One of the concerns of adopting an e-voting systems in the pooling place of any critical elections is the possibility of compromising the voting machine by a malicious piece of code, which could change the votes cast systematically. To address this issue, different techniques have been proposed such as the use of vote verification techniques and the anonymous ballot techniques, e.g., Code Voting. Verifiability may help to detect such attack, while the Code Voting assists to reduce the possibility of attack occurrence. In this paper, a new code voting technique is proposed, implemented and tested, with the aid of an open source voting. The anonymous ballot improved accordingly the paper audit trail used in this machine. The developed system, which we called CVOTING, further demonstrated the efficacy of the Code Voting technique against systematic vote change attacks and provides some features to make it easily configurable for different elections and elections in countries with right-to-left and up-to-down languages.
Marketing information system (KMIS) is an essential factor of developing business’ performance and getting sustainable success. The main goal of the research is to measure effect of MIS on customer orientation and product innovation. Also, another goal is to analyze the mediation role of product innovation in relationship MIS and customer orientation. This study sought to analyze the marketing information system and measure its effect on the customer orientation and product innovation. The data of the study were collected using questionnaire. The data were analyzed using statistical tools and SPSS programming. The results of the study showed that the KMIS can positively and significantly effect product innovation. Also, t
... Show MoreSmall and Medium Enterprises (SMEs) in Iraq have experienced low performance due to the limited usage of accounting information systems (AIS) and the inability to exploit knowledge of management capabilities (KMC). These deficiencies have led to competitive pressures in the marketplace that have adversely affected their sales and production. This study investigates the role of AIS in terms of operation support, knowledge support, regulatory support, and the role of KMC, including knowledge acquisition, knowledge transfer, and knowledge utilized to enhance organizational performance in Iraqi SMEs. The target population was managers and owners in SMEs using AIS in Iraq’s cities. A non-probability purposive sampling technique was use
... Show MoreCommunication of the human brain with the surroundings became reality by using Brain- Computer Interface (BCI) based mechanism. Electroencephalography (EEG) being the non-invasive method has become popular for interaction with the brain. Traditionally, the devices were used for clinical applications to detect various brain diseases but with the advancement in technologies, companies like Emotiv, NeuoSky are coming up with low cost, easily portable EEG based consumer graded devices that can be used in various application domains like gaming, education etc as these devices are comfortable to wear also. This paper reviews the fields where the EEG has shown its impact and the way it has p
Cryptography algorithms play a critical role in information technology against various attacks witnessed in the digital era. Many studies and algorithms are done to achieve security issues for information systems. The high complexity of computational operations characterizes the traditional cryptography algorithms. On the other hand, lightweight algorithms are the way to solve most of the security issues that encounter applying traditional cryptography in constrained devices. However, a symmetric cipher is widely applied for ensuring the security of data communication in constraint devices. In this study, we proposed a hybrid algorithm based on two cryptography algorithms PRESENT and Salsa20. Also, a 2D logistic map of a chaotic system is a
... Show MoreThis study can be considered as un introduction to the idioms and the strategy about the productive partnership development connection, that helps the researcher and the organization in their work in to activate development and the natural sources,manegment,to improve the two sides active connected to the local society, and to use it as easier and smoother participation of the people who work in development field and the natural sources management research, That connection depends mostly upon the capability of researcher and the development worker to increase the ability of individual and local society to specify and analyzing their problems and to try solutions to make their life better with good income.