CINXE.COM
Search results for: electronic voting
<!DOCTYPE html> <html lang="en" dir="ltr"> <head> <!-- Google tag (gtag.js) --> <script async src="https://www.googletagmanager.com/gtag/js?id=G-P63WKM1TM1"></script> <script> window.dataLayer = window.dataLayer || []; function gtag(){dataLayer.push(arguments);} gtag('js', new Date()); gtag('config', 'G-P63WKM1TM1'); </script> <!-- Yandex.Metrika counter --> <script type="text/javascript" > (function(m,e,t,r,i,k,a){m[i]=m[i]||function(){(m[i].a=m[i].a||[]).push(arguments)}; m[i].l=1*new Date(); for (var j = 0; j < document.scripts.length; j++) {if (document.scripts[j].src === r) { return; }} k=e.createElement(t),a=e.getElementsByTagName(t)[0],k.async=1,k.src=r,a.parentNode.insertBefore(k,a)}) (window, document, "script", "https://mc.yandex.ru/metrika/tag.js", "ym"); ym(55165297, "init", { clickmap:false, trackLinks:true, accurateTrackBounce:true, webvisor:false }); </script> <noscript><div><img src="https://mc.yandex.ru/watch/55165297" style="position:absolute; left:-9999px;" alt="" /></div></noscript> <!-- /Yandex.Metrika counter --> <!-- Matomo --> <!-- End Matomo Code --> <title>Search results for: electronic voting</title> <meta name="description" content="Search results for: electronic voting"> <meta name="keywords" content="electronic voting"> <meta name="viewport" content="width=device-width, initial-scale=1, minimum-scale=1, maximum-scale=1, user-scalable=no"> <meta charset="utf-8"> <link href="https://cdn.waset.org/favicon.ico" type="image/x-icon" rel="shortcut icon"> <link href="https://cdn.waset.org/static/plugins/bootstrap-4.2.1/css/bootstrap.min.css" rel="stylesheet"> <link href="https://cdn.waset.org/static/plugins/fontawesome/css/all.min.css" rel="stylesheet"> <link href="https://cdn.waset.org/static/css/site.css?v=150220211555" rel="stylesheet"> </head> <body> <header> <div class="container"> <nav class="navbar navbar-expand-lg navbar-light"> <a class="navbar-brand" href="https://waset.org"> <img src="https://cdn.waset.org/static/images/wasetc.png" alt="Open Science Research Excellence" title="Open Science Research Excellence" /> </a> <button class="d-block d-lg-none navbar-toggler ml-auto" type="button" data-toggle="collapse" data-target="#navbarMenu" aria-controls="navbarMenu" aria-expanded="false" aria-label="Toggle navigation"> <span class="navbar-toggler-icon"></span> </button> <div class="w-100"> <div class="d-none d-lg-flex flex-row-reverse"> <form method="get" action="https://waset.org/search" class="form-inline my-2 my-lg-0"> <input class="form-control mr-sm-2" type="search" placeholder="Search Conferences" value="electronic voting" name="q" aria-label="Search"> <button class="btn btn-light my-2 my-sm-0" type="submit"><i class="fas fa-search"></i></button> </form> </div> <div class="collapse navbar-collapse mt-1" id="navbarMenu"> <ul class="navbar-nav ml-auto align-items-center" id="mainNavMenu"> <li class="nav-item"> <a class="nav-link" href="https://waset.org/conferences" title="Conferences in 2024/2025/2026">Conferences</a> </li> <li class="nav-item"> <a class="nav-link" href="https://waset.org/disciplines" title="Disciplines">Disciplines</a> </li> <li class="nav-item"> <a class="nav-link" href="https://waset.org/committees" rel="nofollow">Committees</a> </li> <li class="nav-item dropdown"> <a class="nav-link dropdown-toggle" href="#" id="navbarDropdownPublications" role="button" data-toggle="dropdown" aria-haspopup="true" aria-expanded="false"> Publications </a> <div class="dropdown-menu" aria-labelledby="navbarDropdownPublications"> <a class="dropdown-item" href="https://publications.waset.org/abstracts">Abstracts</a> <a class="dropdown-item" href="https://publications.waset.org">Periodicals</a> <a class="dropdown-item" href="https://publications.waset.org/archive">Archive</a> </div> </li> <li class="nav-item"> <a class="nav-link" href="https://waset.org/page/support" title="Support">Support</a> </li> </ul> </div> </div> </nav> </div> </header> <main> <div class="container mt-4"> <div class="row"> <div class="col-md-9 mx-auto"> <form method="get" action="https://publications.waset.org/abstracts/search"> <div id="custom-search-input"> <div class="input-group"> <i class="fas fa-search"></i> <input type="text" class="search-query" name="q" placeholder="Author, Title, Abstract, Keywords" value="electronic voting"> <input type="submit" class="btn_search" value="Search"> </div> </div> </form> </div> </div> <div class="row mt-3"> <div class="col-sm-3"> <div class="card"> <div class="card-body"><strong>Commenced</strong> in January 2007</div> </div> </div> <div class="col-sm-3"> <div class="card"> <div class="card-body"><strong>Frequency:</strong> Monthly</div> </div> </div> <div class="col-sm-3"> <div class="card"> <div class="card-body"><strong>Edition:</strong> International</div> </div> </div> <div class="col-sm-3"> <div class="card"> <div class="card-body"><strong>Paper Count:</strong> 1822</div> </div> </div> </div> <h1 class="mt-3 mb-3 text-center" style="font-size:1.6rem;">Search results for: electronic voting</h1> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">1822</span> Usability and Biometric Authentication of Electronic Voting System</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Nighat%20Ayub">Nighat Ayub</a>, <a href="https://publications.waset.org/abstracts/search?q=Masood%20Ahmad"> Masood Ahmad</a> </p> <p class="card-text"><strong>Abstract:</strong></p> In this paper, a new voting system is developed and its usability is evaluated. The main feature of this system is the biometric verification of the voter and then a few easy steps to cast a vote. As compared to existing systems available, e.g dual vote, the new system requires no training in advance. The security is achieved via multiple key concept (another part of this project). More than 100 student voters were participated in the election from University of Malakanad, Chakdara, PK. To achieve the reliability, the voters cast their votes in two ways, i.e. paper based and electronic based voting using our new system. The results of paper based and electronic voting system are compared and it is concluded that the voters cast their votes for the intended candidates on the electronic voting system. The voters were requested to fill a questionnaire and the results of the questionnaire are carefully analyzed. The results show that the new system proposed in this paper is more secure and usable than other systems. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=e-voting" title="e-voting">e-voting</a>, <a href="https://publications.waset.org/abstracts/search?q=security" title=" security"> security</a>, <a href="https://publications.waset.org/abstracts/search?q=usability" title=" usability"> usability</a>, <a href="https://publications.waset.org/abstracts/search?q=authentication" title=" authentication"> authentication</a> </p> <a href="https://publications.waset.org/abstracts/68301/usability-and-biometric-authentication-of-electronic-voting-system" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/68301.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">392</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">1821</span> Secure E-Voting Using Blockchain Technology</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Barkha%20Ramteke">Barkha Ramteke</a>, <a href="https://publications.waset.org/abstracts/search?q=Sonali%20Ridhorkar"> Sonali Ridhorkar</a> </p> <p class="card-text"><strong>Abstract:</strong></p> An election is an important event in all countries. Traditional voting has several drawbacks, including the expense of time and effort required for tallying and counting results, the cost of papers, arrangements, and everything else required to complete a voting process. Many countries are now considering online e-voting systems, but the traditional e-voting systems suffer a lack of trust. It is not known if a vote is counted correctly, tampered or not. A lack of transparency means that the voter has no assurance that his or her vote will be counted as they voted in elections. Electronic voting systems are increasingly using blockchain technology as an underlying storage mechanism to make the voting process more transparent and assure data immutability as blockchain technology grows in popularity. The transparent feature, on the other hand, may reveal critical information about applicants because all system users have the same entitlement to their data. Furthermore, because of blockchain's pseudo-anonymity, voters' privacy will be revealed, and third parties involved in the voting process, such as registration institutions, will be able to tamper with data. To overcome these difficulties, we apply Ethereum smart contracts into blockchain-based voting systems. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=blockchain" title="blockchain">blockchain</a>, <a href="https://publications.waset.org/abstracts/search?q=AMV%20chain" title=" AMV chain"> AMV chain</a>, <a href="https://publications.waset.org/abstracts/search?q=electronic%20voting" title=" electronic voting"> electronic voting</a>, <a href="https://publications.waset.org/abstracts/search?q=decentralized" title=" decentralized"> decentralized</a> </p> <a href="https://publications.waset.org/abstracts/145724/secure-e-voting-using-blockchain-technology" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/145724.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">136</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">1820</span> Securing Online Voting With Blockchain and Smart Contracts</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Anant%20Mehrotra">Anant Mehrotra</a>, <a href="https://publications.waset.org/abstracts/search?q=Krish%20Phagwani"> Krish Phagwani</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Democratic voting is vital for any country, but current methods like ballot papers or EVMs have drawbacks, including transparency issues, low voter turnout, and security concerns. Blockchain technology offers a potential solution by providing a secure, decentralized, and transparent platform for e-voting. With features like immutability, security, and anonymity, blockchain combined with smart contracts can enhance trust and prevent vote tampering. This paper explores an Ethereum-based e-voting application using Solidity, showcasing a web app that prevents duplicate voting through a token-based system, while also discussing the advantages and limitations of blockchain in digital voting. Voting is a crucial component of democratic decision-making, yet current methods, like paper ballots, remain outdated and inefficient. This paper reviews blockchain-based voting systems, highlighting strategies and guidelines to create a comprehensive electronic voting system that leverages cryptographic techniques, such as zero-knowledge proofs, to enhance privacy. It addresses limitations of existing e-voting solutions, including cost, identity management, and scalability, and provides key insights for organizations looking to design their own blockchain-based voting systems. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=electronic%20voting" title="electronic voting">electronic voting</a>, <a href="https://publications.waset.org/abstracts/search?q=smart%20contracts" title=" smart contracts"> smart contracts</a>, <a href="https://publications.waset.org/abstracts/search?q=blockchain%20nased%20voting" title=" blockchain nased voting"> blockchain nased voting</a>, <a href="https://publications.waset.org/abstracts/search?q=security" title=" security"> security</a> </p> <a href="https://publications.waset.org/abstracts/193842/securing-online-voting-with-blockchain-and-smart-contracts" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/193842.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">8</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">1819</span> Adoption and Use of an Electronic Voting System in Ghana</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Isaac%20Kofi%20Mensah">Isaac Kofi Mensah</a> </p> <p class="card-text"><strong>Abstract:</strong></p> The manual system of voting has been the most widely used system of electing representatives around the globe, particularly in Africa. Due to the known numerous problems and challenges associated with the manual system of voting, many countries are migrating to the electronic voting system as a suitable and credible means of electing representatives over the manual paper-based system. This research paper therefore investigated the factors influencing adoption and use of an electronic voting system in Ghana. A total of 400 Questionnaire Instruments (QI) were administered to potential respondents in Ghana, of which 387 responded representing a response rate of 96.75%. The Technology Acceptance Model was used as the theoretical framework for the study. The research model was tested using a simple linear regression analysis with SPSS. A little of over 71.1% of the respondents recommended the Electoral Commission (EC) of Ghana to adopt an electronic voting system in the conduct of public elections in Ghana. The results indicated that all the six predictors such as perceived usefulness (PU), perceived ease of use (PEOU), perceived free and fair elections (PFFF), perceived credible elections (PCE), perceived system integrity (PSI) and citizens trust in the election management body (CTEM) were all positively significant in predicting the readiness of citizens to adopt and use an electronic voting system in Ghana. However, jointly, the hypotheses tested revealed that apart from Perceived Free and Fair Elections and Perceived Credible and Transparent Elections, all the other factors such as PU, Perceived System Integrity and Security and Citizen Trust in the Election Management Body were found to be significant predictors of the Willingness of Ghanaians to use an electronic voting system. All the six factors considered in this study jointly account for about 53.1% of the reasons determining the readiness to adopt and use an electronic voting system in Ghana. The implications of this research finding on elections in Ghana are discussed. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=credible%20elections" title="credible elections">credible elections</a>, <a href="https://publications.waset.org/abstracts/search?q=Election%20Management%20Body%20%28EMB%29" title=" Election Management Body (EMB)"> Election Management Body (EMB)</a>, <a href="https://publications.waset.org/abstracts/search?q=electronic%20voting" title=" electronic voting"> electronic voting</a>, <a href="https://publications.waset.org/abstracts/search?q=Ghana" title=" Ghana"> Ghana</a>, <a href="https://publications.waset.org/abstracts/search?q=Technology%20Acceptance%20Model%20%28TAM%29" title=" Technology Acceptance Model (TAM)"> Technology Acceptance Model (TAM)</a> </p> <a href="https://publications.waset.org/abstracts/69348/adoption-and-use-of-an-electronic-voting-system-in-ghana" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/69348.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">397</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">1818</span> Challenge Response-Based Authentication for a Mobile Voting System</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Tohari%20Ahmad">Tohari Ahmad</a>, <a href="https://publications.waset.org/abstracts/search?q=Hudan%20Studiawan"> Hudan Studiawan</a>, <a href="https://publications.waset.org/abstracts/search?q=Iwang%20Aryadinata"> Iwang Aryadinata</a>, <a href="https://publications.waset.org/abstracts/search?q=Royyana%20M.%20Ijtihadie"> Royyana M. Ijtihadie</a>, <a href="https://publications.waset.org/abstracts/search?q=Waskitho%20Wibisono"> Waskitho Wibisono</a> </p> <p class="card-text"><strong>Abstract:</strong></p> A manual voting system has been implemented worldwide. It has some weaknesses which may decrease the legitimacy of the voting result. An electronic voting system is introduced to minimize this weakness. It has been able to provide a better result, in terms of the total time taken in the voting process and accuracy. Nevertheless, people may be reluctant to go to the polling location because of some reasons, such as distance and time. In order to solve this problem, mobile voting is implemented by utilizing mobile devices. There are many mobile voting architectures available. Overall, authenticity of the users is the common problem of all voting systems. There must be a mechanism which can verify the users’ authenticity such that only verified users can give their vote once; others cannot vote. In this paper, a challenge response-based authentication is proposed by utilizing properties of the users, for example, something they have and know. In terms of speed, the proposed system provides good result, in addition to other capabilities offered by the system. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=authentication" title="authentication">authentication</a>, <a href="https://publications.waset.org/abstracts/search?q=data%20protection" title=" data protection"> data protection</a>, <a href="https://publications.waset.org/abstracts/search?q=mobile%20voting" title=" mobile voting"> mobile voting</a>, <a href="https://publications.waset.org/abstracts/search?q=security" title=" security"> security</a> </p> <a href="https://publications.waset.org/abstracts/8038/challenge-response-based-authentication-for-a-mobile-voting-system" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/8038.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">419</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">1817</span> Review of Electronic Voting as a Panacea for Election Malpractices in Nigerian Political System: Challenges, Benefits, and Issues</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Muhammad%20Muhammad%20Suleiman">Muhammad Muhammad Suleiman</a> </p> <p class="card-text"><strong>Abstract:</strong></p> The Nigerian political system has witnessed rising occurrences of election malpractice in the last decade. This has been due to election rigging and other forms of electoral fraud. In order to find a sustainable solution to this malpractice, the introduction of electronic voting (e-voting) has been suggested. This paper reviews the challenges, benefits, and issues associated with e-voting as a panacea for election malpractice in Nigeria. The review of existing literature revealed that e-voting can reduce the cost of conducting elections and reduce the opportunity for electoral fraud. The review suggests that the introduction of e-voting in the Nigerian political system would require adequate cybersecurity measures, trust-building initiatives, and proper legal frameworks to ensure its successful implementation. It is recommended that there should be an effective policy that would ensure the security of the system as well as the credibility of the results. Furthermore, a comprehensive awareness campaign needs to be conducted to ensure that voters understand the process and are comfortable using the system. In conclusion, e-voting has the potential to reduce the occurrence of election malpractice in the Nigerian political system. However, the successful implementation of e-voting will require effective policy interventions and trust-building initiatives. Additionally, the costs of acquiring the necessary infrastructure and equipment and implementing proper legal frameworks need to be considered. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=electronic%20voting" title="electronic voting">electronic voting</a>, <a href="https://publications.waset.org/abstracts/search?q=general%20election" title=" general election"> general election</a>, <a href="https://publications.waset.org/abstracts/search?q=candidate" title=" candidate"> candidate</a>, <a href="https://publications.waset.org/abstracts/search?q=INEC" title=" INEC"> INEC</a>, <a href="https://publications.waset.org/abstracts/search?q=cyberattack" title=" cyberattack"> cyberattack</a> </p> <a href="https://publications.waset.org/abstracts/176249/review-of-electronic-voting-as-a-panacea-for-election-malpractices-in-nigerian-political-system-challenges-benefits-and-issues" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/176249.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">104</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">1816</span> The Use of Information and Communication Technologies in Electoral Procedures: Comments on Electronic Voting Security</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Magdalena%20Musia%C5%82-Karg">Magdalena Musiał-Karg</a> </p> <p class="card-text"><strong>Abstract:</strong></p> The expansion of telecommunication and progress of electronic media constitute important elements of our times. The recent worldwide convergence of information and communication technologies (ICT) and dynamic development of the mass media is leading to noticeable changes in the functioning of contemporary states and societies. Currently, modern technologies play more and more important roles and filter down to almost every field of contemporary human life. It results in the growth of online interactions that can be observed by the inconceivable increase in the number of people with home PCs and Internet access. The proof of it is undoubtedly the emergence and use of concepts such as e-society, e-banking, e-services, e-government, e-government, e-participation and e-democracy. The newly coined word e-democracy evidences that modern technologies have also been widely used in politics. Without any doubt in most countries all actors of political market (politicians, political parties, servants in political/public sector, media) use modern forms of communication with the society. Most of these modern technologies progress the processes of getting and sending information to the citizens, communication with the electorate, and also – which seems to be the biggest advantage – electoral procedures. Thanks to implementation of ICT the interaction between politicians and electorate are improved. The main goal of this text is to analyze <em>electronic voting</em> (<em>e-voting</em>) as one of the important forms of <em>electronic democracy</em> in terms of security aspects. The author of this paper aimed at answering the questions of security of electronic voting as an additional form of participation in elections and referenda. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=electronic%20democracy" title="electronic democracy">electronic democracy</a>, <a href="https://publications.waset.org/abstracts/search?q=electronic%20voting" title=" electronic voting"> electronic voting</a>, <a href="https://publications.waset.org/abstracts/search?q=security%20of%20e-voting" title=" security of e-voting"> security of e-voting</a>, <a href="https://publications.waset.org/abstracts/search?q=information%20and%20communication%20technology%20%28ICT%29" title=" information and communication technology (ICT)"> information and communication technology (ICT)</a> </p> <a href="https://publications.waset.org/abstracts/72767/the-use-of-information-and-communication-technologies-in-electoral-procedures-comments-on-electronic-voting-security" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/72767.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">239</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">1815</span> Citizens’ Readiness to Adopt and Use Electronic Voting System in Ghana</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Isaac%20Kofi%20Mensah">Isaac Kofi Mensah </a> </p> <p class="card-text"><strong>Abstract:</strong></p> The adoption and application of Information and Communication Technologies (ICTs) in government administration through e-government is expected to permeate all sectors of state/ public institutions as well as democratic institutions. One of such public institutions is the Electoral Commission of Ghana mandated by the 1992 Constitution to hold all public elections including presidential and parliamentary elections. As Ghana holds its 7th General Elections since 1992, on 7th November 2016, there are demands from key stakeholders for the Election Management Body, which is the Electoral Commission (EC) of Ghana to adopt and implement an electronic voting system. This case study, therefore, attempts to contribute significantly to the debate by examining influencing factors that would impact on citizen’s readiness to adopt and use an electronic voting system in Ghana. The Technology Acceptance Model (TAM) was used as a theoretical framework for this study, out of which a research model and hypotheses were developed. Importantly, the outcome of this research finding would form a basis for appropriate policy recommendation for consideration of Government and EC of Ghana. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=citizens%20readiness" title="citizens readiness">citizens readiness</a>, <a href="https://publications.waset.org/abstracts/search?q=e-government" title=" e-government"> e-government</a>, <a href="https://publications.waset.org/abstracts/search?q=electronic%20voting" title=" electronic voting"> electronic voting</a>, <a href="https://publications.waset.org/abstracts/search?q=technology%20acceptance%20model%20%28TAM%29" title=" technology acceptance model (TAM)"> technology acceptance model (TAM)</a> </p> <a href="https://publications.waset.org/abstracts/46865/citizens-readiness-to-adopt-and-use-electronic-voting-system-in-ghana" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/46865.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">265</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">1814</span> Authentication and Legal Admissibility of 'Computer Evidence from Electronic Voting Machines' in Electoral Litigation: A Qualitative Legal Analysis of Judicial Opinions of Appellate Courts in the USA</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Felix%20O.%20Omosele">Felix O. Omosele</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Several studies have established that electronic voting machines are prone to multi-faceted challenges. One of which is their capacity to lose votes after the ballots might have been cast. Therefore, the international consensus appears to favour the use of electronic voting machines that are accompanied with verifiable audit paper audit trail (VVPAT). At present, there is no known study that has evaluated the impacts (or otherwise) of this verification and auditing on the authentication, admissibility and evidential weight of electronically-obtained electoral data. This legal inquiry is important as elections are sometimes won or lost in courts and on the basis of such data. This gap will be filled by the present research work. Using the United States of America as a case study, this paper employed a qualitative legal analysis of several of its appellate courts’ judicial opinions. This analysis equally unearths the necessary statutory rules and regulations that are important to the research problem. The objective of the research is to highlight the roles played by VVPAT on electoral evidence- as seen from the eyes of the court. The preliminary outcome of this qualitative analysis shows that the admissibility and weight attached to ‘Computer Evidence from e-voting machines (CEEM)’ are often treated with general standards applied to other computer-stored evidence. These standards sometimes fail to embrace the peculiar challenges faced by CEEM, particularly with respect to their tabulation and transmission. This paper, therefore, argues that CEEM should be accorded unique consideration by courts. It proposes the development of a legal standard which recognises verification and auditing as ‘weight enhancers’ for electronically-obtained electoral data. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=admissibility%20of%20computer%20evidence" title="admissibility of computer evidence">admissibility of computer evidence</a>, <a href="https://publications.waset.org/abstracts/search?q=electronic%20voting" title=" electronic voting"> electronic voting</a>, <a href="https://publications.waset.org/abstracts/search?q=qualitative%20legal%20analysis" title=" qualitative legal analysis"> qualitative legal analysis</a>, <a href="https://publications.waset.org/abstracts/search?q=voting%20machines%20in%20the%20USA" title=" voting machines in the USA"> voting machines in the USA</a> </p> <a href="https://publications.waset.org/abstracts/81510/authentication-and-legal-admissibility-of-computer-evidence-from-electronic-voting-machines-in-electoral-litigation-a-qualitative-legal-analysis-of-judicial-opinions-of-appellate-courts-in-the-usa" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/81510.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">196</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">1813</span> An Investigation Enhancing E-Voting Application Performance</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Aditya%20Verma">Aditya Verma</a> </p> <p class="card-text"><strong>Abstract:</strong></p> E-voting using blockchain provides us with a distributed system where data is present on each node present in the network and is reliable and secure too due to its immutability property. This work compares various blockchain consensus algorithms used for e-voting applications in the past, based on performance and node scalability, and chooses the optimal one and improves on one such previous implementation by proposing solutions for the loopholes of the optimally working blockchain consensus algorithm, in our chosen application, e-voting. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=blockchain" title="blockchain">blockchain</a>, <a href="https://publications.waset.org/abstracts/search?q=parallel%20bft" title=" parallel bft"> parallel bft</a>, <a href="https://publications.waset.org/abstracts/search?q=consensus%20algorithms" title=" consensus algorithms"> consensus algorithms</a>, <a href="https://publications.waset.org/abstracts/search?q=performance" title=" performance"> performance</a> </p> <a href="https://publications.waset.org/abstracts/132393/an-investigation-enhancing-e-voting-application-performance" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/132393.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">167</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">1812</span> Structural Barriers to Voting among Young Voters: an Intersectional Approach</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Ryo%20Sato">Ryo Sato</a> </p> <p class="card-text"><strong>Abstract:</strong></p> The United States and many other countries witness alarmingly low voting rates among youths, skewing democratic representation. Many scholars and pundits have ascribed to this trend young voters' laziness, indifference, and self-centeredness and placed blame on them. However, a growing body of research is focusing on structural barriers to voting, which are defined as built-in obstacles lying in electoral laws and procedures. Drawing on national survey data from 891 young adults in 2020 and extant literature on structural barriers to voting, the project aims to develop a framework for analyzing systematic obstacles to voting experienced by young people and offer tangible policy recommendations. The preliminary findings presented at this conference include an intersectional analysis of the survey data, focusing on how different social categories — race, gender, socioeconomic status, immigration status, and others — in combination create unique voting experiences and barriers. This project offers a critical framework to combat the individualized understanding of low voting rates among youths and inform pathways to functional democracy. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=youth%20voting%20behavior" title="youth voting behavior">youth voting behavior</a>, <a href="https://publications.waset.org/abstracts/search?q=structural%20barriers" title=" structural barriers"> structural barriers</a>, <a href="https://publications.waset.org/abstracts/search?q=intersectionality" title=" intersectionality"> intersectionality</a>, <a href="https://publications.waset.org/abstracts/search?q=democratic%20participation" title=" democratic participation"> democratic participation</a>, <a href="https://publications.waset.org/abstracts/search?q=S" title=" S"> S</a> </p> <a href="https://publications.waset.org/abstracts/183013/structural-barriers-to-voting-among-young-voters-an-intersectional-approach" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/183013.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">58</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">1811</span> Blockchain Technology Security Evaluation: Voting System Based on Blockchain</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Omid%20Amini">Omid Amini</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Nowadays, technology plays the most important role in the life of human beings because people use technology to share data and to communicate with each other, but the challenge is the security of this data. For instance, as more people turn to technology in the world, more data is generated, and more hackers try to steal or infiltrate data. In addition, the data is under the control of the central authority, which can trigger the challenge of losing information and changing information; this can create widespread anxiety for different people in different communities. In this paper, we sought to investigate Blockchain technology that can guarantee information security and eliminate the challenge of central authority access to information. Now a day, people are suffering from the current voting system. This means that the lack of transparency in the voting system is a big problem for society and the government in most countries, but blockchain technology can be the best alternative to the previous voting system methods because it removes the most important challenge for voting. According to the results, this research can be a good start to getting acquainted with this new technology, especially on the security part and familiarity with how to use a voting system based on blockchain in the world. At the end of this research, it is concluded that the use of blockchain technology can solve the major security problem and lead to a secure and transparent election. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=blockchain" title="blockchain">blockchain</a>, <a href="https://publications.waset.org/abstracts/search?q=technology" title=" technology"> technology</a>, <a href="https://publications.waset.org/abstracts/search?q=security" title=" security"> security</a>, <a href="https://publications.waset.org/abstracts/search?q=information" title=" information"> information</a>, <a href="https://publications.waset.org/abstracts/search?q=voting%20system" title=" voting system"> voting system</a>, <a href="https://publications.waset.org/abstracts/search?q=transparency" title=" transparency"> transparency</a> </p> <a href="https://publications.waset.org/abstracts/162928/blockchain-technology-security-evaluation-voting-system-based-on-blockchain" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/162928.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">132</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">1810</span> To Ensure Maximum Voter Privacy in E-Voting Using Blockchain, Convolutional Neural Network, and Quantum Key Distribution</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Bhaumik%20Tyagi">Bhaumik Tyagi</a>, <a href="https://publications.waset.org/abstracts/search?q=Mandeep%20Kaur"> Mandeep Kaur</a>, <a href="https://publications.waset.org/abstracts/search?q=Kanika%20Singla"> Kanika Singla</a> </p> <p class="card-text"><strong>Abstract:</strong></p> The advancement of blockchain has facilitated scholars to remodel e-voting systems for future generations. Server-side attacks like SQL injection attacks and DOS attacks are the most common attacks nowadays, where malicious codes are injected into the system through user input fields by illicit users, which leads to data leakage in the worst scenarios. Besides, quantum attacks are also there which manipulate the transactional data. In order to deal with all the above-mentioned attacks, integration of blockchain, convolutional neural network (CNN), and Quantum Key Distribution is done in this very research. The utilization of blockchain technology in e-voting applications is not a novel concept. But privacy and security issues are still there in a public and private blockchains. To solve this, the use of a hybrid blockchain is done in this research. This research proposed cryptographic signatures and blockchain algorithms to validate the origin and integrity of the votes. The convolutional neural network (CNN), a normalized version of the multilayer perceptron, is also applied in the system to analyze visual descriptions upon registration in a direction to enhance the privacy of voters and the e-voting system. Quantum Key Distribution is being implemented in order to secure a blockchain-based e-voting system from quantum attacks using quantum algorithms. Implementation of e-voting blockchain D-app and providing a proposed solution for the privacy of voters in e-voting using Blockchain, CNN, and Quantum Key Distribution is done. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=hybrid%20blockchain" title="hybrid blockchain">hybrid blockchain</a>, <a href="https://publications.waset.org/abstracts/search?q=secure%20e-voting%20system" title=" secure e-voting system"> secure e-voting system</a>, <a href="https://publications.waset.org/abstracts/search?q=convolutional%20neural%20networks" title=" convolutional neural networks"> convolutional neural networks</a>, <a href="https://publications.waset.org/abstracts/search?q=quantum%20key%20distribution" title=" quantum key distribution"> quantum key distribution</a>, <a href="https://publications.waset.org/abstracts/search?q=one-time%20pad" title=" one-time pad"> one-time pad</a> </p> <a href="https://publications.waset.org/abstracts/160604/to-ensure-maximum-voter-privacy-in-e-voting-using-blockchain-convolutional-neural-network-and-quantum-key-distribution" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/160604.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">94</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">1809</span> Electoral Politics and Voting Behaviour in 2011 Assembly Election in West Bengal, India: A Case Study in Electoral Geography</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Md%20Motibur%20Rahman">Md Motibur Rahman</a> </p> <p class="card-text"><strong>Abstract:</strong></p> The present paper attempts to study the electoral politics and voting behavior of 2011 assembly election of West Bengal state in India. Electoral geography is considered as the study of geographical aspects of the organization, conduct, and result of elections. It deals with the spatial voting patterns/behaviour or the study of the spatial distribution of political phenomena of voting. Voting behavior is a form of political psychology which played a great role in political decision-making process. The voting behavior of the electorates is largely influenced by their perception that existing during the time of election. The main focus of the study will be to analyze the electoral politics of the party organizations and political profile of the electorates. The principle objectives of the present work are i) to study the spatial patterns of voting behavior in 2011 assembly election in West Bengal, ii) to analysis the result and finding of 2011 assembly election. The whole study based on the secondary source of data. The electoral data have taken from Election Commission of India, New Delhi and Centre for the study of Developing Societies (CSDS) in New Delhi. In the battle of 2011 Assembly election in West Bengal, the two major parties were Left Front and Trinamool Congress. This election witnessed the remarkable successes of Trinamool Congress and decline of 34 years longest ruler party that is Left Front. Trinamool Congress won a majority of seats that 227 out of 294 but Left Front won only 62 seats out of 294 seats. The significance of the present study is that it helps in understanding the voting pattern, voting behaviour, trends of voting and also helps for further study of electoral geography in West Bengal. The study would be highly significant and helpful to the planners, politicians, and administrators who are involved in the formulation of development plans and programmes for the people of the state. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=assembly%20election" title="assembly election">assembly election</a>, <a href="https://publications.waset.org/abstracts/search?q=electoral%20geography" title=" electoral geography"> electoral geography</a>, <a href="https://publications.waset.org/abstracts/search?q=electoral%20politics" title=" electoral politics"> electoral politics</a>, <a href="https://publications.waset.org/abstracts/search?q=voting%20behaviour" title=" voting behaviour"> voting behaviour</a> </p> <a href="https://publications.waset.org/abstracts/52811/electoral-politics-and-voting-behaviour-in-2011-assembly-election-in-west-bengal-india-a-case-study-in-electoral-geography" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/52811.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">231</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">1808</span> Electronic Mentoring: How Can It Be Used with Teachers?</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Roberta%20Gentry">Roberta Gentry</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Electronic mentoring is defined as a relationship between a mentor and a mentee using computer mediated communication (CMC) that is intended to develop and improve mentee’s skills, confidence, and cultural understanding. This session will increase knowledge about electronic mentoring, its uses, and outcomes. The research behind electronic mentoring and descriptions of existing programs will also be shared. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=electronic%20mentoring" title="electronic mentoring">electronic mentoring</a>, <a href="https://publications.waset.org/abstracts/search?q=mentoring" title=" mentoring"> mentoring</a>, <a href="https://publications.waset.org/abstracts/search?q=beginning%20special%20educators" title=" beginning special educators"> beginning special educators</a>, <a href="https://publications.waset.org/abstracts/search?q=education" title=" education"> education</a> </p> <a href="https://publications.waset.org/abstracts/2667/electronic-mentoring-how-can-it-be-used-with-teachers" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/2667.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">253</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">1807</span> Voting Representation in Social Networks Using Rough Set Techniques </h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Yasser%20F.%20Hassan">Yasser F. Hassan</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Social networking involves use of an online platform or website that enables people to communicate, usually for a social purpose, through a variety of services, most of which are web-based and offer opportunities for people to interact over the internet, e.g. via e-mail and ‘instant messaging’, by analyzing the voting behavior and ratings of judges in a popular comments in social networks. While most of the party literature omits the electorate, this paper presents a model where elites and parties are emergent consequences of the behavior and preferences of voters. The research in artificial intelligence and psychology has provided powerful illustrations of the way in which the emergence of intelligent behavior depends on the development of representational structure. As opposed to the classical voting system (one person – one decision – one vote) a new voting system is designed where agents with opposed preferences are endowed with a given number of votes to freely distribute them among some issues. The paper uses ideas from machine learning, artificial intelligence and soft computing to provide a model of the development of voting system response in a simulated agent. The modeled development process involves (simulated) processes of evolution, learning and representation development. The main value of the model is that it provides an illustration of how simple learning processes may lead to the formation of structure. We employ agent-based computer simulation to demonstrate the formation and interaction of coalitions that arise from individual voter preferences. We are interested in coordinating the local behavior of individual agents to provide an appropriate system-level behavior. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=voting%20system" title="voting system">voting system</a>, <a href="https://publications.waset.org/abstracts/search?q=rough%20sets" title=" rough sets"> rough sets</a>, <a href="https://publications.waset.org/abstracts/search?q=multi-agent" title=" multi-agent"> multi-agent</a>, <a href="https://publications.waset.org/abstracts/search?q=social%20networks" title=" social networks"> social networks</a>, <a href="https://publications.waset.org/abstracts/search?q=emergence" title=" emergence"> emergence</a>, <a href="https://publications.waset.org/abstracts/search?q=power%20indices" title=" power indices"> power indices</a> </p> <a href="https://publications.waset.org/abstracts/15260/voting-representation-in-social-networks-using-rough-set-techniques" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/15260.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">393</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">1806</span> Political Agency of Women Voters in India: Dependent or Independent Voters</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Priyanka%20Sharma">Priyanka Sharma</a> </p> <p class="card-text"><strong>Abstract:</strong></p> The women voter turnout in India is increasing. The rising female voter turnout is explained in part by men intimidating women in the household to vote. Women are more likely than men to be guided before voting. What is perhaps more significant is that the gender gap has shrunk significantly over the years. However, there are layers and categories of women voters in India. Some women are much more likely than the average woman to follow advice. Against this backdrop, this paper investigates the variation among women voters during the national elections of 2019 in India. The central question of this research paper is whether or not the development of greater political opinion among women would offset guided voting and allow them to emerge as more independent voters. So the independent variable of the study is Indian women’s opinion on politics, and the dependent variable is their voting behavior. The methodology used in this paper is both quantitative and qualitative. This study investigated and examined Lokniti’s election survey data. The sample size used in this survey is 11568. The analysis of this study has revealed that there is a considerable impact of women having a political opinion on their voting behavior. The Bivariate analysis of the variables states that 83% of Indian women who have opinions on political issues do not seek advice while going to vote. This proves the hypothesis of this paper that women with an opinion on politics are more likely to be independent voters. To check the statistical significance of the finding, a chi-square test was done and the p-value found is 0.009737, which shows it is statistically significant. Furthermore, a regression test has been done by controlling certain variables like age, educational qualification, caste, and financial position of the women to probe the influence on the dependent variable. The findings provide worthwhile insights into the relationship between these control variables and the women voting behavior in India. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=dependent%20voter" title="dependent voter">dependent voter</a>, <a href="https://publications.waset.org/abstracts/search?q=independent%20voter" title=" independent voter"> independent voter</a>, <a href="https://publications.waset.org/abstracts/search?q=political%20opinion" title=" political opinion"> political opinion</a>, <a href="https://publications.waset.org/abstracts/search?q=voting%20behavior" title=" voting behavior"> voting behavior</a>, <a href="https://publications.waset.org/abstracts/search?q=women%20voter" title=" women voter"> women voter</a> </p> <a href="https://publications.waset.org/abstracts/153742/political-agency-of-women-voters-in-india-dependent-or-independent-voters" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/153742.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">82</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">1805</span> Machine Learning Predictive Models for Hydroponic Systems: A Case Study Nutrient Film Technique and Deep Flow Technique</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Kritiyaporn%20Kunsook">Kritiyaporn Kunsook</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Machine learning algorithms (MLAs) such us artificial neural networks (ANNs), decision tree, support vector machines (SVMs), Naïve Bayes, and ensemble classifier by voting are powerful data driven methods that are relatively less widely used in the mapping of technique of system, and thus have not been comparatively evaluated together thoroughly in this field. The performances of a series of MLAs, ANNs, decision tree, SVMs, Naïve Bayes, and ensemble classifier by voting in technique of hydroponic systems prospectively modeling are compared based on the accuracy of each model. Classification of hydroponic systems only covers the test samples from vegetables grown with Nutrient film technique (NFT) and Deep flow technique (DFT). The feature, which are the characteristics of vegetables compose harvesting height width, temperature, require light and color. The results indicate that the classification performance of the ANNs is 98%, decision tree is 98%, SVMs is 97.33%, Naïve Bayes is 96.67%, and ensemble classifier by voting is 98.96% algorithm respectively. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=artificial%20neural%20networks" title="artificial neural networks">artificial neural networks</a>, <a href="https://publications.waset.org/abstracts/search?q=decision%20tree" title=" decision tree"> decision tree</a>, <a href="https://publications.waset.org/abstracts/search?q=support%20vector%20machines" title=" support vector machines"> support vector machines</a>, <a href="https://publications.waset.org/abstracts/search?q=na%C3%AFve%20Bayes" title=" naïve Bayes"> naïve Bayes</a>, <a href="https://publications.waset.org/abstracts/search?q=ensemble%20classifier%20by%20voting" title=" ensemble classifier by voting"> ensemble classifier by voting</a> </p> <a href="https://publications.waset.org/abstracts/91070/machine-learning-predictive-models-for-hydroponic-systems-a-case-study-nutrient-film-technique-and-deep-flow-technique" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/91070.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">372</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">1804</span> Polymer in Electronic Waste: An Analysis</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Anis%20A.%20Ansari">Anis A. Ansari</a>, <a href="https://publications.waset.org/abstracts/search?q=Aftab%20A.%20Ansari"> Aftab A. Ansari</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Electronic waste is inundating the traditional solid-waste-disposal facilities, which are inadequately designed to handle and manage such type of new wastes. Since electronic waste contains mostly hazardous and even toxic materials, the seriousness of its effects on human health and the environment cannot be ignored in present scenario. Waste from the electronic industry is increasing exponentially day by day. From the last 20 years, we are continuously generating huge quantities of e-waste such as obsolete computers and other discarded electronic components, mainly due to evolution of newer technologies as a result of constant efforts in research and development in this sector. Polymers, one of the major constituents in almost every electronic waste, such as computers, printers, electronic equipment, entertainment devices, mobile phones, television sets etc., are if properly recycled can create a new business opportunity. This would not only create potential market for polymers to improve economy but also the priceless land used as dumping sites of electronic waste, can be utilized for other productive purposes. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=polymer%20recycling" title="polymer recycling">polymer recycling</a>, <a href="https://publications.waset.org/abstracts/search?q=electronic%20waste" title=" electronic waste"> electronic waste</a>, <a href="https://publications.waset.org/abstracts/search?q=hazardous%20materials" title=" hazardous materials"> hazardous materials</a>, <a href="https://publications.waset.org/abstracts/search?q=electronic%20components" title=" electronic components"> electronic components</a> </p> <a href="https://publications.waset.org/abstracts/19469/polymer-in-electronic-waste-an-analysis" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/19469.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">474</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">1803</span> Evaluation and Analysis of the Secure E-Voting Authentication Preparation Scheme</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Nidal%20F.%20Shilbayeh">Nidal F. Shilbayeh</a>, <a href="https://publications.waset.org/abstracts/search?q=Reem%20A.%20Al-Saidi"> Reem A. Al-Saidi</a>, <a href="https://publications.waset.org/abstracts/search?q=Ahmed%20H.%20Alsswey"> Ahmed H. Alsswey</a> </p> <p class="card-text"><strong>Abstract:</strong></p> In this paper, we presented an evaluation and analysis of E-Voting Authentication Preparation Scheme (EV-APS). EV-APS applies some modified security aspects that enhance the security measures and adds a strong wall of protection, confidentiality, non-repudiation and authentication requirements. Some of these modified security aspects are Kerberos authentication protocol, PVID scheme, responder certificate validation, and the converted Ferguson e-cash protocol. Authentication and privacy requirements have been evaluated and proved. Authentication guaranteed only eligible and authorized voters were permitted to vote. Also, the privacy guaranteed that all votes will be kept secret. Evaluation and analysis of some of these security requirements have been given. These modified aspects will help in filtering the counter buffer from unauthorized votes by ensuring that only authorized voters are permitted to vote. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=e-voting%20preparation%20stage" title="e-voting preparation stage">e-voting preparation stage</a>, <a href="https://publications.waset.org/abstracts/search?q=blind%20signature%20protocol" title=" blind signature protocol"> blind signature protocol</a>, <a href="https://publications.waset.org/abstracts/search?q=Nonce%20based%20authentication%20scheme" title=" Nonce based authentication scheme"> Nonce based authentication scheme</a>, <a href="https://publications.waset.org/abstracts/search?q=Kerberos%20Authentication%20Protocol" title=" Kerberos Authentication Protocol"> Kerberos Authentication Protocol</a>, <a href="https://publications.waset.org/abstracts/search?q=pseudo%20voter%20identity%20scheme%20PVID" title=" pseudo voter identity scheme PVID"> pseudo voter identity scheme PVID</a> </p> <a href="https://publications.waset.org/abstracts/48108/evaluation-and-analysis-of-the-secure-e-voting-authentication-preparation-scheme" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/48108.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">298</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">1802</span> Unified Theory of Acceptance and Use of Technology in Evaluating Voters' Intention Towards the Adoption of Electronic Forensic Election Audit System</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Sijuade%20A.%20A.">Sijuade A. A.</a>, <a href="https://publications.waset.org/abstracts/search?q=Oguntoye%20J.%20P."> Oguntoye J. P.</a>, <a href="https://publications.waset.org/abstracts/search?q=Awodoye%20O.%20O."> Awodoye O. O.</a>, <a href="https://publications.waset.org/abstracts/search?q=Adedapo%20O.%20A."> Adedapo O. A.</a>, <a href="https://publications.waset.org/abstracts/search?q=Wahab%20W.%20B."> Wahab W. B.</a>, <a href="https://publications.waset.org/abstracts/search?q=Okediran%20O.%20O."> Okediran O. O.</a>, <a href="https://publications.waset.org/abstracts/search?q=Omidiora%20E.%20O."> Omidiora E. O.</a>, <a href="https://publications.waset.org/abstracts/search?q=Olabiyisi%20S.%20O."> Olabiyisi S. O.</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Electronic voting systems have been introduced to improve the efficiency, accuracy, and transparency of the election process in many countries around the world, including Nigeria. However, concerns have been raised about the security and integrity of these systems. One way to address these concerns is through the implementation of electronic forensic election audit systems. This study aims to evaluate voters' intention to the adoption of electronic forensic election audit systems using the Unified Theory of Acceptance and Use of Technology (UTAUT) model. In the study, the UTAUT model which is a widely used model in the field of information systems to explain the factors that influence individuals' intention to use a technology by integrating performance expectancy, effort expectancy, social influence, facilitating conditions, cost factor and privacy factor to voters’ behavioural intention was proposed. A total of 294 sample data were collected from a selected population of electorates who had at one time or the other participated in at least an electioneering process in Nigeria. The data was then analyzed statistically using Partial Least Square Structural Equation Modeling (PLS-SEM). The results obtained show that all variables have a significant effect on the electorates’ behavioral intention to adopt the development and implementation of an electronic forensic election audit system in Nigeria. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=election%20Audi" title="election Audi">election Audi</a>, <a href="https://publications.waset.org/abstracts/search?q=voters" title=" voters"> voters</a>, <a href="https://publications.waset.org/abstracts/search?q=UTAUT" title=" UTAUT"> UTAUT</a>, <a href="https://publications.waset.org/abstracts/search?q=performance%20expectancy" title=" performance expectancy"> performance expectancy</a>, <a href="https://publications.waset.org/abstracts/search?q=effort%20expectancy" title=" effort expectancy"> effort expectancy</a>, <a href="https://publications.waset.org/abstracts/search?q=social%20influence" title=" social influence"> social influence</a>, <a href="https://publications.waset.org/abstracts/search?q=facilitating%20condition%20social%20influence" title=" facilitating condition social influence"> facilitating condition social influence</a>, <a href="https://publications.waset.org/abstracts/search?q=facilitating%20conditions" title=" facilitating conditions"> facilitating conditions</a>, <a href="https://publications.waset.org/abstracts/search?q=cost%20factor" title=" cost factor"> cost factor</a>, <a href="https://publications.waset.org/abstracts/search?q=privacy%20factor" title=" privacy factor"> privacy factor</a>, <a href="https://publications.waset.org/abstracts/search?q=behavioural%20intention" title=" behavioural intention"> behavioural intention</a> </p> <a href="https://publications.waset.org/abstracts/173994/unified-theory-of-acceptance-and-use-of-technology-in-evaluating-voters-intention-towards-the-adoption-of-electronic-forensic-election-audit-system" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/173994.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">73</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">1801</span> Competitive Effects of Differential Voting Rights and Promoter Control in Indian Start-Ups</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Prateek%20Bhattacharya">Prateek Bhattacharya</a> </p> <p class="card-text"><strong>Abstract:</strong></p> The definition of 'control' in India is a rapidly evolving concept, owing to varying rights attached to varying securities. Shares with differential voting rights (DVRs) provide the holder with differential rights as to voting, as compared to ordinary equity shareholders of the company. Such DVRs can amount to both superior voting rights and inferior voting rights, where DVRs with superior voting rights amount to providing the holder with golden shares in the company. While DVRs are not a novel concept in India having been recognized since 2000, they were placed on a back burner by the Securities and Exchange Board of India (SEBI) in 2010 after issuance of DVRs with superior voting rights was restricted. In June 2019, the SEBI rekindled the ebbing fire of DVRs, keeping mind the fast-paced nature of the global economy, the government's faith that India’s ‘new age technology companies’ (i.e., Start-Ups) will lead the charge in achieving its goal of India becoming a $5 trillion dollar economy by 2024, and recognizing that the promoters of such Start-Ups seek to raise capital without losing control over their companies. DVRs with superior voting rights guarantee promoters with up to 74% shareholding in Start-Ups for a period of 5 years, meaning that the holder of such DVRs can exercise sole control and material influence over the company for that period. This manner of control has the potential of causing both pro-competitive and anti-competitive effects in the markets where these companies operate. On the one hand, DVRs will allow Start-Up promoters/founders to retain control of their companies and protect its business interests from foreign elements such as private/public investors – in a scenario where such investors have multiple investments in firms engaged in associated lines of business (whether on a horizontal or vertical level) and would seek to influence these firms to enter into potential anti-competitive arrangements with one another, DVRs will enable the promoters to thwart such scenarios. On the other hand, promoters/founders who themselves have multiple investments in Start-Ups, which are in associated lines of business run the risk of influencing these associated Start-Ups to engage in potentially anti-competitive arrangements in the name of profit maximisation. This paper shall be divided into three parts: Part I shall deal with the concept of ‘control’, as deliberated upon and decided by the SEBI and the Competition Commission of India (CCI) under both company/securities law and competition law; Part II shall review this definition of ‘control’ through the lens of DVRs, and Part III shall discuss the aforementioned potential pro-competitive and anti-competitive effects caused by the DVRs by examining the current Indian Start-Up scenario. The paper shall conclude by providing suggestions for the CCI to incorporate a clearer and more progressive concept of ‘control’. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=competition%20law" title="competition law">competition law</a>, <a href="https://publications.waset.org/abstracts/search?q=competitive%20effects" title=" competitive effects"> competitive effects</a>, <a href="https://publications.waset.org/abstracts/search?q=control" title=" control"> control</a>, <a href="https://publications.waset.org/abstracts/search?q=differential%20voting%20rights" title=" differential voting rights"> differential voting rights</a>, <a href="https://publications.waset.org/abstracts/search?q=DVRs" title=" DVRs"> DVRs</a>, <a href="https://publications.waset.org/abstracts/search?q=investor%20shareholding" title=" investor shareholding"> investor shareholding</a>, <a href="https://publications.waset.org/abstracts/search?q=merger%20control" title=" merger control"> merger control</a>, <a href="https://publications.waset.org/abstracts/search?q=start-ups" title=" start-ups"> start-ups</a> </p> <a href="https://publications.waset.org/abstracts/122655/competitive-effects-of-differential-voting-rights-and-promoter-control-in-indian-start-ups" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/122655.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">123</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">1800</span> Machines Hacking Humans: Performances Practices in Electronic Music during the 21st Century</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Zimasa%20Siyasanga%20Gysman">Zimasa Siyasanga Gysman</a> </p> <p class="card-text"><strong>Abstract:</strong></p> This paper assesses the history of electronic music and its performance to illustrate that machines and technology have largely influenced how humans perform electronic music. The history of electronic music mainly focuses on the composition and production of electronic music with little to no attention paid to its performance by the majority of scholars in this field. Therefore, establishing a history of performance involves investigating what compositions of electronic music called for in the production of electronic music performance. This investigation into seminal works in the history of electronic music, therefore, illustrates the aesthetics of electronic music performance and the aesthetics established in the very beginnings of electronic music performance demonstrate the aesthetics of electronic music which are still prevalent today. The key aesthetics are the repurposing of technology and the hybridisation of technology. Performers take familiar technology (technology that society has become accustomed to using in daily life), not necessarily related to music or performance and use it as an instrument in their performances, such as a rotary dial telephone. Likewise, since the beginnings of electronic music, producers have always experimented with the latest technologies available to them in their compositions and performances. The spirit of performers of electronic music, therefore, revolves around repurposing familiar technologies and using them in new ways, whilst similarly experimenting with new technologies in their performances. This process of hybridisation plays a key role in the production and performance of electronic music in the twentieth century. Through various interviews with performers of electronic music, it is shown that these aesthetics are driving performance practices in the twenty-first century. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=body" title="body">body</a>, <a href="https://publications.waset.org/abstracts/search?q=hybridisation" title=" hybridisation"> hybridisation</a>, <a href="https://publications.waset.org/abstracts/search?q=performance" title=" performance"> performance</a>, <a href="https://publications.waset.org/abstracts/search?q=sound" title=" sound"> sound</a> </p> <a href="https://publications.waset.org/abstracts/102904/machines-hacking-humans-performances-practices-in-electronic-music-during-the-21st-century" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/102904.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">161</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">1799</span> Leveraging Quality Metrics in Voting Model Based Thread Retrieval</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Atefeh%20Heydari">Atefeh Heydari</a>, <a href="https://publications.waset.org/abstracts/search?q=Mohammadali%20Tavakoli"> Mohammadali Tavakoli</a>, <a href="https://publications.waset.org/abstracts/search?q=Zuriati%20Ismail"> Zuriati Ismail</a>, <a href="https://publications.waset.org/abstracts/search?q=Naomie%20Salim"> Naomie Salim</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Seeking and sharing knowledge on online forums have made them popular in recent years. Although online forums are valuable sources of information, due to variety of sources of messages, retrieving reliable threads with high quality content is an issue. Majority of the existing information retrieval systems ignore the quality of retrieved documents, particularly, in the field of thread retrieval. In this research, we present an approach that employs various quality features in order to investigate the quality of retrieved threads. Different aspects of content quality, including completeness, comprehensiveness, and politeness, are assessed using these features, which lead to finding not only textual, but also conceptual relevant threads for a user query within a forum. To analyse the influence of the features, we used an adopted version of voting model thread search as a retrieval system. We equipped it with each feature solely and also various combinations of features in turn during multiple runs. The results show that incorporating the quality features enhances the effectiveness of the utilised retrieval system significantly. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=content%20quality" title="content quality">content quality</a>, <a href="https://publications.waset.org/abstracts/search?q=forum%20search" title=" forum search"> forum search</a>, <a href="https://publications.waset.org/abstracts/search?q=thread%20retrieval" title=" thread retrieval"> thread retrieval</a>, <a href="https://publications.waset.org/abstracts/search?q=voting%20techniques" title=" voting techniques"> voting techniques</a> </p> <a href="https://publications.waset.org/abstracts/42749/leveraging-quality-metrics-in-voting-model-based-thread-retrieval" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/42749.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">213</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">1798</span> New Practical and Non-Malleable Elgamal Encryption for E-Voting Protoco</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Karima%20Djebaili">Karima Djebaili</a>, <a href="https://publications.waset.org/abstracts/search?q=Lamine%20Melkemi"> Lamine Melkemi</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Elgamal encryption is a fundamental public-key encryption in cryptography, which is based on the difficulty of discrete logarithm problem and the Diffie-Hellman problem. Supposing the Diffie–Hellman problem is computationally infeasible then Elgamal is secure under a chosen plaintext attack, where security indicates it is difficult for the attacker, given the ciphertext, to restore the whole of the plaintext. However, although it is secure against chosen plaintext attack, Elgamal is absolutely malleable i.e. is not secure against an adaptive chosen ciphertext attack, where the attacker can recover the plaintext. We present a extension on Elgamal encryption which result in non-malleability against adaptive chosen plaintext attack using concatenation and a cryptographic hash function, our evidence utilizes the device of plaintext aware. The algorithm proposed can be used in cryptography voting protocol given its level security. Our protocol protects the confidentiality of voters because each voter encrypts their choice before casting their vote, offers public verifiability using a signing algorithm, the final result is correctly computed using homomorphic property, and works even in the presence of an adversary due to the propriety of non-malleability. Moreover, the protocol prevents some parties colluding to fix the vote results. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=Elgamal%20encryption" title="Elgamal encryption">Elgamal encryption</a>, <a href="https://publications.waset.org/abstracts/search?q=non-malleability" title=" non-malleability"> non-malleability</a>, <a href="https://publications.waset.org/abstracts/search?q=plaintext%20aware" title=" plaintext aware"> plaintext aware</a>, <a href="https://publications.waset.org/abstracts/search?q=e-voting" title=" e-voting"> e-voting</a> </p> <a href="https://publications.waset.org/abstracts/21307/new-practical-and-non-malleable-elgamal-encryption-for-e-voting-protoco" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/21307.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">451</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">1797</span> Recovery of Polymers from Electronic Waste - An Analysis</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Anis%20A.%20Ansari">Anis A. Ansari</a>, <a href="https://publications.waset.org/abstracts/search?q=Syed%20Javed%20Arif"> Syed Javed Arif</a> </p> <p class="card-text"><strong>Abstract:</strong></p> From the last two-three decades, all countries are continuously generating huge quantities of electronic waste in the form of obsolete computers, gadgets and other discarded electronic instruments mainly due to evolution of newer technologies as a result of constant efforts in research and development in this area. This is the primary reason why waste from the electronic industry is increasing exponentially day by day. Thermoset and thermoplastic polymers, which are the major constituents in every electronic waste, may create a new business opportunity if these are recovered and recycled properly. This may reduce our directly dependency on petroleum and petro-products for polymer materials and also create a potential market for recycled polymers to improve economy. The main theme of this paper is to evolve the potential of recovery and recycling of polymers from the waste being generated globally in the form of discarded electronic products. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=polymer%20recovery" title="polymer recovery">polymer recovery</a>, <a href="https://publications.waset.org/abstracts/search?q=electronic%20waste" title=" electronic waste"> electronic waste</a>, <a href="https://publications.waset.org/abstracts/search?q=petroleum" title=" petroleum"> petroleum</a>, <a href="https://publications.waset.org/abstracts/search?q=thermoplastics" title=" thermoplastics"> thermoplastics</a> </p> <a href="https://publications.waset.org/abstracts/42470/recovery-of-polymers-from-electronic-waste-an-analysis" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/42470.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">504</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">1796</span> A Framework for Organizational Architecture of Electronic City and Electronic Municipality</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Ali%20Zeynali%20Azim">Ali Zeynali Azim</a>, <a href="https://publications.waset.org/abstracts/search?q=Mostfa%20Basiry"> Mostfa Basiry</a>, <a href="https://publications.waset.org/abstracts/search?q=Samira%20Kafshi"> Samira Kafshi</a>, <a href="https://publications.waset.org/abstracts/search?q=Elnaz%20Behnoud"> Elnaz Behnoud</a> </p> <p class="card-text"><strong>Abstract:</strong></p> This study provides a framework for enterprise architecture in electronic city is electronic municipality. Nowadays, information technology as an emerging phenomenon has a special place in the world. Development of information and communication technology causes many changes in various fields, including emerging e-cities, municipalities and citizens. However, e-city and e-municipality need essential enterprise architecture. In order to develop enterprise architecture of e-city and e-municipality, enterprise architecture maturity method should be applied. Therefore, one of the most important needs of organizations is to choose important activities according to limitations. The studies show that there is a close relationship between IT, enterprise architecture, e-city and e-municipality. This study aimed to clarify the concept of IT, enterprise architecture, electronic city and e-municipality and how they are related to each other. Is the existence of each of IT, enterprise architecture, electronic and electronic municipal requires each other? <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=enterprise%20architecture" title="enterprise architecture">enterprise architecture</a>, <a href="https://publications.waset.org/abstracts/search?q=e-city" title=" e-city"> e-city</a>, <a href="https://publications.waset.org/abstracts/search?q=e-municipality" title=" e-municipality"> e-municipality</a>, <a href="https://publications.waset.org/abstracts/search?q=e-government" title=" e-government"> e-government</a>, <a href="https://publications.waset.org/abstracts/search?q=e-citizen" title=" e-citizen"> e-citizen</a>, <a href="https://publications.waset.org/abstracts/search?q=service-oriented%20architecture" title=" service-oriented architecture"> service-oriented architecture</a> </p> <a href="https://publications.waset.org/abstracts/13947/a-framework-for-organizational-architecture-of-electronic-city-and-electronic-municipality" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/13947.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">534</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">1795</span> Electronic Transparency in Georgia as a Basis for Development of Electronic Governance</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Lasha%20Mskhaladze">Lasha Mskhaladze</a>, <a href="https://publications.waset.org/abstracts/search?q=Guram%20Burchuladze"> Guram Burchuladze</a>, <a href="https://publications.waset.org/abstracts/search?q=Khvicha%20Datunashvili"> Khvicha Datunashvili</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Technological changes have an impact not only on economic but also on social elements of society which in turn has created new challenges for states’ political systems and their regimes. As a result of unprecedented growth of information technologies and communications digital democracy and electronic governance have emerged. Nowadays effective state functioning cannot be imagined without electronic governance. In Georgia, special attention is paid to the development of such new systems and establishment of electronic governance. Therefore, in parallel to intensive development of information technologies an important priority for public sector in Georgia is the development of electronic governance. In spite of the fact that today Georgia with its economic indicators satisfies the standards of western informational society, and major part of its gross domestic product comes from the service sector (59.6%), it still remains a backward country on the world map in terms of information technologies and electronic governance. E-transparency in Georgia should be based on such parameters as government accountability when the government provides citizens information about their activities; e-participation which involves government’s consideration of external expert assessments; cooperation between officials and citizens in order to solve national problems. In order to improve electronic systems the government should actively do the following: Fully develop electronic programs concerning HR and exchange of data between public organizations; develop all possible electronic services; improve existing electronic programs; make electronic services available on different mobile platforms (iPhone, Android, etc.). <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=electronic%20transparency" title="electronic transparency">electronic transparency</a>, <a href="https://publications.waset.org/abstracts/search?q=electronic%20services" title=" electronic services"> electronic services</a>, <a href="https://publications.waset.org/abstracts/search?q=information%20technology" title=" information technology"> information technology</a>, <a href="https://publications.waset.org/abstracts/search?q=information%20society" title=" information society"> information society</a>, <a href="https://publications.waset.org/abstracts/search?q=electronic%20systems" title=" electronic systems"> electronic systems</a> </p> <a href="https://publications.waset.org/abstracts/50282/electronic-transparency-in-georgia-as-a-basis-for-development-of-electronic-governance" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/50282.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">278</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">1794</span> Provision Electronic Management Requirements in Libyan Oil Companies</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Hitham%20Yami">Hitham Yami</a> </p> <p class="card-text"><strong>Abstract:</strong></p> This study will focus primarily on assessing the availability requirements of the electronic management of oil companies in Libya, and the mean objectives of the research applying electronic management and make recommendations and steps to approach electronic management. There are limited research and statistical analysis to support electronic management in Libyan companies. The groundwork for the proposed approach is to develop independent variables and the dependent variables to be restructured after it Alntra side of the field and the side to get the data to achieve the desired results and solving the problem faced by the Libyan Oil Corporation. All these strategies are proposed to achieve the goal, and solving Libyan oil installations. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=oil%20company%E2%80%99s%20revenue" title="oil company’s revenue">oil company’s revenue</a>, <a href="https://publications.waset.org/abstracts/search?q=independent%20variables" title=" independent variables"> independent variables</a>, <a href="https://publications.waset.org/abstracts/search?q=electronic%20management" title=" electronic management"> electronic management</a>, <a href="https://publications.waset.org/abstracts/search?q=Libyan%20oil%20corporation" title=" Libyan oil corporation"> Libyan oil corporation</a> </p> <a href="https://publications.waset.org/abstracts/59775/provision-electronic-management-requirements-in-libyan-oil-companies" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/59775.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">264</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">1793</span> Motives for Using Electronic Journalism More than Daily Newspapers in Palestine</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Motaz%20Alshawwa">Motaz Alshawwa</a> </p> <p class="card-text"><strong>Abstract:</strong></p> This current study aims to know journalists' motives for dealing with electronic journalism more than paper journalism in Palestine. The participants of the study were (250) journalists. To achieve the study objective, a questionnaire was used that was composed of (18) questions. The results of the study showed that the motives dealing with electronic journalism were utilitarian motives that were represented by knowing the local news. We find a statistically significant relationship at the level of significance of 0.05 between the uses of electronic journalism and gender, and there are statistically significant differences at the level of 0.05 in the motives of dealing with electronic journalism. The study recommends the daily paper journals in Palestine should meet the various and different needs of the public. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=electronic%20journalism" title="electronic journalism">electronic journalism</a>, <a href="https://publications.waset.org/abstracts/search?q=journalist" title=" journalist"> journalist</a>, <a href="https://publications.waset.org/abstracts/search?q=paper%20journalism" title=" paper journalism"> paper journalism</a>, <a href="https://publications.waset.org/abstracts/search?q=utilitarian%20motives" title=" utilitarian motives"> utilitarian motives</a> </p> <a href="https://publications.waset.org/abstracts/161624/motives-for-using-electronic-journalism-more-than-daily-newspapers-in-palestine" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/161624.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">87</span> </span> </div> </div> <ul class="pagination"> <li class="page-item disabled"><span class="page-link">‹</span></li> <li class="page-item active"><span class="page-link">1</span></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=electronic%20voting&page=2">2</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=electronic%20voting&page=3">3</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=electronic%20voting&page=4">4</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=electronic%20voting&page=5">5</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=electronic%20voting&page=6">6</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=electronic%20voting&page=7">7</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=electronic%20voting&page=8">8</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=electronic%20voting&page=9">9</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=electronic%20voting&page=10">10</a></li> <li class="page-item disabled"><span class="page-link">...</span></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=electronic%20voting&page=60">60</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=electronic%20voting&page=61">61</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=electronic%20voting&page=2" rel="next">›</a></li> </ul> </div> </main> <footer> <div id="infolinks" class="pt-3 pb-2"> <div class="container"> <div style="background-color:#f5f5f5;" class="p-3"> <div class="row"> <div class="col-md-2"> <ul class="list-unstyled"> About <li><a href="https://waset.org/page/support">About Us</a></li> <li><a href="https://waset.org/page/support#legal-information">Legal</a></li> <li><a target="_blank" rel="nofollow" href="https://publications.waset.org/static/files/WASET-16th-foundational-anniversary.pdf">WASET celebrates its 16th foundational anniversary</a></li> </ul> </div> <div class="col-md-2"> <ul class="list-unstyled"> Account <li><a href="https://waset.org/profile">My Account</a></li> </ul> </div> <div class="col-md-2"> <ul class="list-unstyled"> Explore <li><a href="https://waset.org/disciplines">Disciplines</a></li> <li><a href="https://waset.org/conferences">Conferences</a></li> <li><a href="https://waset.org/conference-programs">Conference Program</a></li> <li><a href="https://waset.org/committees">Committees</a></li> <li><a href="https://publications.waset.org">Publications</a></li> </ul> </div> <div class="col-md-2"> <ul class="list-unstyled"> Research <li><a href="https://publications.waset.org/abstracts">Abstracts</a></li> <li><a href="https://publications.waset.org">Periodicals</a></li> <li><a href="https://publications.waset.org/archive">Archive</a></li> </ul> </div> <div class="col-md-2"> <ul class="list-unstyled"> Open Science <li><a target="_blank" rel="nofollow" href="https://publications.waset.org/static/files/Open-Science-Philosophy.pdf">Open Science Philosophy</a></li> <li><a target="_blank" rel="nofollow" href="https://publications.waset.org/static/files/Open-Science-Award.pdf">Open Science Award</a></li> <li><a target="_blank" rel="nofollow" href="https://publications.waset.org/static/files/Open-Society-Open-Science-and-Open-Innovation.pdf">Open Innovation</a></li> <li><a target="_blank" rel="nofollow" href="https://publications.waset.org/static/files/Postdoctoral-Fellowship-Award.pdf">Postdoctoral Fellowship Award</a></li> <li><a target="_blank" rel="nofollow" href="https://publications.waset.org/static/files/Scholarly-Research-Review.pdf">Scholarly Research Review</a></li> </ul> </div> <div class="col-md-2"> <ul class="list-unstyled"> Support <li><a href="https://waset.org/page/support">Support</a></li> <li><a href="https://waset.org/profile/messages/create">Contact Us</a></li> <li><a href="https://waset.org/profile/messages/create">Report Abuse</a></li> </ul> </div> </div> </div> </div> </div> <div class="container text-center"> <hr style="margin-top:0;margin-bottom:.3rem;"> <a href="https://creativecommons.org/licenses/by/4.0/" target="_blank" class="text-muted small">Creative Commons Attribution 4.0 International License</a> <div id="copy" class="mt-2">© 2024 World Academy of Science, Engineering and Technology</div> </div> </footer> <a href="javascript:" id="return-to-top"><i class="fas fa-arrow-up"></i></a> <div class="modal" id="modal-template"> <div class="modal-dialog"> <div class="modal-content"> <div class="row m-0 mt-1"> <div class="col-md-12"> <button type="button" class="close" data-dismiss="modal" aria-label="Close"><span aria-hidden="true">×</span></button> </div> </div> <div class="modal-body"></div> </div> </div> </div> <script src="https://cdn.waset.org/static/plugins/jquery-3.3.1.min.js"></script> <script src="https://cdn.waset.org/static/plugins/bootstrap-4.2.1/js/bootstrap.bundle.min.js"></script> <script src="https://cdn.waset.org/static/js/site.js?v=150220211556"></script> <script> jQuery(document).ready(function() { /*jQuery.get("https://publications.waset.org/xhr/user-menu", function (response) { jQuery('#mainNavMenu').append(response); });*/ jQuery.get({ url: "https://publications.waset.org/xhr/user-menu", cache: false }).then(function(response){ jQuery('#mainNavMenu').append(response); }); }); </script> </body> </html>