Moderately, advanced national election technologies have improved political systems. As electronic voting (e-voting) systems advance, security threats like impersonation, ballot tampering, and result manipulation increase. These challenges are addressed through a review covering biometric authentication, watermarking, and blockchain technologies, each of which plays a crucial role in improving the security of e-voting systems. More precisely, the biometric authentication is being examined due to its ability in identify the voters and reducing the risks of impersonation. The study also explores the blockchain technology to decentralize the elections, enhance the transparency and ensure the prevention of any unauthorized alteration or manipulation of the results. Additionally, the watermarking technology is examined for viewing the ability to store and transmit the voting result in secure manner though preserving the confidentiality ensure fair elections. this review aims to evaluate the combination of biometric authentication, watermarking, and blockchain technologies effectiveness to develop robust e-voting framework. as a result, the key finding indicates a hybrid approach that integrates those technology offers a solution to address the security challenges.
"Watermarking" is one method in which digital information is buried in a carrier signal;
the hidden information should be related to the carrier signal. There are many different types of
digital watermarking, including traditional watermarking that uses visible media (such as snaps,
images, or video), and a signal may be carrying many watermarks. Any signal that can tolerate
noise, such as audio, video, or picture data, can have a digital watermark implanted in it. A digital
watermark must be able to withstand changes that can be made to the carrier signal in order to
protect copyright information in media files. The goal of digital watermarking is to ensure the
integrity of data, whereas stegano
The aim of this research is to identify the impact of the effectiveness of digital transformation technology in improving the efficiency of the insurance service in the public insurance companies in Iraq through digital transformation technology in the insurance process "promotion of the insurance product, submission of insurance application, underwriting, settlement of losses" and to achieve this goal a questionnaire was designed A survey distributed in the surveyed community Which represents the decision makers in the researched companies under study, and one of the most important results of the research was the existence of a relationship between digital transformation and improving the efficiency of the insurance process, whether thr
... Show MoreThe subject of the information technology system ( ITS ) of the important issues And contemporary thought in management, and various types of organizations seeking to apply and try to
... Show MoreThe expansion of building blocks at the expense of agricultural land is one of the main problems causing climate change within the urban area of a city. The research came to determine these indicators, as a study was conducted on the expansion of the building blocks in three municipalities in the city of Baghdad for a period of four decades extended in the form of time cycles for the period (1981-2021) and using ArcMap GIS 10.7 technology. Then, the impact of this expansion on temperature rates was evaluated, as they are the most important climatic elements due to their significant effect on the rest of the elements. The results showed a clear, direct relationship between the increase in urban expansion rates and the corresponding r
... Show MoreBig developments in technology have led to upset the balance of ideas, given of its own post new properties for products not provided by traditional technology, especially economic units operating within the industrial sector, and therefore it is important to develop the Iraqi industrial sector and interest to do its vital role in light Of progress technological.The research aims to Find the use of advanced manufacturing technologies that lead to customized production and quality appropriate whether they are low quality and low cost or low cost and suitable quality or high quality and high cost to win customer satisfaction.While the important conclusions is that the application of advanced manufacturing technology is not limited to techn
... Show MoreThe aim of the research to apply TD-ABC technology to determine the idle capacity of the central oil companies (oil field east of Baghdad), as a modern cost management technology based on time-oriented activities (TD-ABC) is used by industrial companies in general and oil companies on In particular to build a sustainable Calvinist pillar and make future decisions by identifying idle energy to gain it a competitive advantage, the descriptive analytical approach has been adopted in calculating and analyzing the company’s data for 2018, and the most prominent conclusions of this research are managing idle energy and the task of applying cost technology on the basis of time-oriented activities and providing Convenient spatial infor
... Show MoreAbstract
The basic aim of this research is to study the interactional effect of investing information technology on the relationship between value added intellectual capital and financial performance as literature review suggested on the theoretical level, including previous studies, with the deduction of its trends strongly predicted by research hypotheses and their content associated with the investment in intellectual capital after information technology tools being employed in this direction to improve the financial performance of the studied companies at the levels of both industrial and service sectors, a non-random sample was chosen included (40) forty Iraqi Joint-Stoc
... Show MoreAuthentication is the process of determining whether someone or something is, in fact, who or what it is declared to be. As the dependence upon computers and computer networks grows, the need for user authentication has increased. User’s claimed identity can be verified by one of several methods. One of the most popular of these methods is represented by (something user know), such as password or Personal Identification Number (PIN). Biometrics is the science and technology of authentication by identifying the living individual’s physiological or behavioral attributes. Keystroke authentication is a new behavioral access control system to identify legitimate users via their typing behavior. The objective of this paper is to provide user
... Show More-convex sets and -convex functions, which are considered as an important class of generalized convex sets and convex functions, have been introduced and studied by Youness [5] and other researchers. This class has recently extended, by Youness, to strongly -convex sets and strongly -convex functions. In these generalized classes, the definitions of the classical convex sets and convex functions are relaxed and introduced with respect to a mapping . In this paper, new properties of strongly -convex sets are presented. We define strongly -convex hull, strongly -convex cone, and strongly -convex cone hull and we proof some of their properties. Some examples to illustrate the aforementioned concepts and to cl
... Show More