Privacy and transparency in vote counting are the most prevalent concerns these days due to the involvement of untrusted authorities in the counting process. As a result, the counting process faces significant privacy...
详细信息
Privacy and transparency in vote counting are the most prevalent concerns these days due to the involvement of untrusted authorities in the counting process. As a result, the counting process faces significant privacy, trust, and transparency hurdles. Hence, there is a need for an efficient and trusted mechanism to resolve such problems. Blockchain technology has the potential to bring transparency and trust in several applications. Therefore, in this work, we explore blockchain technology in conjunction with a secure partitioning scheme to promote transparency, trust, and privacy between users and participating authorities in a decentralized platform. This paper presents a chaincode-based implementation of our proposed secure and verifiable vote counting mechanism that enables trust and fairness over a decentralized platform. Multiple authorities participate in the vote counting process in a trusted manner to cooperate and coordinate in a decision process over a decentralized platform. Our research exhibits that blockchain technology can eliminate the trust gaps and increase transparency and fairness in the election and vote counting procedure. We register user votes in the blockchain platform based on the secret sharing mechanism to enable fairness and openness between counting authorities. Each vote is recorded into the distributed ledger to support openness and verifiability in our mechanism. The ledger is accessible to every registered user as per the permissioned blockchain policy. We created many authorities in the blockchain network and deployed multiple smart contracts on the Hyperledger platform to analyze the feasibility of our strategy. The performance results are obtained and reported using the Hyperledger Caliper benchmark tool. The results demonstrate that the proposed chaincode-based solution achieves the highest throughput at 200–400 tps for fetching and removing contracts. We achieve the optimal latency of 18.09 s for the vote distribution contract
In the problem of Dispersion by mobile robots, l robots placed arbitrarily on nodes of a network having n nodes are asked to relocate themselves autonomously so that each node contains at most ⌈l/n⌉ robots. When l ≤ ...
详细信息
The ability of any steganography system to correctly retrieve the secret message is the primary criterion for measuring its ***,researchers have tried to generate a new natural image driven from only the secret messag...
详细信息
The ability of any steganography system to correctly retrieve the secret message is the primary criterion for measuring its ***,researchers have tried to generate a new natural image driven from only the secret message bits rather than using a cover to embed the secret message within it;this is called the stego *** paper proposes a new secured coverless steganography system using a generative mathematical model based on semi Quick Response(QR)code and maze game image *** system consists of two *** first component contains two processes,encryption process,and hiding *** encryption process encrypts secret message bits in the form of a semi-QR code image whereas the hiding process conceals the pregenerated semi-QR code in the generated maze game *** the other hand,the second component contains two processes,extraction and decryption,which are responsible for extracting the semi-QR code from the maze game image and then retrieving the original secret message from the extracted semi-QR code image,*** results were obtained using the bit error rate(BER)*** results confirmed that the system achieved high hiding capacity,good performance,and a high level of robustness against attackers compared with other coverless steganography methods.
Canonicalization provides an architecture-agnostic method for enforcing equivariance, with generalizations such as frame-averaging recently gaining prominence as a lightweight and flexible alternative to equivariant a...
详细信息
Canonicalization provides an architecture-agnostic method for enforcing equivariance, with generalizations such as frame-averaging recently gaining prominence as a lightweight and flexible alternative to equivariant architectures. Recent works have found an empirical benefit to using probabilistic frames instead, which learn weighted distributions over group elements. In this work, we provide strong theoretical justification for this phenomenon: for commonly-used groups, there is no efficiently computable choice of frame that preserves continuity of the function being averaged. In other words, unweighted frame-averaging can turn a smooth, non-symmetric function into a discontinuous, symmetric function. To address this fundamental robustness problem, we formally define and construct weighted frames, which provably preserve continuity, and demonstrate their utility by constructing efficient and continuous weighted frames for the actions of SO(d), O(d), and Sn on point clouds. Copyright 2024 by the author(s)
In this paper, the problem of finding exact solutions to the magnetohydrodynamic(MHD) equations in the presence of incompressible mass flows with helical symmetry is considered. For ideal flows, a similarity reduction...
详细信息
In this paper, the problem of finding exact solutions to the magnetohydrodynamic(MHD) equations in the presence of incompressible mass flows with helical symmetry is considered. For ideal flows, a similarity reduction method is used to obtain exact solutions for several MHD flows with nonlinear variable Mach number. For resistive flows parallel to a magnetic field, the governing equilibrium equation is derived. The MHD equilibrium state of a helically symmetric incompressible flow is governed by a second-order elliptic partial differential equation(PDE) for the helical magnetic flux function. Exact solutions for the latter equation are obtained. Also, the equilibrium equations of a gravitating plasma with incompressible flow are derived.
Data augmentation is a critical component in building modern deep-learning systems. In this article, we propose MFG Augment, a novel data augmentation method based on the mean-field game (MFG) theory that can synthesi...
详细信息
Speech-to-Speech translation is attracting increasing attention from researchers due to its potential of easing the communication. It can be leveraged to develop voice user interfaces for important services, such as a...
详细信息
We study the impact of forbidding short cycles to the edge density of k-planar graphs;a k-planar graph is one that can be drawn in the plane with at most k crossings per edge. Specifically, we consider three settings,...
详细信息
The photovoltaic system has been widely integrated into electrical power grids to produce clean and sustainable energy sources. Precisely modeling of PV systems is crucial to simulate and asset the performance of such...
详细信息
Video forgery is one of the most serious problems affecting the credibility and reliability of video content. Therefore, detecting video forgery presents a major challenge for researchers due to the diversity of forge...
详细信息
暂无评论