One of the concerns of adopting an e-voting systems in the pooling place of any critical elections is the possibility of compromising the voting machine by a malicious piece of code, which could change the votes cast systematically. To address this issue, different techniques have been proposed such as the use of vote verification techniques and the anonymous ballot techniques, e.g., Code Voting. Verifiability may help to detect such attack, while the Code Voting assists to reduce the possibility of attack occurrence. In this paper, a new code voting technique is proposed, implemented and tested, with the aid of an open source voting. The anonymous ballot improved accordingly the paper audit trail used in this machine. The developed system, which we called CVOTING, further demonstrated the efficacy of the Code Voting technique against systematic vote change attacks and provides some features to make it easily configurable for different elections and elections in countries with right-to-left and up-to-down languages.
In this study, a mathematical model is presented to study the chemisorption of two interacting atoms on solid surface in the presence of laser field. Our mathematical model is based on the occupation numbers formula that depends on the laser field which we derived according to Anderson model for single atom adsorbed on solid surface. Occupation numbers formula and chemisorption energy formula are derived for two interacting atoms (as a diatomic molecule) as they approach to the surface taking into account the correlation effects on each atom and between atoms. This model is characterized by obvious dependence of all relations on the system variables and the laser field characteristics which gives precise description for the molecule –
... Show MoreThe aim of this paper is to find a new method for solving a system of linear initial value problems of ordinary differential equation using approximation technique by two-point osculatory interpolation with the fit equal numbers of derivatives at the end points of an interval [0, 1] and compared the results with conventional methods and is shown to be that seems to converge faster and more accurately than the conventional methods.
Purpose - The study aimed at evaluating the accounting system of the Iraqi political parties, which is applied according to legislative texts, and then the ability to provide accounting information to evaluate the strategic performance and control of the party's operational and financial performance.
Findings- The research found that the unified accounting system applied to political parties does not provide relevance informations to judge the performance of the political party, the researcher a proposal for an accounting system that provides the necessary information to measure and monitor the performance of Iraqi political parties can be presented. The
Knowing the Messengers, peace and blessings be upon them, and explaining their obligatory, impossible, and permissible qualities is a legal necessity. It is a rooting of the faith, a means of understanding the Sharia, and a preventer from falling into the scourge of denial and bad manners against them. Therefore, sound belief in their presence is a major reason for the validity of the faith in the aspect of divinity and unseen hearing. Studying the status of prophethood is an urgent necessity in a time in which knowledge is scarce and attachment to the Messenger, may God Almighty’s prayers and peace be upon him, his family, and his companions, is weak, and suspicions and ideas hostile to the faith abound until we begin to hear - unfort
... Show MoreRate of penetration plays a vital role in field development process because the drilling operation is expensive and include the cost of equipment and materials used during the penetration of rock and efforts of the crew in order to complete the well without major problems. It’s important to finish the well as soon as possible to reduce the expenditures. So, knowing the rate of penetration in the area that is going to be drilled will help in speculation of the cost and that will lead to optimize drilling outgoings. In this research, an intelligent model was built using artificial intelligence to achieve this goal. The model was built using adaptive neuro fuzzy inference system to predict the rate of penetration in
... Show MoreIn this paper, an experimental analysis of conventional air-cooled and microchannel condensers in automotive vapor compression refrigeration cycle concerning heat transfer coefficient and energy using R134a as a refrigerant was presented. The performance of two condensers and cycles tested regarding ambient temperature which it was varied from 40oC to 65oC, while the indoor temperature and load have been set to be 23oC and 2200 W respectively. Results showed that the microchannel condenser has 224 % and 77 % higher refrigerant side and air side heat transfer coefficient respectively than the coefficients of the conventional condenser. Thus, the COP, in case of using the microchannel
... Show MoreA novel analytical method is developed for the determination of azithromycin. The method utilizes continuous flow injection analysis to enhance the chemiluminescence system of luminol, H2O2, and Cr(III). The method demonstrated a linear dynamic range of 0.001–100 mmol L-1 with a high correlation coefficient (r) of 0.9978, and 0.001–150 mmol L-1 with a correlation coefficient (r) of 0.9769 for the chemiluminescence emission versus azithromycin concentration. The limit of detection (L.O.D.) of the method was found to be 18.725 ng.50 µL−1 based on the stepwise dilution method for the lowest concentration within the linear dynamic range of the calibration graph. The relative standard deviation (R.S.D. %) for n = 6 was less than 1.2%
... Show MoreA mathematical eco-epidemiological model consisting of harvested prey–predator system involving fear and disease in the prey population is formulated and studied. The prey population is supposed to be separated into two groups: susceptible and infected. The susceptible prey grows logistically, whereas the infected prey cannot reproduce and instead competes for the environment’s carrying capacity. Furthermore, the disease is transferred through contact from infected to susceptible individuals, and there is no inherited transmission. The existence, positivity, and boundedness of the model’s solution are discussed. The local stability analysis is carried out. The persistence requirements are established. The global behavior of th
... Show MoreUsing a mathematical model to simulate the interaction between prey and predator was suggested and researched. It was believed that the model would entail predator cannibalism and constant refuge in the predator population, while the prey population would experience predation fear and need for a predator-dependent refuge. This study aimed to examine the proposed model's long-term behavior and explore the effects of the model's key parameters. The model's solution was demonstrated to be limited and positive. All potential equilibrium points' existence and stability were tested. When possible, the appropriate Lyapunov function was utilized to demonstrate the equilibrium points' overall stability. The system's persistence requirements were spe
... Show More