One of the concerns of adopting an e-voting systems in the pooling place of any critical elections is the possibility of compromising the voting machine by a malicious piece of code, which could change the votes cast systematically. To address this issue, different techniques have been proposed such as the use of vote verification techniques and the anonymous ballot techniques, e.g., Code Voting. Verifiability may help to detect such attack, while the Code Voting assists to reduce the possibility of attack occurrence. In this paper, a new code voting technique is proposed, implemented and tested, with the aid of an open source voting. The anonymous ballot improved accordingly the paper audit trail used in this machine. The developed system, which we called CVOTING, further demonstrated the efficacy of the Code Voting technique against systematic vote change attacks and provides some features to make it easily configurable for different elections and elections in countries with right-to-left and up-to-down languages.
Fear, harvesting, hunting cooperation, and antipredator behavior are all important subjects in ecology. As a result, a modified Leslie-Gower prey-predator model containing these biological aspects is mathematically constructed, when the predation processes are described using the Beddington-DeAngelis type of functional response. The solution's positivity and boundedness are studied. The qualitative characteristics of the model are explored, including stability, persistence, and bifurcation analysis. To verify the gained theoretical findings and comprehend the consequences of modifying the system's parameters on their dynamical behavior, a detailed numerical investigation is carried out using MATLAB and Mathematica. It is discovered that the
... Show MoreAlot of medical and industrial applications used the metal nanoparticles (NPs) with increase interest to be used as cancer therapy. The current work aimed to prepare AuNPs and AgNPs through the use of plasma jet and test their antitumor mechanism of apoptosis induction. The results indicating the face-centered cubic structures and crystalline nature of AuNPs and AgNPs. Also, the image of FESEM showed that the well dispersions regarding AuNPs and AgNPs, while the NP’s spherical shape with the particle size distributions which are considered to be close that estimated from the XRD. cytotoxicity have been assessed against the Normal embryonic cell line REF and the digestive system (HC , SK-GT-4) cell lines under a variety of the seri
... Show MoreIn this work, an efficient energy management (EEM) approach is proposed to merge IoT technology to enhance electric smart meters by working together to satisfy the best result of the electricity customer's consumption. This proposed system is called an integrated Internet of things for electrical smart meter (2IOT-ESM) architecture. The electric smart meter (ESM) is the first and most important technique used to measure the active power, current, and energy consumption for the house’s loads. At the same time, the effectiveness of this work includes equipping ESM with an additional storage capacity that ensures that the measurements are not lost in the event of a failure or sudden outage in WiFi network. Then then these
... Show MoreIn the present study, nanoporous material type MCM-41 was prepared by the sol-gel technique and was used as a carrier for prednisolone (PRD) drug delivery. The structural properties of mesoporous were fully characterized by X-ray diffraction (XRD), N2 adsorption /desorption and Fourier-transform infrared (FTIR). The mass transfer in term of adsorption process (loading) and desorption process (releasing) properties were investigated. The maximum drug loading efficiency was equal to 38% and 47.5% at different concentrations. The PRD released was prudently studied in water media of pH 6.8 simulated body fluid (SBF) in according to "United State Pharmacopeia (USP38)". The results proved that the release of prednisolone from MCM-41
... Show MoreAbstract
The aim of this work is to create a power control system for wind turbines based on fuzzy logic. Three power control loop was considered including: changing the pitch angle of the blade, changing the length of the blade and turning the nacelle. The stochastic law was given for changes and instant inaccurate assessment of wind conditions changes. Two different algorithms were used for fuzzy inference in the control loop, the Mamdani and Larsen algorithms. These two different algorithms are materialized and developed in this study in Matlab-Fuzzy logic toolbox which has been practically implemented using necessary intelligent control system in electrical engineerin
... Show MoreCryptography algorithms play a critical role in information technology against various attacks witnessed in the digital era. Many studies and algorithms are done to achieve security issues for information systems. The high complexity of computational operations characterizes the traditional cryptography algorithms. On the other hand, lightweight algorithms are the way to solve most of the security issues that encounter applying traditional cryptography in constrained devices. However, a symmetric cipher is widely applied for ensuring the security of data communication in constraint devices. In this study, we proposed a hybrid algorithm based on two cryptography algorithms PRESENT and Salsa20. Also, a 2D logistic map of a chaotic system is a
... Show More