• Title/Summary/Keyword: Voting Method

Search Result 187, Processing Time 0.024 seconds

Anomaly-Based Network Intrusion Detection: An Approach Using Ensemble-Based Machine Learning Algorithm

  • Kashif Gul Chachar;Syed Nadeem Ahsan
    • International Journal of Computer Science & Network Security
    • /
    • v.24 no.1
    • /
    • pp.107-118
    • /
    • 2024
  • With the seamless growth of the technology, network usage requirements are expanding day by day. The majority of electronic devices are capable of communication, which strongly requires a secure and reliable network. Network-based intrusion detection systems (NIDS) is a new method for preventing and alerting computers and networks from attacks. Machine Learning is an emerging field that provides a variety of ways to implement effective network intrusion detection systems (NIDS). Bagging and Boosting are two ensemble ML techniques, renowned for better performance in the learning and classification process. In this paper, the study provides a detailed literature review of the past work done and proposed a novel ensemble approach to develop a NIDS system based on the voting method using bagging and boosting ensemble techniques. The test results demonstrate that the ensemble of bagging and boosting through voting exhibits the highest classification accuracy of 99.98% and a minimum false positive rate (FPR) on both datasets. Although the model building time is average which can be a tradeoff by processor speed.

A Fast and Secure Method to Preserve Anonymity in Electronic Voting (전자투표에서 익명성 보장을 위한 빠르고 안전한 방식)

  • Yang, Hyung-Kyu
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.14 no.1
    • /
    • pp.245-251
    • /
    • 2014
  • Mix network plays a key role in electronic voting to preserve anonymity and lots of mixnet schemes have been proposed so far. However, they requires complex and costly zero-knowledge proofs to provide their correct mixing operations. In 2010, Seb$\acute{e}$ et al. proposed an efficient and lightweight mixnet scheme based on a cryptographic secure hash function instead of zero-knowledge proofs. In this paper, we present a more efficient and faster mixnet scheme than Seb$\acute{e}$ et al.'s scheme under the same assumption. Also, our scheme is secure.

Hardware and Software Dependability Analysis of Embedded AVTMR(All Voting Triple Modular Redundancy) System (내장형 AVTMR 시스템의 하드웨어 및 소프트웨어 신뢰성 분석)

  • Kim, Hyun-Ki
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.34 no.7B
    • /
    • pp.744-750
    • /
    • 2009
  • In this paper, the unified Markov modeling of hardware and software for AVTMR(AlI Voting Triple Modular Redundancy) system is proposed and the dependability is analyzed. In hardware case, a failure rate is fixed to no time varying parameter. But, in software case, failure rate is applied with time varying parameter. Especially, the dependability(Reliability, Availability, Maintainability, Safety) of software is analyzed with G-O/NHPP for Markov modeling. The dependability of single and AVTMR system is analyzed and simulated with a unified Markov modeling method, and the characteristic of each system is compared accroding to failure rate. This kind of fault tolerat system can be applied to an airplane and life critical system to meet the requirement for a specific requirement.

A Dependability Analysis of the Group Management Protocol for Intrusion Tolerance of Essential Service (필수 서비스의 침입감내를 위한 그룹관리 프로토콜의 신뢰성 분석)

  • Kim, Hyung-Jong;Lee, Tai-Jin
    • Journal of the Korea Society for Simulation
    • /
    • v.16 no.1
    • /
    • pp.59-68
    • /
    • 2007
  • IT (Intrusion Tolerant) technology is for guaranteeing the availability of service for certain amount time against the attacks which couldn't be prevented by the currently deployed information security countermeasures. IT (Intrusion Tolerant) technology mainly makes use of the replication of service and system fur enhancing availability, and voting scheme and GMP (Croup Management Protocol) are used for the correctness of service. This paper presents a scheme to analyze dependability of IT (Intrusion Tolerant) technology through probabilistic and simulation method. Using suggested analysis scheme, we can analyze the robustness and make a sensible trade-offs in of IT (Intrusion Tolerant) technology.

  • PDF

Automatic Meniscus Segmentation from Knee MR Images using Multi-atlas-based Locally-weighted Voting and Patch-based Edge Feature Classification (무릎 MR 영상에서 다중 아틀라스 기반 지역적 가중 투표 및 패치 기반 윤곽선 특징 분류를 통한 반월상 연골 자동 분할)

  • Kim, SoonBeen;Kim, Hyeonjin;Hong, Helen;Wang, Joon Ho
    • Journal of the Korea Computer Graphics Society
    • /
    • v.24 no.4
    • /
    • pp.29-38
    • /
    • 2018
  • In this paper, we propose an automatic segmentation method of meniscus in knee MR images by automatic meniscus localization, multi-atlas-based locally-weighted voting, and patch-based edge feature classification. First, after segmenting the bone and knee articular cartilage, the volume of interest of the meniscus is automatically localized. Second, the meniscus is segmented by multi-atlas-based locally-weighted voting taking into account the weights of shape and intensity distribution in the volume of interest of the meniscus. Finally, to remove leakage to the collateral ligaments with similar intensity, meniscus is refined using patch-based edge feature classification considering shape and distance weights. Dice similarity coefficient between proposed method and manual segmentation were 80.13% of medial meniscus and 80.81 % for lateral meniscus, and showed better results of 7.25% for medial meniscus and 1.31% for lateral meniscus compared to the multi-atlas-based locally-weighted voting.

Default Voting using User Coefficient of Variance in Collaborative Filtering System (협력적 여과 시스템에서 사용자 변동 계수를 이용한 기본 평가간 예측)

  • Ko, Su-Jeong
    • Journal of KIISE:Software and Applications
    • /
    • v.32 no.11
    • /
    • pp.1111-1120
    • /
    • 2005
  • In collaborative filtering systems most users do not rate preferences; so User-Item matrix shows great sparsity because it has missing values for items not rated by users. Generally, the systems predict the preferences of an active user based on the preferences of a group of users. However, default voting methods predict all missing values for all users in User-Item matrix. One of the most common methods predicting default voting values tried two different approaches using the average rating for a user or using the average rating for an item. However, there is a problem that they did not consider the characteristics of items, users, and the distribution of data set. We replace the missing values in the User-Item matrix by the default noting method using user coefficient of variance. We select the threshold of user coefficient of variance by using equations automatically and determine when to shift between the user averages and item averages according to the threshold. However, there are not always regular relations between the averages and the thresholds of user coefficient of variances in datasets. It is caused that the distribution information of user coefficient of variances in datasets affects the threshold of user coefficient of variance as well as their average. We decide the threshold of user coefficient of valiance by combining them. We evaluate our method on MovieLens dataset of user ratings for movies and show that it outperforms previously default voting methods.

Mobile Electronic Voting System for Improving of Election Process Student Representatives (학생임원 선출 방법의 개선을 위한 모바일 전자투표 시스템)

  • Oh, Pill-Woo;Shin, Soo-Bum;Kim, Myeong-Ryeol
    • Journal of The Korean Association of Information Education
    • /
    • v.10 no.1
    • /
    • pp.119-127
    • /
    • 2006
  • This paper is designed to search the new alternatives to supplement the inconvenience of the traditional written ballot method which is executed every early semester to select the class board at the school. It is prepared on the based the results of the design and implement of the wired/wireless inter-working mobile electronic voting system where the students can participate in the real-time class board selection and the decision-making utilizing the mobile phones, PDA and PC they commonly have. It is time when we should consider introducing the electronic voting system, to minimize the students' inconvenience and the subsequent missing class, having to wait in the long line in the designated place to select the class board at every election season. This system enables the students to participate wherever they are other than the common place as well. Further, this research will provide the opportunity to think over the new school election culture in line with the age of Ubiquitous, as well as the useful means in the field to promote the active participation of the parents and students in the students' self-administration, decision-making necessary at the schools.

  • PDF

Design and Implementation of an Automatic Scoring Model Using a Voting Method for Descriptive Answers (투표 기반 서술형 주관식 답안 자동 채점 모델의 설계 및 구현)

  • Heo, Jeongman;Park, So-Young
    • Journal of the Korea Society of Computer and Information
    • /
    • v.18 no.8
    • /
    • pp.17-25
    • /
    • 2013
  • TIn this paper, we propose a model automatically scoring a student's answer for a descriptive problem by using a voting method. Considering the model construction cost, the proposed model does not separately construct the automatic scoring model per problem type. In order to utilize features useful for automatically scoring the descriptive answers, the proposed model extracts feature values from the results, generated by comparing the student's answer with the answer sheet. For the purpose of improving the precision of the scoring result, the proposed model collects the scoring results classified by a few machine learning based classifiers, and unanimously selects the scoring result as the final result. Experimental results show that the single machine learning based classifier C4.5 takes 83.00% on precision while the proposed model improve the precision up to 90.57% by using three machine learning based classifiers C4.5, ME, and SVM.

Estimation of Moving Information for Tracking of Moving Objects

  • Park, Jong-An;Kang, Sung-Kwan;Jeong, Sang-Hwa
    • Journal of Mechanical Science and Technology
    • /
    • v.15 no.3
    • /
    • pp.300-308
    • /
    • 2001
  • Tracking of moving objects within video streams is a complex and time-consuming process. Large number of moving objects increases the time for computation of tracking the moving objects. Because of large computations, there are real-time processing problems in tracking of moving objects. Also, the change of environment causes errors in estimation of tracking information. In this paper, we present a new method for tracking of moving objects using optical flow motion analysis. Optical flow represents an important family of visual information processing techniques in computer vision. Segmenting an optical flow field into coherent motion groups and estimating each underlying motion are very challenging tasks when the optical flow field is projected from a scene of several moving objects independently. The problem is further complicated if the optical flow data are noisy and partially incorrect. Optical flow estimation based on regulation method is an iterative method, which is very sensitive to the noisy data. So we used the Combinatorial Hough Transform (CHT) and Voting Accumulation for finding the optimal constraint lines. To decrease the operation time, we used logical operations. Optical flow vectors of moving objects are extracted, and the moving information of objects is computed from the extracted optical flow vectors. The simulation results on the noisy test images show that the proposed method finds better flow vectors and more correctly estimates the moving information of objects in the real time video streams.

  • PDF