• Title/Summary/Keyword: Voting system

Search Result 195, Processing Time 0.042 seconds

A study on the comparision of AVTMR (All Voting Triple Modular Redundancy) and Dual-Duplex system (AVTMR 과 듀얼 듀플렉스 시스템 비교에 관한 연구)

  • 김현기;신석균;이기서
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.26 no.6A
    • /
    • pp.1067-1077
    • /
    • 2001
  • 본 논문에서는 결함의 영향을 받지 않고 동작할 수 있는 AVTMR(All Voting Triple Modular Redundancy) 시스템과 듀얼 듀플렉스(Dual-duplex) 시스템을 설계하고, 각 시스템의 평가를 통하여 RAMS(Reliability, Avaliability, Maintainability, Safety)를 비교하였다. ABTMR 시스템은 3중화된 보터(voter)를 사용하여 설계를 하였으며, 듀얼 듀플렉스 시스템은 비교기(comparator)를 이용하여 시스템을 설계하였다. 각 시스템은 버스 레벨로 데이터를 비교하도록 설계하였으며, 시스템 평가를 위해서 소자의 고장율은 MILSPEC-217F에 기반을 두고 RELEX6.0을 이용하였고, 마코브 모델(Markov model)을 이용하여 시스템의 RAMS를 평가하였다. 본 논문에서는 각 시스템을 MC68000을 기반으로 설계하여, 각각 시스템에 사용되는 비용 및 시스템이 어느 부분에서 선호될 수 있는가를 RAMS 및 MTTF(Mean Time To Failure)를 통하여 선택할 수 있는 기반을 제시하도록 나타내고 있다. 이러한 AVTMR이나 듀얼 듀플렉스 시스템(dual-duplex system)은 결함 허용 시스템(fault tolerant system)으로 인간의 생명과 직접적인 관련이 있는 고속철도 시스템이나 항공기 시스템에 적용될 수 있다.

  • PDF

A Study on the Empirical Cases of Electronic Democracy Focused on Internet Voting for the G2C(Government to Customer) Environment (G2C 환경을 위한 인터넷 선거 중심의 전자민주주의의 사례 연구)

  • 양광모;김형진
    • Journal of the Korea Safety Management & Science
    • /
    • v.5 no.3
    • /
    • pp.121-131
    • /
    • 2003
  • This study centers on how the electronic democracy which is expected to be a political system of information society may increase civic participation and develop political system. On the other hand, critics of internet voting claim that the technology required to properly authenticate voters and assure the accuracy and integrity of the election system either does not exist or is not widespread enough in society to be equitable and effective. In order to capture the potential that this new technology offers, it must be implemented correctly, upon a well-conceived framework of standards and procedures. At the same time, government must seek the advice of industry leaders as well as social activists so as to avoid the many obstacles that will undoubtedly arise.

Ensemble of Convolution Neural Networks for Driver Smartphone Usage Detection Using Multiple Cameras

  • Zhang, Ziyi;Kang, Bo-Yeong
    • Journal of information and communication convergence engineering
    • /
    • v.18 no.2
    • /
    • pp.75-81
    • /
    • 2020
  • Approximately 1.3 million people die from traffic accidents each year, and smartphone usage while driving is one of the main causes of such accidents. Therefore, detection of smartphone usage by drivers has become an important part of distracted driving detection. Previous studies have used single camera-based methods to collect the driver images. However, smartphone usage detection by employing a single camera can be unsuccessful if the driver occludes the phone. In this paper, we present a driver smartphone usage detection system that uses multiple cameras to collect driver images from different perspectives, and then processes these images with ensemble convolutional neural networks. The ensemble method comprises three individual convolutional neural networks with a simple voting system. Each network provides a distinct image perspective and the voting mechanism selects the final classification. Experimental results verified that the proposed method avoided the limitations observed in single camera-based methods, and achieved 98.96% accuracy on our dataset.

Design of a Voting Mechanism considering Safety for NMR PPC Using EPLD and Reliability Analysis (EPLD를 이용한 안전성이 고려된 NMR PPC의 보팅메카니즘 설계와 신뢰도 분석)

  • Ryoo, Dong-Wan;Park, Heui-Youn;Koo, In-Soo;Seo, Bo-Hyeok
    • Proceedings of the KIEE Conference
    • /
    • 2000.07d
    • /
    • pp.2557-2560
    • /
    • 2000
  • The protection system of the nuclear reactor and chemical reactor are representative of PPC(Plant Protection Controller). This PPC must be designed based on reliability as well as concept of safety, which is a failed system go a way of safe. PPC is consist of part of data acquisition, calculator, communication with redundancy, and a voter is important factor of reliability. Because it is serial connected. This paper presents a Design and Analysis of a Voting Mechanism considering Safety for NMR PPC Using EPLD. In the case of digital implementation a coincidence logic(voter) of PPC, it needs CPU and memory, so increase a number of units. Therefore the failure rate and cost is increased. On the contrary when it is designed EPLD or FPGA.

  • PDF

The Secure Electronic Voting System using the Magic Sticker (Magic Sticker 기법을 이용한 안전한 전자투표 시스템)

  • Park, Hui-Un;Lee, Im-Yeong
    • The KIPS Transactions:PartC
    • /
    • v.8C no.3
    • /
    • pp.263-270
    • /
    • 2001
  • 정보사회를 거치면서 네트워크의 발전과 관련한 많은 응용 분야들이 연구되고 있는데, 그 중에서도 암호학을 이용한 전자 투표의 비중이 증대되고 있다. 이러한 전자 투표는 그 중요성에도 불구하고 아직까지 취약한 점이 많이 산재해 있다. 특히, 전자 투표를 총괄하는 선거 관리위원회가 부정을 저지를 경우 투표 자체의 신뢰성은 무너지게 되며, 투표권의 매매가 성립할 경우에는 전자 투표에 있어 치명적인 악영향을 미치게 될 것이다. 딸서 몬 논문은 기존의 투표를 전자 투표로 적용시키는 과정에서 어떠한 요소들이 필요한지 확인해 보고 선거관리 위원회의 부정 방지 및 매매 방지를 위한 요구 조건을 살펴볼 것이다. 또한 매매방지를 위해 네트워크 상에서 익명성을 제공하는 안전한 선택 기법인 “Magic Sticker” 기법을 사용하여, 투표자의 투표 내용이 공개되더라도 투표 결과를 안전하게 보호할 수 있는 전자 투표 시스템을 제안한다.

  • PDF

Voting system using Etherium block-chain network (이더리움 블록체인 네트워크를 활용한 투표 시스템)

  • Hur, Tai-Sung;Kim, Ga-Gyeom;Han, Seok-Hyeon
    • Proceedings of the Korean Society of Computer Information Conference
    • /
    • 2019.07a
    • /
    • pp.227-228
    • /
    • 2019
  • 현실 세계에서 진행되는 투표는 시간과 공간이라는 자원들을 낭비하면서 진행이 된다. 그에 따른 보완책으로 온라인 투표 시스템을 제안할 수 있지만, 이 경우 데이터를 저장한 중앙 서버가 해킹당할 경우 데이터의 무결성 이 훼손되는 문제점을 야기할 수 있다. 본 논문에서는 이러한 문제점을 보완하기 위하여 블록체인 네트워크를 활용한 투표 시스템을 제안한다. 블록체인 투표 시스템을 응용하면 온라인으로 투표를 진행하여 시간과 공간이라는 자원을 절약할 수 있고 보안의 3요소 중 하나인 데이터의 무결성을 유지하여 투표 시스템의 투명성을 향상 킬 수 있다.

  • PDF

Weighted Voting Game and Stochastic Learning Based Certificate Revocation for the Mobile Ad-hoc Network (이동 애드 혹 네트워크 환경에서 가중투표게임과 확률러닝을 이용한 악의적인 노드의 인증서 폐지 기법)

  • Kim, Min Jung;Kim, Sung Wook
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.6 no.7
    • /
    • pp.315-320
    • /
    • 2017
  • In this paper, I design a new scheme that is immune to malicious attack based on the weighted voting game. By using stochastic learning, the proposed scheme can revoke the certification of malicious node. Through the revocation process, the proposed scheme can effectively adapt the dynamic Mobile Ad hoc network situation. Simulation results clearly indicate that the developed scheme has better performance than other existing schemes under widely diverse network environments.

A Study on The Effects of a Primary on The Party Defection Voting Behavior of Congressmen (의원의 당론이탈 투표에 미치는 경선의 효과: 제20대 국회 본회의 표결을 중심으로)

  • Kim, Hanna
    • Korean Journal of Legislative Studies
    • /
    • v.25 no.2
    • /
    • pp.69-101
    • /
    • 2019
  • The purpose of this study is to verify that voting behavior of congressmen can vary depending on the different candidate selection methods of political parties. Specifically, this paper examines whether congressmen elected through a primary tend to deviate from the party line vote in the floor voting, compared to those who did not. As a result, it was founded that congressmen who went through competition of the primary are more likely to defect from the party line vote than who did not. This empirical evidence suggests that if the introduction of the open primary system is further expanded in the future, it may lead to weakening of party cohesion and reinforcing lawmakers' autonomy.

Default Voting using User Coefficient of Variance in Collaborative Filtering System (협력적 여과 시스템에서 사용자 변동 계수를 이용한 기본 평가간 예측)

  • Ko, Su-Jeong
    • Journal of KIISE:Software and Applications
    • /
    • v.32 no.11
    • /
    • pp.1111-1120
    • /
    • 2005
  • In collaborative filtering systems most users do not rate preferences; so User-Item matrix shows great sparsity because it has missing values for items not rated by users. Generally, the systems predict the preferences of an active user based on the preferences of a group of users. However, default voting methods predict all missing values for all users in User-Item matrix. One of the most common methods predicting default voting values tried two different approaches using the average rating for a user or using the average rating for an item. However, there is a problem that they did not consider the characteristics of items, users, and the distribution of data set. We replace the missing values in the User-Item matrix by the default noting method using user coefficient of variance. We select the threshold of user coefficient of variance by using equations automatically and determine when to shift between the user averages and item averages according to the threshold. However, there are not always regular relations between the averages and the thresholds of user coefficient of variances in datasets. It is caused that the distribution information of user coefficient of variances in datasets affects the threshold of user coefficient of variance as well as their average. We decide the threshold of user coefficient of valiance by combining them. We evaluate our method on MovieLens dataset of user ratings for movies and show that it outperforms previously default voting methods.