Preferred Language
Articles
/
bsj-2449
CVOTING: An Anonymous Ballot E-Voting System

One of the concerns of adopting an e-voting systems in the pooling place of any critical elections is the possibility of compromising the voting machine by a malicious piece of code, which could change the votes cast systematically. To address this issue, different techniques have been proposed such as the use of vote verification techniques and the anonymous ballot techniques, e.g., Code Voting. Verifiability may help to detect such attack, while the Code Voting assists to reduce the possibility of attack occurrence. In this paper, a new code voting technique is proposed, implemented and tested, with the aid of an open source voting. The anonymous ballot improved accordingly the paper audit trail used in this machine. The developed system, which we called CVOTING, further demonstrated the efficacy of the Code Voting technique against systematic vote change attacks and provides some features to make it easily configurable for different elections and elections in countries with right-to-left and up-to-down languages.

Scopus Clarivate Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Sat Apr 30 2022
Journal Name
Iraqi Journal Of Science
Maximal and Minimal Regular β -Open Sets in Topological Spaces

    In this paper, new concepts of maximal and minimal regular s are introduced and discussed. Some basic properties are obtained. The relation between maximal and minimal regular s and some other types of open sets such as regular open sets and   -open sets are investigated.

Scopus Crossref
View Publication Preview PDF
Publication Date
Thu Jan 14 2021
Journal Name
Iraqi Journal Of Science
Network Authentication Protocol Based on Secure Biometric NIDN

In this paper an authentication based finger print biometric system is proposed with personal identity information of name and birthday. A generation of National Identification Number (NIDN) is proposed in merging of finger print features and the personal identity information to generate the Quick Response code (QR) image that used in access system. In this paper two approaches are dependent, traditional authentication and strong identification with QR and NIDN information. The system shows accuracy of 96.153% with threshold value of 50. The accuracy reaches to 100% when the threshold value goes under 50.

Scopus Crossref
View Publication Preview PDF
Publication Date
Sat Jan 02 2021
Journal Name
Journal Of The College Of Languages (jcl)
Translating Food and Drink-Related Insults in Shakespeare’s (Henry IV) into Arabic

        This study highlights the problems of translating Shakespeare's food and drink-related insults (henceforth FDRIs) in (Henry IV, Parts I&II) into Arabic. It adopts (Vinay & Darbelnet's:1950s) model, namely (Direct& Oblique) to highlight the applicability of the different methods and procedures made by the two selected translators (Mashati:1990 & Habeeb:1905) .The present study tries to answer the following questions:(i) To what extent the FDRIs in Henry IV might pose a translational problem for the selected translators to find suitable cultural equivalents for them? (ii) Why do the translators, in many cases, resort to a literal procedure which is almost not worka

... Show More
Crossref
View Publication Preview PDF
Publication Date
Wed May 17 2017
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
-Generalized b- Closed Sets in Topological Spaces

     In this paper we introduce a new class of sets called -generalized b- closed (briefly gb closed) sets. We study some of its basic properties. This class of sets is strictly placed between the class of gp- closed sets and the class of gsp- closed sets. Further the notion of b- space is introduced and studied.

2000 Mathematics Subject Classification: 54A05

 

View Publication Preview PDF
Publication Date
Thu Nov 30 2023
Journal Name
Iraqi Journal Of Science
Role Of ψ-Operator in the Study of Minimal Open Sets

     The operator ψ has been introduced as an associated set-valued set function. Although it has importance for the study of minimal open sets as well as minimal I-open sets. As a result of this study, we introduce minimal I^*-open sets . In this study, several characterizations of minimal I^*-open sets are also investigated. This study also discusses the role of minimal  I^*-open sets in the *-locally finite spaces. In an aspect of topological invariant, the homeomorphic images of minimal I^*-open set has been discussed here.

Crossref
View Publication Preview PDF
Publication Date
Sun Mar 07 2010
Journal Name
Baghdad Science Journal
On Semi-?-Connected Subspace

In this paper, the concept of semi-?-open set will be used to define a new kind of strongly connectedness on a topological subspace namely "semi-?-connectedness". Moreover, we prove that semi-?-connectedness property is a topological property and give an example to show that semi-?-connectedness property is not a hereditary property. Also, we prove thate semi-?-irresolute image of a semi-?-connected space is a semi-?-connected space.

Crossref
View Publication Preview PDF
Publication Date
Sun Dec 05 2010
Journal Name
Baghdad Science Journal
On Semi-p-Compact Space1

The purpose of this paper is to introduce a new type of compact spaces, namely semi-p-compact spaces which are stronger than compact spaces; we give properties and characterizations of semi-p-compact spaces.

Crossref
View Publication Preview PDF
Publication Date
Wed Mar 28 2018
Journal Name
Iraqi Journal Of Science
Weak Forms of Soft (1, 2)*-Omega Open Sets in Soft Bitopological Spaces

 In this paper, we introduce  and  study  new  classes of soft  open  sets  in soft bitopological spaces called soft  (1,2)*-omega  open  sets  and  weak forms of soft (1,2)*-omega open sets such as soft  (1,2)*-α-ω-open sets, soft  (1,2)*-pre-ω-opensets, soft  (1,2)*-b-ω-open sets,  and  soft  (1,2)*-β-ω-open  sets. Moreover; some basic properties and the relation among these concepts and other concepts also have been studied.

View Publication Preview PDF
Publication Date
Tue Aug 15 2023
Journal Name
Al-academy
Narrative infrastructure and its impact on building open and closed endings in the feature film

The topic of the research tagged (narrative structure and its impact on building open and closed endings in the fictional film) is summarized by studying the mechanism of employing closed and open endings in the fictional film. novelist, then the need for it, as well as the objectives of the research and clarifying its limits as well as its importance. Then moving to the theoretical framework, which included three topics, where the first topic was entitled (the cinematic construction of the film narrative), either the second topic (the structure of complexity and narrative solutions), or the third topic dealt with the subject (the structure of the end and its relationship to the construction of the narrative). After completing the theore

... Show More
Crossref
View Publication Preview PDF
Publication Date
Tue Nov 01 2011
Journal Name
Australian Journal Of Basic And Applied Sciences
Closure Operators on Graphs

The aim of this paper is to generate topological structure on the power set of vertices of digraphs using new definition which is Gm-closure operator on out-linked of digraphs. Properties of this topological structure are studied and several examples are given. Also we give some new generalizations of some definitions in digraphs to the some known definitions in topology which are Ropen subgraph, α-open subgraph, pre-open subgraph, and β-open subgraph. Furthermore, we define and study the accuracy of these new generalizations on subgraps and paths.

View Publication Preview PDF