Preferred Language
Articles
/
TxhbK5YBVTCNdQwC4YKI
Secure E-voting authentication system employing biometric technology, Crypto-Watermarking Approach and blockchain technology: A Review
...Show More Authors

Moderately, advanced national election technologies have improved political systems. As electronic voting (e-voting) systems advance, security threats like impersonation, ballot tampering, and result manipulation increase. These challenges are addressed through a review covering biometric authentication, watermarking, and blockchain technologies, each of which plays a crucial role in improving the security of e-voting systems. More precisely, the biometric authentication is being examined due to its ability in identify the voters and reducing the risks of impersonation. The study also explores the blockchain technology to decentralize the elections, enhance the transparency and ensure the prevention of any unauthorized alteration or manipulation of the results. Additionally, the watermarking technology is examined for viewing the ability to store and transmit the voting result in secure manner though preserving the confidentiality ensure fair elections. this review aims to evaluate the combination of biometric authentication, watermarking, and blockchain technologies effectiveness to develop robust e-voting framework. as a result, the key finding indicates a hybrid approach that integrates those technology offers a solution to address the security challenges.

Crossref
View Publication
Publication Date
Sun Jul 09 2023
Journal Name
Journal Of Engineering
New Approach in Detection MAC Spoofing in a WiFi LAN
...Show More Authors

Medium Access Control (MAC) spoofing attacks relate to an attacker altering the manufacturer assigned MAC address to any other value. MAC spoofing attacks in Wireless Fidelity (WiFi) network are simple because of the ease of access to the tools of the MAC fraud on the Internet like MAC Makeup, and in addition to that the MAC address can be changed manually without software. MAC spoofing attacks are considered one of the most intensive attacks in the WiFi network; as result for that, many MAC spoofing detection systems were built, each of which comes with its strength and weak points. This paper logically identifies and recognizes the weak points
and masquerading paths that penetrate the up-to-date existing detection systems. Then the

... Show More
View Publication Preview PDF
Crossref
Publication Date
Thu Jan 01 2015
Journal Name
Journal Of Materials Chemistry A
A novel approach to fabricate zeolite membranes for pervaporation processes
...Show More Authors

A method has been demonstrated to synthesise effective zeolite membranes from existing crystals without a hydrothermal synthesis step.

View Publication
Scopus (26)
Crossref (25)
Scopus Clarivate Crossref
Publication Date
Sat Sep 24 2022
Journal Name
Arab World English Journal
Conflict in Atwood’s The Handmaid’s Tale: A Critical Discourse Approach
...Show More Authors

Conflict is a common but complicated phenomenon. It has been extensively researched in many domains, including philosophy, sociology, psychology, and linguistics. Using the Critical Discourse Approach, this study examines the issue of self-society conflict in The Handmaid’s Tale. The significance of this work lies in the identification and explanation of the discursive strategies that force the ideological polarization of the positively portrayed self versus the negatively portrayed other. The purpose of this study is to answer two questions: what are the discursive strategies used in The Handmaid’s Tale to create a positive or negative representation, and how are these strategies implemented? Five extracts from The Handmaid’s

... Show More
View Publication Preview PDF
Clarivate Crossref
Publication Date
Fri Apr 01 2011
Journal Name
Al-mustansiriyah Journal Of Science
A Genetic Algorithm Based Approach For Generating Unit Maintenance Scheduling
...Show More Authors

Publication Date
Fri Jul 01 2016
Journal Name
Al–bahith Al–a'alami
A Semiotic Approach to the Analysis of the News Story
...Show More Authors

This study attempts to provide an approach analysis for the news, depending on the bases and principles which conceptuality semiotic researchers of this field first of them «A. J. Gremas» for the theory of «narrative discourse analysis», to more clarify we tried to apply it on a published press- news, to concludes the most important steps and methods that are necessary to follows gain more understanding of the press- news.

View Publication Preview PDF
Publication Date
Thu Mar 14 2024
Journal Name
Biomedical And Pharmacology Journal
A Summary of the Pharmacological Activity, Phytochemistry and Pharmacognosy of Parthenocissus quinquefolia (L.): A Review
...Show More Authors

Historically, medicinal herbs have been utilized as an important origin of chemicals with particular therapeutic potentials, and they continue to be a great place to find new medication candidates. Parthenocissus quinquefolia L. is a member of the grape-growing family Vitaceae. It is indigenous to Central and North America. It is widely dispersed in Iraqi gardens and plant houses from north to south. Traditionally, it has many uses, like relieving constipation, treating jaundice, expectorant, emetic, and others. At the same time, its proven activities include antioxidant activity, antimicrobial, anti-diabetic, thrombin inhibitor effect, and medicine for treating eyelid eczema. Parthenocissus quinquefolia contains valuable phytochemicals lik

... Show More
View Publication
Scopus (2)
Scopus
Publication Date
Wed Aug 24 2022
Journal Name
European Journal Of Research Development And Sustainability
MONKEYPOX A NEW PANDEMIC DISEASE: IMPLICATIONS FOR CLINICAL PRACTICE AND PUBLIC HEALTH EDUCATION. A REVIEW
...Show More Authors

Publication Date
Sun Jun 05 2016
Journal Name
Baghdad Science Journal
Study of total Immunoglobulin E and Eosinophil count in allergic disease
...Show More Authors

The present study aimed to evaluate the levels of total immunoglobulin E and percentage count of eosinophil in some of allergic disease. Blood sample collected from 210 patients (110 female, 100 male) with allergic disease (allergic asthma, allergic rhinitis, and urticaria) their age between 10-70 years and 50 healthy control their age between 23-52 years. A highly significant (P<0.01) increase in the mean serum total IgE in patients with asthma (503.54 ± 63.49 IU/ml), Allergic rhinitis (442.77 ± 95.76 IU/ml) and urticaria (489.53 ± 69.68 IU/ml) as a compared with healthy controls (23.67 ± 5.81 IU/ml).There was a significant difference in percentage count of eosinophil in patients groups allergic asthma 4.37 ± 0.52% ,allergic rhinitis

... Show More
View Publication Preview PDF
Crossref
Publication Date
Tue Jun 14 2016
Journal Name
Al-academy
Employing traditional symbols and popular beliefs in the designs of fabrics, clothing women's home
...Show More Authors

The woman's choice of clothing is no longer supported on the basis of the available forms of design in general. It is the interaction of design relationships with the receiver structure that reflects the character of integrated women with an emphasis on attractions pulling attention, all of these interventions reach us to the need to emphasize through this search Picking the perfect symbols of heritage in every sense of the popular beliefs of the employed in the designs of apparel fabrics women's home included a search of four chapters deal with the first problem of the research which you can employ the traditional symbols and popular beliefs in the designs of household apparel fabrics in order to raise the aesthetic value and utility of

... Show More
View Publication Preview PDF
Crossref
Publication Date
Tue Jun 30 2015
Journal Name
Iraqi Journal Of Market Research And Consumer Protection
Consumer protection in e-marketing contracts An analytical study.: Consumer protection in e-marketing contracts An analytical study.
...Show More Authors

Marketing plays a role in the transfer of consumer desires through research, studies and satisfy the needs process, and with the technical development has evolved and marketing departments in the world of commerce has made great strides since the expansion of the trade deal, especially in light of spread of the Internet and the culture of use where he became a lot as individuals or institutions are dealings via electronic shopping . In all cases, we find that the consumer is important party, and that the legal rules did not leave the shopping process or contracting E without protection and I've dealt with so many studies through the civil protection for the consumer in electronic contracts legally with an analytical study of the

... Show More
View Publication Preview PDF