Moderately, advanced national election technologies have improved political systems. As electronic voting (e-voting) systems advance, security threats like impersonation, ballot tampering, and result manipulation increase. These challenges are addressed through a review covering biometric authentication, watermarking, and blockchain technologies, each of which plays a crucial role in improving the security of e-voting systems. More precisely, the biometric authentication is being examined due to its ability in identify the voters and reducing the risks of impersonation. The study also explores the blockchain technology to decentralize the elections, enhance the transparency and ensure the prevention of any unauthorized alteration or manipulation of the results. Additionally, the watermarking technology is examined for viewing the ability to store and transmit the voting result in secure manner though preserving the confidentiality ensure fair elections. this review aims to evaluate the combination of biometric authentication, watermarking, and blockchain technologies effectiveness to develop robust e-voting framework. as a result, the key finding indicates a hybrid approach that integrates those technology offers a solution to address the security challenges.
We present a case of congenital of flexor pollicis longus agenesis without thenar hypoplasia in a 12-year-old girl with no history of trauma. Two-staged corrective surgery was planned. In the first stage, the flexor pulley was reconstructed using silicone followed by the second stage 3 months later when flexor pollicis longus reconstruction was performed using tendon transfer of the flexor digitorum superficialis. The patient completed post-operative physiotherapy and the result of the surgical treatment in both functional and cosmetic aspects was, in the authors’ opinion, excellent.
The rapid development of telemedicine services and the requirements for exchanging medical information between physicians, consultants, and health institutions have made the protection of patients’ information an important priority for any future e-health system. The protection of medical information, including the cover (i.e. medical image), has a specificity that slightly differs from the requirements for protecting other information. It is necessary to preserve the cover greatly due to its importance on the reception side as medical staff use this information to provide a diagnosis to save a patient's life. If the cover is tampered with, this leads to failure in achieving the goal of telemedicine. Therefore, this work provides an in
... Show MoreOrthodontic wires facilitate the required dental adjustments in the context of orthodontic therapy. The archwire has played a crucial role in orthodontic treatment, and the increasing emphasis on aesthetic preferences from patients, as well as the development of composite and ceramic brackets, have prompted investigations into aesthetic archwires that complement these brackets. Orthodontic wires are produced using a diverse range of materials. The utilisation of all available wire types can improve patient comfort, decrease chairside time, and shorten the overall duration of treatment. The individual clinician must possess comprehensive knowledge and comprehension of the various requirements and alternatives throughout the therapeut
... Show MoreIn the recent years the research on the activated carbon preparation from agro-waste and byproducts have been increased due to their potency for agro-waste elimination. This paper presents a literature review on the synthesis of activated carbon from agro-waste using microwave irradiation method for heating. The applicable approach is highlighted, as well as the effects of activation conditions including carbonization temperature, retention period, and impregnation ratio. The review reveals that the agricultural wastes heated using a chemical process and microwave energy can produce activated carbon with a surface area that is significantly higher than that using the conventional heating method.
The main challenge is to protect the environment from future deterioration due to pollution and the lack of natural resources. Therefore, one of the most important things to pay attention to and get rid of its negative impact is solid waste. Solid waste is a double-edged sword according to the way it is dealt with, as neglecting it causes a serious environmental risk from water, air and soil pollution, while dealing with it in the right way makes it an important resource in preserving the environment. Accordingly, the proper management of solid waste and its reuse or recycling is the most important factor. Therefore, attention has been drawn to the use of solid waste in different ways, and the most common way is to use it as an alternative
... Show MoreThe recent advancements in security approaches have significantly increased the ability to identify and mitigate any type of threat or attack in any network infrastructure, such as a software-defined network (SDN), and protect the internet security architecture against a variety of threats or attacks. Machine learning (ML) and deep learning (DL) are among the most popular techniques for preventing distributed denial-of-service (DDoS) attacks on any kind of network. The objective of this systematic review is to identify, evaluate, and discuss new efforts on ML/DL-based DDoS attack detection strategies in SDN networks. To reach our objective, we conducted a systematic review in which we looked for publications that used ML/DL approach
... Show MoreThis study aimed at isolating uropathogenic Escherichia coli from urinary tract infections (UTIs) of human and cattle to examine the molecular diversity and phylogenetic relationship of the isolates. A total of 100 urine samples were collected from UTIs of human and cattle. The isolates identification was done using routine diagnostic methods and confirmed by Vitek2. Antimicrobial susceptibility was tested against 10 antimicrobials. Random amplified polymorphic DNA (RAPD)-polymerase chain reaction (PCR) was applied to identify the genetic diversity among E. coli isolates from human and animal origin by using five different octamer primers. The gelJ software for the phylogenetic analysis created Dendrograms. Out of 50 human urine samples, E.
... Show MoreWhen the digital technologies entered the world of cinema production, they boosted the ability of the cinematographic medium to implement various subjects with great accuracy, as the development included all the joints and stages of the cinematic film production whether it is a feature film or an animation. Therefore, the process of film manufacturing by the digital technologies reflects the spirit of the age and the development that humanity has attained. What motivated the researcher to determine the topic of the research, which combines between the sound effects and the animated films under the title (aesthetics of employing digital sound effects in animated films), is the work of the digital technologies. The researcher divide
... Show MoreThe researcher chose her research which is imprinted ( the mechanism of employing the numbered personality in structuring scientific imaginary movies) because it’s found in modern employing of the numbered personalities of the movies that are designed by computers which made the directors and the producers to exploit these numbered development technologies in designing numbered personalities, in order to make them heroes instead of the actual actors in the cinema scene, it’s divided the research to five chapters, the first chapter, the methodical fine which includes, the problem of the research, the aim of the research includes, the importance of the research and it’s details, and the chapter concludes limiting the important terms,
... Show More