Moderately, advanced national election technologies have improved political systems. As electronic voting (e-voting) systems advance, security threats like impersonation, ballot tampering, and result manipulation increase. These challenges are addressed through a review covering biometric authentication, watermarking, and blockchain technologies, each of which plays a crucial role in improving the security of e-voting systems. More precisely, the biometric authentication is being examined due to its ability in identify the voters and reducing the risks of impersonation. The study also explores the blockchain technology to decentralize the elections, enhance the transparency and ensure the prevention of any unauthorized alteration or manipulation of the results. Additionally, the watermarking technology is examined for viewing the ability to store and transmit the voting result in secure manner though preserving the confidentiality ensure fair elections. this review aims to evaluate the combination of biometric authentication, watermarking, and blockchain technologies effectiveness to develop robust e-voting framework. as a result, the key finding indicates a hybrid approach that integrates those technology offers a solution to address the security challenges.
Shatt Al-Hilla branches from the left of Euphrates River, U/S Hindiyah Barrage, Iraq, and extends about 100 km. It branches at the end into Shatt Al-Diwaniya 112 km and Shatt Al-Daghara 64 km. The study aims to evaluate and develop (Hilla-Daghara) rivers system, which is included Shatt Al-Hilla and Shatt Al-Daghara. Fieldwork began from (26 October until December) 2020. M9, S5 devices, and the installed staff gauges were used to measure discharges and water levels, respectively. A one-dimensional model was developed for the study area by HEC-RAS, after calibration and verification by field measurements; the Manning's n of Shatt Al-Daghara is found to be 0.022. Five Scenarios were simulated to study the reach under the cu
... Show MoreA simulated ion/electron optical transport and focusing system has been put forward to
be mounted on high voltage transmission electron microscope for in situ investigations.
The suggested system consists of three axially symmetric electrostatic lenses namely an
einzel lens, an accelerating immersion lens, and a decelerating immersion lens, in addition
to an electrostatic quadrupole doublet lens placed on the image side. The electrodes
profile of these lenses is determined from the proposed axial field distributions. The
optical properties of the whole system have been computed together with the trajectory of
the accelerated charged-particles beam along the optical axis of the system. The computed
dimensions of th
In this work, the design and implementation of a smart energy metering system has been developed. This system consists of two parts: billing center and a set of distributed smart energy meters. The function of smart energy meter is measuring and calculating the cost of consumed energy according to a multi-tariff scheme. This can be effectively solving the problem of stressing the electrical grid and rising consumer awareness. Moreover, smart energy meter decreases technical losses by improving power factor. The function of the billing center is to issue a consumer bill and contributes in locating the irregularities on the electrical grid (non-technical losses). Moreover, it sends the switch off command in case of the consumer bill is not
... Show MoreConstitutional Review of 1992 and 1996 and the role of the Party of Progress and Socialism
Cloud computing offers a new way of service provision by rearranging various resources over the Internet. The most important and popular cloud service is data storage. In order to preserve the privacy of data holders, data are often stored in cloud in an encrypted form. However, encrypted data introduce new challenges for cloud data deduplication, which becomes crucial for big data storage and processing in the cloud. Traditional deduplication schemes cannot work on encrypted data. Among these data, digital videos are fairly huge in terms of storage cost and size; and techniques that can help the legal aspects of video owner such as copyright protection and reducing the cloud storage cost and size are always desired. This paper focuses on v
... Show MoreAbstract Depending on their protective properties against different cases of Colorectal Cancer (CRC), vitamins C, D, and E are the main focus of this research. CRC is one of the global public health concerns. 30 healthy individuals provided serum samples, whereas the group of CRC patients was divided into three, totaling 90 individuals. Group I consisted of 30 newly diagnosed cases of CRC. Group II 30 consisted of consisted of 30 CRC patients who were administered three cycles of chemotherapy. Group III consisted of 30 diagnosed CRC patients who also have non-alcoholic fatty liver disease (NAFLD). The concentrations and groups of vitamins C, D, and E were evaluated using ELISA. The levels of Vitamin C were significantly lower (p &l
... Show MoreImproved oral bioavailability of lipophilic substances can be achieved using self-emulsifying drug delivery systems. However, because the properties of self-emulsifying are greatly influenced by surfactant amount and type, type of oil used, droplet size, charge, cosolvents, and physiological variables, the synthesis of self-emulsifying is highly complex; consequently, only a small number of excipient self-emulsifying formulations has been developed so far for clinical use. This study reports a highly effective procedure for developing self-emulsifying formulations using a novel approach based on the hydrophilic-lipophilic difference theory. Microemulsion characteristics, such as the constituents and amounts of oil and surfactant electrolyte
... Show MoreIn this research, a study is introduced on the effect of several environmental factors on the performance of an already constructed quality inspection system, which was designed using a transfer learning approach based on convolutional neural networks. The system comprised two sets of layers, transferred layers set from an already trained model (DenseNet121) and a custom classification layers set. It was designed to discriminate between damaged and undamaged helical gears according to the configuration of the gear regardless to its dimensions, and the model showed good performance discriminating between the two products at ideal conditions of high-resolution images. So, this study aimed at testing the system performance at poo
... Show MoreThe research focuses on how to reach a mechanism that assists experts, engineers, and others in the architectural & engineering project to verify the co-existence of values and sustainability constituents in it. Research problem shows a clear lack, locally, in the interest to establish a value system and a list that cares about comprehending building components whether considering sustainable building criteria. Hypothesis shows that in order to head towards the applicable sustainable approach of buildings, then a local assessment system should be established to evaluate buildings during its life cycle, and from which buildings would be categorized as sustainable or not. Research aims at establishing main and general
... Show MoreIn this work, an efficient energy management (EEM) approach is proposed to merge IoT technology to enhance electric smart meters by working together to satisfy the best result of the electricity customer's consumption. This proposed system is called an integrated Internet of things for electrical smart meter (2IOT-ESM) architecture. The electric smart meter (ESM) is the first and most important technique used to measure the active power, current, and energy consumption for the house’s loads. At the same time, the effectiveness of this work includes equipping ESM with an additional storage capacity that ensures that the measurements are not lost in the event of a failure or sudden outage in WiFi network. Then then these measurement
... Show More