Reference Hub1
A Fuzzy-Based Multi-Modal Architectural Model for Electioneering in Nigeria

A Fuzzy-Based Multi-Modal Architectural Model for Electioneering in Nigeria

Oladele Stephen Adeola
Copyright: © 2020 |Volume: 11 |Issue: 4 |Pages: 26
ISSN: 1947-9301|EISSN: 1947-931X|EISBN13: 9781799806400|DOI: 10.4018/IJTD.2020100101
Cite Article Cite Article

MLA

Adeola, Oladele Stephen. "A Fuzzy-Based Multi-Modal Architectural Model for Electioneering in Nigeria." IJTD vol.11, no.4 2020: pp.1-26. http://doi.org/10.4018/IJTD.2020100101

APA

Adeola, O. S. (2020). A Fuzzy-Based Multi-Modal Architectural Model for Electioneering in Nigeria. International Journal of Technology Diffusion (IJTD), 11(4), 1-26. http://doi.org/10.4018/IJTD.2020100101

Chicago

Adeola, Oladele Stephen. "A Fuzzy-Based Multi-Modal Architectural Model for Electioneering in Nigeria," International Journal of Technology Diffusion (IJTD) 11, no.4: 1-26. http://doi.org/10.4018/IJTD.2020100101

Export Reference

Mendeley
Favorite Full-Issue Download

Abstract

The 2015 election has been adjured to be the best in the history of elections in Nigeria, thanks to the deployment of information technology by the Independent National Electoral Commission (INEC). In reality, the election was not as flawless as many people believe. There were lots of problems associated with it, particularly in the areas of verification and authentication of eligible voters. This work examines these problems and proposed a fuzzy-based multi-modal architectural model for future elections in contrast to the unimodal model currently in use. The architecture is based on the extraction of the features of fingerprint and iris of the prospective voters as opposed to only fingerprint currently in use. Drawing from the strength of fingerprint and Iris features discussed in the work, a robust architecture supported by the fuzzy-based mathematical model was developed for future elections. Further discussed were the advantages of the proposed architecture over the current INEC method of voter verification and authentication.

Request Access

You do not own this content. Please login to recommend this title to your institution's librarian or purchase it from the IGI Global bookstore.