5 results on '"Vote method"'
Search Results
2. Steganographer Detection via Multi-Scale Embedding Probability Estimation
- Author
-
Mingjie Zheng, Sheng-hua Zhong, Yuantian Wang, Gangshan Wu, Yan Liu, and Tongwei Ren
- Subjects
021110 strategic, defence & security studies ,Steganography ,Computer Networks and Communications ,business.industry ,Computer science ,Probability estimation ,Gaussian ,0211 other engineering and technologies ,Pattern recognition ,02 engineering and technology ,Image (mathematics) ,symbols.namesake ,Hardware and Architecture ,Vote method ,0202 electrical engineering, electronic engineering, information engineering ,symbols ,Probability distribution ,Embedding ,020201 artificial intelligence & image processing ,Artificial intelligence ,Scale (map) ,business - Abstract
Steganographer detection aims to identify the guilty user who utilizes steganographic methods to hide secret information in the spread of multimedia data, especially image data, from a large amount of innocent users on social networks. A true embedding probability map illustrates the probability distribution of embedding secret information in the corresponding images by specific steganographic methods and settings, which has been successfully used as the guidance for content-adaptive steganographic and steganalytic methods. Unfortunately, in real-world situation, the detailed steganographic settings adopted by the guilty user cannot be known in advance. It thus becomes necessary to propose an automatic embedding probability estimation method. In this article, we propose a novel content-adaptive steganographer detection method via embedding probability estimation. The embedding probability estimation is first formulated as a learning-based saliency detection problem and the multi-scale estimated map is then integrated into the CNN to extract steganalytic features. Finally, the guilty user is detected via an efficient Gaussian vote method with the extracted steganalytic features. The experimental results prove that the proposed method is superior to the state-of-the-art methods in both spatial and frequency domains.
- Published
- 2019
- Full Text
- View/download PDF
3. A Hybrid Intrusion Detection System Based on Decision Tree and Support Vector Machine
- Author
-
Ashok Kumar Mehta and Anku Kumari
- Subjects
business.industry ,Computer science ,Decision tree ,Particle swarm optimization ,020206 networking & telecommunications ,02 engineering and technology ,Intrusion detection system ,Machine learning ,computer.software_genre ,Support vector machine ,C4.5 algorithm ,Vote method ,0202 electrical engineering, electronic engineering, information engineering ,020201 artificial intelligence & image processing ,Artificial intelligence ,Detection rate ,Intrusion prevention system ,business ,computer - Abstract
As the use of network services increase, security is considered as a crucial and major issue in the network. Several computers connected with the network play an essential role in business and other applications running over the network to provide services. Therefore, we need to search out the best ways to protect the system. One of the methods is to provide security to the system and analyze network traffic through intrusion detection or intrusion prevention. In this paper, a hybrid intrusion detection framework is suggested. Proposed hybrid IDS is a combination of two machine learning algorithms J48 DT and SVM. To select relevant features from the KDD CUP dataset Particle Swarm Optimization is used. WEKA is used to implement classification on the KDD CUP dataset. The dataset is divided into ratios of 60:40, 70:30, and 80:20 for training and testing purpose. The experiment result showed 99.1% accuracy, 99.6% detection rate and 1.0% FAR for 60:40 datasets whereas accuracy, detection rate and FAR for 70:30 datasets are 99.2%, 99.6% and 0.9% respectively for 80:20 datasets 99.1%, 99.6% and 0.9% respectively.
- Published
- 2020
- Full Text
- View/download PDF
4. Analysis of the 2013 German Bundestag Election
- Author
-
Andranik Tangian
- Subjects
education.field_of_study ,business.industry ,Population ,Public opinion ,Popularity ,Representativeness heuristic ,language.human_language ,German ,Vote method ,Political economy ,Political science ,language ,Opinion poll ,education ,business - Abstract
The 2013 German Bundestag election is analyzed in the same way as the 2017 Bundestag election is analyzed in Chapter 8. The positions of 28 German parties on 38 topical policy issues are compared with the statistics of relevant public opinion polls. The results are summarized in the indices of popularity (the average percentage of the population represented) and universality (frequency of representing a majority) at both the party and the coalition levels. We show that the election winners are not the best representatives of public opinion, whereas the best representatives receive too few votes to be allocated Bundestag seats. Since the same problem is inherent in the 2009, 2013 and 2017 Bundestag elections, we conclude that such an election failure is not occasional but appears to have a systemic character. To overcome it, the Third Vote method introduced in Chapter 10 is applied to hypothetically reallocate the Bundestag seats, resulting, as previously, in a significant gain in the Bundestag’s representativeness.
- Published
- 2020
- Full Text
- View/download PDF
5. The How and Why to Internet Voting an Attempt to Explain E-Stonia
- Author
-
Priit Vinkel and Robert Krimmer
- Subjects
Local election ,business.industry ,media_common.quotation_subject ,05 social sciences ,Internet privacy ,020207 software engineering ,02 engineering and technology ,Public relations ,Democracy ,Vote method ,Voting ,General election ,Political science ,0202 electrical engineering, electronic engineering, information engineering ,0509 other social sciences ,050904 information & library sciences ,business ,Internet voting ,media_common - Abstract
The introduction of remote electoral methods (also, e.g., postal voting) serves the citizen in providing an easily accessible and comfortable means of voting. In addition, remote voting is also considered a viable alternative for disenfranchised voters whose participation in elections has always been dependent on the methods they are offered – voters living or residing permanently abroad, voters who are living in conditions which make it difficult for them to attend elections for geographical reasons and voters with disabilities. All these voters need to make extra efforts in participating in the democratic process, and in all these cases, the principle of universality (or general elections) prevails over the possible concerns connected with the way of voting.
- Published
- 2017
- Full Text
- View/download PDF
Catalog
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.