One of the concerns of adopting an e-voting systems in the pooling place of any critical elections is the possibility of compromising the voting machine by a malicious piece of code, which could change the votes cast systematically. To address this issue, different techniques have been proposed such as the use of vote verification techniques and the anonymous ballot techniques, e.g., Code Voting. Verifiability may help to detect such attack, while the Code Voting assists to reduce the possibility of attack occurrence. In this paper, a new code voting technique is proposed, implemented and tested, with the aid of an open source voting. The anonymous ballot improved accordingly the paper audit trail used in this machine. The developed system, which we called CVOTING, further demonstrated the efficacy of the Code Voting technique against systematic vote change attacks and provides some features to make it easily configurable for different elections and elections in countries with right-to-left and up-to-down languages.
This research work considers one of the authentic and most modern modes of storytelling, as employed by Garcia Marquez in one of his famous stories "An Old ManWith Enormous Wings" (1972). Technically, the work is divided into four parts: the first serves as an introduction to his literary works, his use of magic realism, and addresses mainly the interests of Arab readers; the second handles the development of modern short story through the perspective of realism, until the emergence of magic realism as a new style; the third deals with the origin, nature and development of this style, and his mastery of it; the fourth part tries to analyze the story and its plot, thoughts, characters, symbols and metaphors, in the light of the artistic p
... Show MoreSliding Mode Controller (SMC) is a simple method and powerful technique to design a robust controller for nonlinear systems. It is an effective tool with acceptable performance. The major drawback is a classical Sliding Mode controller suffers from the chattering phenomenon which causes undesirable zigzag motion along the sliding surface. To overcome the snag of this classical approach, many methods were proposed and implemented. In this work, a Fuzzy controller was added to classical Sliding Mode controller in order to reduce the impact chattering problem. The new structure is called Sliding Mode Fuzzy controller (SMFC) which will also improve the properties and performance of the classical Sliding Mode control
... Show MoreThe developing countries can be distinguished by spatial disparities and by this a wide gap between urban and rural settlements were produced as well as the appearance of primate cities. The effect of spatial development as a dynamic and continuous process can be perceived in the state of population distribution inside settlements inter and intra regions as well as the hierarchy of urban settlements according to time series. The research proved that the improvement judgment of the structure of the urban system using Gene factor is not accurate because it cannot be accounted for the internal components of the system which make a contrariety between the whole judgment (country) and partial components (Provinces including Sulaimaniy
... Show MoreThis study aims to study the inherited occupations which are considered to be a cultural, civilized and social legacy that effected by the Prevailing social and economic circumstances in the Iraqi society .
The study aimed to achieve several goals, including:
Identify the relationship between the urbanization and inherited occupations in the old city Al-Karkh.
Identify the relationship between the ecological construction and inherited occupations in the old city Al-Karkh.
Recognize the factors and motives inherited occupations in the study area .Identify the role of inherited occupations in promoting opportunities cohesion of the family system in the study area.
The field of the study had concentrated on a sample of famili
A load-shedding controller suitable for small to medium size loads is designed and implemented based on preprogrammed priorities and power consumption for individual loads. The main controller decides if a particular load can be switched ON or not according to the amount of available power generation, load consumption and loads priorities. When themaximum allowed power consumption is reached and the user want to deliver power to additional load, the controller will decide if this particular load should be denied receiving power if its priority is low. Otherwise, it can be granted to receive power if its priority is high and in this case lower priority loads are automatically switched OFF in order not to overload the power generation. The
... Show MoreTested effective Alttafaria some materials used for different purposes, system a bacterial mutagenesis component of three bacterial isolates belonging to different races and materials tested included drug Briaktin
Economic intelligence represents a modern field of knowledge that has been and is still the focus of many studies and research, including this research that deals with economic intelligence and its role in strengthening Iraqi national security - an analytical study. Economic development and economic development without security, and in a situation such as that of Iraq, which is still suffering from conflicts, conflicts and the effects of wars, as well as the unstable conditions in its regional environment, the directions of that relationship cannot be determined except through the availability of accurate information, indicators, full knowledge of reality and the pos
... Show MoreAZ Khalaf, M kassim Haidir, LK Jasim, Iraqi Journal of Science, 2012
The internet is a basic source of information for many specialities and uses. Such information includes sensitive data whose retrieval has been one of the basic functions of the internet. In order to protect the information from falling into the hands of an intruder, a VPN has been established. Through VPN, data privacy and security can be provided. Two main technologies of VPN are to be discussed; IPSec and Open VPN. The complexity of IPSec makes the OpenVPN the best due to the latter’s portability and flexibility to use in many operating systems. In the LAN, VPN can be implemented through Open VPN to establish a double privacy layer(privacy inside privacy). The specific subnet will be used in this paper. The key and certificate will
... Show MoreIn this research a recent developed practical modeling technique is applied for the glucose regulation system identification. By using this technique a set of mathematical models is obtained instead of single one to compensate for the loss of information caused by the optimization technique in curve fitting algorithms, the diversity of members inside the single set is interpreted in term of restricted range of its parameters, also a diagnosis criteria is developed for detecting any disorder in the glucose regulation system by investigating the influence of variation of the parameters on the response of the system, this technique is applied in this research practically for 20 cases with association of National Center for
... Show More