Preferred Language
Articles
/
TxhbK5YBVTCNdQwC4YKI
Secure E-voting authentication system employing biometric technology, Crypto-Watermarking Approach and blockchain technology: A Review
...Show More Authors

Moderately, advanced national election technologies have improved political systems. As electronic voting (e-voting) systems advance, security threats like impersonation, ballot tampering, and result manipulation increase. These challenges are addressed through a review covering biometric authentication, watermarking, and blockchain technologies, each of which plays a crucial role in improving the security of e-voting systems. More precisely, the biometric authentication is being examined due to its ability in identify the voters and reducing the risks of impersonation. The study also explores the blockchain technology to decentralize the elections, enhance the transparency and ensure the prevention of any unauthorized alteration or manipulation of the results. Additionally, the watermarking technology is examined for viewing the ability to store and transmit the voting result in secure manner though preserving the confidentiality ensure fair elections. this review aims to evaluate the combination of biometric authentication, watermarking, and blockchain technologies effectiveness to develop robust e-voting framework. as a result, the key finding indicates a hybrid approach that integrates those technology offers a solution to address the security challenges.

Crossref
View Publication
Publication Date
Fri Mar 01 2024
Journal Name
الذكوات البيض
The problem of employing political discourse and its role in promoting community peace: Iraq as a model
...Show More Authors

After 2003, Iraq witnessed new challenges represented by the predominance of sectarian discourses, hatred and extremism at the expense of moderate political discourse and the predominance of sub-affiliations and external agendas at the expense of national affiliation, which led to the creation of an unsafe or stable environment dominated by the character of violence and terrorism. Moderate discourse would work to fuse sub-affiliations into one melting pot in which it would be the first loyalty to the homeland and not to the tribe, party or sect... Etc., and this in turn will contribute to promoting peaceful coexistence between the various other sub-affiliations within the framework of one community construction

Publication Date
Tue Sep 14 2021
Journal Name
Egyptian Journal Of Chemistry
Real wastewater Treatment by Electrocoagulation- Electro-oxidation Combined System: Optimization using Taguchi Approach
...Show More Authors

In this study, the optimum conditions for COD removal from petroleum refinery wastewater by using a combined electrocoagulation- electro-oxidation system were attained by Taguchi method. An orthogonal array experimental design (L18) which is of four controllable parameters including NaCl concentration, C.D. (current density), PH, and time (time of electrolysis) was employed. Chemical oxygen demand (COD) removal percentage was considered as the quality characteristics to be enhanced. Also, the value of turbidity and TDS (total dissolved solid) were estimated. The optimum levels of the studied parameters were determined precisely by implementing S/N analysis and analysis of variance (ANOVA). The optimum conditions were found to be NaCl = 2.5

... Show More
View Publication Preview PDF
Scopus (7)
Crossref (1)
Scopus Clarivate Crossref
Publication Date
Tue Nov 09 2021
Journal Name
Journal Of Accounting And Financial Studies ( Jafs )
Financial technology as one of the recovery strategies of the Iraqi banking sector in the post-Covid-19 stage: An exploratory study
...Show More Authors

The research aims to employ one of the most important strategies for recovery from the crisis of the Covid-19 pandemic, which ravaged the economies of the entire world and its various sectors, including the banking sector, through financial technology that is based on digital transformation to achieve financial sustainability and the creation of innovative financial value chains in light of the decline in the banking sector as a result of The negative effects of the Covid-19 pandemic, be guided by the relevant international accounting standards to control the risks associated with financial technology. To recover from the Covid-19 crisis, the research came out with a set of recommendations, most notably financial technology from

... Show More
View Publication Preview PDF
Publication Date
Tue Aug 31 2021
Journal Name
International Journal Of Nonlinear Analysis And Applications
Face mask detection methods and techniques: A review
...Show More Authors

Corona virus sickness has become a big public health issue in 2019. Because of its contact-transparent characteristics, it is rapidly spreading. The use of a face mask is among the most efficient methods for preventing the transmission of the Covid-19 virus. Wearing the face mask alone can cut the chance of catching the virus by over 70\%. Consequently, World Health Organization (WHO) advised wearing masks in crowded places as precautionary measures. Because of the incorrect use of facial masks, illnesses have spread rapidly in some locations. To solve this challenge, we needed a reliable mask monitoring system. Numerous government entities are attempting to make wearing a face mask mandatory; this process can be facilitated by using face m

... Show More
View Publication
Publication Date
Wed Dec 01 2021
Journal Name
Journal Of Biotechnology Research Center
Candida and Candidiasis - A review of Virulence Factors
...Show More Authors

   The occurrences of invasive candidiasis has increased over the previous few decades. Although Candida albicans considers as one of the most common species of organisms, that cause acquired fungal infections. Candida albicans is an opportunistic fungal pathogen and inherent in as a lifelong, the yeast is present in healthy individuals as a commensal, and can reside harmlessly in human body. However, in immuno-compromised individuals, the fungus can invade tissues, producing superficial infections and, in severe cases, life-threatening systemic infections. This review wills emphasis on virulence factor of C. albicans including (adhesion, invasion, candida proteinase, and phenotypic switching and biofilm formation. I

... Show More
View Publication
Crossref (3)
Crossref
Publication Date
Mon Oct 02 2023
Journal Name
Journal Of Engineering
Tools for Drought Identification and Assessment: A Review
...Show More Authors

Drought is a natural phenomenon in many arid, semi-arid, or wet regions. This showed that no region worldwide is excluded from the occurrence of drought. Extreme droughts were caused by global weather warming and climate change. Therefore, it is essential to review the studies conducted on drought to use the recommendations made by the researchers on drought.  The drought was classified into meteorological, agricultural, hydrological, and economic-social. In addition, researchers described the severity of the drought by using various indices which required different input data.  The indices used by various researchers were the Joint Deficit Index (JDI), Effective Drought Index (EDI), Streamflow Drought Index (SDI), Sta

... Show More
View Publication Preview PDF
Crossref (2)
Crossref
Publication Date
Thu Jun 06 2024
Journal Name
Journal Of Applied Engineering And Technological Science (jaets)
Lightweight Block and Stream Cipher Algorithm: A Review
...Show More Authors

Most of the Internet of Things (IoT), cell phones, and Radio Frequency Identification (RFID) applications need high speed in the execution and processing of data. this is done by reducing, system energy consumption, latency, throughput, and processing time. Thus, it will affect against security of such devices and may be attacked by malicious programs. Lightweight cryptographic algorithms are one of the most ideal methods Securing these IoT applications. Cryptography obfuscates and removes the ability to capture all key information patterns ensures that all data transfers occur Safe, accurate, verified, legal and undeniable.  Fortunately, various lightweight encryption algorithms could be used to increase defense against various at

... Show More
View Publication
Scopus (2)
Scopus Crossref
Publication Date
Thu Jan 04 2018
Journal Name
Journal Of Electrical Engineering And Technology
An efficient selective method for audio watermarking against de-synchronization attacks
...Show More Authors

View Publication
Scopus (7)
Scopus
Publication Date
Sat Jun 01 2019
Journal Name
Journal Of Economics And Administrative Sciences
Intermediate Role Of information Technology In The Relationship To The Entrepreneurial Orientation and Success Factors Of The Project (Analytical exploratory research in Al – Zawraa General Company)
...Show More Authors

The purpose of the current research is to identify the reality and applicability of the entrepreneurial approach in its dimensions (creative, proactive, independent, risk tolerant, offensive) and its impact on the success factors of the project (organizational commitment, communication, project team, project monitoring) Access to information, treatment, storage), which is a significant and important link in the success and development of industrial projects with the possibility of studying and analyzing the provision of the appropriate environment for this.

 the research started from a problem expressed by a number of intellectual and practical questions aimed at answering them as well as To answer a

... Show More
View Publication Preview PDF
Crossref
Publication Date
Mon Apr 04 2022
Journal Name
Journal Of Research In Medical And Dental Science
Efficacy of Varnishes with: Bioactive Glass, Recaldent Technology and Silver Diamine Fluoride in Comparison with Sodium Fluoride on Tooth Surface Micro-hardness (an In Vitro Study)
...Show More Authors

Efficacy of Varnishes with: Bioactive Glass, Recaldent Technology and Silver Diamine Fluoride in Comparison with Sodium Fluoride on Tooth Surface Micro-hardness (an In Vitro Study)

View Publication Preview PDF