It was considered that electronic voting is revolutionary around the world because of the new technological trends that are improving over time with their security and privacy in the different voting platforms;this pr...
详细信息
It was considered that electronic voting is revolutionary around the world because of the new technological trends that are improving over time with their security and privacy in the different voting platforms;this problem is notable in all underdeveloped *** objective is to analyze and determine a cryptographic system to improve the security with efficiency and effectiveness in the electoral processes at the moment of paying and having a vote count,maintaining the transparency and integrity of the *** deductive method was used to analyze the different cryptographic algorithms used in electronic votes that provide greater knowledge in the new trends of electronic *** was determined the operation of the Smartmatic that allows to identify the methods when making the electronic votes around the world,each of these systems implements an exclusive security for their voting systems,so that the voter carries out the action of paying and this vote is keep intact and transparent for the system and for the general public,achieving high reliability and integrity of the data,in addition a change in society will be noted,promoting democracy and *** was concluded that electronic votes show a high level of trust,although this depends on the age and education of the voter who must have some knowledge in the field of computer science,this refers to the elderly who sometimes do not have the comfort and adequate confidence in many *** system can be an alternative to implement electronic voting in Ecuador to improve democracy.
Cooperative communication is a new method that uses multi-hop communication to send the information from source to sink. The broadcast nature of wireless signals causes the communication process to be vulnerable to wi...
详细信息
With technology scaling, transient faults are becoming an increasing threat to hardware reliability. Commodity systems must be made resilient to these in-field faults through very low-cost resiliency solutions. Up to ...
详细信息
ISBN:
(纸本)9783319685427;9783319685410
With technology scaling, transient faults are becoming an increasing threat to hardware reliability. Commodity systems must be made resilient to these in-field faults through very low-cost resiliency solutions. Up to 77% of the transient faults cause Control Flow Errors (CFEs). software-based control-flow checking techniques have emerged as promising low-cost and effective solutions. The signature monitoring method is the foundation of most of these control flow checking techniques. Some CFEs cannot be detected by previous control flow checking techniques when transient fault hit the software signature. A technique, masking signature data errors of software-based control flow checking techniques employing redundancy signature (CFCRS), with the ability to mask these CFEs is proposed in this paper. In CFCRS, these errors can be detected and corrected by triple redundancy signature. The experimental results demonstrated that CFCRS is able to mask all 2,000 injected faults in software signatures;It is reasonable and feasible to apply this technique on the former software-based control flow checking techniques due to its perfect correction coverage of CFEs caused by incorrect-signature and low overheads.
Finding a document that is similar to a specified query document within a large document database is one of important issues in the Big data era, as most data available is in the form of unstructured texts. Our testin...
详细信息
Through elaborating on the associated relationship among electric power big data, cloud computing and smart grid, this paper put forward general framework of electric power big data platform based on the smart grid. T...
详细信息
Energy management is a growing concern especially with the increasing growth of smart appliances within the home. Energy disaggregation is an ongoing challenge to discover the appliance usage by examining the energy o...
详细信息
ISBN:
(纸本)9783319685052;9783319685045
Energy management is a growing concern especially with the increasing growth of smart appliances within the home. Energy disaggregation is an ongoing challenge to discover the appliance usage by examining the energy output of a household or building. Unsupervised NILM presents the additional challenge of energy disaggregation without any reliance on training data. A key issue to address in Unsupervised NILM is the discovery of appliances without a priori information. In this paper we present a new approach based on Competitive Agglomeration (CA) which incorporates the good qualities of both hierarchical and partitional clustering. Our proposed energy disaggregation algorithm makes use of CA in order to discover appliances without prior information about the number of appliances. Validation with experimental data from the Reference Energy Disaggregation dataset (REDD), and comparison with recent state of the art Unsupervised NILM indicates that our proposed algorithm is effective.
Surface reconstruction is a very important problem in fields such as geometric modeling and processing, and CAD/CAM. Most of the methods proposed to solve this problem rely on parametric polynomial schemes. However, t...
详细信息
IT (Information Technology) has been used to solve problems from different domains. In the context of agriculture, IT is being applied for increasing the productivity as well as for empowering farmers to make decision...
详细信息
Security of data is considered to be one of the most important concerns in today’s world. data is vulnerable to various types of intrusion attacks that may reduce the utility of any network or systems. Constantly cha...
详细信息
暂无评论