Moderately, advanced national election technologies have improved political systems. As electronic voting (e-voting) systems advance, security threats like impersonation, ballot tampering, and result manipulation increase. These challenges are addressed through a review covering biometric authentication, watermarking, and blockchain technologies, each of which plays a crucial role in improving the security of e-voting systems. More precisely, the biometric authentication is being examined due to its ability in identify the voters and reducing the risks of impersonation. The study also explores the blockchain technology to decentralize the elections, enhance the transparency and ensure the prevention of any unauthorized alteration or manipulation of the results. Additionally, the watermarking technology is examined for viewing the ability to store and transmit the voting result in secure manner though preserving the confidentiality ensure fair elections. this review aims to evaluate the combination of biometric authentication, watermarking, and blockchain technologies effectiveness to develop robust e-voting framework. as a result, the key finding indicates a hybrid approach that integrates those technology offers a solution to address the security challenges.
Background: Head and neck squamous cell carcinoma is the sixth most common cancer world wide. Despite greater emphasis on multi-modality therapy including surgery, radiation and chemotherapy, advanced stage head and neck squamous cell carcinoma continues to have poor 5-year survival rates (0-40%) that have not significantly improved in the last (30) years. To improve outcomes for this deadly disease , It is required a better understanding of the mechanisms underlying head and neck squamous cell carcinoma tumor growth, metastasis, and treatment resistance. This study evaluates the Immunohistochemical expression of E-cadherin and CD44 adhesion molecules in OSCC and to correlate the expression of either marker with each other, with lymph node
... Show MoreThe present study was aimed to find out the role of humoral immunity in the pathogenesis of psoriasis. Complements C3, C4 and immunoglobulin IgE .The study included 55 Iraqi patients with psoriasis 30 (15 females ,15 males) were untreated with any drugs. The other patient group consisted of 25 (9 female and 16 male) treated with a biological treatment (infliximab) ,and 30 (13 males ,12 females) healthy control group. Blood sample were withdrawn (5) ml of venous blood for both patients and members of the control ,to conduct the Immunological tests to determine the quantitative for each of total IgE by using (ELISA) and C3,C4 by Single Radial Immunodiffuse (SIRD). The results showed significant increase in the level of probability (P <0.0
... Show MoreUropathogenic specific protein is a genotoxic protein targeting the DNA, leading to mutations and modifications in the normal cell's DNA and subsequently, cancer development. This study aims to determine the prevalence of the usp gene in Uropathogenic Escherichia coli isolated from females with urinary tract infections and study its correlation with biofilm formation. One hundred and five urine specimens were collected from female patients (20 to 55 years old) with urinary tract infections attending hospitals. Traditional laboratory methods using selective and differential culture media were used for initial bacterial isolation and identification, and molecular techniques that targeted a segment of the 16SrRNA gene with a specific primer pa
... Show MoreAmong the available chaotic modulation schemes, differential chaos shift keying (DSCK) offers the perfect noise performance. The power consumption of DCSK is high since it sends chaotic signal in both of 1 and 0 transmission, so it does not represent the optimal choice for some applications like indoor wireless sensing where power consumption is a critical issue. In this paper a novel noncoherent chaotic communication scheme called differential chaos on-off keying (DCOOK) is proposed as a solution of this problem. With the proposed scheme, the DCOOK signal have a structure similar to chaos on-off keying (COOK) scheme with improved performance in noisy and multipath channels by introducing the concept of differential coherency used in DCS
... Show MoreApplications of nonlinear, time variant, and variable parameters represent a big challenge in a conventional control systems, the control strategy of the fuzzy systems may be represents a simple, a robust and an intelligent solution for such applications.
This paper presents a design of fuzzy control system that consists of three sub controllers; a fuzzy temperature controller (FC_T), a fuzzy humidity controller (FC_H) and a ventilation control system; to control the complicate environment of the greenhouse (GH) using a proposed multi-choice control system approach. However, to reduce the cost of the crop production in the GH, the first choice is using the ventilation system to control the temperature and humidit
... Show MoreThis study proposed a biometric-based digital signature scheme proposed for facial recognition. The scheme is designed and built to verify the person’s identity during a registration process and retrieve their public and private keys stored in the database. The RSA algorithm has been used as asymmetric encryption method to encrypt hashes generated for digital documents. It uses the hash function (SHA-256) to generate digital signatures. In this study, local binary patterns histograms (LBPH) were used for facial recognition. The facial recognition method was evaluated on ORL faces retrieved from the database of Cambridge University. From the analysis, the LBPH algorithm achieved 97.5% accuracy; the real-time testing was done on thirty subj
... Show MoreWith wireless sensor network (WSN) wide applications in popularity, securing its data becomes a requirement. This can be accomplished by encrypting sensor node data. In this paper a new an efficient symmetric cryptographic algorithm is presented. This algorithm is called wireless sensor network wavelet curve ciphering system (WSN-WCCS). The algorithm idea based on discrete wavelet transformation to generate keys for each node in WSN. It implements on hierarchical clustering WSN using LEACH protocol. Python programming language version 2.7 was used to create the simulator of WSN framework and implement a WSN-WCCS algorithm. The simulation result of the proposed WSN-WCCS with other symmetric algorithms has show
... Show More