Blockchain has garnered the most attention as the most important new technology that supports recent digital transactions via e-government. The most critical challenge for public e-government systems is reducing bureaucracy and increasing the efficiency and performance of administrative processes in these systems since blockchain technology can play a role in a decentralized environment and execute a high level of security transactions and transparency. So, the main objectives of this work are to survey different proposed models for e-government system architecture based on blockchain technology implementation and how these models are validated. This work studies and analyzes some research trends focused on blockchain and the future of e-governance for connecting citizens and smart cities, such as Using Blockchain in the Notarial Office (NO), using blockchain technology in the management of police complaints, exploring blockchain-enabled end-to-end security e-voting, using blockchain and smart contract technology for trusted and safe property registration and record management, and using a blockchain-enabled Vehicle Certification (BVC) framework. Finally, this work has proven that the issue of transforming governments from the traditional system to electronic governments based on blockchain technology has become an inevitable matter of time.
This paper proposes a new password generation technique on the basis of mouse motion and a special case location recognized by the number of clicks to protect sensitive data for different companies. Two, three special locations click points for the users has been proposed to increase password complexity. Unlike other currently available random password generators, the path and number of clicks will be added by admin, and authorized users have to be training on it.
This method aims to increase combinations for the graphical password generation using mouse motion for a limited number of users. A mathematical model is developed to calculate the performance
Compression for color image is now necessary for transmission and storage in the data bases since the color gives a pleasing nature and natural for any object, so three composite techniques based color image compression is implemented to achieve image with high compression, no loss in original image, better performance and good image quality. These techniques are composite stationary wavelet technique (S), composite wavelet technique (W) and composite multi-wavelet technique (M). For the high energy sub-band of the 3 rd level of each composite transform in each composite technique, the compression parameters are calculated. The best composite transform among the 27 types is the three levels of multi-wavelet transform (MMM) in M technique wh
... Show MoreThis paper reviews the distribution range of wild goat Capra aegagrus (Erxleben, 1777) in Iraq with new sighting of very small herd of wild goat occur in Alqosh mountain, north of Nineveh province, where wild goat have a little informations on the distribution areas in Iraq according to the Red List of the International Union for Conservation of Nature (IUCN).
A novel analytical method is developed for the determination of azithromycin. The method utilizes continuous flow injection analysis to enhance the chemiluminescence system of luminol, H2O2, and Cr(III). The method demonstrated a linear dynamic range of 0.001–100 mmol L-1 with a high correlation coefficient (r) of 0.9978, and 0.001–150 mmol L-1 with a correlation coefficient (r) of 0.9769 for the chemiluminescence emission versus azithromycin concentration. The limit of detection (L.O.D.) of the method was found to be 18.725 ng.50 µL−1 based on the stepwise dilution method for the lowest concentration within the linear dynamic range of the calibration graph. The relative standard deviation (R.S.D. %) for n = 6 was less than 1.2%
... Show More The current research aims at transforming the concept of implication from the rhetoric into the industrial design in order to have a new term (the design implication) in which the industrial designer takes all or part of another's design to imply his design in it and acknowledge that, and if he did not do so, it would be (design theft) parallel to the literary plagiarism.
In order to show the potentials of the industrial design in the production of new formulations of the industrial products forms, as the design is the carrier of language that addresses the recipients, it is possible to use the implication as a the tool of literature in the design and as a design strategy as it is one of the concepts that takes its course in e
This study identified the genus Coelastrella Chodat, 1922 which was isolated from a sediment sample taken from the Tigris river in Baghdad Governorate, Iraq. The alga was isolated and cultured in modified Chu 10 media and the morphological features of the isolated algae were observed in light microscopy (LM); it showed some characteristic features of this genus, such as its ellipsoidal or lemon- shaped cells, a visible pyrenoid and the chloroplast parietal. To ensure correct identification of the isolated alga, a molecular analysis using 18S rRNA gene and DNA sequencing revealed a match with C. terrestris (Reisigl) Hedewald & N. Hanagata 2002. This species is a new record in Iraq
... Show MoreThree scolopacids out of 150 are found infected with Haemoproteus scolopaci Galli-
Valerio 1929 and H. tringae n. sp. A detailed description of the new taxon is presented along
with a comparison of the diagnostic measurements between the two species.