Preferred Language
Articles
/
TxhbK5YBVTCNdQwC4YKI
Secure E-voting authentication system employing biometric technology, Crypto-Watermarking Approach and blockchain technology: A Review
...Show More Authors

Moderately, advanced national election technologies have improved political systems. As electronic voting (e-voting) systems advance, security threats like impersonation, ballot tampering, and result manipulation increase. These challenges are addressed through a review covering biometric authentication, watermarking, and blockchain technologies, each of which plays a crucial role in improving the security of e-voting systems. More precisely, the biometric authentication is being examined due to its ability in identify the voters and reducing the risks of impersonation. The study also explores the blockchain technology to decentralize the elections, enhance the transparency and ensure the prevention of any unauthorized alteration or manipulation of the results. Additionally, the watermarking technology is examined for viewing the ability to store and transmit the voting result in secure manner though preserving the confidentiality ensure fair elections. this review aims to evaluate the combination of biometric authentication, watermarking, and blockchain technologies effectiveness to develop robust e-voting framework. as a result, the key finding indicates a hybrid approach that integrates those technology offers a solution to address the security challenges.

Crossref
View Publication
Publication Date
Mon Dec 14 2020
Journal Name
2020 13th International Conference On Developments In Esystems Engineering (dese)
Anomaly Based Intrusion Detection System Using Hierarchical Classification and Clustering Techniques
...Show More Authors

With the rapid development of computers and network technologies, the security of information in the internet becomes compromise and many threats may affect the integrity of such information. Many researches are focused theirs works on providing solution to this threat. Machine learning and data mining are widely used in anomaly-detection schemes to decide whether or not a malicious activity is taking place on a network. In this paper a hierarchical classification for anomaly based intrusion detection system is proposed. Two levels of features selection and classification are used. In the first level, the global feature vector for detection the basic attacks (DoS, U2R, R2L and Probe) is selected. In the second level, four local feature vect

... Show More
View Publication
Scopus (4)
Crossref (4)
Scopus Clarivate Crossref
Publication Date
Tue Jan 31 2023
Journal Name
International Journal Of Nonlinear Analysis And Applications
Survey on intrusion detection system based on analysis concept drift: Status and future directions
...Show More Authors

Nowadays, internet security is a critical concern; the One of the most difficult study issues in network security is "intrusion detection". Fight against external threats. Intrusion detection is a novel method of securing computers and data networks that are already in use. To boost the efficacy of intrusion detection systems, machine learning and deep learning are widely deployed. While work on intrusion detection systems is already underway, based on data mining and machine learning is effective, it requires to detect intrusions by training static batch classifiers regardless considering the time-varying features of a regular data stream. Real-world problems, on the other hand, rarely fit into models that have such constraints. Furthermor

... Show More
View Publication
Publication Date
Sun Mar 13 2016
Journal Name
Iraqi Journal Of Market Research And Consumer Protection
Isolation and Identification of food Probiotic Saccharomyces boulardii by using traditional methods, Vitek 2 system and molecular identification methods.: Isolation and Identification of food Probiotic Saccharomyces boulardii by using traditional methods, Vitek 2 system and molecular identification methods.
...Show More Authors

This study was aimed to isolate and identify Saccharomyces boulardii from Mangosteen fruits (Garcinia mangostana L.) by traditional and molecular identification methods To get safe and healthy foods probiotics for use, The isolates and two commercial strains were subjected to cultural, morphological and biochemical tests, The colonies of the isolates were spherical, smooth, mucoidal, dull and white to cream colour on SD agar media .The shape of cells was globose to ovoid and sometimes with budding, in a single form or clustered like a beehive. The isolates and two commercial strains were unable to metabolized galactose and lactose , Results shows that all isolates were unable to utilize potassium nitrate and not grow in the presence of (

... Show More
View Publication Preview PDF
Publication Date
Sat Nov 13 2021
Journal Name
International Journal Of Pharmacy Practice
A comprehensive review of drivers influencing flu vaccine acceptance in the Middle East over the last six years: using Health Belief Model
...Show More Authors
Abstract<sec> <title>Objectives

The objectives of this study were to review the literature covering the perceptions about influenza vaccines in the Middle East and to determine factors influencing the acceptance of vaccination using Health Belief Model (HBM).

Methods

A comprehensive literature search was performed utilizing PubMed and Google Scholar databases. Three keywords were used: Influenza vaccine, perceptions and Middle East. Empirical studies that dealt with people/healthcare worker (HCW) perceptio

... Show More
Scopus (9)
Crossref (9)
Scopus Clarivate Crossref
Publication Date
Sat Nov 13 2021
Journal Name
International Journal Of Pharmacy Practice
A comprehensive review of drivers influencing flu vaccine acceptance in the Middle East over the last six years: using Health Belief Model
...Show More Authors
Abstract<sec> <title>Objectives

The objectives of this study were to review the literature covering the perceptions about influenza vaccines in the Middle East and to determine factors influencing the acceptance of vaccination using Health Belief Model (HBM).

Methods

A comprehensive literature search was performed utilizing PubMed and Google Scholar databases. Three keywords were used: Influenza vaccine, perceptions and Middle East. Empirical studies that dealt with people/healthcare worker (HCW) perceptio

... Show More
View Publication
Scopus (9)
Crossref (9)
Scopus Clarivate Crossref
Publication Date
Sun Sep 01 2019
Journal Name
Journal Of Engineering And Applied Sciences
The role of e-Government on corruption and its impact on the financial performance of the government: An empirical analysis on the Iraqi government
...Show More Authors

This study aimed to provide a conceptual model for the use and benefits of the e-Government as related to administrative fraud and financial corruption. The study also looked into their concepts, forms, dimensions and types and the role of e-Government on fraud reduction, corruption in administration and finance and its impact on the government performance. From the result, it is revealed that there is need for electronic government for implementation in order to curb the rate of fraud and administrative and financial corruption and improve the quality of service provision for better performance

Scopus (15)
Scopus
Publication Date
Fri Jan 24 2020
Journal Name
International Journal Of Pharmaceutical Research
Preparation, spectral characterization and biological activity of somenewbimetalic complexes derived from{ 2,2`((5-methyl-1,3-phenylene)-bis- (oxy))-bis-N`(E`)-2- hydroxybenzylideneacetohydrazide}ligand
...Show More Authors

In this work, the preparation of new multidentate Schiff-base lig and and its metal complexes are described. The formation of the lig and{ 2,2`((5-methyl-1,3-phenylene)-bis-(oxy))-bis-N`(E`)-2- hydroxybenzylideneacetohydrazide}[H2L] was prepared from the reaction {2,2-((5-methyl-1,3-phenylene)-bis-(oxy))- di-(acetohydrazide)}[M]precursor and salicylaldehyde in a 1:2 mole ratio, respectively. The reaction of the lig and [H2L] with (Cr+3 , Mn+2 and Fe+2 )metal ions in a 1:2 (L:M) mole ratio. Ligand and complexes were characterised via spectroscopic analyses; [FT-IR, UV-Vis spectroscopy,(C.H.N) microanalysis, chloride content, thermal analysis(TG), electrospray mass, magnetic susceptibility and conductivity measurements. The characterisation d

... Show More
View Publication
Publication Date
Sat Feb 01 2020
Journal Name
Journal Of Economics And Administrative Sciences
The Relationship between the Strategies of E-marketing mix and Marketing Effectiveness of the Palestinian Small Business Industrial Organizations in the City of Hebron
...Show More Authors

In the city of Hebron, small business industrial organizations face a major challenge related to its ability to reach, attract and sustain a sufficient number of customers in order to ensure its continuity and sustainability. The research problem is summarized in an attempt to reveal how the e-marketing could improve and support the marketing effectiveness of small business industrial organizations in the city of Hebron/Palestine. The importance of this research stems from the fact that it addresses a new knowledge branch of the field of marketing, which is electronic marketing for small business organizations, and the fact that the research highlights appropriate marketing solutions for these organizations in light of the Intern

... Show More
View Publication Preview PDF
Crossref
Publication Date
Tue Sep 01 2020
Journal Name
Baghdad Science Journal
Developing Arabic License Plate Recognition System Using Artificial Neural Network and Canny Edge Detection
...Show More Authors

            In recent years, there has been expanding development in the vehicular part and the number of vehicles moving on the roads in all the sections of the country. Arabic vehicle number plate identification based on image processing is a dynamic area of this work; this technique is used for security purposes such as tracking of stolen cars and access control to restricted areas. The License Plate Recognition System (LPRS) exploits a digital camera to capture vehicle plate numbers is used as input to the proposed recognition system. Basically, the proposed system consists of three phases, vehicle license plate localization, character segmentation, and character recognition, the

... Show More
View Publication Preview PDF
Scopus (10)
Crossref (4)
Scopus Clarivate Crossref
Publication Date
Sat Aug 01 2015
Journal Name
Journal Of Engineering
Analytical Approach for Load Capacity of Large Diameter Bored Piles Using Field Data
...Show More Authors

An analytical approach based on field data was used to determine the strength capacity of large diameter bored type piles. Also the deformations and settlements were evaluated for both vertical and lateral loadings. The analytical predictions are compared to field data obtained from a proto-type test pile used at Tharthar –Tigris canal Bridge. They were found to be with acceptable agreement of 12% deviation.

               Following ASTM standards D1143M-07e1,2010, a test schedule of five loading cycles were proposed for vertical loads and series of cyclic loads to simulate horizontal loading .The load test results and analytical data of 1.95

... Show More
View Publication Preview PDF