• Title/Summary/Keyword: e-voting

Search Result 68, Processing Time 0.021 seconds

Credit Risk Evaluations of Online Retail Enterprises Using Support Vector Machines Ensemble: An Empirical Study from China

  • LI, Xin;XIA, Han
    • The Journal of Asian Finance, Economics and Business
    • /
    • v.9 no.8
    • /
    • pp.89-97
    • /
    • 2022
  • The e-commerce market faces significant credit risks due to the complexity of the industry and information asymmetries. Therefore, credit risk has started to stymie the growth of e-commerce. However, there is no reliable system for evaluating the creditworthiness of e-commerce companies. Therefore, this paper constructs a credit risk evaluation index system that comprehensively considers the online and offline behavior of online retail enterprises, including 15 indicators that reflect online credit risk and 15 indicators that reflect offline credit risk. This paper establishes an integration method based on a fuzzy integral support vector machine, which takes the factor analysis results of the credit risk evaluation index system of online retail enterprises as the input and the credit risk evaluation results of online retail enterprises as the output. The classification results of each sub-classifier and the importance of each sub-classifier decision to the final decision have been taken into account in this method. Select the sample data of 1500 online retail loan customers from a bank to test the model. The empirical results demonstrate that the proposed method outperforms a single SVM and traditional SVMs aggregation technique via majority voting in terms of classification accuracy, which provides a basis for banks to establish a reliable evaluation system.

Comparison of Anonymous Authentication Protocols

  • Kim, Jongseong;Kim, Kwangjo
    • Proceedings of the Korea Institutes of Information Security and Cryptology Conference
    • /
    • 2002.11a
    • /
    • pp.369-372
    • /
    • 2002
  • An anonymous authentication scheme allows a user to identify himself as a member of a group of users in a secure and anonymous way. It seems to be crucial and indispensable components in English auction, electronic voting and open procurement, which are getting very popular business areas in E-commerce. First, we briefly describe the previous anonymous authentication protocols how to work and what cryptographic techniques adopted to increase performance and achieve anonymity. Second, we compare those protocols from the viewpoint of the communication and computation complexity and the specific cryptographic techniques used in their protocols.

  • PDF

Electronic Voting System based on Distributed Middleware (분산 미들웨어 기반의 전자투표시스템)

  • Choi, J.W.;Kim, E.S.;Kim, Y.M.;Woo, J.W.;Han, J.I.;Jun, S.I.
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 1998.10a
    • /
    • pp.397-399
    • /
    • 1998
  • 인터넷 사용의 폭발적 증가로 인해 다양하고 인터넷에 제공되는 새로운 서비스들이 계속 증가하고 있다. 본 연구는 새로운 인터넷 서비스인 전자투표시스템에 대한 것으로 분산 미들웨어를 사용하여 H/W나 S/W의 제한 없는 클라이언트/서버 시스템을 목표로 하였다. 본 논문은 대표적인 분산 미들웨어인 CORBA와 DCOM을 사용하여 전자투표시스템D의 프로토타입을 구현하고 그 결과를 비교한다. 이는 앞으로 개발될 실제 전자투표시스템의 개발에 요구되는 분산 미들웨어 선택에 유용한 지침이 될 것이다.

  • PDF

Implementation of Voter Verifiable Receipts in E-Voting System (검증 가능한 영수증을 발급하는 전자투표 시스템의 구현)

  • Jeong Han-Jae;Lee Kwang-Woo;Lee Yun-Ho;Kim Seung-Joo;Won Dong-Ho
    • Proceedings of the Korea Institutes of Information Security and Cryptology Conference
    • /
    • 2006.06a
    • /
    • pp.525-528
    • /
    • 2006
  • 최근 전자투표 시스템에 대한 투표자의 신뢰성을 높이기 위해 영수증을 발급하는 기술에 대한 연구가 활발히 진행되고 있다. 전자투표 영수증은 투표자가 자신이 투표한 결과가 최종집계에 올바르게 반영되었음을 확인할 수 있어야 하며, 매표 방지 기능도 함께 가지고 있어야 한다. 본 논문에서는 기존의 연구되었던 기술 중에서 일반 용지 및 프린터를 이용하여 검증 가능한 영수증을 발급하는 전자투표 시스템을 구현하고자 한다.

  • PDF

A Cryptographic Receipt for trustworthy e-Voting (전자투표 신뢰성 향상을 위한 암호학적 영수증 발급기술)

  • Lee Kwang-Woo;Lee Yun-Ho;Jeong Han-Jae;Kim Seung-Joo;Won Dong-Ho
    • Proceedings of the Korea Institutes of Information Security and Cryptology Conference
    • /
    • 2006.06a
    • /
    • pp.521-524
    • /
    • 2006
  • 최근 사회적 이슈가 되고 있는 전자투표는 관리적 측면에서는 유용하지만, 사회적으로 투표기의 동작에 대한 신뢰성을 확보하지 못하여 도입에 어려움을 겪고 있다. 본 논문에서는 전자투표기에 대한 신뢰성을 높이기 위하여 투표소 밖으로 가지고 나갈 수 있는 영수증 발급 기술을 제안한다. 이 방식은 기존 방식과 비교하여 특별한 용지나 프린터가 필요없고, 투표소 내의 기기나 관리자를 신뢰하지 않아도 되므로 실제 투표에 유용하게 사용될 수 있다.

  • PDF

Numerical simulation of structural damage localization through decentralized wireless sensors

  • Jeong, Min-Joong;Koh, Bong-Hwan
    • Proceedings of the Korean Society for Noise and Vibration Engineering Conference
    • /
    • 2007.05a
    • /
    • pp.938-942
    • /
    • 2007
  • The proposed algorithm tries to localize damage in a structure by monitoring abnormal increases in strain measurements from a group of wireless sensors. Initially, this clustering technique provides an effective sensor placement within a structure. Sensor clustering also assigns a certain number of master sensors in each cluster so that they can constantly monitor the structural health of a structure. By adopting a voting system, a group of wireless sensors iteratively forages for a damage location as they can be activated as needed. Numerical simulation demonstrates that the newly developed searching algorithm implemented on wireless sensors successfully localizes stiffness damage in a plate through the local level reconfigurable function of smart sensors.

  • PDF

An Efficient Identity-Based Deniable Authenticated Encryption Scheme

  • Wu, Weifeng;Li, Fagen
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.9 no.5
    • /
    • pp.1904-1919
    • /
    • 2015
  • Deniable authentication protocol allows a sender to deny his/her involvement after the protocol run and a receiver can identify the true source of a given message. Meanwhile, the receiver has no ability to convince any third party of the fact that the message was sent by the specific sender. However, most of the proposed protocols didn't achieve confidentiality of the transmitted message. But, in some special application scenarios such as e-mail system, electronic voting and Internet negotiations, not only the property of deniable authentication but also message confidentiality are needed. To settle this problem, in this paper, we present a non-interactive identity-based deniable authenticated encryption (IBDAE) scheme using pairings. We give the security model and formal proof of the presented IBDAE scheme in the random oracle model under bilinear Diffie-Hellman (BDH) assumption.

Shifting Alliances in International Organizations: A social networks analysis of co-sponsorship of UN GA resolutions, 1976-2012

  • Lee, Eugene;Stek, Pieter E.
    • Journal of Contemporary Eastern Asia
    • /
    • v.15 no.2
    • /
    • pp.191-210
    • /
    • 2016
  • While general belief is that the military alliances are stable and rigid, the authors argue that the states are far more flexible in their behavior and often act against their alliances. This paper looks at states' behavior in the UN GA and looks how it is reflected in participation in military alliances during three periods of history since 1976 to this day. The authors illustrate the need to consider the network representation of co-sponsoring groups in General Assembly votes. They find significant support for their argument, indicating that social aspects can be extended beyond alliances. An application of social network analysis shows some unexpected affiliations in UN GA. If the UN GA is the "true" nature of these countries' alliance strategies, then it might suggest some significant defections and interesting association.

A Spam Mail Classification Using Link Structure Analysis (링크구조분석을 이용한 스팸메일 분류)

  • Rhee, Shin-Young;Khil, A-Ra;Kim, Myung-Won
    • Journal of KIISE:Software and Applications
    • /
    • v.34 no.1
    • /
    • pp.30-39
    • /
    • 2007
  • The existing content-based spam mail filtering algorithms have difficulties in filtering spam mails when e-mails contain images but little text. In this thesis we propose an efficient spam mail classification algorithm that utilizes the link structure of e-mails. We compute the number of hyperlinks in an e-mail and the in-link frequencies of the web pages hyperlinked in the e-mail. Using these two features we classify spam mails and legitimate mails based on the decision tree trained for spam mail classification. We also suggest a hybrid system combining three different algorithms by majority voting: the link structure analysis algorithm, a modified link structure analysis algorithm, in which only the host part of the hyperlinked pages of an e-mail is used for link structure analysis, and the content-based method using SVM (support vector machines). The experimental results show that the link structure analysis algorithm slightly outperforms the existing content-based method with the accuracy of 94.8%. Moreover, the hybrid system achieves the accuracy of 97.0%, which is a significant performance improvement over the existing method.

A Study on the 4th Industrial Revolution and Intelligent Government Operating Strategy -In Terms of Block Chain Introduction Plans of Electronic Government- (제4차 산업혁명과 지능형 정부 운용전략에 대한 연구 -블록체인 기술의 전자정부 도입방안 측면에서-)

  • Lee, Sang-Yun;Yoon, Hong-Joo
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.14 no.1
    • /
    • pp.1-10
    • /
    • 2019
  • In terms of realizing the future e-government such as intelligent government, this paper attempts to provide an earnest and insightful reflection and suggests desirable strategies with regard to the four different crucial elements including electronic voting, electronic contract, resident registration/electronic document management, and real-estate registration as an operating strategy of intelligent government and the fourth industrial revolution regarding. The 4th industrial revolution is aimed at concentrating information or data characterized with sharing, opening, communicating and releasing in cloud computing system, analyzing big data, collecting information, and flourishing people's well-being by information and communications technology with utilizing the smart devices. Therefore, reliability of the pivotal information or data is critical and it is important for the participants being transparently shared, without the data or information being forged. In this respect, introduction or application of block chain technology is essential. This paper will review preceding studies, discuss the aspect of the 4th industrial revolution and intelligent government, then suggest operating strategies in the field of electronic voting, electronic contract, management of resident registration and electronic document and real-estate registration.