One of the concerns of adopting an e-voting systems in the pooling place of any critical elections is the possibility of compromising the voting machine by a malicious piece of code, which could change the votes cast systematically. To address this issue, different techniques have been proposed such as the use of vote verification techniques and the anonymous ballot techniques, e.g., Code Voting. Verifiability may help to detect such attack, while the Code Voting assists to reduce the possibility of attack occurrence. In this paper, a new code voting technique is proposed, implemented and tested, with the aid of an open source voting. The anonymous ballot improved accordingly the paper audit trail used in this machine. The developed system, which we called CVOTING, further demonstrated the efficacy of the Code Voting technique against systematic vote change attacks and provides some features to make it easily configurable for different elections and elections in countries with right-to-left and up-to-down languages.
The aim of the current research is to know the degree to which middle school teachers and female teachers in the southern border schools use electronic educational alternatives in the field of education from their point of view and its relationship to some variables, and to achieve this goal, a random sample of (200) teachers was selected in southern border schools, and a questionnaire was prepared to collect The data, as well as the descriptive approach was used to achieve this goal. T-test and analysis of variance were used for the statistical treatment. The results concluded that the educational courses provided to male and female teachers are not sufficient. It has also been concluded that the use of electronic educational alternativ
... Show MoreIn present study 74 specimens of urine were collected from patients suffering from urinary tract infections.Fifty (67.56%) isolates were identified as Escherichia coli. 78% of isolates were identified as extendedspectrum beta lactamases (ESBL) producer. Antibiotic susceptibility t est was done and ceftazidime wasselected to complete this study by implying stress at sub-MIC on isolate harbor high number of resistancegenes (N11) and compared with sensitive isolate (S). Only four β-lactamase coding genes were detected;blaTEM, blaPER, blaVIM and blaCTX-M-2 and N11 had blaTEM, blaPER, and blaVIM. It was found that the resistantisolate did not form biofilm when compared with the sensitive one, which formed moderate biofilm. Inaddition, ceftazidi
... Show MoreRecent reports provided evidence that epithelial to mesenchymal transition (EMT) and some matrix metalloproteinases (MMPs) contribute to the invasion and metastasis of cancer cells. This study investigated the expression pattern of some EMT markers (E-cadherin and Vimentin) and some MMPs (MMP-2 and MMP-9) in transitional cell carcinoma (TCC). Fifty five paraffin embedded biopsies were included in this study. Expression pattern of E-cadherin and Vimentin was evaluated by immunohistochemistry while cytoplasmic mRNA expression of both MMP-2 and MMP-9 were determined by in situ hybridization. The expression of all markers were significantly increased with the increase of patient's age (? 50 years), and furthermore an increase in men expression
... Show MoreIn this work, the notion is defined by using and some properties of this set are studied also, and Ù€ set are two concepts that are defined by using ; many examples have been cited to indicate that the reverse of the propositions and remarks is not achieved. In addition, new application example of nano was studied.
Unlike fault diagnosis approaches based on the direct analysis of current and voltage signals, this paper proposes a diagnosis of induction motor faults through monitoring the variations in motor's parameters when it is subjected to an open circuit or short circuit faults. These parameters include stator and rotor resistances, self-inductances, and mutual inductance. The genetic algorithm and the trust-region method are used for the estimation process. Simulation results confirm the efficiency of both the genetic algorithm and the trust-region method in estimating the motor parameters; however, better performance in terms of estimation time is obtained when the trust-region method is adopted. The results also show the po
... Show MoreThis research aimed at identifying the factors that affecting in the recruitment of a teaching staff for the Massive Open Online Courses (MOOCs) in university teaching at the University of Khartoum. The descriptive method was followed. The questionnaire was used as a tool for data collection,, which was distributed directly to a sample of (181) respondent of the teaching staff members of the senate at University of Khartoum from those who were attend at the senate meeting No. (409) which was held on 22 August 2016 Of (272). The researcher followed for the distribution the chance method, where each questionnaire was distributed to each of a teaching staff from different faculties at the University of Khartoum, according to his willingness
... Show MoreThis work intends to illustrate the methods of using the authentic literary text in the process of spreading Italian, especially in Baghdad where there is a strong propensity to learn the Italian language. The concept of the language that arises from literature is an idea closely linked to the mentality of the Arab learner towards Italian culture: an idea also created by the first Arabisations of literary texts in the early years of the previous century. The research was carried out in Baghdad by two researchers, an Italianist from Baghdad and an Italian mother language linguist, with the aim of bringing together the two sectors in favor of the diffusion of the Italian language. The study also aims to clarify the models from Italian l
... Show MoreThe quality of Global Navigation Satellite Systems (GNSS) networks are considerably influenced by the configuration of the observed baselines. Where, this study aims to find an optimal configuration for GNSS baselines in terms of the number and distribution of baselines to improve the quality criteria of the GNSS networks. First order design problem (FOD) was applied in this research to optimize GNSS network baselines configuration, and based on sequential adjustment method to solve its objective functions.
FOD for optimum precision (FOD-p) was the proposed model which based on the design criteria of A-optimality and E-optimality. These design criteria were selected as objective functions of precision, whic
... Show MoreThe prospective study has been designed to determine some biomarkers in Iraqi female patients with
breast cancer. The current study contained 30 patients whose tissue samples have been collected from
hospitals in Medical City in Baghdad after consent patients themselves and used immunohistochemical
technique to determine these markers. The results showed a significant correlation between ER and PR tissue
markers (Sig = 0.000) and a significant correlation between cyclin E phenotype and cyclin E intensity (Sig =
0.001).
The relation between anemia and inflammatory immune response has lately had much attention. This research was conducted from October 2018 until April 2019, including (110) children below 12 years from both gender in some Hospitals, Primary Health care centers, Public Primary Schools and Kindergarten in Baghdad, Iraq. The objective of this study is to determine the possible correlation between iron deficiency anemia and inflammatory immune response among children infected with Entamoeba histolytica or Giardia lamblia. Blood samples were taken from all groups to measure hemoglobin level, serum iron, total iron binding capacity (TIBC), mean corpuscular volume (MCV), and mean corpuscular hemoglobin concentration
... Show More