• Title/Summary/Keyword: Electronic Voting

Search Result 91, Processing Time 0.027 seconds

1V 2.56-GS/s 6-bit Flash ADC with Clock Calibration Circuit (클록 보정회로를 가진 1V 2.56-GS/s 6-bit Flash ADC)

  • Kim, Sang-Hun;Lee, Han-Yeol;Jang, Young-Chan
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2011.10a
    • /
    • pp.436-439
    • /
    • 2011
  • 본 논문은 클록 보정회로를 가진 1V 2.56-GS/s 6-bit flash analog-to-digital converter (ADC) 제안한다. 제안하는 ADC 구조에서 아날로그 블록은 단일 T/H와 2단의 프리앰프, 그리고 비교기를 사용된다. 2단의 프리앰프와 비교기의 출력에 옵셋의 크기를 줄이기 위하여 저항 평균화 기법을 적용하였다. 디지털 블록은 quasi-gray rom base 구조를 사용한다. 3입력 voting 회로로 flash ADC에서 발생하기 쉬운 bubble error를 제거하였으며, 고속 동작을 위해 단일 클록을 사용하는 TSPC F/F로 구현한다. 제안하는 flash ADC는 클록 듀티 비를 조절할 수 있는 클록 보정회로를 사용한다. 클록 보정 회로는 비교기 클록 듀티 비를 조절하여 리셋 시간과 evaluation 시간의 비율을 최적화함으로 dynamic 특성을 확보한다. 제안한 flash ADC는 1V 90nm의 CMOS 공정에서 설계되었다. Full power bandwidth인 1.2 GHz 입력에 대하여 ADC 성능을 시뮬레이션을 통해 확인하였다. 설계된 flash ADC의 면적과 전력소모는 각각 $800{\times}400\;{\mu}m^2$와 193.02mW 이다.

  • PDF

Anomaly-Based Network Intrusion Detection: An Approach Using Ensemble-Based Machine Learning Algorithm

  • Kashif Gul Chachar;Syed Nadeem Ahsan
    • International Journal of Computer Science & Network Security
    • /
    • v.24 no.1
    • /
    • pp.107-118
    • /
    • 2024
  • With the seamless growth of the technology, network usage requirements are expanding day by day. The majority of electronic devices are capable of communication, which strongly requires a secure and reliable network. Network-based intrusion detection systems (NIDS) is a new method for preventing and alerting computers and networks from attacks. Machine Learning is an emerging field that provides a variety of ways to implement effective network intrusion detection systems (NIDS). Bagging and Boosting are two ensemble ML techniques, renowned for better performance in the learning and classification process. In this paper, the study provides a detailed literature review of the past work done and proposed a novel ensemble approach to develop a NIDS system based on the voting method using bagging and boosting ensemble techniques. The test results demonstrate that the ensemble of bagging and boosting through voting exhibits the highest classification accuracy of 99.98% and a minimum false positive rate (FPR) on both datasets. Although the model building time is average which can be a tradeoff by processor speed.

Outlier rejection in automobile-mounted NFOV camera (지능화 차량을 위한 오정합점 제거 방법)

  • Suhr, Jae-Kyu;Bea, Kwang-Hyuk;Jung, Ho-Gi;Kim, Jai-Hie
    • Proceedings of the IEEK Conference
    • /
    • 2007.07a
    • /
    • pp.375-376
    • /
    • 2007
  • This paper proposes an algorithm for rejecting mismatched points (known as outliers). The proposed algorithm identifies and rejects outliers in image pairs obtained under automobile-like motions which consist of two translations and one rotation. The camera rotation is approximated to the image shift by assuming that the narrow field of lens is used. The voting method estimates the focus of expansion (FOE) while shifting one of the images. Using the properties of the FOE, the outliers are rejected while most of the inliers are retained.

  • PDF

A Blockchain Network Construction Tool and its Electronic Voting Application Case (블록체인 자동화도구 개발과 전자투표 적용사례)

  • AING TECKCHUN;KONG VUNGSOVANREACH;Okki Kim;Kyung-Hee Lee;Wan-Sup Cho
    • The Journal of Bigdata
    • /
    • v.6 no.2
    • /
    • pp.151-159
    • /
    • 2021
  • Construction of a blockchain network needs a cumbersome and time consuming activity. To overcome these limitations, global IT companies such as Microsoft are providing cloud-based blockchain services. In this paper, we propose a blockchain-based construction and management tool that enables blockchain developers, blockchain operators, and enterprises to deploy blockchain more comfortably in their infrastructure. This tool is implemented using Hyperledger Fabric, one of the famous private blockchain platforms, and Ansible, an open-source IT automation engine that supports network-wide deployment. Instead of complex and repetitive text commands, the tool provides a user-friendly web dashboard interface that allows users to seamlessly set up, deploy and interact with a blockchain network. With this proposed solution, blockchain developers, operators, and blockchain researchers can more easily build blockchain infrastructure, saving time and cost. To verify the usefulness and convenience of the proposed tool, a blockchain network that conducts electronic voting was built and tested. The construction of a blockchain network, which consists of writing more than 10 setting files and executing commands over hundreds of lines, can be replaced with simple input and click operations in the graphical user interface, saving user convenience and time. The proposed blockchain tool will be used to build trust data infrastructure in various fields such as food safety supply chain construction in the future.

A Study on the 4th Industrial Revolution and Intelligent Government Operating Strategy -In Terms of Block Chain Introduction Plans of Electronic Government- (제4차 산업혁명과 지능형 정부 운용전략에 대한 연구 -블록체인 기술의 전자정부 도입방안 측면에서-)

  • Lee, Sang-Yun;Yoon, Hong-Joo
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.14 no.1
    • /
    • pp.1-10
    • /
    • 2019
  • In terms of realizing the future e-government such as intelligent government, this paper attempts to provide an earnest and insightful reflection and suggests desirable strategies with regard to the four different crucial elements including electronic voting, electronic contract, resident registration/electronic document management, and real-estate registration as an operating strategy of intelligent government and the fourth industrial revolution regarding. The 4th industrial revolution is aimed at concentrating information or data characterized with sharing, opening, communicating and releasing in cloud computing system, analyzing big data, collecting information, and flourishing people's well-being by information and communications technology with utilizing the smart devices. Therefore, reliability of the pivotal information or data is critical and it is important for the participants being transparently shared, without the data or information being forged. In this respect, introduction or application of block chain technology is essential. This paper will review preceding studies, discuss the aspect of the 4th industrial revolution and intelligent government, then suggest operating strategies in the field of electronic voting, electronic contract, management of resident registration and electronic document and real-estate registration.

An Efficient Identity-Based Deniable Authenticated Encryption Scheme

  • Wu, Weifeng;Li, Fagen
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.9 no.5
    • /
    • pp.1904-1919
    • /
    • 2015
  • Deniable authentication protocol allows a sender to deny his/her involvement after the protocol run and a receiver can identify the true source of a given message. Meanwhile, the receiver has no ability to convince any third party of the fact that the message was sent by the specific sender. However, most of the proposed protocols didn't achieve confidentiality of the transmitted message. But, in some special application scenarios such as e-mail system, electronic voting and Internet negotiations, not only the property of deniable authentication but also message confidentiality are needed. To settle this problem, in this paper, we present a non-interactive identity-based deniable authenticated encryption (IBDAE) scheme using pairings. We give the security model and formal proof of the presented IBDAE scheme in the random oracle model under bilinear Diffie-Hellman (BDH) assumption.

Electric Load Signature Analysis for Home Energy Monitoring System

  • Lu-Lulu, Lu-Lulu;Park, Sung-Wook;Wang, Bo-Hyeun
    • International Journal of Fuzzy Logic and Intelligent Systems
    • /
    • v.12 no.3
    • /
    • pp.193-197
    • /
    • 2012
  • This paper focuses on identifying which appliance is currently operating by analyzing electrical load signature for home energy monitoring system. The identification framework is comprised of three steps. Firstly, specific appliance features, or signatures, were chosen, which are DC (Duty Cycle), SO (Slope of On-state), VO (Variance of On-state), and ZC (Zero Crossing) by reviewing observations of appliances from 13 houses for 3 days. Five appliances of electrical rice cooker, kimchi-refrigerator, PC, refrigerator, and TV were chosen for the identification with high penetration rate and total operation-time in Korea. Secondly, K-NN and Naive Bayesian classifiers, which are commonly used in many applications, are employed to estimate from which appliance the signatures are obtained. Lastly, one of candidates is selected as final identification result by majority voting. The proposed identification frame showed identification success rate of 94.23%.

An Electronic Voting Protocol using Threshold Blind Signature (문턱 은닉 서명을 이용한 전자투표 프로토콜)

  • 김진호;김광조
    • Proceedings of the Korea Institutes of Information Security and Cryptology Conference
    • /
    • 2001.11a
    • /
    • pp.309-312
    • /
    • 2001
  • 단일 선거관리자로부터 은닉 서명을 생성하는 프로토콜은 부정한 선거관리자에 의한 투표위조의 문제점이 나타날 수 있으므로 그에 대한 보완이 필요하다. 본 논문은 은닉서명을 사용하는 전자투표 프로토콜에 문턱 은닉 서명을 적용시켜 다중 선거관리자로부터 유효한 은닉 서명을 생성하는 투표 프로토콜을 제안한다. 효과적인 문턱 은닉 서명을 설계하기 위해서 Schnorr 은닉 서명을 이용했으며, 이를 적용한 다중 선거관리자에서의 전자투표 프로토콜을 설계했다. 제안한 방식에서 은닉서명은 n명의 선거관리자중 t명 이상의 합의에 의해서만 생성 가능하므로, 부정한 단일 선거관리자에 의한 투표위조의 문제점을 해결할 수 있다.

  • PDF

The Magic Sticker Electronic Voting Scheme using the Screw Method (Screw기법을 이용한 Magic Sticker 전자 투표 방식)

  • 박희운;이임영
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2001.10a
    • /
    • pp.760-762
    • /
    • 2001
  • 정보 사회의 급속한 발전을 통해 유.무선 환경에서 다양한 응용 분야들이 창출되고 있다. 그 중에서 전자 투표는 그 효용성 측면에서 새로이 관심을 가지는 분야이다. 그러나, 아직까지는 공개 네트워크를 이용하여 투표를 수행할 경우 보안 측면에서 여러 고려 사항들이 존재하며, 이들이 만족되지 않을 경우 투표의 신뢰성을 떨어뜨리게 된다. 본 논문은 전자 투표를 위해 필수적으로 요구되는 보안 사항들을 일반 요구 사항과 특수 요구 사항으로 분류하고, 이들 요구사항을 만족하는데 필요한 Screw method와 Magic Sticker 방식을 제안한다. 동시에 이들을 기초로 새로운 전자 투표 기법을 제안하고, 요구 사항을 만족하는지 평가할 것이다.

  • PDF

A New Soft-Fusion Approach for Multiple-Receiver Wireless Communication Systems

  • Aziz, Ashraf M.;Elbakly, Ahmed M.;Azeem, Mohamed H.A.;Hamid, Gamal A.
    • ETRI Journal
    • /
    • v.33 no.3
    • /
    • pp.310-319
    • /
    • 2011
  • In this paper, a new soft-fusion approach for multiple-receiver wireless communication systems is proposed. In the proposed approach, each individual receiver provides the central receiver with a confidence level rather than a binary decision. The confidence levels associated with the local receiver are modeled by means of soft-membership functions. The proposed approach can be applied to wireless digital communication systems, such as amplitude shift keying, frequency shift keying, phase shift keying, multi-carrier code division multiple access, and multiple inputs multiple outputs sensor networks. The performance of the proposed approach is evaluated and compared to the performance of the optimal diversity, majority voting, optimal partial decision, and selection diversity in case of binary noncoherent frequency shift keying on a Rayleigh faded additive white Gaussian noise channel. It is shown that the proposed approach achieves considerable performance improvement over optimal partial decision, majority voting, and selection diversity. It is also shown that the proposed approach achieves a performance comparable to the optimal diversity scheme.