The Use of Blockchain Technology and OCR in E-Government for Document Management: Inbound Invoice Management as an Example
Abstract
:1. Introduction
- After confirmation, protect the document’s data from any modification.
- After acceptance, protect the document data from damage or loss.
2. Related Work
- Decentralisation: Transactions in systems that operate on separate or clustered servers are centralised and require the participation of a third party. The third party is entrusted with sending requests to the system’s server(s) and waiting for a response. If a single server goes offline, the entire system will fail, creating a single point of failure [12]. Additionally, in centralised systems, all authorities are dependent on a single entity’s decisions. Consequently, decisions will take longer. Using the peer-to-peer network, blockchain was able to resolve these issues. The e-government system is a prime example of a centralised system that must be improved to provide better and quicker services [13].
- Immutability: The blockchain employs cryptographic hashes that cannot be reverse-engineered. In other terms, the blockchain’s transaction history is immutable, permanent, and unalterable [14]. Immutability is one of the primary benefits of blockchain features that could aid in the reduction in corruption in government.
- Transparency: Blockchain transactions are public, traceable, and available to anybody with access [15].
3. Proposed SECHash System Model
3.1. SECHash System Model Methodology
- 1.
- SECHash System Design Process: The SECHash model is proposed to solve the problem of the lack of individuals’ confidence in government due to corruption and fraud. In this paper, a case study in this area has been carried out. However, it will examine a specific use case related to external invoices/bills municipalities must pay. For example, suppose there is a maintenance bill from non-governmental organisations (NGOs) that the municipality must pay. The accountant or municipal employee will manually enter the bill data into the municipality’s financial system. At this stage, the billing record is drafted. After auditing, the same employee or maybe another one confirms the draft bill, a journal entry is created on the financial system, and all financial statements are reflected in the accounts. One of the problems that may arrive from the manual entry of bills is that we cannot guarantee the correctness of the bill data. Additionally, there is no way to verify the integrity of the entered information in the case of malicious actors.The two main issues the SECHash model will look at are integrity and correctness. The suggested solution is to address these issues in a manner that is automated, transparent, and easy to understand in layperson’s terms. Thus, promoting trust in municipalities and other similar governmental entities.
- 2.
- SECHash System Design Components: The proposal is based on three main components as follows:
- (a)
- OCR component: to capture the scanned bill’s content, extract its data, and transform them into digital data that the municipal financial system can read.
- (b)
- Blockchain component: to hash the scanned bills documents and store the hashes in the network—this is a write-private network with an open-read permission model.
- (c)
- Bills explorer component: to allow the user to request and view the hash for any document.
- 3.
- Technology Selection: As a result of the recent literature review shown in Section 2, blockchain with OCR can be an excellent combination to address integrity and correctness issues. Therefore, the proposed SECHash system proposal is based on blockchain and OCR technologies in its solution.
- 4.
- Proof-of-Concept Implementation: this work builds the proposed SECHash to defend the idea. And to prove that blockchain technology in the governmental sector will preserve data integrity.
3.2. SECHash System Model Workflow
4. SECHash Proof-of-Concept
4.1. Technology Selection
- Django Web framework [42]. It is an open-source web application framework written in Python. Because of its rapid development capabilities, Django is very sophisticated in today’s market; it takes less time to build any application. It uses the Model View Template (MVT) design structure. Its name comes from the framework based on the model as the database, the view as the control function, and the templates as the user pages for communication interactions. A Django model acts as a database manager and uses two main commands:
- Django picks up the changes in the models.py file after python manage.py performs the migrations and sends the data to the PostgreSQL database, then migrate python manage.py. The Django system then saves all changes to the database system.
- Python manage.py runs the server at the end. This will start the project and give the user the local host address of the project running locally. The views.py file also handles project requests into template management API calls within demands. The user can describe her/his views using Python functions [42].
- PostgreSQL database technology [43]. It supports most SQL transactions and provides concurrency control. In addition, it offers modern features such as complex queries, triggers, views, transnational integrity, and allows adding data type extensions. It also provides functions, operators, and procedural languages. As a result, it is one of the world’s most advanced open-source Database Management Systems (DBMS) [43].
- LBRY (https://spec.lbry.com/, accessed on 14 April 2023). A protocol enables a decentralised online content marketplace. Specifically, it uses blockchain to build a community controlled decentralised content platform. That lets users quickly publish, host, search, access, download, and pay for content. LBRY introduces a new naming scheme that gives users complete control over the name of their content and uses blockchain to create a digital currency (LBC), a transparent distributed ledger, and a sync for all users. A global index of content metadata that also supports access to a unique namespace and supports new paradigms in digital content delivery [44]. The LBRY credits specifications are as follows:
- –
- Max Supply: 1,083,202,000 LBC.
- –
- Coin Type: PoW.
- –
- PoW Algorithm: lbry.
- –
- PoW Period: 20 years.
- –
- Block Time: 2.5 min.
- –
- Current Block Reward: 345 LBC.
- –
- Premine: 400,000,000 LBC.
- Hash function. An algorithm takes user data as input and produces a fixed-length output (called a hash digest) for the input data. Federal Information Processing Standard (FIPS) 180–44 (Dworkin, 2015) [45] provided distinct requirements for hash functions algorithms certified by the National Institute of Standards and Technology (NIST). As a result, the Secure Hash Algorithms (SHA) family are the most commonly implemented hash function in different applications [46]. LBRY is a PoW algorithm that combines SHA-256, SHA-512, and RIPEMD hash functions. This algorithm enables fast and secure transactions on the LBRY network.
- SHA-256 has an output of 32 bytes and is displayed as a 64-character hexadecimal string. Therefore, it is considered secure and fast. The most common uses of SHA-256 are website authentication, digital signature, blockchain security, and file and fingerprint comparison in antivirus programs [47].
- SHA-512 is an algorithm based on non-linear functions that output 64 bytes. It is designed to prevent any cracking method and is unbreakable. At the same time, the user data are encrypted by hashing it to 128-bit hexadecimal characters. The SHA-512 algorithm is useful in many areas, such as internet security, digital certificates, and blockchain for secure password hashing [48].
- Asprise (https://asprise.com/royalty-free-library/python-ocr-api-overview.html, accessed on 5 March 2023). Since 1997, Asprise has provided customers worldwide with a wide range of Software Development Kits (SDKs) and APIs for programming libraries. Asprise OCR SDK is in high demand thanks to its high performance and royalty-free distribution model [49].
4.2. SECHash Implementation
- A Django project is created in the first step. Inside the model.py file, the following models are created:
- The invoice model contains the following fields: invoice number, issued data, customer name, hash ID, total amount, currency, the image of the invoice document, address, email, phone number, notes, and foreign Key that has many records and data from other models for the invoice items.
- The Invoice item model contains the following fields: product name, product description, quantity, the unit price for the product, and the amount.
- The second step is migration, in which the SECHash system uses the makemigrations command. This command prepares all the SQL queries for the table creations, and the migration command executes the prepared queries to translate Python objects into tables in the PostgreSQL database. This is the role of the Object Relational Mapper (ORM).
- Preparing the URLs as follows:
- Implementing the logic for all the functionalities, which includes adding a new document, extracting invoice data from the uploaded document, creating a new record in the invoice table, and sending the document to the blockchain network.
4.3. SECHach Evaluation and Discussion
4.3.1. Storage Analysis
4.3.2. Data Security Analysis
5. Conclusions
Author Contributions
Funding
Institutional Review Board Statement
Informed Consent Statement
Data Availability Statement
Conflicts of Interest
References
- Malodia, S.; Dhir, A.; Mishra, M.; Bhatti, Z.A. Future of e-Government: An integrated conceptual framework. Technol. Forecast. Soc. Chang. 2021, 173, 121102. [Google Scholar] [CrossRef]
- Ndou, D. E-Government for Developing Countries: Opportunities and Challenges. EJISDC Electron. J. Inf. Syst. Dev. Ctries. 2004, 18, 1–24. [Google Scholar] [CrossRef]
- Farida, I.; Setiawan, R.; Maryatmi, A.; Juwita, N. The Implementation of E-Government in the Industrial Revolution Era 4.0 in Indonesia. Int. J. Progress. Sci. Technol. 2020, 22, 340–346. [Google Scholar]
- Carter, L.; Yoon, V.; Liu, D. Analyzing e-government design science artifacts: A systematic literature review. Int. J. Inf. Manag. 2022, 62, 102430. [Google Scholar] [CrossRef]
- Vasconez, J.P.; Kantor, G.A.; Auat Cheein, F.A. Human–robot interaction in agriculture: A survey and current challenges. Biosyst. Eng. 2019, 179, 35–48. [Google Scholar] [CrossRef]
- Maulidi, A. Philosophical understanding of the dynamics and control of occupational fraud in the public sector: Contingency analysis. Int. J. Ethics Syst. 2023, 39, 432–463. [Google Scholar] [CrossRef]
- Dikmen, S.; Çiçek, H.G. Fighting Against Corruption and Bribery in Public Procurements during the COVID-19 Pandemic. The Ethics of Bribery: Theoretical and Empirical Studies; Springer: Cham, Switzerland, 2022; Volume 10. [Google Scholar]
- Tacconi, L.; Williams, D.A. Corruption and anti-corruption in environmental and resource management. Annu. Rev. Environ. Resour. 2020, 45, 305–329. [Google Scholar] [CrossRef]
- Awadallah, R.; Samsudin, A.; Teh, J.S.; Almazrooie, M. An Integrated Architecture for Maintaining Security in Cloud Computing Based on Blockchain. IEEE Access 2021, 9, 69513–69526. [Google Scholar] [CrossRef]
- Ammous, S. Blockchain Technology: What is it Good for? SSRN Electron. J. 2016, 2832751. [Google Scholar] [CrossRef] [Green Version]
- Ali Laghari, A.; Wu, K.; Ali Laghari, R.; Ali, M.; Ayub Khan, A. A Review and State of Art of Internet of Things (IoT). Arch. Comput. Methods Eng. 2021, 29, 1395–1413. [Google Scholar] [CrossRef]
- Fareed, R.; Kamal, Z.A. E-government based on the blockchain technology, and the evaluation of its transaction through the number of transactions completed per second. Period. Eng. Nat. Sci. 2022, 10, 620–631. [Google Scholar] [CrossRef]
- Hoang, V.H.; Lehtihet, E.; Ghamri-Doudane, Y. Privacy-preserving blockchain-based data sharing platform for decentralized storage systems. In Proceedings of the 2020 IFIP Networking Conference (Networking), Paris, France, 22–25 June 2020; pp. 280–288. [Google Scholar]
- Feng, W. Blockchain Bills of Lading and Their Future Regulation; NUS: Singapore, 2021. [Google Scholar]
- Balan, A.; Alboaie, S.; Kourtit, K.; Nijkamp, P. Transparency and Accountability in Urban Public Procurement: Design of a Self-Sovereign Blockchain APP. Int. Arch. Photogramm. Remote. Sens. Spat. Inf. Sci. 2020, 44, 9–16. [Google Scholar] [CrossRef]
- Abou Jaoude, J.; Saade, R.G. Blockchain applications–usage in different domains. IEEE Access 2019, 7, 45360–45381. [Google Scholar] [CrossRef]
- Hasselgren, A.; Kralevska, K.; Gligoroski, D.; Pedersen, S.A.; Faxvaag, A. Blockchain in healthcare and health sciences—A scoping review. Int. J. Med. Inform. 2020, 134, 104040. [Google Scholar] [CrossRef]
- Mirabelli, G.; Solina, V. Blockchain-based solutions for agri-food supply chains: A survey. Int. J. Simul. Process. Model. 2021, 17, 1–15. [Google Scholar] [CrossRef]
- Bisht, D.; Singh, R.; Gehlot, A.; Akram, S.V.; Singh, A.; Montero, E.C.; Priyadarshi, N.; Twala, B. Imperative Role of Integrating Digitalization in the Firms Finance: A Technological Perspective. Electronics 2022, 11, 3252. [Google Scholar] [CrossRef]
- Jiang, A.; Yuan, H.; Li, D. A two-stage optimization approach on the decisions for prosumers and consumers within a community in the Peer-to-peer energy sharing trading. Int. J. Electr. Power Energy Syst. 2021, 125, 106527. [Google Scholar] [CrossRef]
- Tushar, W.; Saha, T.K.; Yuen, C.; Azim, M.I.; Morstyn, T.; Poor, H.V.; Niyato, D.; Bean, R. A coalition formation game framework for peer-to-peer energy trading. Appl. Energy 2020, 261, 114436. [Google Scholar] [CrossRef] [Green Version]
- Borowski, P.F. Zonal and Nodal Models of energy market in European Union. Energies 2020, 13, 4182. [Google Scholar] [CrossRef]
- Lan, T.; Jermsittiparsert, K.; Alrashood, S.T.; Rezaei, M.; Al-Ghussain, L.; Mohamed, M.A. An advanced machine learning based energy management of renewable microgrids considering hybrid electric vehicles’ charging demand. Energies 2021, 14, 569. [Google Scholar] [CrossRef]
- Wang, S.; Taha, A.F.; Wang, J.; Kvaternik, K.; Hahn, A. Energy crowdsourcing and peer-to-peer energy trading in blockchain-enabled smart grids. IEEE Trans. Syst. Man Cybern. Syst. 2019, 49, 1612–1623. [Google Scholar] [CrossRef] [Green Version]
- Tushar, W.; Yuen, C.; Saha, T.K.; Morstyn, T.; Chapman, A.C.; Alam, M.J.E.; Hanif, S.; Poor, H.V. Peer-to-peer energy systems for connected communities: A review of recent advances and emerging challenges. Appl. Energy 2021, 282, 116131. [Google Scholar] [CrossRef]
- Wang, Q.; Su, M. Integrating blockchain technology into the energy sector—from theory of blockchain to research and application of energy blockchain. Comput. Sci. Rev. 2020, 37, 100275. [Google Scholar] [CrossRef]
- Nicolazzo, S.; Nocera, A.; Ursinoc, D.; Virgilic, L. A privacy-preserving approach to prevent feature disclosure in an IoT scenario. Future Gener. Comput. Syst. 2020, 105, 502–519. [Google Scholar] [CrossRef]
- Corradini, E.; Nicolazzo, S.; Nocera, A.; Domenico, U.; Luca, V. A two-tier Blockchain framework to increase protection and autonomy of smart objects in the IoT. Future Gener. Comput. Syst. 2022, 181, 338–356. [Google Scholar] [CrossRef]
- D’Hauwers, R.; Van Der Bank, J.; Montakhabi, M. Trust, transparency and security in the sharing economy: What is the Government’s role? Technol. Innov. Manag. Rev. 2020, 10, 5–17. [Google Scholar] [CrossRef]
- Fallucchi, F.; Gerardi, M.; Petito, M.; De Luca, E.W. Blockchain Framework in Digital Government for the Certification of Authenticity, Timestamping and Data Property; University of Hawaii Manoa Library: Honolulu, HI, USA, 2021. [Google Scholar]
- Lacity, M.C.; Van Hoek, R. How Walmart Canada used blockchain technology to reimagine freight invoice processing. MIS Q. Exec. 2021, 20, 5. [Google Scholar] [CrossRef]
- Rasool, S.; Saleem, A.; Iqbal, M.; Dagiuklas, T.; Mumtaz, S. Docschain: Blockchain-based IoT solution for verification of degree documents. IEEE Trans. Comput. Soc. Syst. 2020, 7, 827–837. [Google Scholar] [CrossRef]
- Perera, T.; Hettige, S.P.T.; Jayatilake, S.A.; Abeygunawardhana, W.; Bandara, H.D. Blockchain-based product traceability beyond proof of existence. In Proceedings of the 2020 Moratuwa Engineering Research Conference (MERCon), Moratuwa, Sri Lanka, 28–30 July 2020; pp. 1–6. [Google Scholar]
- Mthethwa, S.; Dlamini, N.; Barbour, G. Proposing a blockchain-based solution to verify the integrity of hardcopy documents. In Proceedings of the 2018 International Conference on Intelligent and Innovative Computing Applications (ICONIC), Plaine Magnien, Mauritius, 6–7 December 2018; pp. 1–5. [Google Scholar]
- Das, M.; Tao, X.; Liu, Y.; Cheng, J.C. A blockchain-based integrated document management framework for construction applications. Autom. Constr. 2022, 133, 104001. [Google Scholar] [CrossRef]
- Nizamuddin, N.; Hasan, H.R.; Salah, K. IPFS-Blockchain-Based Authenticity of Online Publications. In Blockchain—ICBC 2018; Chen, S., Wang, H., Zhang, L.J., Eds.; Springer: Cham, Switzerland, 2018; pp. 199–212. [Google Scholar]
- Alketbi, A.; Nasir, Q.; Abu Talib, M. Novel blockchain reference model for government services: Dubai government case study. Int. J. Syst. Assur. Eng. Manag. 2020, 11, 1170–1191. [Google Scholar] [CrossRef]
- Páez, R.V.; Pérez Cerquera, M.; Ramírez, G.; Montes, J.; Bouvarel, L. An Architecture for Biometric Electronic Identification Document System Based on Blockchain. Future Internet 2020, 12, 10. [Google Scholar] [CrossRef] [Green Version]
- Yavuz, E.; Koç, A.K.; Çabuk, U.C.; Dalkılıç, G. Towards secure e-voting using ethereum blockchain. In Proceedings of the 2018 6th International Symposium on Digital Forensic and Security (ISDFS), Antalya, Turkey, 22–25 March 2018; pp. 1–7. [Google Scholar] [CrossRef]
- Zhang, Y.; Deng, S.; Zhang, Y.; Kong, J. Research on Government Information Sharing Model Using Blockchain Technology. In Proceedings of the 2019 10th International Conference on Information Technology in Medicine and Education (ITME), Qingdao, China, 23–25 August 2019; pp. 726–729. [Google Scholar] [CrossRef]
- Huang, Y.; Lv, T.; Cui, L.; Lu, Y.; Wei, F. LayoutLMv3: Pre-Training for Document AI with Unified Text and Image Masking. arXiv 2022, arXiv:2204.08387. [Google Scholar] [CrossRef]
- Gore, H.; Singh, R.K.; Singh, A.; Singh, A.P.; Shabaz, M. Django: Web Development Simple and Fast. Ann. Rom. Soc. Cell Biol. 2021, 25, 4576–4585. [Google Scholar]
- Viloria, A.; Acuña, G.C.; Alcázar Franco, D.J.; Hernández-Palma, H.; Fuentes, J.P. Integration of Data Mining Techniques to PostgreSQL Database Manager System. Procedia Comput. Sci. 2019, 155, 575–580. [Google Scholar] [CrossRef]
- Li, J.; Grintsvayg, A.; Kauffman, J.; Fleming, C. LBRY: A Blockchain-Based Decentralized Digital Content Marketplace. In Proceedings of the 2020 IEEE International Conference on Decentralized Applications and Infrastructures (DAPPS), Oxford, UK, 17–20 July 2020; pp. 42–51. [Google Scholar] [CrossRef]
- FIPS PUB 180-4; Secure Hash Standard (SHS). National Institute of Standards and Technology. Federal Information Processing Standards Publication: Gaithersburg, MD, USA, 20 August 2015. [CrossRef]
- Awadallah, R.; Samsudin, A. Using Blockchain in Cloud Computing to Enhance Relational Database Security. IEEE Access 2021, 9, 137353–137366. [Google Scholar] [CrossRef]
- Zhang, X.; WU, R.; Wang, M.; Wang, L. A High-Performance Parallel Computation Hardware Architecture in ASIC of SHA-256 Hash. In Proceedings of the 2019 21st International Conference on Advanced Communication Technology (ICACT), Pyeong Chang, South Korea, 17–20 February 2019; pp. 52–55. [Google Scholar] [CrossRef]
- Verma, J.; Shahrukh, M.; Krishna, M. A Critical Review on Cryptography and Hashing Algorithm SHA-512. Int. Res. J. Mod. Eng. 2021, 3, 1760. [Google Scholar]
- Petrescu, R.; Manolache, S.; Boiangiu, C.A.; Avatavului, C.; Prodan, M. Combining tesseract and asprise results to improve ocr text detection accuracy. J. Inf. Syst. Manag. 2019, 13, 57. [Google Scholar]
- Awadallah, R.; Samsudin, A. Homomorphic Encryption for Cloud Computing and Its Challenges. In Proceedings of the 2020 IEEE 7th International Conference on Engineering Technologies and Applied Sciences (ICETAS), 18–20 December 2020; pp. 1–6. [Google Scholar] [CrossRef]
- Shang, G.; Ilk, N.; Fan, S. Need for speed, but how much does it cost? Unpacking the fee-speed relationship in Bitcoin transactions. J. Oper. Manag. 2023, 69, 102–126. [Google Scholar] [CrossRef]
- Awadallah, R.; Samsudin, A.; Almazrooie, M. Verifiable homomorphic encrypted computations for cloud computing. Int. J. Adv. Comput. Sci. Appl. 2021, 12, 797–808. [Google Scholar] [CrossRef]
- Breydo, L. Stocks, Memes or Miles? A New Crypto Taxonomy & Regulatory Paradigm. In A New Crypto Taxonomy & Regulatory Paradigm (April 23, 2023); SSRN: Rochester, NY, USA, 2023. [Google Scholar]
Maturity of Solution | Consensus Algorithm | |||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|
Paper | Scope | Experimental | Conceptual | Prototype | Proposal | Kafka Consensus | Proof-of-Stake | Proof-of-Luck | Tournament Consensus | Proof-of-Existence | Proof-of-Work | Proof-of-Integrity |
(Fallucchi et al., 2020 [30]) | Security and Data Integrity | ○ | ○ | ● | ○ | ○ | ● | ○ | ○ | ○ | ○ | ○ |
(Fallucchi et al., 2020 [30]) | Documents Traceability | ○ | ○ | ● | ○ | ○ | ● | ○ | ○ | ○ | ○ | ○ |
(Fallucchi et al., 2020 [30]) | Documents Verification | ● | ○ | ○ | ○ | ○ | ● | ○ | ○ | ○ | ○ | ○ |
(Lacity et al., 2020 [31]) | Invoice Processing | ● | ○ | ○ | ○ | ○ | ● | ○ | ○ | ○ | ○ | ○ |
(Rasool et al., 2019 [32]) | Education (Degree Verification) | ○ | ○ | ● | ○ | ○ | ○ | ○ | ○ | ● | ○ | ○ |
(Mthethwa et al., 2020 [34]) | Document Verification | ○ | ○ | ○ | ● | ○ | ○ | ○ | ○ | ● | ○ | ○ |
(Das et al., 2022 [35]) | Document Version Management | ○ | ○ | ● | ○ | ○ | ○ | ○ | ○ | ○ | ○ | ● |
(Nizamuddin et al., 2018 [36]) | Online Publication | ○ | ○ | ○ | ● | ○ | ● | ○ | ○ | ○ | ○ | ○ |
(Alketbi et al., 2020 [37]) | Land Property Services | ○ | ● | ○ | ○ | ● | ○ | ○ | ○ | ○ | ○ | ○ |
(Páez et al., 2020 [38]) | Authenticat-ion | ○ | ○ | ● | ○ | ○ | ○ | ● | ● | ○ | ○ | ○ |
(Yavuz et al., 2018 [39]) | e-Voting | ○ | ○ | ● | ○ | ○ | ● | ○ | ○ | ○ | ○ | ○ |
(Zhang et al., 2019 [40]) | Data Sharing | ○ | ● | ○ | ○ | ○ | ● | ○ | ○ | ○ | ○ | ○ |
SECHash | e-Government | ○ | ○ | ● | ○ | ○ | ● | ○ | ○ | ○ | ● | ○ |
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content. |
© 2023 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/).
Share and Cite
Azzam, F.; Jaber, M.; Saies, A.; Kirresh, T.; Awadallah, R.; Karakra, A.; Barghouthi, H.; Amarneh, S. The Use of Blockchain Technology and OCR in E-Government for Document Management: Inbound Invoice Management as an Example. Appl. Sci. 2023, 13, 8463. https://doi.org/10.3390/app13148463
Azzam F, Jaber M, Saies A, Kirresh T, Awadallah R, Karakra A, Barghouthi H, Amarneh S. The Use of Blockchain Technology and OCR in E-Government for Document Management: Inbound Invoice Management as an Example. Applied Sciences. 2023; 13(14):8463. https://doi.org/10.3390/app13148463
Chicago/Turabian StyleAzzam, Fatima, Mariam Jaber, Amany Saies, Tareq Kirresh, Ruba Awadallah, Abdallah Karakra, Hafez Barghouthi, and Saleh Amarneh. 2023. "The Use of Blockchain Technology and OCR in E-Government for Document Management: Inbound Invoice Management as an Example" Applied Sciences 13, no. 14: 8463. https://doi.org/10.3390/app13148463
APA StyleAzzam, F., Jaber, M., Saies, A., Kirresh, T., Awadallah, R., Karakra, A., Barghouthi, H., & Amarneh, S. (2023). The Use of Blockchain Technology and OCR in E-Government for Document Management: Inbound Invoice Management as an Example. Applied Sciences, 13(14), 8463. https://doi.org/10.3390/app13148463