One of the concerns of adopting an e-voting systems in the pooling place of any critical elections is the possibility of compromising the voting machine by a malicious piece of code, which could change the votes cast systematically. To address this issue, different techniques have been proposed such as the use of vote verification techniques and the anonymous ballot techniques, e.g., Code Voting. Verifiability may help to detect such attack, while the Code Voting assists to reduce the possibility of attack occurrence. In this paper, a new code voting technique is proposed, implemented and tested, with the aid of an open source voting. The anonymous ballot improved accordingly the paper audit trail used in this machine. The developed system, which we called CVOTING, further demonstrated the efficacy of the Code Voting technique against systematic vote change attacks and provides some features to make it easily configurable for different elections and elections in countries with right-to-left and up-to-down languages.
The performance analyses of 15 kWp (kW peak) Grid -Tied solar PV system (that considered first of its type) implemented at the Training and Energy Research Center Subsidiary of Iraqi Ministry of Electricity in Baghdad city has been achieved. The system consists of 72 modules arranged in 6 strings were each string contains 12 modules connected in series to increase the voltage output while these strings connected in parallel to increase the current output. According to the observed duration, the reference daily yields, array daily yields and final daily yields of this system were (5.9, 4.56, 4.4) kWh/kWp/day respectively. The energy yield was 1585 kWh/kWp/year while the annual total solar irradiation received by solar array system was 198
... Show MoreCryptography algorithms play a critical role in information technology against various attacks witnessed in the digital era. Many studies and algorithms are done to achieve security issues for information systems. The high complexity of computational operations characterizes the traditional cryptography algorithms. On the other hand, lightweight algorithms are the way to solve most of the security issues that encounter applying traditional cryptography in constrained devices. However, a symmetric cipher is widely applied for ensuring the security of data communication in constraint devices. In this study, we proposed a hybrid algorithm based on two cryptography algorithms PRESENT and Salsa20. Also, a 2D logistic map of a chaotic system is a
... Show MoreIn this study, the response and behavior of machine foundations resting on dry and saturated sand was investigated experimentally. A physical model was manufactured to simulate steady state harmonic load at different operating frequencies. The effect of relative density, depth of embedment, foundation area as well as the imposed harmonic load was investigated. It was found that the amplitude of displacement of the foundation increases with increasing the amplitude of dynamic force and operating frequency meanwhile it decreases with increasing the relative density of sand, degree of saturation, depth of embedment and contact area of footing. The maximum displacement was noticed at 33.34 to 41.67 Hz. The maximum displacement amplitude respons
... Show MoreImproved oral bioavailability of lipophilic substances can be achieved using self-emulsifying drug delivery systems. However, because the properties of self-emulsifying are greatly influenced by surfactant amount and type, type of oil used, droplet size, charge, cosolvents, and physiological variables, the synthesis of self-emulsifying is highly complex; consequently, only a small number of excipient self-emulsifying formulations has been developed so far for clinical use. This study reports a highly effective procedure for developing self-emulsifying formulations using a novel approach based on the hydrophilic-lipophilic difference theory. Microemulsion characteristics, such as the constituents and amounts of oil and surfactant electrolyte
... Show MoreThis research aims to present a proposed model for disclosure and documentation when performing the audit according to the joint audit method by using the questions and principles of the collective intelligence system, which leads to improving and enhancing the efficiency of the joint audit, and thus enhancing the confidence of the parties concerned in the outputs of the audit process. As the research problem can be formulated through the following question: “Does the proposed model for disclosure of the role of the collective intelligence system contribute to improving joint auditing?”
The proposed model is designed for the disclosure of joint auditing and the role
... Show MoreAn experiment was carried out at Al-Raed Research Station, which is located on the Baghdad-Anbar road during the winter season, in order to study the effect of the type of solar panels and irrigation system on some performance indicators of irrigation systems and germination percentage of bean crop (Vicia Faba L). A randomized complete block design (RCBD) was used with three replications. The experiment consist of two factors. 1st factor was the solar panel type with two levels : monocrystalline and polycrystalline. Second factor was the irrigation system with two levels Drip and sprinkler irrigation system the following indicators were studied : solar panel efficiency (%), Irrigation