• Title/Summary/Keyword: voting

Search Result 534, Processing Time 0.023 seconds

Shipboard Secret Electronic Voting System for Information and Communication Technology-isolated Ocean Crews

  • Huh, Jun-Ho;Koh, Taehoon;Seo, Kyungryong
    • Journal of Multimedia Information System
    • /
    • v.3 no.3
    • /
    • pp.77-84
    • /
    • 2016
  • The sailors on seagoing ships experience much difficulty in communicating with their families, friends or associates ashore due to communication cost or technical difficulties so that they are sometimes unable to adapt to the rapid social changes promptly. This is mainly the result of an insufficient Information and Communication Technology (ICT)-environment on their ships. To surmount such a problem, an electronic shipboard voting system that guarantees the publicness and absolute secrecy in voting process has been proposed in this paper. The system not only helps crews to catch up with up-to-date news and provides them a feeling that they are being connected to the everyday lives of the outside world, but also allows them to cast their votes based on the newly acquired information (e.g., current political or economic situations in their respective regions and etc.).

A Practical and Secure Electronic Election System

  • Lee, Yun-Ho;Won, Dong-Ho
    • ETRI Journal
    • /
    • v.34 no.1
    • /
    • pp.55-65
    • /
    • 2012
  • E-voting is expected to offer prominent advantages over traditional voting methods. Advantages include faster tallying, greater accuracy, prevention of void ballots, and lower cost. However, many experts express concerns about the potential for large-scale fraud. Recently, many paper based end-to-end (E2E) voter verifiable systems providing individual verifiability and universal verifiability have been proposed. These systems, unlike previous voting systems, are used in polling booths and without access to trusted computing devices at the time of voting. In this paper, we propose a practical and secure E2E voter verifiable system using a paper receipt based on cryptographic technologies.

Analysis of the Dependability of Voting and Group Management In the Intrusion Tolerant Technology (침입감내기술에서의 Voting 및 그룹관리 신뢰성 분석)

  • 이태진;김형종;이강신
    • Proceedings of the Korea Society for Simulation Conference
    • /
    • 2004.05a
    • /
    • pp.1-6
    • /
    • 2004
  • Intrusion tolerant technology is the technology to guarantee the Quality of service for certain amount time from the attacks which cannot be defended by the previous information security technologies. It increases the availability and confidentiality of the system by minimizing the damage from the attacks. And the fundamental components of the intrusion tolerant technology are voting and GMP(Group Management Protocol). In this paper, we present a new scheme to analyze the voting dependability and corrupt member detection dependability, which is very critical in GMP. Based on this scheme, we can make a new security policy and the methodology of analyzing the dependability itself also can be applicable to the other field.

  • PDF

Treatment of Missing Data by Decomposition and Voting with Ordinal Data

  • Chun, Young-M.;Son, Hong-K.;Chung, Sung-S.
    • Journal of the Korean Data and Information Science Society
    • /
    • v.18 no.3
    • /
    • pp.585-598
    • /
    • 2007
  • It is so difficult to get complete data when we conduct a questionaire in actuality. And we get inefficient results if we analyze statistical tests with ignoring missing values. Therefore, we use imputation methods which evaluate quality of data. This study proposes a imputation method by decomposition and voting with ordinal data. First, data are sorted by each variable. After that, imputation methods are used by each decomposition level. And the last step is selection of values with voting. The proposed method is evaluated by accuracy and RMSE. In conclusion, missing values are related to each variable, median imputation method using decomposition and voting is powerful.

  • PDF

Ring Signature Scheme Based on Lattice and Its Application on Anonymous Electronic Voting

  • Zhou, Yihua;Dong, Songshou;Yang, Yuguang
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.16 no.1
    • /
    • pp.287-304
    • /
    • 2022
  • With the development of quantum computers, ring signature schemes based on large integer prime factorization, discrete logarithm problem, and bilinear pairing are under threat. For this reason, we design a ring signature scheme based on lattice with a fixed verification key. Compared with the previous ring signature scheme based on lattice, our design has a fixed verification key and does not disclose the signer's identity. Meanwhile, we propose an anonymous electronic voting scheme by using our ring signature scheme based on lattice and (t, n) threshold scheme, which makes up for the lack of current anonymous electronic voting that cannot resist attacks of the quantum computer. Finally, under standard model (SM), we prove that our ring signature scheme based on lattice is anonymous against the full-key exposure, and existentially non-forgeable against insider corruption. Furthermore, we also briefly analyze the security of our anonymous electronic voting scheme.

Weighted Soft Voting Classification for Emotion Recognition from Facial Expressions on Image Sequences (이미지 시퀀스 얼굴표정 기반 감정인식을 위한 가중 소프트 투표 분류 방법)

  • Kim, Kyeong Tae;Choi, Jae Young
    • Journal of Korea Multimedia Society
    • /
    • v.20 no.8
    • /
    • pp.1175-1186
    • /
    • 2017
  • Human emotion recognition is one of the promising applications in the era of artificial super intelligence. Thus far, facial expression traits are considered to be the most widely used information cues for realizing automated emotion recognition. This paper proposes a novel facial expression recognition (FER) method that works well for recognizing emotion from image sequences. To this end, we develop the so-called weighted soft voting classification (WSVC) algorithm. In the proposed WSVC, a number of classifiers are first constructed using different and multiple feature representations. In next, multiple classifiers are used for generating the recognition result (namely, soft voting) of each face image within a face sequence, yielding multiple soft voting outputs. Finally, these soft voting outputs are combined through using a weighted combination to decide the emotion class (e.g., anger) of a given face sequence. The weights for combination are effectively determined by measuring the quality of each face image, namely "peak expression intensity" and "frontal-pose degree". To test the proposed WSVC, CK+ FER database was used to perform extensive and comparative experimentations. The feasibility of our WSVC algorithm has been successfully demonstrated by comparing recently developed FER algorithms.

A Weighted Feature Voting Approach for Robust and Real-Time Voice Activity Detection

  • Moattar, Mohammad Hossein;Homayounpour, Mohammad Mehdi
    • ETRI Journal
    • /
    • v.33 no.1
    • /
    • pp.99-109
    • /
    • 2011
  • This paper concerns a robust real-time voice activity detection (VAD) approach which is easy to understand and implement. The proposed approach employs several short-term speech/nonspeech discriminating features in a voting paradigm to achieve a reliable performance in different environments. This paper mainly focuses on the performance improvement of a recently proposed approach which uses spectral peak valley difference (SPVD) as a feature for silence detection. The main issue of this paper is to apply a set of features with SPVD to improve the VAD robustness. The proposed approach uses a weighted voting scheme in order to take the discriminative power of the employed feature set into account. The experiments show that the proposed approach is more robust than the baseline approach from different points of view, including channel distortion and threshold selection. The proposed approach is also compared with some other VAD techniques for better confirmation of its achievements. Using the proposed weighted voting approach, the average VAD performance is increased to 89.29% for 5 different noise types and 8 SNR levels. The resulting performance is 13.79% higher than the approach based only on SPVD and even 2.25% higher than the not-weighted voting scheme.

Image Processing based on Tensor Voting and its Applications (텐서 보팅에 기반한 영상처리 및 응용)

  • Park, Jong Hyun;Park, Soonyoung;Lee, Guee Sang
    • Smart Media Journal
    • /
    • v.1 no.2
    • /
    • pp.23-33
    • /
    • 2012
  • In this paper, the characteristics of tensor voting, which are used extensively in image processing and computer vision, have been surveyed. In general, tensor voting can infer the structural features like junctions, curves, regions and surfaces from n-dimensional data given as points, curve elements or surface patch elements. Currently various perceptual grouping methods based on such structural inference are studied and are used for diverse applications on images or scenes. Tensor voting provides robustness to noises and demonstrates itself efficient in many applications.

  • PDF

Voting System Bus Protocol for a Highly-Reliable PLC with Redundant Modules (다중화 구조 고신뢰성 제어기기를 위한 보팅 시스템버스 프로토콜)

  • Jeong, Woohyuk;Park, Jaehyun
    • Journal of Institute of Control, Robotics and Systems
    • /
    • v.20 no.6
    • /
    • pp.689-694
    • /
    • 2014
  • An SPLC (Safety Programmable Logic Controller) must be designed to meet the highest safety standards, IEEE 1E, and should guarantee a level of fault-tolerance and high-reliability that ensures complete error-free operation. In order to satisfy these criteria, I/O modules, communication modules, processor modules and bus modules of the SPLC have been configured in triple or dual modular redundancy. The redundant modules receive the same data to determine the final data by the voting logic. Currently, the processor of each rx module performs the voting by deciding on the final data. It is the intent of this paper to prove the improvement on the current system, and develop a voting system for multiple data on a system bus level. The new system bus protocol is implemented based on a TCN-MVB that is a deterministic network consisting of a master-slave structure. The test result shows that the suggested system is better than the present system in view of its high utilization and improved performance of data exchange and voting.

Countermeasures against Security Threats to Online Voting Using Distributed Ledger Technology (분산 원장 기술을 활용한 온라인 투표에 대한 보안 위협과 대응 방안)

  • Park, Keundug;Kim, ChangOh;Youm, Heung-youl
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.27 no.5
    • /
    • pp.1201-1216
    • /
    • 2017
  • Recently, many countries around the world including Korea (Rep. of) have actively introduced online voting using distributed ledger technology (e.g. blockchain). However, online voting using distributed ledger technology based on the widely deployed telecommunication/ICT infrastructure. There is insufficient analysis of potential security threats. In this paper, we suggest a model for online voting system using distributed ledger technology and propose countermeasures by analyzing the security threats that may occur in online voting process in terms of information security.