One of the concerns of adopting an e-voting systems in the pooling place of any critical elections is the possibility of compromising the voting machine by a malicious piece of code, which could change the votes cast systematically. To address this issue, different techniques have been proposed such as the use of vote verification techniques and the anonymous ballot techniques, e.g., Code Voting. Verifiability may help to detect such attack, while the Code Voting assists to reduce the possibility of attack occurrence. In this paper, a new code voting technique is proposed, implemented and tested, with the aid of an open source voting. The anonymous ballot improved accordingly the paper audit trail used in this machine. The developed system, which we called CVOTING, further demonstrated the efficacy of the Code Voting technique against systematic vote change attacks and provides some features to make it easily configurable for different elections and elections in countries with right-to-left and up-to-down languages.
In Iraq, the risk of soil pollution by petroleum products increases with the growth of oil exploration, production and shipping large quantities of oil through pipelines over thousands of kilometers. Numerous oil spills have been documented recently in many sites due to damage in the oil industry infrastructures, which have led to soil contamination causing serious environmental hazards and deterioration to the soil and its engineering properties. So, it is essential to investigate the impact of oil leakage through the soil stratum consequently, assessing the eligibility of the contaminated soil for construction projects or identifying the appropriate treatment method. The paper investigates the general behaviour and the associated variatio
... Show MoreThis research work considers one of the authentic and most modern modes of storytelling, as employed by Garcia Marquez in one of his famous stories "An Old ManWith Enormous Wings" (1972). Technically, the work is divided into four parts: the first serves as an introduction to his literary works, his use of magic realism, and addresses mainly the interests of Arab readers; the second handles the development of modern short story through the perspective of realism, until the emergence of magic realism as a new style; the third deals with the origin, nature and development of this style, and his mastery of it; the fourth part tries to analyze the story and its plot, thoughts, characters, symbols and metaphors, in the light of the artistic p
... Show MoreThe herein research was carried out in order to identified the presence of bacteria in cervix and uterine lumen in Iraqi cattle during the different estrus phase with focusing on Protus and E coli. Estrus phases were determined by the structures which found on ovary (follicular growth for pro-estrus, mature growing follicle for estrus, hemorrhagic corpus luteam for meta-estrus and active corpus luteam for di-eatrus). Forty cervical swabs (ten for each estrus phase) and forty uterine swabs (ten for each estrus phase) were taken from macroscopically healthy reproductive animals after slaughtering and cultivated on nutrient agar and blood agar, the bacterial isolation were identified with biochemical teats. The present study found that
... Show MoreCurrently, there is no established of e-waste treatment in Thi- Qar province, while their creating is increasing every year. It has been well- known that e-waste is a source of environmental degrading and their placement in landfills increases the irreversible climate change. A research model has been developed to link three components: coercive pressure, normative influence, and mimicry, then study their effect on e-waste adopt and continuance intentions. The model was validated using data collected from a field survey of 92 managers of small enterprises in Thi-Qar province. A questionnaire was developed to collect data. It contains five major variables, exemplify by fourteen items. Als
... Show MoreOne of the Kurdish scholars who have research on the doctrinal issues of the author of this brief message that we are about to achieve; to bring it out better and in order to preserve the Islamic heritage, and revive what can be revived after being close to death by staying in libraries here and there, out of reach of hands, carrying dust Years of forgetting and marginalization, and this letter is the papers in the door of the divorce entitled his author "Iqdar al-dream for those who did not sign divorce commoner," and the name is evident the name, and the intention of the author through writing, where he wrote it to answer some of the knowledgeable among the public at the time So they decreed that there was no divorce from commoners D w
... Show MoreThe internet is a basic source of information for many specialities and uses. Such information includes sensitive data whose retrieval has been one of the basic functions of the internet. In order to protect the information from falling into the hands of an intruder, a VPN has been established. Through VPN, data privacy and security can be provided. Two main technologies of VPN are to be discussed; IPSec and Open VPN. The complexity of IPSec makes the OpenVPN the best due to the latter’s portability and flexibility to use in many operating systems. In the LAN, VPN can be implemented through Open VPN to establish a double privacy layer(privacy inside privacy). The specific subnet will be used in this paper. The key and certificate will
... Show MoreBeen using a pv system program to determine the solar window for Baghdad city . the solar window for any location can be determine by deviating left and right from the geographical south as well as deviation according to the amount of tilt angle with the horizon for fixed panel so that will not change the average of solar radiation incident over the whole year and this lead to help in the process of installation of fixed solar panel without any effect on annual output .the range of solar window for Baghdad city between two angles ( -8 - +8 ) degrees left to right of the geographical south and tilt angle that allowed for the horizon range between angles (21- 30) degrees so that the amount of solar radiation that falling on the solar pan
... Show MoreThis paper presents a proposed method for (CBIR) from using Discrete Cosine Transform with Kekre Wavelet Transform (DCT/KWT), and Daubechies Wavelet Transform with Kekre Wavelet Transform (D4/KWT) to extract features for Distributed Database system where clients/server as a Star topology, client send the query image and server (which has the database) make all the work and then send the retrieval images to the client. A comparison between these two approaches: first DCT compare with DCT/KWT and second D4 compare with D4/KWT are made. The work experimented over the image database of 200 images of 4 categories and the performance of image retrieval with respect to two similarity measures namely Euclidian distance (ED) and sum of absolute diff
... Show More