Moderately, advanced national election technologies have improved political systems. As electronic voting (e-voting) systems advance, security threats like impersonation, ballot tampering, and result manipulation increase. These challenges are addressed through a review covering biometric authentication, watermarking, and blockchain technologies, each of which plays a crucial role in improving the security of e-voting systems. More precisely, the biometric authentication is being examined due to its ability in identify the voters and reducing the risks of impersonation. The study also explores the blockchain technology to decentralize the elections, enhance the transparency and ensure the prevention of any unauthorized alteration or manipulation of the results. Additionally, the watermarking technology is examined for viewing the ability to store and transmit the voting result in secure manner though preserving the confidentiality ensure fair elections. this review aims to evaluate the combination of biometric authentication, watermarking, and blockchain technologies effectiveness to develop robust e-voting framework. as a result, the key finding indicates a hybrid approach that integrates those technology offers a solution to address the security challenges.
The research aims to show the relationship between the use of automated accounting systems technology and its impact on enhancing the efficiency and effectiveness of the internal control system in a sample of Bahraini universities in light of the rapid changes in the electronic business environment. Automated accounting and its impact on enhancing the efficiency and effectiveness of the internal control system, and it is concluded through the analytical study of the research sample that there is a percenta
... Show MoreA series of batch demulsification runs were carried out to evaluate the final emulsified water content of emulsion samples after the exposure to microwave. An experimental study was conducted to evaluate the effects of a set of operating variables on the demulsification performance. Several microwave irradiation demulsification runs were carried out at different irradiation powers (700, 800, and 900 watt), using water-in-oil emulsion samples containing different water contents (20-80%, 30-70%, and 50-50%) and salt contents (10000, 20000, and 30000 ppm). It was found that the best separation efficiency was obtained at 900watt, 50% water content and 160 s of irradiation time. Experimental results showed that microwave radiation method can
... Show MoreThe study aims to demonstrate the significance of metaverse technology across various disciplines, academic degrees, scientific fields, and academic titles. It also aims to assess the level of knowledge and understanding of university teachers (research sample) regarding metaverse technology. Hence, the descriptive research methodology was based on the method of statistical survey in the sample. It involved a set of organized scientific steps to deduce data from the reality of the statistical sample and its nature in order to achieve the objectives of the study. In this study, a questionnaire was used as a tool to collect data from a random sample of approximately 121 teachers and instructors from the University of Baghdad. This app
... Show MoreA geographic information system (GIS) is a very effective management and analysis tool. Geographic locations rely on data. The use of artificial neural networks (ANNs) for the interpretation of natural resource data has been shown to be beneficial. Back-propagation neural networks are one of the most widespread and prevalent designs. The combination of geographic information systems with artificial neural networks provides a method for decreasing the cost of landscape change studies by shortening the time required to evaluate data. Numerous designs and kinds of ANNs have been created; the majority of them are PC-based service domains. Using the ArcGIS Network Analyst add-on, you can locate service regions around any network
... Show MoreAn approach is depended in the recent years to distinguish any author or writer from other by analyzing his writings or essays. This is done by analyzing the syllables of writings of an author. The syllable is composed of two letters; therefore the words of the writing are fragmented to syllables and extract the most frequency syllables to become trait of that author. The research work depend on analyzed the frequency syllables in two cases, the first, when there is a space between the words, the second, when these spaces are ignored. The results is obtained from a program which scan the syllables in the text file, the performance is best in the first case since the sequence of the selected syllables is higher than the same syllables in
... Show MoreIn cyber security, the most crucial subject in information security is user authentication. Robust text-based password methods may offer a certain level of protection. Strong passwords are hard to remember, though, so people who use them frequently write them on paper or store them in file for computer .Numerous of computer systems, networks, and Internet-based environments have experimented with using graphical authentication techniques for user authentication in recent years. The two main characteristics of all graphical passwords are their security and usability. Regretfully, none of these methods could adequately address both of these factors concurrently. The ISO usability standards and associated characteristics for graphical
... Show More