One of the concerns of adopting an e-voting systems in the pooling place of any critical elections is the possibility of compromising the voting machine by a malicious piece of code, which could change the votes cast systematically. To address this issue, different techniques have been proposed such as the use of vote verification techniques and the anonymous ballot techniques, e.g., Code Voting. Verifiability may help to detect such attack, while the Code Voting assists to reduce the possibility of attack occurrence. In this paper, a new code voting technique is proposed, implemented and tested, with the aid of an open source voting. The anonymous ballot improved accordingly the paper audit trail used in this machine. The developed system, which we called CVOTING, further demonstrated the efficacy of the Code Voting technique against systematic vote change attacks and provides some features to make it easily configurable for different elections and elections in countries with right-to-left and up-to-down languages.
An Optimal Algorithm for HTML Page Building Process
Various Hall Effects have been successfully observed in samples of n-type indium antimonide with values for conductivity, energy gap, Hall mobility and Hall coefficient all agreeing with theory. A particular interest in developing a method for obtaining accurate values of carrier concentrations in semiconductor samples has been fulfilled with an experimental result of (1.6×1016 cm-3 ±10.7%) giving a percentage difference of (6.7%) to a quoted value of (1.5×1016cm-3) at (77K) using an (80mW C.W. CO2) laser beam at (10.6μm) to illuminate a similar sample of n-type indium antimonide, an "Optical" Hall effect has been observed. Although some doubt has been raised as to the validity of effect i.e. "thermal" rather than "Optical", values o
... Show MoreThis research deals with a jurisprudential manuscript with study and investigation by Sheikh Ibrahim Al-Kurani, one of the prominent Kurdish scholars in the eleventh century. Some claim that it is heresy in the religion, and that the Prophet, may God bless him and grant him peace, did not do it.
The Sheikh responded to that, confirming its permissibility, and that it does not fall within the innovated matters, based on its permissibility on the two Eids and other religious occasions, and also that the issue of supplication with acceptance was legislated for the sake of worship without specifying it to one without the other, and it is known that prayer is one of the greatest acts of worship. supplication that fasting is accepted;
... Show MoreThe rise of online platforms has transformed the discourse landscape, enabling users to create and share content actively, thereby shaping public perceptions and societal narratives. Understanding the dynamics of this discourse is essential for comprehending its socio-political implications. This review aims to provide a comprehensive overview of Critical Discourse Analysis (CDA) concerning online platforms, exploring how language is utilized across various digital contexts to influence identity formation and social inequalities. Methodologically, the review systematically searches electronic databases, including Google Scholar and ProQuest, using keywords related to CDA and online platforms. A total of 30 relevant studies are purpo
... Show MoreAbstract
These experiments seek to investigate the effects of the fixed variations to the basic box plot on subjects' judgments of the box lengths. The study consists of two experiments, were constructed as an extension to the experiments carried out previously by Hussin, M.M. (1989, 2006). Subjects were asked to judge what percentage the shorter represented of the longer length in pairs of box lengths and give an estimate of percentage, one being a standard plot and the other being of a different box length and also varying with respect to other elements such as, box width or whisker length. When he (1989) suggested in the future research points (1, 2), the changing length of the st
... Show MoreIn the reverse engineering approach, a massive amount of point data is gathered together during data acquisition and this leads to larger file sizes and longer information data handling time. In addition, fitting of surfaces of these data point is time-consuming and demands particular skills. In the present work a method for getting the control points of any profile has been presented. Where, many process for an image modification was explained using Solid Work program, and a parametric equation of the profile that proposed has been derived using Bezier technique with the control points that adopted. Finally, the proposed profile was machined using 3-aixs CNC milling machine and a compression in dimensions process has been occurred betwe
... Show MoreElectrocardiogram (ECG) is an important physiological signal for cardiac disease diagnosis. With the increasing use of modern electrocardiogram monitoring devices that generate vast amount of data requiring huge storage capacity. In order to decrease storage costs or make ECG signals suitable and ready for transmission through common communication channels, the ECG data
volume must be reduced. So an effective data compression method is required. This paper presents an efficient technique for the compression of ECG signals. In this technique, different transforms have been used to compress the ECG signals. At first, a 1-D ECG data was segmented and aligned to a 2-D data array, then 2-D mixed transform was implemented to compress the
As they are the smallest functional parts of the muscle, motor units (MUs) are considered as the basic building blocks of the neuromuscular system. Monitoring MU recruitment, de-recruitment, and firing rate (by either invasive or surface techniques) leads to the understanding of motor control strategies and of their pathological alterations. EMG signal decomposition is the process of identification and classification of individual motor unit action potentials (MUAPs) in the interference pattern detected with either intramuscular or surface electrodes. Signal processing techniques were used in EMG signal decomposition to understand fundamental and physiological issues. Many techniques have been developed to decompose intramuscularly detec
... Show MoreIn this paper, a discrete SIS epidemic model with immigrant and treatment effects is proposed. Stability analysis of the endemic equilibria and disease-free is presented. Numerical simulations are conformed the theoretical results, and it is illustrated how the immigrants, as well as treatment effects, change current model behavior
This paper deals with an analytical study of the flow of an incompressible generalized Burgers’ fluid (GBF) in an annular pipe. We discussed in this problem the flow induced by an impulsive pressure gradient and compare the results with flow due to a constant pressure gradient. Analytic solutions for velocity is earned by using discrete Laplace transform (DLT) of the sequential fractional derivatives (FD) and finite Hankel transform (FHT). The influences of different parameters are analyzed on a velocity distribution characteristics and a comparison between two cases is also presented, and discussed in details. Eventually, the figures are plotted to exhibit these effects.