Blockchain has garnered the most attention as the most important new technology that supports recent digital transactions via e-government. The most critical challenge for public e-government systems is reducing bureaucracy and increasing the efficiency and performance of administrative processes in these systems since blockchain technology can play a role in a decentralized environment and execute a high level of security transactions and transparency. So, the main objectives of this work are to survey different proposed models for e-government system architecture based on blockchain technology implementation and how these models are validated. This work studies and analyzes some research trends focused on blockchain and the future of e-governance for connecting citizens and smart cities, such as Using Blockchain in the Notarial Office (NO), using blockchain technology in the management of police complaints, exploring blockchain-enabled end-to-end security e-voting, using blockchain and smart contract technology for trusted and safe property registration and record management, and using a blockchain-enabled Vehicle Certification (BVC) framework. Finally, this work has proven that the issue of transforming governments from the traditional system to electronic governments based on blockchain technology has become an inevitable matter of time.
Iraq within the ranks of the fledgling communities characterized by a broad base of the population pyramid, because they pose the age group (under 15 years) of a large proportion of the community, as it exceeded the proportion (40%) during the years of research extended (1986-2010) Despite the relative decline in the rates fertility during that period, but the proportion of young people remained high, especially for groups of at least five years, amounting to about 14% in 2012, a little more than the proportion of what constitutes age group (5-9 above) years, where it was (13%) and this naturally predicts continuing population increases in coming decades, due to the entry of those numbers of individuals in the reproductive stage,
... Show MoreIn information security, fingerprint verification is one of the most common recent approaches for verifying human identity through a distinctive pattern. The verification process works by comparing a pair of fingerprint templates and identifying the similarity/matching among them. Several research studies have utilized different techniques for the matching process such as fuzzy vault and image filtering approaches. Yet, these approaches are still suffering from the imprecise articulation of the biometrics’ interesting patterns. The emergence of deep learning architectures such as the Convolutional Neural Network (CNN) has been extensively used for image processing and object detection tasks and showed an outstanding performance compare
... Show MoreIncreasingly, public organizations in the federal state are required to work together, as well as to work with others to achieve their objectives. In Iraq there are two levels of organizations, including federal and local, and these organizations have been forced to work for many years in an environment in which the responsibility for service delivery is shared between policy makers and service providers, and between local governments and the federal government. It is sometimes difficult to manage the relationship between these organizations (federal and local) and do not always provide the best possible outcome of this relationship. This paper reviews how to manage the relationship between local administrations and
... Show MoreGaining the relationship between the central government and local governments is great importance especially after the expanded functions of the central government and became unable to carry out their works without all that delegate or transfer parts of its powers to lower levels.
The aims of the research is to determine the relationship of the central government with the local government in accordance with the principle of administrative decentralization with the presentation of the competent authorities, the control of local governments, according to the Provincial Council Act No. 21 of 2008 amended.
The research has a problem that has been the relationship of the central
... Show MoreEscherichia coli has been recognized worldwide as the most common causative agent for severe infections of the urinary tract. Colibactin is a genotoxin produced through a gene cluster called polyketide synthase (pks) island by members of Enterobacteriaceae. Limited information is available about the frequency of colibactin in E. coli isolates in Iraq. Hence, this study aimed to examine the frequency of some colibactin genes (CIbA and CIbQ) in clinical isolates of E. coli obtained from urinary tract infections (UTIs) in Iraq. Between October 2023 and January 2024, 120 urine samples were collected from females diagnosed with UTIs in Iraqi hospitals. 70 E. coli isolates were isolated after identification by biochemical methods and confirmed by
... Show MoreThe steganography (text in image hiding) methods still considered important issues to the researchers at the present time. The steganography methods were varied in its hiding styles from a simple to complex techniques that are resistant to potential attacks. In current research the attack on the host's secret text problem didn’t considered, but an improved text hiding within the image have highly confidential was proposed and implemented companied with a strong password method, so as to ensure no change will be made in the pixel values of the host image after text hiding. The phrase “highly confidential” denoted to the low suspicious it has been performed may be found in the covered image. The Experimental results show that the covere
... Show MoreDuring the 2016–2017 and 2017–2018 winter semesters, researchers from the College of Agricultural Engineering Sciences at the University of Baghdad conducted a field experiment at the university’s research station. This inquiry set out to examine how spraying wheat plants with vitamins B9 (Folic acid) and E (Tocopherol) affected certain yield characteristics (Al-Fourat variety). The studies were set up as three repetitions of a factorial experiment using a Randomized Full Block Design. Vitamin E was sprayed at 0, 1, and 2 ml.L-1, while vitamin B9 was sprayed at 0, 1, and 3 ml.L-1 (0, 250, and 500 mg. L-1). While the
The problem of research was the lack of research that dealt with issue of the organizational environment, job design approach that is more suitable for knowledge work, therefore, the research aims to determine the impact of quality of working life and job enrichment on knowledge capital, starting from the hypothesis that there significant impact of quality of working life and job enrichment on knowledge capital, to achieve this goal the researcher from the theoretical literature and related studies conclude to the construction of the scheme shows the hypothetical relationship between the variables, which was adopted quality of working life and job enrichment as independent variable while knowl
... Show MoreFiber optics technology has shown immense applications in the areas of medicine, telecommunication, and imaging. For these particular applications, it requires fibers with precise cleaving. In this paper, we will demonstrate a quick, simple and efficient cleaving method that can result in a high-quality fiber surface that works well for many fiber-optic applications. The smooth tip and good surface quality obtained on the cleaved surface of optical fiber is demonstrated by using a microscope imaging system and was flat surface with a 900 angle for perpendicular cleavages. The precision cleaver provides smooth and high-quality cleaves on single-fiber surfaces as opposed to the ruby scribe pen. The defects that may occur during the cleaving p
... Show More