Preferred Language
Articles
/
bsj-2449
CVOTING: An Anonymous Ballot E-Voting System
...Show More Authors

One of the concerns of adopting an e-voting systems in the pooling place of any critical elections is the possibility of compromising the voting machine by a malicious piece of code, which could change the votes cast systematically. To address this issue, different techniques have been proposed such as the use of vote verification techniques and the anonymous ballot techniques, e.g., Code Voting. Verifiability may help to detect such attack, while the Code Voting assists to reduce the possibility of attack occurrence. In this paper, a new code voting technique is proposed, implemented and tested, with the aid of an open source voting. The anonymous ballot improved accordingly the paper audit trail used in this machine. The developed system, which we called CVOTING, further demonstrated the efficacy of the Code Voting technique against systematic vote change attacks and provides some features to make it easily configurable for different elections and elections in countries with right-to-left and up-to-down languages.

Scopus Clarivate Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Sat May 16 2009
Journal Name
Journal Of Planner And Development
Information technology and replacement system in decision-making in the city
...Show More Authors

IT has its impact on all aspects of life, including its planning and operations. Based on the assumption that the plan can adapt any technique as an analytical tool within broader dimensions to include society in general and meet the requirements of that society. They have neutral values, meaning and usefulness rather than being adopted as abstract goals or objectives so that the planner or the decision-maker can benefit greatly from them. This information technology is summarized in three main axes: First: Geographic Information Systems. Second: computer modeling. Third: visual simulation and the Internet. The problem of research is that the decision-making environment of the plan is surrounded by uncertain information-planning conditio

... Show More
View Publication Preview PDF
Publication Date
Mon Feb 02 2015
Journal Name
Al-khwarizmi Engineering Journal
Stabilizing Gap of Pole Electric Arc Furnace Using Smart Hydraulic System
...Show More Authors

Preview PDF
Publication Date
Sat Dec 01 2012
Journal Name
Iraqi Journal Of Science
Applications of Camera Total Station System (CTSS) in the Construction Surveying
...Show More Authors

AZ Khalaf, M kassim Haidir, LK Jasim, Iraqi Journal of Science, 2012

View Publication
Publication Date
Mon Feb 04 2019
Journal Name
Journal Of The College Of Education For Women
The Role of inherited occupations in cohesion of the family system
...Show More Authors

This study aims to study the inherited occupations which are considered to be a cultural, civilized and social legacy that effected by the Prevailing social and economic circumstances in the Iraqi society .
The study aimed to achieve several goals, including:
Identify the relationship between the urbanization and inherited occupations in the old city Al-Karkh.
Identify the relationship between the ecological construction and inherited occupations in the old city Al-Karkh.
Recognize the factors and motives inherited occupations in the study area .Identify the role of inherited occupations in promoting opportunities cohesion of the family system in the study area.
The field of the study had concentrated on a sample of famili

... Show More
View Publication Preview PDF
Publication Date
Mon Dec 14 2020
Journal Name
2020 13th International Conference On Developments In Esystems Engineering (dese)
Anomaly Based Intrusion Detection System Using Hierarchical Classification and Clustering Techniques
...Show More Authors

With the rapid development of computers and network technologies, the security of information in the internet becomes compromise and many threats may affect the integrity of such information. Many researches are focused theirs works on providing solution to this threat. Machine learning and data mining are widely used in anomaly-detection schemes to decide whether or not a malicious activity is taking place on a network. In this paper a hierarchical classification for anomaly based intrusion detection system is proposed. Two levels of features selection and classification are used. In the first level, the global feature vector for detection the basic attacks (DoS, U2R, R2L and Probe) is selected. In the second level, four local feature vect

... Show More
View Publication
Scopus (3)
Crossref (2)
Scopus Clarivate Crossref
Publication Date
Wed Aug 31 2022
Journal Name
International Journal Of Intelligent Engineering And Systems
Performance Evaluation Based on Multi-UAV in Airborne Computer Network System
...Show More Authors

View Publication
Scopus (3)
Scopus Crossref
Publication Date
Wed Jun 30 2021
Journal Name
International Journal Of Intelligent Engineering And Systems
Airborne Computer System Path-Tracking Based Multi-PID-PSO Controller Design
...Show More Authors

View Publication
Scopus (14)
Crossref (7)
Scopus Crossref
Publication Date
Fri Dec 07 2018
Journal Name
Iraqi Journal Of Pharmaceutical Sciences ( P-issn 1683 - 3597 E-issn 2521 - 3512)
Novel Combination for Self-Nanoemulsifying Drug Delivery System of Candesartan Cilexetil
...Show More Authors

Solubility problem of many of effective pharmaceutical molecules are still one of the major obstacle in theformulation of such molecules. Candesartan cilexetil (CC) is angiotensin II receptor antagonist with very low water solubility and this result in low and variable bioavailability. Self- emulsifying drug delivery system (SEDDS) showed promising result in overcoming solubility problem of many drug molecules. CC was prepared as SEDDS by using novel combination of two surfactants (tween 80 and cremophore EL) and tetraglycol as cosurfactant, in addition to the use of triacetin as oil. Different tests were performed in order to confirm the stability of the final product which includes thermodynamic study, determination of self-emulsificat

... Show More
View Publication Preview PDF
Scopus (6)
Crossref (1)
Scopus Crossref
Publication Date
Fri May 01 2020
Journal Name
Iop Conference Series: Materials Science And Engineering
A review of ultra-high temperature materials for thermal protection system
...Show More Authors
Abstract<p>Ultra-High Temperature Materials (UHTMs) are at the base of entire aerospace industry; these high stable materials at temperatures exceeding 1600 °C are used to manage the heat shielding to protect vehicles and probes during the hypersonic flight through reentry trajectory against aerodynamic heating and reducing plasma surface interaction. Those materials are also recognized as Thermal Protection System Materials (TPSMs). The structural materials used during the high-temperature oxidizing environment are mainly limited to SiC, oxide ceramics, and composites. In addition to that, silicon-based ceramic has a maximum-use at 1700 °C approximately; as it is an active oxidation process o</p> ... Show More
View Publication
Scopus (53)
Crossref (45)
Scopus Clarivate Crossref
Publication Date
Sat Jan 01 2022
Journal Name
Lecture Notes In Electrical Engineering
Dynamics Modeling and Motion Simulation of a Segway Robotic Transportation System
...Show More Authors

View Publication
Crossref (3)
Crossref