Moderately, advanced national election technologies have improved political systems. As electronic voting (e-voting) systems advance, security threats like impersonation, ballot tampering, and result manipulation increase. These challenges are addressed through a review covering biometric authentication, watermarking, and blockchain technologies, each of which plays a crucial role in improving the security of e-voting systems. More precisely, the biometric authentication is being examined due to its ability in identify the voters and reducing the risks of impersonation. The study also explores the blockchain technology to decentralize the elections, enhance the transparency and ensure the prevention of any unauthorized alteration or
... Show MoreThe purpose of this research is to enhance the role of organizational communication in organizations using IT technologies. The results showed that there is a strong relationship with information technology technologies in enhancing the role of organizational communication, which in turn helps to improve the performance of organizations in general
This review covers recent progress in the synthesis of curcumin and the bioactivity of semisynthetic and synthetic analogs of curcumin. The review also shows how curcumin is a useful intermediate for the synthesis of more complex organic molecules; historical perspective; the process of preparing the metal complexes and characterization the produced complexes using various spectral and other techniques; shows the importance of curcumin and its derivatives for their potential applications in medical devices and broad-spectrum of medical application such as antibiotic ointment, alternative therapeutics, antifungal, and antibacterial activities
This research sheds light on the use of metal in the manufacture of jewelry, which is represented by ornamental tools in the period between the third and second millennium BC, in addition to the most important molds used in their manufacture. Man has been interested in metals since early ages, and was able to make tools that he uses in his daily life, especially jewelry. And the Syrian people got acquainted with the types of minerals, their characteristics, and how to deal with them. Minerals played an effective and prominent role in the economy of ancient Syria. Trade with those countries and secure their roads.
The aim of this research is to investigate the skills of the chemistry students from the Ibn Al-Haytham Education college of pure sciences in Baghdad in understanding and constructing graphical representations of data. The research sample consisted of (101) male and female students in their fourth year of study during the 2016-2017 academic year. This sample represents 71% of the total number of students in this group.The research methodology used consisted of two parts relating to 19 issues. The first part is an objective multi choice type of test to measure the student’s skill in selecting the right representation of specific subject graph amongst many provided. The second part concentrated on measuring the student’s skill in construc
... Show MoreThe current research aims to measure the impact of the skills of human resources management professionals in information technology in Iraqi private banks, as the skills of human resources management professionals constitute the modern trend of banks' interest in employees with outstanding performance, and the presence of information technology in banks is a prerequisite for dealing with the huge amount of data. And converting it into information to support the decision-maker in light of a complex environment, and the field research problem was the presence of a clear lack of interest in the skills of human resource management professionals and the weak adoption of information technology, which was reflected negatively on the compet
... Show MoreThe internet is a basic source of information for many specialities and uses. Such information includes sensitive data whose retrieval has been one of the basic functions of the internet. In order to protect the information from falling into the hands of an intruder, a VPN has been established. Through VPN, data privacy and security can be provided. Two main technologies of VPN are to be discussed; IPSec and Open VPN. The complexity of IPSec makes the OpenVPN the best due to the latter’s portability and flexibility to use in many operating systems. In the LAN, VPN can be implemented through Open VPN to establish a double privacy layer(privacy inside privacy). The specific subnet will be used in this paper. The key and certificate will
... Show More