Voting is one of the most fundamental components of a democratic society. In 2021 Iraq held the Council of Representatives (CoR) elections in 83 electoral constituencies in 19 governorates. Nonetheless, several significant issues arose during this election, including the problem of logistics distribution, the excessively long period of ballot counting, voters can't know if their votes were counted or if their ballots were tampered with, and the inconsistent regulation of vote counting. Blockchain technology, which was just invented, may offer a solution to these problems. This paper introduces an electronic voting system for the Iraq Council of Representatives elections that is based on a prototype of the permission hyperledger fabric blockchain. An immutable, distributed ledger maintained by all members of a network is what blockchain technology is all about. By authenticating each voter, the system can prevent voting fraud by making votes traceable and verifiable, hence decreasing the chance of unlawful activities and fraudulent ballots. This work investigates the influence of E-voting, specifically the voting phase workload, on the performance of the hyperledger fabric blockchain platform in terms of latency and throughput by altering transaction send rates (tps), block size, and block timeout.
Abstract
The current research aims to identify the level of E-learning among middle school students, the level of academic passion among middle school students, and the correlation between e-learning and academic passion among middle school students. In order to achieve the objectives of the research, the researcher developed two questionnaires to measure the variables of the study (e-learning and study passion) among students, these two tools were applied to the research sample, which was (380) male and female students in the first and second intermediate classes. The research concluded that there is a relationship between e-learning and academic passion among students.
ABSTRACT Possible interference of vamin nutritional solution with the activity of several B-lactam antibiotics against E.coli was evaluated in vitro.In Minimal basal salts-glucose medium rapid growth inhibition of sensitive E. coli was induced by 4 µg/ml of ampicillin / cloxaillin, 8 µg/ml of ampicillin, 6 µg/ml of carbencillin, hostacillin, and cephalotin, and by 32 µg/ml of penicillin G and cloxacillin. Significant inactivation of up to 32 µg/ml of carbencillin, cephalotin, penicillin G, and hostacillin was induced by addition of 1:20 v/v vamin. This inactivation was due to the presence of specific amino acids in the mixture. Deletions of amino acids revealed that valine, leucine, isoleucine, tyrosine, tryptophan, phenylalanine, cys
... Show MoreThe preparation of the title compound, C26H25N, was achieved by the condensation of an ethanolic mixture of benzaldehyde, cyclohexanone and ammonium acetate in a 2:1:1 molar ratio. There are two crystallographically independent molecules in the asymmetric unit. The two cyclohexyl rings adopt an
The need to constantly and consistently improve the quality and quantity of the educational system is essential. E-learning has emerged from the rapid cycle of change and the expansion of new technologies. Advances in information technology have increased network bandwidth, data access speed, and reduced data storage costs. In recent years, the implementation of cloud computing in educational settings has garnered the interest of major companies, leading to substantial investments in this area. Cloud computing improves engineering education by providing an environment that can be accessed from anywhere and allowing access to educational resources on demand. Cloud computing is a term used to describe the provision of hosting services
... Show MoreIn recent years, the performance of Spatial Data Infrastructures for governments and companies is a task that has gained ample attention. Different categories of geospatial data such as digital maps, coordinates, web maps, aerial and satellite images, etc., are required to realize the geospatial data components of Spatial Data Infrastructures. In general, there are two distinct types of geospatial data sources exist over the Internet: formal and informal data sources. Despite the growth of informal geospatial data sources, the integration between different free sources is not being achieved effectively. The adoption of this task can be considered the main advantage of this research. This article addresses the research question of ho
... Show MoreBiometrics is widely used with security systems nowadays; each biometric modality can be useful and has distinctive properties that provide uniqueness and ambiguity for security systems especially in communication and network technologies. This paper is about using biometric features of fingerprint, which is called (minutiae) to cipher a text message and ensure safe arrival of data at receiver end. The classical cryptosystems (Caesar, Vigenère, etc.) became obsolete methods for encryption because of the high-performance machines which focusing on repetition of the key in their attacks to break the cipher. Several Researchers of cryptography give efforts to modify and develop Vigenère cipher by enhancing its weaknesses.
... Show MoreTo achieve safe security to transfer data from the sender to receiver, cryptography is one way that is used for such purposes. However, to increase the level of data security, DNA as a new term was introduced to cryptography. The DNA can be easily used to store and transfer the data, and it becomes an effective procedure for such aims and used to implement the computation. A new cryptography system is proposed, consisting of two phases: the encryption phase and the decryption phase. The encryption phase includes six steps, starting by converting plaintext to their equivalent ASCII values and converting them to binary values. After that, the binary values are converted to DNA characters and then converted to their equivalent complementary DN
... Show MoreThe confirming of security and confidentiality of multimedia data is a serious challenge through the growing dependence on digital communication. This paper offers a new image cryptography based on the Chebyshev chaos polynomials map, via employing the randomness characteristic of chaos concept to improve security. The suggested method includes block shuffling, dynamic offset chaos key production, inter-layer XOR, and block 90 degree rotations to disorder the correlations intrinsic in image. The method is aimed for efficiency and scalability, accomplishing complexity order for n-pixels over specific cipher rounds. The experiment outcomes depict great resistant to cryptanalysis attacks, containing statistical, differential and brut
... Show MoreThe cuneiform images need many processes in order to know their contents
and by using image enhancement to clarify the objects (symbols) founded in the
image. The Vector used for classifying the symbol called symbol structural vector
(SSV) it which is build from the information wedges in the symbol.
The experimental tests show insome numbersand various relevancy including
various drawings in online method. The results are high accuracy in this research,
and methods and algorithms programmed using a visual basic 6.0. In this research
more than one method was applied to extract information from the digital images
of cuneiform tablets, in order to identify most of signs of Sumerian cuneiform.