• Title/Summary/Keyword: Electronic Voting System

Search Result 58, Processing Time 0.024 seconds

Electric Load Signature Analysis for Home Energy Monitoring System

  • Lu-Lulu, Lu-Lulu;Park, Sung-Wook;Wang, Bo-Hyeun
    • International Journal of Fuzzy Logic and Intelligent Systems
    • /
    • v.12 no.3
    • /
    • pp.193-197
    • /
    • 2012
  • This paper focuses on identifying which appliance is currently operating by analyzing electrical load signature for home energy monitoring system. The identification framework is comprised of three steps. Firstly, specific appliance features, or signatures, were chosen, which are DC (Duty Cycle), SO (Slope of On-state), VO (Variance of On-state), and ZC (Zero Crossing) by reviewing observations of appliances from 13 houses for 3 days. Five appliances of electrical rice cooker, kimchi-refrigerator, PC, refrigerator, and TV were chosen for the identification with high penetration rate and total operation-time in Korea. Secondly, K-NN and Naive Bayesian classifiers, which are commonly used in many applications, are employed to estimate from which appliance the signatures are obtained. Lastly, one of candidates is selected as final identification result by majority voting. The proposed identification frame showed identification success rate of 94.23%.

Development of Fuzzy Hybrid Redundancy for Sensor Fault-Tolerant of X-By-Wire System (X-By-Wire 시스템의 센서 결함 허용을 위한 Fuzzy Hybrid Redundancy 개발)

  • Kim, Man-Ho;Son, Byeong-Jeom;Lee, Kyung-Chang;Lee, Suk
    • Journal of Institute of Control, Robotics and Systems
    • /
    • v.15 no.3
    • /
    • pp.337-345
    • /
    • 2009
  • The dependence of numerous systems on electronic devices is causing rapidly increasing concern over fault tolerance because of safety issues of safety critical system. As an example, a vehicle with electronics-controlled system such as x-by-wire systems, which are replacing rigid mechanical components with dynamically configurable electronic elements, should be fault¬tolerant because a devastating failure could arise without warning. Fault-tolerant systems have been studied in detail, mainly in the field of aeronautics. As an alternative to solve these problems, this paper presents the fuzzy hybrid redundancy system that can remove most erroneous faults with fuzzy fault detection algorithm. In addition, several numerical simulation results are given where the fuzzy hybrid redundancy outperforms with general voting method.

Adaptive Cooperative Spectrum Sensing Based on SNR Estimation in Cognitive Radio Networks

  • Ni, Shuiping;Chang, Huigang;Xu, Yuping
    • Journal of Information Processing Systems
    • /
    • v.15 no.3
    • /
    • pp.604-615
    • /
    • 2019
  • Single-user spectrum sensing is susceptible to multipath effects, shadow effects, hidden terminals and other unfavorable factors, leading to misjudgment of perceived results. In order to increase the detection accuracy and reduce spectrum sensing cost, we propose an adaptive cooperative sensing strategy based on an estimated signal-to-noise ratio (SNR). Which can adaptive select different sensing strategy during the local sensing phase. When the estimated SNR is higher than the selection threshold, adaptive double threshold energy detector (ED) is implemented, otherwise cyclostationary feature detector is performed. Due to the fact that only a better sensing strategy is implemented in a period, the detection accuracy is improved under the condition of low SNR with low complexity. The local sensing node transmits the perceived results through the control channel to the fusion center (FC), and uses voting rule to make the hard decision. Thus the transmission bandwidth is effectively saved. Simulation results show that the proposed scheme can effectively improve the system detection probability, shorten the average sensing time, and has better robustness without largely increasing the costs of sensing system.

An Efficient Identity-Based Deniable Authenticated Encryption Scheme

  • Wu, Weifeng;Li, Fagen
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.9 no.5
    • /
    • pp.1904-1919
    • /
    • 2015
  • Deniable authentication protocol allows a sender to deny his/her involvement after the protocol run and a receiver can identify the true source of a given message. Meanwhile, the receiver has no ability to convince any third party of the fact that the message was sent by the specific sender. However, most of the proposed protocols didn't achieve confidentiality of the transmitted message. But, in some special application scenarios such as e-mail system, electronic voting and Internet negotiations, not only the property of deniable authentication but also message confidentiality are needed. To settle this problem, in this paper, we present a non-interactive identity-based deniable authenticated encryption (IBDAE) scheme using pairings. We give the security model and formal proof of the presented IBDAE scheme in the random oracle model under bilinear Diffie-Hellman (BDH) assumption.

A Study on the 4th Industrial Revolution and Intelligent Government Operating Strategy -In Terms of Block Chain Introduction Plans of Electronic Government- (제4차 산업혁명과 지능형 정부 운용전략에 대한 연구 -블록체인 기술의 전자정부 도입방안 측면에서-)

  • Lee, Sang-Yun;Yoon, Hong-Joo
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.14 no.1
    • /
    • pp.1-10
    • /
    • 2019
  • In terms of realizing the future e-government such as intelligent government, this paper attempts to provide an earnest and insightful reflection and suggests desirable strategies with regard to the four different crucial elements including electronic voting, electronic contract, resident registration/electronic document management, and real-estate registration as an operating strategy of intelligent government and the fourth industrial revolution regarding. The 4th industrial revolution is aimed at concentrating information or data characterized with sharing, opening, communicating and releasing in cloud computing system, analyzing big data, collecting information, and flourishing people's well-being by information and communications technology with utilizing the smart devices. Therefore, reliability of the pivotal information or data is critical and it is important for the participants being transparently shared, without the data or information being forged. In this respect, introduction or application of block chain technology is essential. This paper will review preceding studies, discuss the aspect of the 4th industrial revolution and intelligent government, then suggest operating strategies in the field of electronic voting, electronic contract, management of resident registration and electronic document and real-estate registration.

Sensitivity Analysis of Width Representation for Gait Recognition

  • Hong, Sungjun;Kim, Euntai
    • International Journal of Fuzzy Logic and Intelligent Systems
    • /
    • v.16 no.2
    • /
    • pp.87-94
    • /
    • 2016
  • In this paper, we discuss a gait representation based on the width of silhouette in terms of discriminative power and robustness against the noise in silhouette image for gait recognition. Its sensitivity to the noise in silhouette image are rigorously analyzed using probabilistic noisy silhouette model. In addition, we develop a gait recognition system using width representation and identify subjects using the decision level fusion based on majority voting. Experiments on CASIA gait dataset A and the SOTON gait database demonstrate the recognition performance with respect to the noise level added to the silhouette image.

A Public Opinion Polling Application with Robust Verification Based on the Ethereum Bolckchain (견고한 검증을 제공하는 이더리움 블록체인 기반의 여론조사 어플리케이션)

  • Jin, Jae-Hwan;Eom, Hyun-Min;Sun, Ju-Eun;Lee, Myung-Joon
    • Asia-pacific Journal of Multimedia Services Convergent with Art, Humanities, and Sociology
    • /
    • v.8 no.3
    • /
    • pp.895-905
    • /
    • 2018
  • Public opinion polls have a strong influence on modern society as a means of examining the tendency of social groups on specific issues. As the influence of the polls increases, the problem of forgery and falsification of the results becomes an important issue. So, to guarantee the reliability of the results, our society needs novel mechanisms. As one of such mechanisms, the Ethereum blockchain is an environment for developing decentralized applications with the reliable blockchain technology. Ethereum decentralized applications can utilize smart contracts to provide services for users in transparent and reliable ways. In this paper, we propose a polling method that guarantees reliability using the blockchain technology, which is a distributed ledger technique that makes forgery or falsification actually impossible. The proposed method provides a robust verification function on the results of the associated polls for individual voters and verification organizations. Also, we present a distributed opinion polling application running on our private Ethereum blockchain network, showing the effectiveness of the proposed method.

The Effect of the Fake News Related to the Electronic Voting System each News Service on News Users' Attitude of Using System, Intention to Participate through System and Reliability of News Services (뉴스서비스별 전자투표시스템 관련 가짜뉴스가 뉴스 이용자의 이용 태도, 선거 참여 의도, 뉴스서비스 신뢰도에 미치는 영향)

  • Jin, So-Yeon;Lee, Ji-Eun
    • The Journal of the Korea Contents Association
    • /
    • v.21 no.1
    • /
    • pp.105-118
    • /
    • 2021
  • This study pays attention to the fact that the fake news is attracting attention because it causes various social problems. To find out these fake news' influence, the study conducted the experiment to examine that the fake news related to the electronic voting system affects on the news users' attitude of using the system, intention to participate in the election through the system and reliability of news services. The results have shown that the fake news framed with negative contents reduced users' attitude of using the system and intention of participation in the election. Especially, as a result of examining the difference in the fake news' influence according to each news services, in the case that users recognized that the news was fake after exposing to the general internet news, the attitude of using the system and the intention of participation in the election have reduced and recovered again. However, users who exposed to Naver, Facebook believed the negative content of the fake news more strongly. Through these results, this study empirically confirmed that the fake news has a tendency to exert influence on users' cognitive dimension and to reinforce awareness in a direction consistent with the initial exposure information.

U-Net-based Recommender Systems for Political Election System using Collaborative Filtering Algorithms

  • Nidhi Asthana;Haewon Byeon
    • Journal of information and communication convergence engineering
    • /
    • v.22 no.1
    • /
    • pp.7-13
    • /
    • 2024
  • User preferences and ratings may be anticipated by recommendation systems, which are widely used in social networking, online shopping, healthcare, and even energy efficiency. Constructing trustworthy recommender systems for various applications, requires the analysis and mining of vast quantities of user data, including demographics. This study focuses on holding elections with vague voter and candidate preferences. Collaborative user ratings are used by filtering algorithms to provide suggestions. To avoid information overload, consumers are directed towards items that they are more likely to prefer based on the profile data used by recommender systems. Better interactions between governments, residents, and businesses may result from studies on recommender systems that facilitate the use of e-government services. To broaden people's access to the democratic process, the concept of "e-democracy" applies new media technologies. This study provides a framework for an electronic voting advisory system that uses machine learning.

Managing the Reverse Extrapolation Model of Radar Threats Based Upon an Incremental Machine Learning Technique (점진적 기계학습 기반의 레이더 위협체 역추정 모델 생성 및 갱신)

  • Kim, Chulpyo;Noh, Sanguk
    • The Journal of Korean Institute of Next Generation Computing
    • /
    • v.13 no.4
    • /
    • pp.29-39
    • /
    • 2017
  • Various electronic warfare situations drive the need to develop an integrated electronic warfare simulator that can perform electronic warfare modeling and simulation on radar threats. In this paper, we analyze the components of a simulation system to reversely model the radar threats that emit electromagnetic signals based on the parameters of the electronic information, and propose a method to gradually maintain the reverse extrapolation model of RF threats. In the experiment, we will evaluate the effectiveness of the incremental model update and also assess the integration method of reverse extrapolation models. The individual model of RF threats are constructed by using decision tree, naive Bayesian classifier, artificial neural network, and clustering algorithms through Euclidean distance and cosine similarity measurement, respectively. Experimental results show that the accuracy of reverse extrapolation models improves, while the size of the threat sample increases. In addition, we use voting, weighted voting, and the Dempster-Shafer algorithm to integrate the results of the five different models of RF threats. As a result, the final decision of reverse extrapolation through the Dempster-Shafer algorithm shows the best performance in its accuracy.