication
Scopus (7)
Scopus Clarivate Crossref
Publication Date
Thu Oct 01 2015
Journal Name
Journal Of Engineering
Development of Spatial Data Infrastructure based on Free Data Integration
...Show More Authors

In recent years, the performance of Spatial Data Infrastructures for governments and companies is a task that has gained ample attention. Different categories of geospatial data such as digital maps, coordinates, web maps, aerial and satellite images, etc., are required to realize the geospatial data components of Spatial Data Infrastructures. In general, there are two distinct types of geospatial data sources exist over the Internet: formal and informal data sources. Despite the growth of informal geospatial data sources, the integration between different free sources is not being achieved effectively. The adoption of this task can be considered the main advantage of this research. This article addresses the research question of ho

... Show More
Crossref
Publication Date
Thu Jun 01 2023
Journal Name
Journal Of Engineering
A Modified Vigenère Cipher based on Time and Biometrics features
...Show More Authors

Biometrics is widely used with security systems nowadays; each biometric modality can be useful and has distinctive properties that provide uniqueness and ambiguity for security systems especially in communication and network technologies. This paper is about using biometric features of fingerprint, which is called (minutiae) to cipher a text message and ensure safe arrival of data at receiver end. The classical cryptosystems (Caesar, Vigenère, etc.) became obsolete methods for encryption because of the high-performance machines which focusing on repetition of the key in their attacks to break the cipher. Several Researchers of cryptography give efforts to modify and develop Vigenère cipher by enhancing its weaknesses.

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Tue Aug 24 2021
Journal Name
Conference: The 5th International Multi-conference On Artificial Intelligence Technology (mcait 2021).
Text Encryption Based on DNA Cryptography, RNA, and Amino Acid
...Show More Authors

To achieve safe security to transfer data from the sender to receiver, cryptography is one way that is used for such purposes. However, to increase the level of data security, DNA as a new term was introduced to cryptography. The DNA can be easily used to store and transfer the data, and it becomes an effective procedure for such aims and used to implement the computation. A new cryptography system is proposed, consisting of two phases: the encryption phase and the decryption phase. The encryption phase includes six steps, starting by converting plaintext to their equivalent ASCII values and converting them to binary values. After that, the binary values are converted to DNA characters and then converted to their equivalent complementary DN

... Show More
Publication Date
Fri Jan 10 2025
Journal Name
International Journal Of Scientific Research In Science, Engineering And Technology
Image Cryptography Based on Chebyshev Polynomials and Transposition- Substitution Transformations
...Show More Authors

The confirming of security and confidentiality of multimedia data is a serious challenge through the growing dependence on digital communication. This paper offers a new image cryptography based on the Chebyshev chaos polynomials map, via employing the randomness characteristic of chaos concept to improve security. The suggested method includes block shuffling, dynamic offset chaos key production, inter-layer XOR, and block 90 degree rotations to disorder the correlations intrinsic in image. The method is aimed for efficiency and scalability, accomplishing  complexity order for n-pixels over specific cipher rounds. The experiment outcomes depict great resistant to cryptanalysis attacks, containing statistical, differential and brut

... Show More
View Publication
Crossref
Publication Date
Fri Feb 08 2019
Journal Name
Journal Of The College Of Education For Women
Online Sumarians Cuneiform Detection Based on Symbol Structural Vector Algorithm
...Show More Authors

The cuneiform images need many processes in order to know their contents
and by using image enhancement to clarify the objects (symbols) founded in the
image. The Vector used for classifying the symbol called symbol structural vector
(SSV) it which is build from the information wedges in the symbol.
The experimental tests show insome numbersand various relevancy including
various drawings in online method. The results are high accuracy in this research,
and methods and algorithms programmed using a visual basic 6.0. In this research
more than one method was applied to extract information from the digital images
of cuneiform tablets, in order to identify most of signs of Sumerian cuneiform.

View Publication Preview PDF