One of the concerns of adopting an e-voting systems in the pooling place of any critical elections is the possibility of compromising the voting machine by a malicious piece of code, which could change the votes cast systematically. To address this issue, different techniques have been proposed such as the use of vote verification techniques and the anonymous ballot techniques, e.g., Code Voting. Verifiability may help to detect such attack, while the Code Voting assists to reduce the possibility of attack occurrence. In this paper, a new code voting technique is proposed, implemented and tested, with the aid of an open source voting. The anonymous ballot improved accordingly the paper audit trail used in this machine. The developed system, which we called CVOTING, further demonstrated the efficacy of the Code Voting technique against systematic vote change attacks and provides some features to make it easily configurable for different elections and elections in countries with right-to-left and up-to-down languages.
In this paper, an eco-epidemiological prey-predator system when the predator is subjected to the weak Allee effect, and harvesting was proposed and studied. The set of ordinary differential equations that simulate the system’s dynamic is constructed. The impact of fear and Allee’s effect on the system's dynamic behavior is one of our main objectives. The properties of the solution of the system were studied. All possible equilibrium points were determined, and their local, as well as global stabilities, were investigated. The possibility of the occurrence of local bifurcation was studied. Numerical simulation was used to further evaluate the global dynamics and understood the effects of varying parameters on the asymptotic behavior of t
... Show MoreThe research aims at identify the role of the electronic trading system used in the Iraq stock exchange to promote trading activity for the stocks of listed companies in this market.
To prove the hypothesis of research, it was selected the main trading indicators for the market to be a main field in test the research hypothesis.it was selected as the period of time for (9)years span between the years (2005-2013) because they represent the first two articles of equal time periods represent aperiod that preceded the introduction of electronic trading system while the second represents the period of time that followed
The research found a number of conclusions but the mo
... Show MoreA Multiple System Biometric System Based on ECG Data
Background: Head and neck squamous cell carcinoma is the sixth most common cancer world wide. Despite greater emphasis on multi-modality therapy including surgery, radiation and chemotherapy, advanced stage head and neck squamous cell carcinoma continues to have poor 5-year survival rates (0-40%) that have not significantly improved in the last (30) years. To improve outcomes for this deadly disease , It is required a better understanding of the mechanisms underlying head and neck squamous cell carcinoma tumor growth, metastasis, and treatment resistance. This study evaluates the Immunohistochemical expression of E-cadherin and CD44 adhesion molecules in OSCC and to correlate the expression of either marker with each other, with lymph node
... Show MoreThis study examines the validity of e-poetry as an acceptable literary genre. The
thematic, stylistic and esthetic features of a selected number of e-poems produced by
poetry generators are analyzed for this purpose. The e-poems are then compared with a
number of works written by Dada poets in order to establish the literary merit of the
former.
The present study was aimed to find out the role of humoral immunity in the pathogenesis of psoriasis. Complements C3, C4 and immunoglobulin IgE .The study included 55 Iraqi patients with psoriasis 30 (15 females ,15 males) were untreated with any drugs. The other patient group consisted of 25 (9 female and 16 male) treated with a biological treatment (infliximab) ,and 30 (13 males ,12 females) healthy control group. Blood sample were withdrawn (5) ml of venous blood for both patients and members of the control ,to conduct the Immunological tests to determine the quantitative for each of total IgE by using (ELISA) and C3,C4 by Single Radial Immunodiffuse (SIRD). The results showed significant increase in the level of probability (P <0.0
... Show MoreThis study examines the monthly mean diurnal variations of the ionospheric sporadic E (Es) layer’s critical frequency (
The implementation of technology in the provision of public services and communication to citizens, which is commonly referred to as e-government, has brought multitude of benefits, including enhanced efficiency, accessibility, and transparency. Nevertheless, this approach also presents particular security concerns, such as cyber threats, data breaches, and access control. One technology that can aid in mitigating the effects of security vulnerabilities within e-government is permissioned blockchain. This work examines the performance of the hyperledger fabric private blockchain under high transaction loads by analyzing two scenarios that involve six organizations as case studies. Several parameters, such as transaction send ra
... Show More