Results 111 to 120 of about 1,832,471 (333)
Design and Implementation of a Secure i-Voting System [PDF]
There is concern ih many democracies about the declining rates in voter's turnout and more generally, the (perceived) t~end towards political apathy.
Ayo, C. K., Babajide, D.O.
core
Internet voting in Estonia 2005-2019: Evidence from eleven elections
P. Ehin +3 more
semanticscholar +1 more source
Overview of the proposed work. ABSTRACT Identifying cyber threats maintains the security and operational stability of smart grid systems because they experience escalating attacks that endanger both operating data reliability and system stability and electricity grid performance.
Priya R. Karpaga +3 more
wiley +1 more source
This work aims to improve the comprehensive role of big data technology in promoting social development and reduce the continuous emergence of social problems under the background of big data application. Abstract The purpose is to improve the security of the application of big data technology and ensure the stable development of society in the context
Xuejie Zhao
wiley +1 more source
Pakistan's Internet Voting Experiment
Pakistan recently conducted small-scale trials of a remote Internet voting system for overseas citizens. In this contribution, we report on the experience: we document the unique combination of sociopolitical, legal, and institutional factors motivating this exercise.
Haq, Hina Binte +2 more
openaire +2 more sources
ABSTRACT Using online job advertisement data improves the timeliness and granularity depth of analysis in the labor market in domains not covered by official data. Specifically, its variation over time may be used as an anticipator of official employment variations.
Pietro Giorgio Lovaglio +1 more
wiley +1 more source
Online votes or ratings can assist internet users in evaluating the credibility and appeal of the information which they encounter. For example, aggregator websites such as Reddit allow users to up-vote submitted content to make it more prominent, and ...
Maria Priestley, Alex Mesoudi
doaj +1 more source
iTrace: An Implicit Trust Inference Method for Trust-aware Collaborative Filtering
The growth of Internet commerce has stimulated the use of collaborative filtering (CF) algorithms as recommender systems. A collaborative filtering (CF) algorithm recommends items of interest to the target user by leveraging the votes given by other ...
Chen, Ke-Jia, He, Xu, Liu, Bin
core +1 more source
Random Integrated Subdata Ensemble Method for Key Variable Selection in Rare Event Setting
ABSTRACT We propose a general variable selection procedure to identify key input variables by applying elastic net regression to representative subdata in place of the full sample to select variables. We combine the lists of selected variables from each subdata through ensemble techniques, using the frequency of selecting the variable across different ...
Ching‐Chi Yang +3 more
wiley +1 more source
E-Voting Solution for Romanian Parliament [PDF]
Every year hundreds of millions of people vote in a variety of settings in many countries around the world. People vote in public elections to choose government leaders and also in private elections to determine the course of action for groups that ...
Daniel Platon, Liviu Dunaev
core

