Currently voting process is paper based form, by using voting card or paper; thus the counting method is done manually, which exhausts a lot of time. Obsolete votes may be possibly occurring. This paper introduced a system in which voting and counting is done with the help of computer. The election process would be easier, it saves time, avoid errors while counting and obsolete votes are reduced. Electronic voting (E-voting) system is a voting system in which the election related data is stored and handled digitally, it would become the quickest, cheapest, and the most efficient way to administer election and count vote it is considered a means to further enhance and strengthen the democratic processes in modern information societies. Th
... Show MoreWeb application protection lies on two levels: the first is the responsibility of the server management, and the second is the responsibility of the programmer of the site (this is the scope of the research). This research suggests developing a secure web application site based on three-tier architecture (client, server, and database). The security of this system described as follows: using multilevel access by authorization, which means allowing access to pages depending on authorized level; password encrypted using Message Digest Five (MD5) and salt. Secure Socket Layer (SSL) protocol authentication used. Writing PHP code according to set of rules to hide source code to ensure that it cannot be stolen, verification of input before it is s
... Show MoreWeb application protection lies on two levels: the first is the responsibility of the server management, and the second is the responsibility of the programmer of the site (this is the scope of the research). This research suggests developing a secure web application site based on three-tier architecture (client, server, and database). The security of this system described as follows: using multilevel access by authorization, which means allowing access to pages depending on authorized level; password encrypted using Message Digest Five (MD5) and salt. Secure Socket Layer (SSL) protocol authentication used. Writing PHP code according to set of rules to hide source code to ensur
... Show MoreComputer systems and networks are being used in almost every aspect of our daily life; as a result the security threats to computers and networks have also increased significantly. Traditionally, password-based user authentication is widely used to authenticate legitimate user in the current system0T but0T this method has many loop holes such as password sharing, shoulder surfing, brute force attack, dictionary attack, guessing, phishing and many more. The aim of this paper is to enhance the password authentication method by presenting a keystroke dynamics with back propagation neural network as a transparent layer of user authentication. Keystroke Dynamics is one of the famous and inexpensive behavioral biometric technologies, which identi
... Show MoreForward-swept wings were researched and introduced to improve maneuverability, control, and fuel efficiency while reducing drag and they are often used alongside canards, to further enhance their characteristics. In this research, the effects of canard dihedral angles on the wing loading of a forward-swept wing in transonic flow conditions were studied, as the wing loading provides a measure of wing’s efficiency (lift/drag). A generic aircraft model from literatures was selected, simulated, and compared to, using CFD software ANSYS/Fluent where the flow equations were solved to calculate the aerodynamic characteristics. The research was carried at two different Mach numbers, 0.6 and 0.9, for five different canard dihedral angles which tra
... Show MoreThis study aimed at the investigation of abnormal liver and renal functions by biochemical manifestations of underlying metabolic abnormalities in relation to hyperglycemia in non-insulin-dependent diabetic patients. The study comprised 118 diabetic patients (56 males, 62 females) and 60 age-matched healthy non-diabetic controls (30 males, 30 females). All subjects were tested for serum levels of liver enzymatic indicators, which include aspartate transaminase (AST), alanine transaminase (ALT), and alkaline phosphatase (ALP), as well as non enzymatic parameters, including total bilirubin and total proteins.Also, serum levels of renal function markers, including microalbumin, creatinine, urea, and uric acid were measured.
The find
... Show MoreBackground: Diabetes mellitus (DM) accompanied with an increase in the death rate and represents a significant public health challenge. It is the cause of other disorders and infection in many body organs. Hence, it is important to study the possible changes in the immunological components in the serum of diabetic patients which are not well understood. In this work, serum C3, C4, IgA, IgG, and IgM were estimated in the patients with insulin dependent diabetes mellitus (IDDM) and compared with healthy persons. Patients and Methods: Twenty-one insulin dependent diabetic patients in addition to twenty-four healthy persons as control group were participated in this study. Serum C3, C4, IgA, IgG, and IgM were measured by using immunodiffusio
... Show Morestract This paper includes studying (dynamic of double chaos) in two steps: First Step:- Applying ordinary differential equation have behaved chaotically such as (Duffing's equation) on (double pendulum) equation system to get new system of ordinary differential equations depend on it next step. Second Step:- We demonstrate existence of a dynamics of double chaos in Duffing's equation by relying on graphical result of Poincare's map from numerical simulation.