One of the concerns of adopting an e-voting systems in the pooling place of any critical elections is the possibility of compromising the voting machine by a malicious piece of code, which could change the votes cast systematically. To address this issue, different techniques have been proposed such as the use of vote verification techniques and the anonymous ballot techniques, e.g., Code Voting. Verifiability may help to detect such attack, while the Code Voting assists to reduce the possibility of attack occurrence. In this paper, a new code voting technique is proposed, implemented and tested, with the aid of an open source voting. The anonymous ballot improved accordingly the paper audit trail used in this machine. The developed system, which we called CVOTING, further demonstrated the efficacy of the Code Voting technique against systematic vote change attacks and provides some features to make it easily configurable for different elections and elections in countries with right-to-left and up-to-down languages.
The purpose of this research is to identify the youth issues in Talk Shows in the Iraqi satellite channels via monitoring a sample of episodes of the Talk Shows episodes which are concerned and analyzed the youth issues in the Iraqi satellite channels, namely, «Hala Shabab Program» at Al-Iraqia satellite Channel and «Shabab wa Banat Program» at Al-Sumaria satellite Channel by recording and re-watching them again. This research is classified as one of descriptive researches. The survey method was adopted in this study.
For this purpose, the researcher prepared an analysis form. The researcher de
... Show MoreA (b,t)-blocking set B in PG(2,q) is set of b points such that every line of PG(2,q) intersects B in at least t points and there is a line intersecting B in exactly t points. In this paper we construct a minimal (b,t)-blocking sets, t = 1,2,3,4,5 in PG(2,5) by using conics to obtain complete arcs and projective codes related with them.
It is noted in the title that the paper studies the viewpoint in the novel The Dog and the Long Night by the Iranian novelist Shahranoush Parsi Pour and in the novel Alibaba's Sad Night by the Iraqi novelist Abdulkhaliq Ar-Rikabi. Both are well known novelists, and about whose stories and novels many critical books, MA theses, and Ph.D. dissertations have been written. Also, some of their literary works have won prizes. Here, the researcher shed light on the concept of viewpoint, its types, and its importance in novels in general. This was done along with tackling the two viewpoints in both novels, where similarities and differences were identified. For this end, the researcher has adopted the analytic-descriptive appro
... Show MoreTheoretical calculations are achieved to study the effect of different deuterium pressures on various characteristics parameters for PF400J plasma focus using an international computer code. Axial and radial velocities, voltage tube, plasma temperatures, and neutron yields at different operating deuterium pressures are computed. Neutron emission has been calculated in the device. The maximum total neutron yield calculated is of the order of and neutrons per shot for entire pressure used. The computed results agree reasonably well with the published neutron yield curves.
The present work shows a theoretical results that have been used the functional Hybrid of three parameters Lee-Yang-Parr (B3LYP) of the quantum mechanical approach for density functional theory with (Spanish Initiative for Electronic Simulations with Thousands of Atoms) SIESTA code. All calculations were carried out employing the used method at the Gaussian 09 package of programs. It was reported the main point for research on dominance of the bandgap of elongated pi-conjugated molecules by using different chemical groups replacing hydrogen atom in the most molecules that used in this work. The side groups creates another factor that controls the value of the band gap. The dihedral angle between the two pheny
... Show MoreThis paper describes a number of new interleaving strategies based on the golden section. The new interleavers are called golden relative prime interleavers, golden interleavers, and dithered golden interleavers. The latter two approaches involve sorting a real-valued vector derived from the golden section. Random and so-called “spread” interleavers are also considered. Turbo-code performance results are presented and compared for the various interleaving strategies. Of the interleavers considered, the dithered golden interleaver typically provides the best performance, especially for low code rates and large block sizes. The golden relative prime interleaver is shown to work surprisingly well for high puncture rates. These interleav
... Show MoreIn this paper a decoder of binary BCH code is implemented using a PIC microcontroller for code length n=127 bits with multiple error correction capability, the results are presented for correcting errors up to 13 errors. The Berkelam-Massey decoding algorithm was chosen for its efficiency. The microcontroller PIC18f45k22 was chosen for the implementation and programmed using assembly language to achieve highest performance. This makes the BCH decoder implementable as a low cost module that can be used as a part of larger systems. The performance evaluation is presented in terms of total number of instructions and the bit rate.
In this manuscript, the effect of substituting strontium with barium on the structural properties of Tl0.8Ni0.2Sr2-xBrxCa2Cu3O9-δcompound with x= 0, 0.2, 0.4, have been studied. Samples were prepared using solid state reaction technique, suitable oxides alternatives of Pb2O3, CaO, BaO and CuO with 99.99% purity as raw materials and then mixed. They were prepared in the form of discs with a diameter of 1.5 cm and a thickness of (0.2-0.3) cm under pressures 7 tons / cm2, and the samples were sintered at a constant temperature o
... Show MoreThis research is based on the descriptive and analytical methodology. The importance of studying labor laws and labor unions in Japan between 1889 and 1946 constitutions is because Japan was out of a feudal phase, and had no idea about the factory system and industrialization in their modern sense before the Meiji era. Generally, its labor system used to be mostly familial, and the economic system was based on agriculture. This called for the enactment of legislations and laws appropriate for the coming phase in Meiji era. Thus, this paper examines the role of Meiji government in enacting labor legislations and laws when he came to power in 1896, and his new constitution in 1889 and the civil code of 1896. It further examines the way Mei
... Show MoreThis work presents a comparison between the Convolutional Encoding CE, Parallel Turbo code and Low density Parity Check (LDPC) coding schemes with a MultiUser Single Output MUSO Multi-Carrier Code Division Multiple Access (MC-CDMA) system over multipath fading channels. The decoding technique used in the simulation was iterative decoding since it gives maximum efficiency at higher iterations. Modulation schemes used is Quadrature Amplitude Modulation QAM. An 8 pilot carrier were
used to compensate channel effect with Least Square Estimation method. The channel model used is Long Term Evolution (LTE) channel with Technical Specification TS 25.101v2.10 and 5 MHz bandwidth bandwidth including the channels of indoor to outdoor/ pedestrian