One of the concerns of adopting an e-voting systems in the pooling place of any critical elections is the possibility of compromising the voting machine by a malicious piece of code, which could change the votes cast systematically. To address this issue, different techniques have been proposed such as the use of vote verification techniques and the anonymous ballot techniques, e.g., Code Voting. Verifiability may help to detect such attack, while the Code Voting assists to reduce the possibility of attack occurrence. In this paper, a new code voting technique is proposed, implemented and tested, with the aid of an open source voting. The anonymous ballot improved accordingly the paper audit trail used in this machine. The developed system, which we called CVOTING, further demonstrated the efficacy of the Code Voting technique against systematic vote change attacks and provides some features to make it easily configurable for different elections and elections in countries with right-to-left and up-to-down languages.
The article deals with glutton-discursive aphorisms, maxims, sentations, paremias (proverbs and sayings) of different peoples, which reflect their character traits and aspects of life in the family, collective, society, everyday realities, which indicates the close connection of paremias with the language en vironment. Attention is focused on the parodies used in 73% of cases and nominating personality characteristics using the socio-cultural code of arabophones. It is proved that this vocabulary as the national socio-cultural code of arabophones are used to increase the capacity of the statement, and express the emotional and aesthetic positions of a person
This study aims to estimate the accuracy of digital elevation models (DEM) which are created with exploitation of open source Google Earth data and comparing with the widely available DEM datasets, Shuttle Radar Topography Mission (SRTM), version 3, and Advanced Spaceborne Thermal Emission and Reflection Radiometer Global Digital Elevation Model (ASTER GDEM), version 2. The GPS technique is used in this study to produce digital elevation raster with a high level of accuracy, as reference raster, compared to the DEM datasets. Baghdad University, Al Jadriya campus, is selected as a study area. Besides, 151 reference points were created within the study area to evaluate the results based on the values of RMS.Furthermore, th
... Show MoreThis research is based on the descriptive and analytical methodology. The importance of studying labor laws and labor unions in Japan between 1889 and 1946 constitutions is because Japan was out of a feudal phase, and had no idea about the factory system and industrialization in their modern sense before the Meiji era. Generally, its labor system used to be mostly familial, and the economic system was based on agriculture. This called for the enactment of legislations and laws appropriate for the coming phase in Meiji era. Thus, this paper examines the role of Meiji government in enacting labor legislations and laws when he came to power in 1896, and his new constitution in 1889 and the civil code of 1896. It further examines the way Mei
... Show MoreThis work presents a comparison between the Convolutional Encoding CE, Parallel Turbo code and Low density Parity Check (LDPC) coding schemes with a MultiUser Single Output MUSO Multi-Carrier Code Division Multiple Access (MC-CDMA) system over multipath fading channels. The decoding technique used in the simulation was iterative decoding since it gives maximum efficiency at higher iterations. Modulation schemes used is Quadrature Amplitude Modulation QAM. An 8 pilot carrier were
used to compensate channel effect with Least Square Estimation method. The channel model used is Long Term Evolution (LTE) channel with Technical Specification TS 25.101v2.10 and 5 MHz bandwidth bandwidth including the channels of indoor to outdoor/ pedestrian
Homomorphic encryption became popular and powerful cryptographic primitive for various cloud computing applications. In the recent decades several developments has been made. Few schemes based on coding theory have been proposed but none of them support unlimited operations with security. We propose a modified Reed-Muller Code based symmetric key fully homomorphic encryption to improve its security by using message expansion technique. Message expansion with prepended random fixed length string provides one-to-many mapping between message and codeword, thus one-to many mapping between plaintext and ciphertext. The proposed scheme supports both (MOD 2) additive and multiplication operations unlimitedly. We make an effort to prove
... Show MoreChannel estimation (CE) is essential for wireless links but becomes progressively onerous as Fifth Generation (5G) Multi-Input Multi-Output (MIMO) systems and extensive fading expand the search space and increase latency. This study redefines CE support as the process of learning to deduce channel type and signal-tonoise ratio (SNR) directly from per-tone Orthogonal Frequency-Division Multiplexing (OFDM) observations,with blind channel state information (CSI). We trained a dual deep model that combined Convolutional Neural Networks (CNNs) with Bidirectional Recurrent Neural Networks (BRNNs). We used a lookup table (LUT) label for channel type (class indices instead of per-tap values) and ordinal supervision for SNR (0–20 dB,5-dB steps). T
... Show MoreMulti-carrier direct sequence code division multiple access (MC-DS-CDMA) has emerged recently as a promising candidate for the next generation broadband mobile networks. Multipath fading channels have a severe effect on the performance of wireless communication systems even those systems that exhibit efficient bandwidth, like orthogonal frequency division multiplexing (OFDM) and MC-DS-CDMA; there is always a need for developments in the realisation of these systems as well as efficient channel estimation and equalisation methods to enable these systems to reach their maximum performance. A novel MC-DS-CDMA transceiver based on the Radon-based OFDM, which was recently proposed as a new technique in the realisation of OFDM systems, will be us
... Show More