One of the concerns of adopting an e-voting systems in the pooling place of any critical elections is the possibility of compromising the voting machine by a malicious piece of code, which could change the votes cast systematically. To address this issue, different techniques have been proposed such as the use of vote verification techniques and the anonymous ballot techniques, e.g., Code Voting. Verifiability may help to detect such attack, while the Code Voting assists to reduce the possibility of attack occurrence. In this paper, a new code voting technique is proposed, implemented and tested, with the aid of an open source voting. The anonymous ballot improved accordingly the paper audit trail used in this machine. The developed system, which we called CVOTING, further demonstrated the efficacy of the Code Voting technique against systematic vote change attacks and provides some features to make it easily configurable for different elections and elections in countries with right-to-left and up-to-down languages.
Abstract Rasha Hameid Jehad Baghdad University Background: The high reactivity of hydrogen peroxide used in bleaching agents have raised important questions on their potential adverse effects on physical properties of restorative materials. The purpose of this in vitro study was to evaluate the effect of in-office bleaching agents on the microhardness of a new Silorane-based restorative material in comparison to methacrylate-based restorative material. Materials and method: Forty specimens of Filtek™ P90 (3M ESPE,USA) and Filtek™ Supreme XT (3M ESPE, USA) of (8mm diameter and 3m height) were prepared. All specimens were polished with Sof-Lex disks (3M ESPE, USA). All samples were rinsed and stored in incubator 37˚C for 24 ho
... Show MoreThe research aims at identify the role of the electronic trading system used in the Iraq stock exchange to promote trading activity for the stocks of listed companies in this market.
To prove the hypothesis of research, it was selected the main trading indicators for the market to be a main field in test the research hypothesis.it was selected as the period of time for (9)years span between the years (2005-2013) because they represent the first two articles of equal time periods represent aperiod that preceded the introduction of electronic trading system while the second represents the period of time that followed
The research found a number of conclusions but the mo
... Show More
The implementation of technology in the provision of public services and communication to citizens, which is commonly referred to as e-government, has brought multitude of benefits, including enhanced efficiency, accessibility, and transparency. Nevertheless, this approach also presents particular security concerns, such as cyber threats, data breaches, and access control. One technology that can aid in mitigating the effects of security vulnerabilities within e-government is permissioned blockchain. This work examines the performance of the hyperledger fabric private blockchain under high transaction loads by analyzing two scenarios that involve six organizations as case studies. Several parameters, such as transaction send ra
... Show MoreThis study examines the monthly mean diurnal variations of the ionospheric sporadic E (Es) layer’s critical frequency (
The present study was aimed to find out the role of humoral immunity in the pathogenesis of psoriasis. Complements C3, C4 and immunoglobulin IgE .The study included 55 Iraqi patients with psoriasis 30 (15 females ,15 males) were untreated with any drugs. The other patient group consisted of 25 (9 female and 16 male) treated with a biological treatment (infliximab) ,and 30 (13 males ,12 females) healthy control group. Blood sample were withdrawn (5) ml of venous blood for both patients and members of the control ,to conduct the Immunological tests to determine the quantitative for each of total IgE by using (ELISA) and C3,C4 by Single Radial Immunodiffuse (SIRD). The results showed significant increase in the level of probability (P <0.0
... Show MoreThis study examines the validity of e-poetry as an acceptable literary genre. The
thematic, stylistic and esthetic features of a selected number of e-poems produced by
poetry generators are analyzed for this purpose. The e-poems are then compared with a
number of works written by Dada poets in order to establish the literary merit of the
former.
Background: Head and neck squamous cell carcinoma is the sixth most common cancer world wide. Despite greater emphasis on multi-modality therapy including surgery, radiation and chemotherapy, advanced stage head and neck squamous cell carcinoma continues to have poor 5-year survival rates (0-40%) that have not significantly improved in the last (30) years. To improve outcomes for this deadly disease , It is required a better understanding of the mechanisms underlying head and neck squamous cell carcinoma tumor growth, metastasis, and treatment resistance. This study evaluates the Immunohistochemical expression of E-cadherin and CD44 adhesion molecules in OSCC and to correlate the expression of either marker with each other, with lymph node
... Show MoreOne hundred twelve urine samples were collected from Baghdad hospitals and examined by different identification techniques. Seventy isolates (62.5%) were diagnosed as Escherichia coli after microscopic and cultural identifications. The result of PCR product electrophoresis on the isolates showed that thirteen isolates (18.57%) have Pap E gene which are uropathogenic E. coli. Antibiotic susceptibility test was done, and four high resistant strains were mixed with aqueous extract of Quercus infectoria plant in 96 well ELISA plate and incubated for different times. After 0, 6, and 12 hr. of incubation, the effect of the plant extract on the bacterial growth was determined by ELISA reader, and the effect on the expression of P
... Show More