Preferred Language
Articles
/
bsj-2449
CVOTING: An Anonymous Ballot E-Voting System
...Show More Authors

One of the concerns of adopting an e-voting systems in the pooling place of any critical elections is the possibility of compromising the voting machine by a malicious piece of code, which could change the votes cast systematically. To address this issue, different techniques have been proposed such as the use of vote verification techniques and the anonymous ballot techniques, e.g., Code Voting. Verifiability may help to detect such attack, while the Code Voting assists to reduce the possibility of attack occurrence. In this paper, a new code voting technique is proposed, implemented and tested, with the aid of an open source voting. The anonymous ballot improved accordingly the paper audit trail used in this machine. The developed system, which we called CVOTING, further demonstrated the efficacy of the Code Voting technique against systematic vote change attacks and provides some features to make it easily configurable for different elections and elections in countries with right-to-left and up-to-down languages.

Scopus Clarivate Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Sun Nov 01 2020
Journal Name
Annuals Of Tropical Medicine & Public Health
Topical treatment of seborrhoeic dermatitis and dandruff: An overview
...Show More Authors

Scopus (4)
Crossref (3)
Scopus Crossref
Publication Date
Tue Jan 29 2019
Journal Name
Journal Of Accounting And Financial Studies ( Jafs )
Analysis Tax Advantage of Financing Leverage: An Empirical Research
...Show More Authors

The research objective are analyze financial leverage advantage through analyze and discuss financial leverage cost, and achieve tax advantage. study include two firms ,oil firm and industrial companies firm with limited liability.The inductive method is used for the applied part in analyzing the financial data of the companies considered in 2011-2015.The result of the study shows that the financial leverage achieve present value of the costs is Negative . The study concluded that the most important conclusions of the tax advantage of leverage is higher costs as well as achieving a low tax shield ,This study found out the results that interest payments related to pre-tax all of the loan amount and the percentage of the interest rate on b

... Show More
View Publication Preview PDF
Crossref
Publication Date
Wed Jun 14 2023
Journal Name
Al-academy
The Written Text in Conceptual Art (An Analytical Study)
...Show More Authors

The tagged research problem (the outputs of the written text in conceptual art) dealt with a comparative analytical study in the concept of conceptual art trends (land art - body art - art - language).

The study consisted of four chapters. The first chapter dealt with the theoretical framework, which was represented in presenting (the research problem), which raised the following question: What is the role of the written text in the transformations of the conceptual arts?

The first chapter included (the importance of research) and (research objectives) seeking to conduct comparative research in the written text within the trends of conceptual art as a moving phenomenon in art, and to reveal the variable written text in the

... Show More
View Publication Preview PDF
Crossref
Publication Date
Fri Dec 14 2018
Journal Name
Iraqi National Journal Of Nursing Specialties
Effectiveness of Women's Self-care Instructions concerning Wound, Perineal & Urinary System Care post cesarean section in Baghdad teaching hospital
...Show More Authors

Aim: to determine the effectiveness of women's self-care instructions on their post cesarean section care in Baghdad
teaching hospital.
Methodology: The present study used quasi-experimental study design in maternity words in Baghdad teaching
hospital. The sample was collected and follow up for the period (15) January 2014 until 15 May 2014 Nonprobability
(purposive sample) of (100) women post cesarean section divided in to two groups (50) women post
cesarean section considered as a study group, and another (50) women post cesarean section considered as the
control one, A questionnaire designed as a tool to collect data fit the purpose of the study a questionnaire include
demographic variables, Reproductive variables

... Show More
View Publication Preview PDF
Publication Date
Sun Jul 20 2025
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Using a 3D Chaotic Dynamic System as a Random Key Generator for Image Steganography
...Show More Authors

In today's digital era, the importance of securing information has reached critical levels. Steganography is one of the methods used for this purpose by hiding sensitive data within other files. This study introduces an approach utilizing a chaotic dynamic system as a random key generator, governing both the selection of hiding locations within an image and the amount of data concealed in each location. The security of the steganography approach is considerably improved by using this random procedure. A 3D dynamic system with nine parameters influencing its behavior was carefully chosen. For each parameter, suitable interval values were determined to guarantee the system's chaotic behavior. Analysis of chaotic performance is given using the

... Show More
View Publication Preview PDF
Publication Date
Tue Jan 14 2025
Journal Name
South Eastern European Journal Of Public Health
Deep learning-based threat Intelligence system for IoT Network in Compliance With IEEE Standard
...Show More Authors

The continuous advancement in the use of the IoT has greatly transformed industries, though at the same time it has made the IoT network vulnerable to highly advanced cybercrimes. There are several limitations with traditional security measures for IoT; the protection of distributed and adaptive IoT systems requires new approaches. This research presents novel threat intelligence for IoT networks based on deep learning, which maintains compliance with IEEE standards. Interweaving artificial intelligence with standardization frameworks is the goal of the study and, thus, improves the identification, protection, and reduction of cyber threats impacting IoT environments. The study is systematic and begins by examining IoT-specific thre

... Show More
View Publication
Crossref
Publication Date
Sun Sep 11 2022
Journal Name
Mathematics
Modeling and Analysis of the Influence of Fear on a Harvested Food Web System
...Show More Authors

The food web is a crucial conceptual tool for understanding the dynamics of energy transfer in an ecosystem, as well as the feeding relationships among species within a community. It also reveals species interactions and community structure. As a result, an ecological food web system with two predators competing for prey while experiencing fear was developed and studied. The properties of the solution of the system were determined, and all potential equilibrium points were identified. The dynamic behavior in their immediate surroundings was examined both locally and globally. The system’s persistence demands were calculated, and all conceivable forms of local bifurcations were investigated. With the aid of MATLAB, a numerical simu

... Show More
View Publication
Scopus (11)
Crossref (8)
Scopus Clarivate Crossref
Publication Date
Thu Dec 14 2023
Journal Name
Iete Journal Of Research
Performance Enhancement of VLC-NOMA Employing Beamforming Function based vehicle-to-multivehicle Communication system
...Show More Authors

View Publication
Scopus (4)
Crossref (2)
Scopus Clarivate Crossref
Publication Date
Sun Sep 30 2018
Journal Name
Iraqi Journal Of Chemical And Petroleum Engineering
Biological Co-existence of the Microalgae – Bacteria System in Dairy Wastewater using photo-bioreactor
...Show More Authors

Aeration system in the cultivation of Chlorella Sp. Microalgae using dairy wastewater as culture media was addressed in the current study. This research aimed to study the effect of aeration in the bubble column bioreactor on the biological synergy between microalgae and bacteria if they are present in the same place. The results show that the sterilization stage is not the dominant step in the success of microalgae cultivation in water-rich organic waste. There is a clear convergence between the growth rate of Chlorella microalgae in the sterilized and non-sterilized culture media, which gives realism if the proposal is applied industrially. Through the information obtained the aerobic bacteria in the non-sterilized me

... Show More
View Publication Preview PDF
Crossref (3)
Crossref
Publication Date
Tue Jan 31 2023
Journal Name
International Journal Of Nonlinear Analysis And Applications
Survey on intrusion detection system based on analysis concept drift: Status and future directions
...Show More Authors

Nowadays, internet security is a critical concern; the One of the most difficult study issues in network security is "intrusion detection". Fight against external threats. Intrusion detection is a novel method of securing computers and data networks that are already in use. To boost the efficacy of intrusion detection systems, machine learning and deep learning are widely deployed. While work on intrusion detection systems is already underway, based on data mining and machine learning is effective, it requires to detect intrusions by training static batch classifiers regardless considering the time-varying features of a regular data stream. Real-world problems, on the other hand, rarely fit into models that have such constraints. Furthermor

... Show More
View Publication