One of the concerns of adopting an e-voting systems in the pooling place of any critical elections is the possibility of compromising the voting machine by a malicious piece of code, which could change the votes cast systematically. To address this issue, different techniques have been proposed such as the use of vote verification techniques and the anonymous ballot techniques, e.g., Code Voting. Verifiability may help to detect such attack, while the Code Voting assists to reduce the possibility of attack occurrence. In this paper, a new code voting technique is proposed, implemented and tested, with the aid of an open source voting. The anonymous ballot improved accordingly the paper audit trail used in this machine. The developed system, which we called CVOTING, further demonstrated the efficacy of the Code Voting technique against systematic vote change attacks and provides some features to make it easily configurable for different elections and elections in countries with right-to-left and up-to-down languages.
The study involved preparing a new compound by combining between 2- hydroxybenzaldehyde and (Z)-3-hydrazineylideneindolin-2-one resulting in Schiff bases and metal ions: Mn(II), Co(II), Ni(II), Cu(II), and Zn(II) forming stable minerals-based-Schiff complexes. The formation of resulting Schiff bases is detected spectrally using LC-Mss which gave corresponding results with theoretical results, 1H-NMR proves the founding of N=CH signal, FT-IR indicates the occurrence of imine band and UV-VIs mean is proved the ligand formation. On the other hand, minerals-based-Schiff was characterized using the same spectral means that relied with ligand (Schiff bases). Those means gave satisfactory results and proved the suggested distinguishable geometries
... Show MoreThe study involved preparing a new compound by combining between 2-hydroxybenzaldehyde and (Z)-3-hydrazineylideneindolin-2-one resulting in Schiff bases and metal ions: Mn(II), Co(II), Ni(II), Cu(II), and Zn(II) forming stable minerals-based-Schiff complexes. The formation of resulting Schiff bases is detected spectrally using LC-Mss which gave corresponding results with theoretical results, 1H-NMR proves the founding of N=CH signal, FT-IR indicates the occurrence of imine band and UV-VIs mean is proved the ligand formation. On the other hand, minerals-based-Schiff was characterized using the same spectral means that relied with ligand (Schiff bases). Those means gave satisfactory results and proved the suggested distinguishable geometries.
... Show MoreThe importance of the study stems from the fact that it deals with a very important subject, namely, the pivotal role played by E-banking in achieving the competitive advantage of the banking institutions operating in Algeria. By adopting the banking institution and adopting the elements of the electronic marketing mix and developing it as required by the environment The banking system of developments will inevitably be able to achieve excellence from its competitors as each of these elements have an important role in achieving competitive advantage, we relied in this study on studies and research that directly affect the problem of the study and we have put Estep In order to activate the contribution of e-banking in achieving competitiv
... Show MoreAbstractoEl presente estudio tiene como objetivo realizar un análisis comparativo entre dos obras literarias destacadas: “El amor en los tiempos del cólera” del célebre escritor Gabriel García Márquez y la novela “Los jardines del presidente” del escritor iraquí Mohsen al-Ramli. Estas dos novelas, escritas en diferentes contextos culturales y geográficos, comparten una serie de elementos contextuales y narrativos que nos invitan a explorar sus similitudes y diferencias.Principalmente, ambas obras pertenecen al género del realismo y se sumergen en las circunstancias y experiencias de sus personajes en sociedades oscuras dominadas por la opresión, la guerra y las tradiciones impuestas. Los autores ofrecen una perspectiva crí
... Show MoreIt is a well-known fact that publishing companies spend much money, time and energy in designing their book covers to attract potential customers. As the first thing people do when they buy or intend to buy a book is looking at its front cover. However, if there is a need to know more about the book, people usually look at the information on its back cover. This paper attempts to explore the persuasive function of blurbs beyond the constraints of the academic domain and consequently their connection with advertising discourse in two main sections: The first presents the concept of blurb and its structure while the second defines persuasion and shows the most prominent strategiesused in blurbs. Finally, this paper gives the conclusion tha
... Show MorePortable devices such as smartphones, tablet PCs, and PDAs are a useful combination of hardware and software turned toward the mobile workers. While they present the ability to review documents, communicate via electronic mail, appointments management, meetings, etc. They usually lack a variety of essential security features. To address the security concerns of sensitive data, many individuals and organizations, knowing the associated threats mitigate them through improving authentication of users, encryption of content, protection from malware, firewalls, intrusion prevention, etc. However, no standards have been developed yet to determine whether such mobile data management systems adequately provide the fu
... Show MoreThis research presents a model for surveying networks configuration which is designed and called a Computerized Integrated System for Triangulation Network Modeling (CISTNM). It focuses on the strength of figure as a concept then on estimating the relative error (RE) for the computed side (base line) triangulation element. The CISTNM can compute the maximum elevations of the highest
obstacles of the line of sight, the observational signal tower height, the contribution of each triangulation station with their intervisibility test and analysis. The model is characterized by the flexibility to select either a single figure or a combined figures network option. Each option includes three other implicit options such as: triangles, quadri
The research aims to extrapolate the repercussions of the use of expert systems in the work of the external auditor on the quality of audit, as the research problem was that despite the use of these techniques in audit work, there is a problem related to the efficiency and effectiveness of these technological systems used in audit work, the feasibility of their use and the extent of their impact: The quality of the audit process.
The researchers adopted the questionnaire as a tool for collecting study data from a community composed of auditors in auditing offices and companies in Iraq, and the auditors of the Iraqi Federal Financial Supervision Bureau. The number of recovered and valid qu
... Show MoreRationing is a commonly used solution for shortages of resources and goods that are vital for the citizens of a country. This paper identifies some common approaches and policies used in rationing as well asrisks that associated to suggesta system for rationing fuelwhichcan work efficiently. Subsequently, addressing all possible security risks and their solutions. The system should theoretically be applicable in emergency situations, requiring less than three months to implement at a low cost and minimal changes to infrastructure.