Moderately, advanced national election technologies have improved political systems. As electronic voting (e-voting) systems advance, security threats like impersonation, ballot tampering, and result manipulation increase. These challenges are addressed through a review covering biometric authentication, watermarking, and blockchain technologies, each of which plays a crucial role in improving the security of e-voting systems. More precisely, the biometric authentication is being examined due to its ability in identify the voters and reducing the risks of impersonation. The study also explores the blockchain technology to decentralize the elections, enhance the transparency and ensure the prevention of any unauthorized alteration or manipulation of the results. Additionally, the watermarking technology is examined for viewing the ability to store and transmit the voting result in secure manner though preserving the confidentiality ensure fair elections. this review aims to evaluate the combination of biometric authentication, watermarking, and blockchain technologies effectiveness to develop robust e-voting framework. as a result, the key finding indicates a hybrid approach that integrates those technology offers a solution to address the security challenges.
Employing the social personalities (celebrities) in all fields (artistic, sports, media, etc.) is an important media and visual communication means of identification for the companies and institutions in order to convey the advertising idea in accordance with the creative, aesthetic and functional principles aimed at promoting products and gaining the symbolic value for the company. This study investigates the employment of social personalities in the commercial advertising design in order to pinpoint the importance of employing celebrities and their representation in the advertisement to convey the meaning that signifies the advertisement goal. Thus the question of the study is: "What are the mechanisms of employing celebrities in the d
... Show MoreRation power plants, to generate power, have become common worldwide. One such one is the steam power plant. In such plants, various moving parts of heavy machines generate a lot of noise. Operators are subjected to high levels of noise. High noise level exposure leads to psychological as well physiological problems; different kinds of ill effects. It results in deteriorated work efficiency, although the exact nature of work performance is still unknown. To predict work efficiency deterioration, neuro-fuzzy tools are being used in research. It has been established that a neuro-fuzzy computing system helps in identification and analysis of fuzzy models. The last decade has seen substantial growth in development of various neuro-fuzzy systems
... Show MoreIn data mining, classification is a form of data analysis that can be used to extract models describing important data classes. Two of the well known algorithms used in data mining classification are Backpropagation Neural Network (BNN) and Naïve Bayesian (NB). This paper investigates the performance of these two classification methods using the Car Evaluation dataset. Two models were built for both algorithms and the results were compared. Our experimental results indicated that the BNN classifier yield higher accuracy as compared to the NB classifier but it is less efficient because it is time-consuming and difficult to analyze due to its black-box implementation.
This research dealt with the process of reducing costs through some strategic methods of management accounting targeted cost analysis unassembled and Alkeisen, where he focused this research through his theory on a review of some administrative accounting strategic technologies, while the second practical side through the application of targeted cost analysis unassembled and Alkeisen, acquired Search importance of focusing on the decisions to cut costs, through the use of some administrative accounting strategic methods and this we can unassembled analysis, continuous improvement, and the cost of quality) when applied quality, "in light of this has been reached to a set of conclusions that the most important of the company's relian
... Show MoreMan always reacts by employing data that he lives inside Artworks and he tries to make them an ideal speech that shows the most important intellectual trends to which he belongs, as it happened in the formal building of the ancient arts . Mesopotamia is one of the civilizations that interacted with the intellectual legibility transforming into visual symbols, so it is difficult for the researcher to interpret these symbols without considering the nature of these civilizations in general .
This current search aims to identify similarities and differences in the recruitment of cultural shapes between the works of the sculptors (Mohammed Ghani Hikmat and Murtada Haddad) .
Researcher adopted an approach of analytical description of the
The main aim of this paper are the design and implementation of a pharmaceutical inventory database management system. The system was implemented by creating a database containing information about the stored medicines in the inventory, customers making transactions with the pharmaceutical trading company (which owns the inventory), medical suppliers, employees, payments, etc. The database was connected to the main application using C sharp. The proposed system should help in manag inginventory operations which include adding/updating employees’ information, preparing sale and purchase invoices, generating reports, adding/updating customers and suppliers, tracking customer payments and checking expired medicines in order to be disposed
... Show MoreThe concept of implementing e-government systems is growing widely all around the world and becoming an interest to all governments. However, governments are still seeking for effective ways to implement e-government systems properly and successfully. As services of e-government increased and citizens’ demands expand, the e-government systems become more costly to satisfy the growing needs. The cloud computing is a technique that has been discussed lately as a solution to overcome some problems that an e-government implementation or expansion is going through. This paper is a proposal of a new model for e-government on basis of cloud computing. E-Government Public Cloud Model EGPCM, for e-government is related t
... Show Moreتتبلور فكرة البحث حول التوصل لنوع العلاقة التي تربط التعليم الالكتروني خلال جائحة كورونا برفع المهارات التكنولوجية للأساتذة والطلاب، وتبرز أهمية البحث في ان نجاح الوصول لهذه العلاقة يمكن الإفادة منها في تغيير منهجية تطوير المهارات التكنولوجية مستقبلا وذلك باعتماد الجوانب التطبيقية الفعلية بدلا من الدورات وورش العمل والتي قد لا تضاهي الطريقة العملية في رفع مستوى المهارات المختلفة سواء التدريسية او التكنو
... Show MoreThis work presents a five-period chaotic system called the Duffing system, in which the effect of changing the initial conditions and system parameters d, g and w, on the behavior of the chaotic system, is studied. This work provides a complete analysis of system properties such as time series, attractors, and Fast Fourier Transformation Spectrum (FFT). The system shows periodic behavior when the initial conditions xi and yi equal 0.8 and 0, respectively, then the system becomes quasi-chaotic when the initial conditions xi and yi equal 0 and 0, and when the system parameters d, g and w equal 0.02, 8 and 0.09. Finally, the system exhibits hyperchaotic behavior at the first two conditions, 0 and 0, and the bandwidth of the chaotic
... Show More