This E-Voting system mainly for those people who are unable to come to the voting booth due to on duty leave or the people who are physically handicapped. In voting system there are many processes. This system
We innovatively design an education data management system that combines access-control views with a consensus algorithm, effectively addressing the issue of low query performance for security data. Additionally, we propose a method that integrates main chain blocks and side blocks within a chained ...
Voting: each classifier gives a vote for a particular class; the example is labelled with the class label that has received most votes. Weighted voting: each classifier contributes a class probability distribution (or normalized scores). A class probability acts as a weight; the example is labell...
[85] proposed a system to ensure privacy in the e-healthcare system. The confidential data is shared by the patient with the hospital or clinic server using an online mode of operation. The Paillier encryption algorithm is used for encryption purposes, shared with the hospital server and ...
Ad-level nested classical algorithm needsO(\log ^{d-1} n)repetitions to ensure a constant error probability by majority voting. For ad-level quantum algorithm composed of quantum minimum finding, it is known that only a small factorO(\log n)of repetitions is required [27]. We show that ...
but ignores the security of the algorithm. YuHao Wang et al.36proposed an improved consensus algorithm based on PBFT called CDBFT (Byzantine Fault-Tolerant Authorization). This algorithmic election scheme defines a voting system based on credit rewards and penalties, allowing the system cycle to be...
” Each league hosts multiple rounds, where participants compete by submitting and voting for songs they think best fit a prompt. A big part of the experience, Keller says, is the conversation around each submission. He describes how his experience of each song changes as users are pushed to...
whereas transfer learning-based models may lose the resilience required for model generalization. Thus, this study proposes a Genetic Algorithm-Tuned Ensemble of Deep Transfer Learning for NetFlow-Based Intrusion Detection System for Internet of Things (NFIoT-GATE-DTL IDS) to fill the gap. Two publ...
The proposed method utilizes kernel PCA for non-linear feature extraction from fault indicators. Also, it acquires the fuel cell system’s fault feature vector. Then, it utilizes logistic mapping and Cauchy Gaussian mutation strategies to enhance the sparrow search algorithm. The latter is applied ...
through treatises written in Arabic by mathematicians working in the Muslim world.Algorism,the English word for computation with Arabic numerals, is derived from Al-Khwarizmi's name. The wordalgorithmoriginated as a variant spelling ofalgorism,probably under the influence of the wordarithmeticor its ...