Preferred Language
Articles
/
bsj-2449
CVOTING: An Anonymous Ballot E-Voting System
...Show More Authors

One of the concerns of adopting an e-voting systems in the pooling place of any critical elections is the possibility of compromising the voting machine by a malicious piece of code, which could change the votes cast systematically. To address this issue, different techniques have been proposed such as the use of vote verification techniques and the anonymous ballot techniques, e.g., Code Voting. Verifiability may help to detect such attack, while the Code Voting assists to reduce the possibility of attack occurrence. In this paper, a new code voting technique is proposed, implemented and tested, with the aid of an open source voting. The anonymous ballot improved accordingly the paper audit trail used in this machine. The developed system, which we called CVOTING, further demonstrated the efficacy of the Code Voting technique against systematic vote change attacks and provides some features to make it easily configurable for different elections and elections in countries with right-to-left and up-to-down languages.

Scopus Clarivate Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Sun Dec 09 2018
Journal Name
Baghdad Science Journal
Pose Invariant Palm Vein Identification System using Convolutional Neural Network
...Show More Authors

Palm vein recognition is a one of the most efficient biometric technologies, each individual can be identified through its veins unique characteristics, palm vein acquisition techniques is either contact based or contactless based, as the individual's hand contact or not the peg of the palm imaging device, the needs a contactless palm vein system in modern applications rise tow problems, the pose variations (rotation, scaling and translation transformations) since the imaging device cannot aligned correctly with the surface of the palm, and a delay of matching process especially for large systems, trying to solve these problems. This paper proposed a pose invariant identification system for contactless palm vein which include three main

... Show More
View Publication Preview PDF
Scopus (25)
Crossref (2)
Scopus Crossref
Publication Date
Thu Apr 30 2020
Journal Name
Journal Of Economics And Administrative Sciences
Towards building an educational system free of scientific corruption (Applied study in a sample of colleges of higher education in Iraq within the framework of the government program and the directions of the Supreme Council for Combating Corruption)
...Show More Authors

Nations are developed with education and knowledge that raise the status of society in its various segments, beyond that it leads to underdevelopment and deterioration in various sectors, whether economic, health, social, etc. If we considered the general name of The ministry of Education & Scientific Studies, then the second part seems to be not functioning, since scientific research has no material allocation and remains based on the material potential of the university professor. As for the first half of the topic, the reality of the situation reveals problems related to the Holy Trinity of Education which is (Professor - Student - the scientific method) where universities suffer at the present time from this problem, and

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sat Apr 01 2023
Journal Name
Full Text Book Of Minar Congress8
SECTION OF VETERINARY MEDICINE: MICROBIOLOGY, IMMUNITY AND VIROLOGY. THE BACTERIAL CONTAMINATION WITH PROTEUS AND E. COLI IN CERVIX AND UTERINE OF COWS DURING THE DIFFERENT ESTRUS PHASES
...Show More Authors

The herein research was carried out in order to identified the presence of bacteria in cervix and uterine lumen in Iraqi cattle during the different estrus phase with focusing on Protus and E coli. Estrus phases were determined by the structures which found on ovary (follicular growth for pro-estrus, mature growing follicle for estrus, hemorrhagic corpus luteam for meta-estrus and active corpus luteam for di-eatrus). Forty cervical swabs (ten for each estrus phase) and forty uterine swabs (ten for each estrus phase) were taken from macroscopically healthy reproductive animals after slaughtering and cultivated on nutrient agar and blood agar, the bacterial isolation were identified with biochemical teats. The present study found that

... Show More
Crossref
Publication Date
Tue Dec 30 2014
Journal Name
College Of Islamic Sciences
Ignite the burn on those who did not sign          The divorce of the buoy                  For the mark Muhammad ibn al-Haj Hassan alani Kurdish (1111 - 1196 e)
...Show More Authors

One of the Kurdish scholars who have research on the doctrinal issues of the author of this brief message that we are about to achieve; to bring it out better and in order to preserve the Islamic heritage, and revive what can be revived after being close to death by staying in libraries here and there, out of reach of hands, carrying dust Years of forgetting and marginalization, and this letter is the papers in the door of the divorce entitled his author "Iqdar al-dream for those who did not sign divorce commoner," and the name is evident the name, and the intention of the author through writing, where he wrote it to answer some of the knowledgeable among the public at the time So they decreed that there was no divorce from commoners D w

... Show More
View Publication Preview PDF
Publication Date
Mon Oct 01 2018
Journal Name
Journal Of Economics And Administrative Sciences
Studying the effect of institutional pressures on the attitudes of the managers of small enterprises in Thi-Qar province toward intention continuance environmental disposal of e-waste
...Show More Authors

       Currently, there is no established of e-waste treatment in Thi- Qar province, while their creating is increasing every year. It has been well- known that e-waste is a source of environmental degrading and their placement in landfills increases the irreversible climate change. A research model has been developed to link three components: coercive pressure, normative influence, and mimicry, then study their effect on e-waste adopt and continuance intentions. The model was validated using data collected from a field survey of 92 managers of small enterprises in Thi-Qar province.  A questionnaire was developed to collect data. It contains five major variables, exemplify by fourteen items. Als

... Show More
View Publication Preview PDF
Crossref
Publication Date
Mon Feb 04 2019
Journal Name
Journal Of The College Of Education For Women
An Evaluative study for the Arabic language course program: An Evaluative study for the Arabic language course program
...Show More Authors

Abstract
Language is one of God’s blessings to human beings through which he
distingushed them from other creatures, then how if this language was arabic.
God honored this language and in which he descended his Gracious Boole
that gave it glory and magnificance, and made it an immortal revelation to the
arab nation in their poetry, oration, history and human tendency to the life of
knowledge, mind leadershipe, innovation and progress.
This study aimed at evaluating the arabic language come program for
the new teachers. The sample was of (25) participants who were shown a
questionaire consisting of (60) items distributed on (9) fields. Then, the data
was processed statisically by using preauency rate, Kai s

... Show More
View Publication Preview PDF
Publication Date
Mon Jan 01 2018
Journal Name
Journal Of The College Of Languages (jcl)
Gabriel Garcia Marquez and Magic Realism: The Story of "An Old Man With Enormous Wings" as An Example
...Show More Authors

This research work considers one of the authentic and most modern modes of storytelling, as employed by Garcia Marquez in one of his famous stories "An Old ManWith Enormous Wings" (1972). Technically, the work is divided into four parts: the first serves as an introduction to his literary works, his use of magic realism, and addresses mainly the interests of Arab readers; the second handles the development of modern short story through the perspective of realism, until the emergence of magic realism as a new style; the third deals with the origin, nature and development of this style, and his mastery of it; the fourth part tries to analyze the story and its plot, thoughts, characters, symbols and metaphors, in the light of the artistic p

... Show More
View Publication Preview PDF
Publication Date
Fri May 31 2019
Journal Name
International Review Of Civil Engineering (irece)
An Experimental Study on Geotechnical and Electrical Properties of an Oil-Contaminated Soil at Thi-Qar Governorate/Iraq
...Show More Authors

In Iraq, the risk of soil pollution by petroleum products increases with the growth of oil exploration, production and shipping large quantities of oil through pipelines over thousands of kilometers. Numerous oil spills have been documented recently in many sites due to damage in the oil industry infrastructures, which have led to soil contamination causing serious environmental hazards and deterioration to the soil and its engineering properties. So, it is essential to investigate the impact of oil leakage through the soil stratum consequently, assessing the eligibility of the contaminated soil for construction projects or identifying the appropriate treatment method. The paper investigates the general behaviour and the associated variatio

... Show More
View Publication
Scopus (10)
Crossref (3)
Scopus Crossref
Publication Date
Sun Mar 06 2016
Journal Name
Baghdad Science Journal
The Impact of Operating System on Bandwidth in Open VPN Technology
...Show More Authors

The internet is a basic source of information for many specialities and uses. Such information includes sensitive data whose retrieval has been one of the basic functions of the internet. In order to protect the information from falling into the hands of an intruder, a VPN has been established. Through VPN, data privacy and security can be provided. Two main technologies of VPN are to be discussed; IPSec and Open VPN. The complexity of IPSec makes the OpenVPN the best due to the latter’s portability and flexibility to use in many operating systems. In the LAN, VPN can be implemented through Open VPN to establish a double privacy layer(privacy inside privacy). The specific subnet will be used in this paper. The key and certificate will

... Show More
View Publication Preview PDF
Crossref
Publication Date
Wed Jul 12 2023
Journal Name
Energies
Finite Time Disturbance Observer Based on Air Conditioning System Control Scheme
...Show More Authors

A novel robust finite time disturbance observer (RFTDO) based on an independent output-finite time composite control (FTCC) scheme is proposed for an air conditioning-system temperature and humidity regulation. The variable air volume (VAV) of the system is represented by two first-order mathematical models for the temperature and humidity dynamics. In the temperature loop dynamics, a RFTDO temperature (RFTDO-T) and an FTCC temperature (FTCC-T) are designed to estimate and reject the lumped disturbances of the temperature subsystem. In the humidity loop, a robust output of the FTCC humidity (FTCC-H) and RFTDO humidity (RFTDO-H) are also designed to estimate and reject the lumped disturbances of the humidity subsystem. Based on Lyapunov theo

... Show More
View Publication
Scopus (7)
Crossref (6)
Scopus Clarivate Crossref