Moderately, advanced national election technologies have improved political systems. As electronic voting (e-voting) systems advance, security threats like impersonation, ballot tampering, and result manipulation increase. These challenges are addressed through a review covering biometric authentication, watermarking, and blockchain technologies, each of which plays a crucial role in improving the security of e-voting systems. More precisely, the biometric authentication is being examined due to its ability in identify the voters and reducing the risks of impersonation. The study also explores the blockchain technology to decentralize the elections, enhance the transparency and ensure the prevention of any unauthorized alteration or manipulation of the results. Additionally, the watermarking technology is examined for viewing the ability to store and transmit the voting result in secure manner though preserving the confidentiality ensure fair elections. this review aims to evaluate the combination of biometric authentication, watermarking, and blockchain technologies effectiveness to develop robust e-voting framework. as a result, the key finding indicates a hybrid approach that integrates those technology offers a solution to address the security challenges.
Energy use is second to staffing in building operating costs. Sustainable technology in the energy sector is based on utilizing renewable sources of energy such as solar, wind, glazing systems, insulation. Other areas of focus include heating, ventilation and air conditioning; novel materials and construction methods; improved sensors and monitoring systems; and advanced simulation tools that can help building designers make more energy efficient choices. The objective of this research is studying the effect of insulations on energy consumption of buildings in Iraq and identifying the amount of energy savings from application th
... Show MoreThe Multiple Signal Classification (MUSIC) algorithm is the most popular algorithm to estimate the Angle of Arrival (AOA) of the received signals. The analysis of this algorithm (MUSIC) with typical array antenna element ( ) shows that there are two false direction indication in the plan
aligned with the axis of the array. In this paper a suggested modification on array system is proposed by using two perpendiculars crossed dipole array antenna in spite of one array antenna. The suggested modification does not affect the AOA estimation algorithm. The simulation and results shows that the proposed solution overcomes the MUSIC problem without any effect on the performance of the system.
The petroleum sector has a significant influence on the development of multiphase detection sensor techniques; to separate the crude oil from water, the crude oil tank is used. In this paper, a measuring system using a simple and low cost two parallel plate capacitance sensor is designed and implemented based on a Micro controlled embedded system plus PC to automatically identify the (gas/oil) and (oil/water) dynamic multi-interface in the crude oil tank. The Permittivity differences of two-phase liquids are used to determine the interface of them by measuring the relative changes of the sensor’s capacitance when passes through the liquid’s interface. The experiment results to determine the liquid’s interface is sa
... Show MoreIn our research, we dealt with one of the most important issues of linguistic studies of the Holy Qur’an, which is the words that are close in meaning, which some believe are synonyms, but in the Arabic language they are not considered synonyms because there are subtle differences between them. Synonyms in the Arabic language are very few, rather rare, and in the Holy Qur’an they are completely non-existent. And how were these words, close in meaning, translated in the translation of the Holy Qur’an by Almir Kuliev into the Russian language.
Most recent studies have focused on using modern intelligent techniques spatially, such as those
developed in the Intruder Detection Module (IDS). Such techniques have been built based on modern
artificial intelligence-based modules. Those modules act like a human brain. Thus, they should have had the
ability to learn and recognize what they had learned. The importance of developing such systems came after
the requests of customers and establishments to preserve their properties and avoid intruders’ damage. This
would be provided by an intelligent module that ensures the correct alarm. Thus, an interior visual intruder
detection module depending on Multi-Connect Architecture Associative Memory (MCA)
Software testing is a vital part of the software development life cycle. In many cases, the system under test has more than one input making the testing efforts for every exhaustive combination impossible (i.e. the time of execution of the test case can be outrageously long). Combinatorial testing offers an alternative to exhaustive testing via considering the interaction of input values for every t-way combination between parameters. Combinatorial testing can be divided into three types which are uniform strength interaction, variable strength interaction and input-output based relation (IOR). IOR combinatorial testing only tests for the important combinations selected by the tester. Most of the researches in combinatorial testing appli
... Show MoreIraq is highly dependent on international markets to provide food for its residents. As imported food prices are highly dependent on crude oil prices in global markets, any shock in oil prices will have an impact on food consumption in the country. As a result, it is essential to study the demand for imported food at every time period. To the best of our knowledge as researchers, as not even a single study is available in the literature, this paper is considered the first to study the demand for imported food groups in Iraq. Therefore, the main objective of this research is to estimate demand elasticities for several imported food categories in Iraq. This study uses an Almost Ideal Demand System model to analyze the demand for imported f
... Show MoreThis study includes the preparation of the ferrite nanoparticles CuxCe0.3-XNi0.7Fe2O4 (where: x = 0, 0.05, 0.1, 0.15, 0.2, 0.25, 0.3) using the sol-gel (auto combustion) method, and citric acid was used as a fuel for combustion. The results of the tests conducted by X-ray diffraction (XRD), emitting-field scanning electron microscopy (FE-SEM), energy-dispersive X-ray analyzer (EDX), and Vibration Sample Magnetic Device (VSM) showed that the compound has a face-centered cubic structure, and the lattice constant is increased with increasing Cu ion. On the other hand, the compound has apparent porosity and spherical particles, and t
... Show MoreThe aim of the research is a techno-economic analysis of the use of concentrated solar energy technologies in the Iraqi city, considering the concentrated solar energy technology is a renewable energy technology that derives its resources from the sun and is replenished at a rate that exceeds its use. It is also inexhaustible and environmentally friendly energy from its environmental footprint, unlike traditional fossil energy which produces greenhouse gases and a major cause of global warming.
This research measures the costs of concentrated solar energy technology to Reduce the effects caused by other energies and work to fill part of the shortfall in the total electricity production, even at a specific percentage, in preparati
... Show MoreIn recent years, the positioning applications of Internet-of-Things (IoT) based systems have grown increasingly popular, and are found to be useful in tracking the daily activities of children, the elderly and vehicle tracking. It can be argued that the data obtained from GPS based systems may contain error, hence taking these factors into account, the proposed method for this study is based on the application of IoT-based positioning and the replacement of using IoT instead of GPS. This cannot, however, be a reason for not using the GPS, and in order to enhance the reliability, a parallel combination of the modern system and traditional methods simultaneously can be applied. Although GPS signals can only be accessed in open spaces, GP
... Show More