This E-Voting system mainly for those people who are unable to come to the voting booth due to on duty leave or the people who are physically handicapped. In voting system there are many processes. This system having main four processes: firstly, application control process which involves the...
through treatises written in Arabic by mathematicians working in the Muslim world.Algorism,the English word for computation with Arabic numerals, is derived from Al-Khwarizmi's name. The wordalgorithmoriginated as a variant spelling ofalgorism,probably under the influence of the wordarithmeticor its ...
Voting: each classifier gives a vote for a particular class; the example is labelled with the class label that has received most votes. Weighted voting: each classifier contributes a class probability distribution (or normalized scores). A class probability acts as a weight; the example is labell...
These ideas are inspired by quantum searching on bounded-error oracles [43] and amplification of success of quantum search [16]. The above two algorithms will be used in the main algorithm for LMSR as a subroutine. Both of them are optimal because their simpler version (OR function) has lo...
Exploring diverse education data applications through blockchain technology can offer innovative methods for smart education. Among them, storing multi-platform and multi-dimensional education data on the blockchain can enhance the system’s ability to integrate and manage the data effectively. However, ...
The ScaleOut function complexity is the most compute intensive part of the algorithm that requires at least O(|M|) time for the first fit placement algorithm, where M is the number of physical servers in the system. Therefore, the overall time complexity of the algorithm is O(|vk| ×...
The standard 12-lead ECG used in hospitals is the Wilson lead system, which usually takes <1 min to collect, with the patient in a resting state. Wearable ECGs for home monitoring use the Mason-Likar lead system, which requires users to wear electrodes or sensors independently (Fig. 1a)...
but ignores the security of the algorithm. YuHao Wang et al.36proposed an improved consensus algorithm based on PBFT called CDBFT (Byzantine Fault-Tolerant Authorization). This algorithmic election scheme defines a voting system based on credit rewards and penalties, allowing the system cycle to be...
, and the primary nodes are consistently generated from these nodes over a long period, it may lead to dictatorship or monopoly as other nodes cannot express their preferences for different proposals through voting. This is detrimental to the fairness and security of the blockchain system....
SSIM is more correlated with the human visual system [39]. The maximum value of SSIM is one, and the larger the SSIM value, the higher the similarity level of two images. The SSIM metric for two images is calculated by the formula (3)SSIM=2μCμS+K1×2σCS+K2μC2+μS2+K1×σC2...