Preferred Language
Articles
/
bsj-2449
CVOTING: An Anonymous Ballot E-Voting System
...Show More Authors

One of the concerns of adopting an e-voting systems in the pooling place of any critical elections is the possibility of compromising the voting machine by a malicious piece of code, which could change the votes cast systematically. To address this issue, different techniques have been proposed such as the use of vote verification techniques and the anonymous ballot techniques, e.g., Code Voting. Verifiability may help to detect such attack, while the Code Voting assists to reduce the possibility of attack occurrence. In this paper, a new code voting technique is proposed, implemented and tested, with the aid of an open source voting. The anonymous ballot improved accordingly the paper audit trail used in this machine. The developed system, which we called CVOTING, further demonstrated the efficacy of the Code Voting technique against systematic vote change attacks and provides some features to make it easily configurable for different elections and elections in countries with right-to-left and up-to-down languages.

Scopus Clarivate Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Wed Feb 05 2020
Journal Name
Political Sciences Journal
Neutrality in Swedish foreign policy , an analytical study of adaption from traditional neutrality to military non-alignment
...Show More Authors

Abstract Sweden is today one of the most active European countries in the regional and international environment despite the adoption of neutrality as a guiding principle in its foreign policy. For more than two centuries, the length of time for Swedish neutrality has made it a global standard, an agreed foreign policy at home and a political culture rooted in institutions and society. Swedish. Although discussions are still underway on Swedish security and foreign policies after the end of the Cold War, especially cooperation with NATO through the Partnership for Peaceprogram, EU accession and its impact on the principle of neutrality in foreign policy. Sweden, however, insists that it still maintains neutrality, but more adequately, in

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sat May 01 2021
Journal Name
Journal Of Physics: Conference Series
An Efficient Shrinkage Estimators For Generalized Inverse Rayleigh Distribution Based On Bounded And Series Stress-Strength Models
...Show More Authors
Abstract<p>In this paper, we investigate two stress-strength models (Bounded and Series) in systems reliability based on Generalized Inverse Rayleigh distribution. To obtain some estimates of shrinkage estimators, Bayesian methods under informative and non-informative assumptions are used. For comparison of the presented methods, Monte Carlo simulations based on the Mean squared Error criteria are applied.</p>
View Publication
Scopus (4)
Crossref (2)
Scopus Crossref
Publication Date
Thu Dec 13 2018
Journal Name
Iraqi National Journal Of Nursing Specialties
Effectiveness of an Educational Program on Nurses’ Knowledge Concerning the Infection Control Guideline in Baghdad Teaching Hospital
...Show More Authors

Objectives: the study aims to findout the effectiveness of educational program concerning infection control guideline on nurses, and to find out the relationship between effectiveness of program and types of hospital unit, age, level of education, and years of experience of nurses. Methodology: A quasi-experimental design study was carried out in Baghdad teaching hospital in the wards, for the period of December, 20th 2013 to September, 30th of July 2014, The study samples is composed of (60) nurses who have been actually working in the medical ward, blood disease, psychiatric ward, and neurological war

... Show More
View Publication Preview PDF
Publication Date
Tue Dec 05 2023
Journal Name
Baghdad Science Journal
Robust Color Image Encryption Scheme Based on RSA via DCT by Using an Advanced Logic Design Approach
...Show More Authors

Information security in data storage and transmission is increasingly important. On the other hand, images are used in many procedures. Therefore, preventing unauthorized access to image data is crucial by encrypting images to protect sensitive data or privacy. The methods and algorithms for masking or encoding images vary from simple spatial-domain methods to frequency-domain methods, which are the most complex and reliable. In this paper, a new cryptographic system based on the random key generator hybridization methodology by taking advantage of the properties of Discrete Cosine Transform (DCT) to generate an indefinite set of random keys and taking advantage of the low-frequency region coefficients after the DCT stage to pass them to

... Show More
View Publication Preview PDF
Scopus (7)
Crossref (1)
Scopus Crossref
Publication Date
Mon Jan 02 2017
Journal Name
Al-academy
The semiology of culture and the sign variable in a theatre performance: Iraqi theatre as an example
...Show More Authors

The culture of theatre performance has a vital role in the process of reading the linguistic and visual signs of the performance. And the process of transforming a theatre performance from its original context into a new hosting cultural context starts from the actual reading of the text. Directors derives their new signs out of his personal culture, depending on the society where they lives and the culture that forms the social conventions, traditions and beliefs. The text is usually written within its own historical and temporal culture. The process of its production usually takes it away from its original culture, when it interprets the codes of the original writer and their visual and linguistic signs and instils new alternative sign

... Show More
View Publication Preview PDF
Crossref
Publication Date
Tue Dec 31 2013
Journal Name
Al-khwarizmi Engineering Journal
Design of an Adaptive PID Neural Controller for Continuous Stirred Tank Reactor based on Particle Swarm Optimization
...Show More Authors

 A particle swarm optimization algorithm and neural network like self-tuning PID controller for CSTR system is presented. The scheme of the discrete-time PID control structure is based on neural network and tuned the parameters of the PID controller by using a particle swarm optimization PSO technique as a simple and fast training algorithm. The proposed method has advantage that it is not necessary to use a combined structure of identification and decision because it used PSO. Simulation results show the effectiveness of the proposed adaptive PID neural control algorithm in terms of minimum tracking error and smoothness control signal obtained for non-linear dynamical CSTR system.

View Publication Preview PDF
Publication Date
Tue Jun 15 2021
Journal Name
Al-academy
Features of Modernity in the Works of Saleh Al-Jami (An Analytical Study): رؤى قحطان عبد الله
...Show More Authors

Since the beginning of the twentieth century, the art of composition has witnessed major transformations that accompanied the transformations that occurred in the cognitive field. The plastic artists rejected the prevailing artistic line, and sought to create a new artistic format that accommodates the new social and cultural problems. So was the announcement of the era of modernity in the late nineteenth century, with the birth of the impressionism movement that gave a place to challenge all that is familiar. . And he drew the attention of the researcher, and for that he chose the research title (Characteristics of Modernity in the Works of Saleh Al-Jumayyi (Analytical Study)) The researcher divided the research as follows:
Methodolo

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun Dec 01 2019
Journal Name
Al-khwarizmi Engineering Journal
An Experimental Study on Electrochemical Grinding Parameters on Hardness and Material Removal Rate for Stainless Steel 316
...Show More Authors

Electrochemical Grinding (ECG) process is a mechanically assisted electrochemical process for material processing. The process is able to successfully machine electrically conducting harder materials at faster rate with improved surface finish and dimensional control. This research studies the effect of applied current, electrolyte concentration, spindle speed and the gap between workpiece and tool on hardness and material removal rate during electrochemical grinding for stainless steel 316. The characteristic features of the electrochemical grinding process are explored through Taguchi-design-based experimental studies. The better hardness can be obtained at 10 A of the current, 150 g/l of the electrolyte concentration, 0.3 mm of gap an

... Show More
View Publication Preview PDF
Publication Date
Tue Oct 02 2018
Journal Name
Iraqi Journal Of Physics
Enhancement the sensitivity of humidity sensor based on an agarose infiltration reflection-type photonic crystal fiber interferometer
...Show More Authors

Photonic Crystal Fiber Interferometers (PCFIs) are widely used for sensing applications. This work presents the fabrication and study the characterization of a relative humidity sensor based on a polymer-infiltrated photonic crystal fiber that operates in a Mach- Zehnder Interferometer (MZI) reflection mode. The fabrication of the sensor only involves splicing and cleaving Photonic Crystal Fiber (PCF) with Single Mode Fiber (SMF). A stub of (LMA-10) PCF spliced to SMF (Corning-28). In the splice regions. The PCFI sensor operation based on the adsorption and desorption of water vapour at the silica-air interface within the PCF. The sensor shows a high sensitivity to RH variations from (27% RH - 95% RH), with a change in its reflected powe

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Mon Dec 21 2020
Journal Name
Bulletin Of The Iraq Natural History Museum (p-issn: 1017-8678 , E-issn: 2311-9799)
AN EVALUATION OF INVASIVE PEST, RED PALM WEEVIL RHYNCHOPHORUS FERRUGINEUS (OLIVIER, 1790) (COLEOPTERA, CURCULIONIDAE) POPULATION IN IRAQ
...Show More Authors

The Red Palm Weevil (RPW), Rhynchophorus ferrugineus (Olivier, 1790) is a devastating invasive pest of palm trees, invading the Iraqi date palm tree in 2015 for the first time in Safwan county, Basrah province. The Red Palm weevil has been categorized as a quarantine pest of date palm trees worldwide. In this study, a five years monitoring program has been achieved by scouting the invasive pest RPW population in Safwan county by using visual sampling and Pheromone baited traps.
The results indicated that the number of infested palms, increased from 12 trees in 2015 to 111 in 16 orchards in 2016. The number of the infested palms was minimized to 3 trees in the county in 2019 due to the management protocol of the Ministry of Agriculture

... Show More
View Publication Preview PDF
Scopus (4)
Crossref (3)
Scopus Crossref