Blockchain has garnered the most attention as the most important new technology that supports recent digital transactions via e-government. The most critical challenge for public e-government systems is reducing bureaucracy and increasing the efficiency and performance of administrative processes in these systems since blockchain technology can play a role in a decentralized environment and execute a high level of security transactions and transparency. So, the main objectives of this work are to survey different proposed models for e-government system architecture based on blockchain technology implementation and how these models are validated. This work studies and analyzes some research trends focused on blockchain and the future of e-governance for connecting citizens and smart cities, such as Using Blockchain in the Notarial Office (NO), using blockchain technology in the management of police complaints, exploring blockchain-enabled end-to-end security e-voting, using blockchain and smart contract technology for trusted and safe property registration and record management, and using a blockchain-enabled Vehicle Certification (BVC) framework. Finally, this work has proven that the issue of transforming governments from the traditional system to electronic governments based on blockchain technology has become an inevitable matter of time.
The widespread of internet allover the world, in addition to the increasing of the huge number of users that they exchanged important information over it highlights the need for a new methods to protect these important information from intruders' corruption or modification. This paper suggests a new method that ensures that the texts of a given document cannot be modified by the intruders. This method mainly consists of mixture of three steps. The first step which barrows some concepts of "Quran" security system to detect some type of change(s) occur in a given text. Where a key of each paragraph in the text is extracted from a group of letters in that paragraph which occur as multiply of a given prime number. This step cannot detect the ch
... Show MoreAbstract
Magnetic abrasive finishing (MAF) process is one of non-traditional or advanced finishing methods which is suitable for different materials and produces high quality level of surface finish where it uses magnetic force as a machining pressure. A set of experimental tests was planned according to Taguchi orthogonal array (OA) L27 (36) with three levels and six input parameters. Experimental estimation and optimization of input parameters for MAF process for stainless steel type 316 plate work piece, six input parameters including amplitude of tooth pole, and number of cycle between teeth, current, cutting speed, working gap, and finishing time, were performed by design of experiment
... Show MoreFiber-to-the-Home (FTTH) has long been recognized as a technology that provides future proof bandwidth [1], but has generally been too expensive to implement on a wide scale. However, reductions in the cost of electro-optic components and improvements in the handling of fiber optics now make FTTH a cost effective solution in many situations. The transition to FTTH in the access network is also a benefit for both consumers and service providers because it opens up the near limitless capacity of the core long-haul network to the local user. In this paper individual passive optical components, transceivers, and fibers has been put together to form a complete FTTH network. Then the implementation of the under construction Baghdad/Al
... Show MoreIn aired and semiarid areas like Iraq, saline soil may be considered one of the major concerns. In addition to environmental effects, they may produce significant geotechnical hazards that could interrupt the structure stability depending on the salt type and its concentration. So, it is crucial to identify the degree of the soil salinity with a proper tool for getting a qualified assessment and consequently offering a suitable treatment. In this paper, the electrical resistivity technique has been employed to detect the degree of soil salinity by considering a new electronic system. The system used a single-phase Direct Current (DC) to Alternating Current (AC) inverter accompanied by a transformer. Natural soils became artificially saline
... Show MoreIn today's digital era, the importance of securing information has reached critical levels. Steganography is one of the methods used for this purpose by hiding sensitive data within other files. This study introduces an approach utilizing a chaotic dynamic system as a random key generator, governing both the selection of hiding locations within an image and the amount of data concealed in each location. The security of the steganography approach is considerably improved by using this random procedure. A 3D dynamic system with nine parameters influencing its behavior was carefully chosen. For each parameter, suitable interval values were determined to guarantee the system's chaotic behavior. Analysis of chaotic performance is given using the
... Show MoreLanguage is a vehicle for social values and ideologies that a man intends or attempts to express. Dramatic texts are one of the discursive practices that embody values and ideologies. What is expressed in dramatic text is deliberate because it is meant to affect other’s values, trends and ideologies in one way or another. Such ideologies and values are not explicit. To bring them out requires putting language under scrutiny to unveil what is implied. The present study attempts to analyze a dramatic script entitled Advice to Iraqi Women by the British playwright Martin Crimp in an attempt to unveil the intended political ideologies underlying the text. The title reflects a political aspect embedded in the word “Iraqi” that
... Show MoreTransmission lines are generally subjected to faults, so it is advantageous to determine these faults as quickly as possible. This study uses an Artificial Neural Network technique to locate a fault as soon as it happens on the Doukan-Erbil of 132kv double Transmission lines network. CYME 7.1-Programming/Simulink utilized simulation to model the suggested network. A multilayer perceptron feed-forward artificial neural network with a back propagation learning algorithm is used for the intelligence locator's training, testing, assessment, and validation. Voltages and currents were applied as inputs during the neural network's training. The pre-fault and post-fault values determined the scaled values. The neural network's p
... Show MoreA large amount of thermal energy is generated from burning hazardous chemical wastes, and the temperature of the flue gases in hazardous waste incinerators reaches up to (1200 °C). The flue gases are cooled to (40°C) and are treated before emission. This thermal energy can be utilized to produce electrical power by designing a system suitable for dangerous flue gases in the future depending on the results of much research about using a proto-type small steam power plant that uses safe fuel to study and develop the electricity generation process with water tube boiler which is manufactured experimentally with theoretical development for some of its parts which are inefficient in experimental work. The studied system gen
... Show Moreان وضع معايير دولية محاسبية على شكل نماذج وارشادات عامة تؤدي باصحاب القرارات الاقتصادية استخدام معايير المحاسبة الدولية عند اعداد وتجهيز القوائم والبيانات المالية اصبح مطلب اساسي وضرورة ملحة لمختلف الاطراف في المجتمع الحالي فهذه المعايير قد اثمرت في معالجة الامور المحاسبية على الصعيد المحلي والاقليمي والدولي. وان عدد كبير من الدول اعتمدت هذه المعايير فقد تجاوزت 150 بلدا. مما نتج عنه ازالة الفوارق الكث
... Show More