Journal articles on the topic 'Voting data'

To see the other types of publications on this topic, follow the link: Voting data.

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 journal articles for your research on the topic 'Voting data.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.

1

Valsamidis, Stavros, Sotirios Kontogiannis, Theodosios G. Theodosiou, and Ioannis Petasakis. "A Web e-voting system with a data analysis component." Journal of Systems and Information Technology 20, no. 1 (March 12, 2018): 33–53. http://dx.doi.org/10.1108/jsit-01-2017-0002.

Full text
Abstract:
Purpose Currently, electronic election is one of the most popular issues of e-democracy. This has led to the development of applications and several security mechanisms to address such necessity. The problem that arises is that such applications are created either on demand for a specific election process, or experimentally for scientific purposes. The purpose of this study is to present a new e-voting system, called VOTAN. The VOTAN system involves a combination of new features with basic advantages, the implementation as open source software, its modular organization covering the functional requirements of a typical electronic voting system (EVS) and the capability of data analysis of candidates and voters. Design/methodology/approach VOTAN stands for VOTes Analyzer. It is a secure application for the conduct of electronic elections through the internet based on its own security protocol. It also includes a data analysis component which analyzes the election results and investigates the factors that play a crucial role. The major advantages of the system are that it is an open source and includes a data analysis module that can distinguish important variables from the elections and help make predictions for the outcome based on the selected variables. It is a practical solution to the existing e-voting applications and is ideal for small communities such as organizations, universities and chambers. Findings Its main advantage, compared to similar e-voting systems, is the integration of the data analysis component. The analysis of the data produced from elections is considered a critical process to fully comprehend the outcome of the elections and its correlation to specific attributes/variables of the election process. The data analysis module is a unique feature of VOTAN. It facilitates the selection of the most important attributes that influence the outcome of elections and creates a mathematical model to predict the outcome of an election based on the selected attributes. The method used in the module is the LDA. Originality/value The originality of the paper derives from the data analysis component and its security protocol/schema that fulfils several requirements.
APA, Harvard, Vancouver, ISO, and other styles
2

Lin, Huaizhong, and Chun Chen. "Optimistic voting for managing replicated data." Journal of Computer Science and Technology 17, no. 6 (November 2002): 874–81. http://dx.doi.org/10.1007/bf02960779.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

ZHU, SHANFENG, QIZHI FANG, and WEIMIN ZHENG. "SOCIAL CHOICE FOR DATA FUSION." International Journal of Information Technology & Decision Making 03, no. 04 (December 2004): 619–31. http://dx.doi.org/10.1142/s0219622004001288.

Full text
Abstract:
Social choice theory is the study of decision theory on how to aggregate separate preferences into group's rational preference. It has wide applications, especially on the design of voting rules, and brings far-reaching influence on the development of modern political science and welfare economics. With the advent of the information age, social choice theory finds its up-to-date application on designing effective Metasearch engines. Metasearch engines provide effective searching by combining the results of multiple source search engines that make use of diverse models and techniques. In this work, we analyze social choice algorithms in a graph-theoretic approach. In addition to classical social choice algorithms, such as Borda and Condorcet, we study one special type of social choice algorithms, elimination voting, to tackle Metasearch problem. Some new algorithms are proposed and examined in the fusion experiment on TREC data. It shows that these elimination voting algorithms achieve satisfied performance when compared with Borda algorithm.
APA, Harvard, Vancouver, ISO, and other styles
4

Chakrabarti, Shakya, and Neelanjan Acharya. "PROPOSITION OF A SECURE SYSTEM OF VOTING USING UIDAI DATA VIA IOT." International Journal of Students' Research in Technology & Management 6, no. 1 (June 19, 2018): 40–44. http://dx.doi.org/10.18510/ijsrtm.2018.616.

Full text
Abstract:
Purpose of the study: The paper proposes a secure system of voting using UIDAI Data and implementing IoT to save a copy of the voting statistics via VMAC encryption. Methodology: The paper proposes a secure system which will utilize the Aadhar database along with the Electronic Voting Machine units, to authenticate voters by bio-metric means which will be synchronized by Internet of Things. After successful casting of vote, two sets of voting statistics will be stored in the local polling station as well as a centralized register respectively; through a cascade of servers. These will be secured from virtual third-party vulnerability by VMAC encryption. Finally, an impenetrable system of voting can be established by the above method. Applications of this study: If the proposed system of voting is practically implemented, then a proper consensus can be obtained by avoiding poll-day violence. Furthermore, if UIDAI data is used then the voter’s authenticity is also verified. Novelty/Originality of this study: The use of biometric data, as well as storage of a second set of data using VMAC encryption to a secondary storage site.
APA, Harvard, Vancouver, ISO, and other styles
5

Rifa Hanifatunnisa and Muhammad Ismail. "Desain dan Implementasi Sistem Pencatatan Pemungutan Suara dengan Teknologi Blockchain pada Jaringan Peer-to-Peer." Jurnal Nasional Teknik Elektro dan Teknologi Informasi 9, no. 4 (December 10, 2020): 354–64. http://dx.doi.org/10.22146/jnteti.v9i4.648.

Full text
Abstract:
Proses voting (pemungutan suara) merupakan salah satu bagian penting dalam sistem demokrasi, yang sampai saat ini masih banyak dilakukan secara konvensional menggunakan kertas. Pelaksanaan kegiatan voting yang dikelola oleh satu pihak atau organisasi membuat data hasil voting rentan manipulasi. Blockchain sebagai sebuah teknologi yang mampu menjaga keamanan data dapat dijadikan sebagai salah satu solusi untuk mengatasi kecurangan dalam proses voting. Data hasil voting dicatat di dalam blockchain, kemudian data tersebut didistribusikan ke banyak pihak. Data yang terdistribusi ini juga menghilangkan ketergantungan pada satu pihak mengenai data hasil voting. Makalah ini membahas penerapan sistem pencatatan voting menggunakan teknologi blockchain dan proses pendistribusian data tersebut dalam jaringan peer-to-peer. Pada sistem ini, TPS merupakan node pada jaringan yang akan mencatat, menandatangani, dan menyebarkan data voting di tempatnya ke node lain yang saling terhubung dalam jaringan peer-to-peer. Dengan begitu, salinan data hasil voting tiap node akan disimpan di semua node. Selain itu, hasil voting dapat dilihat secara real-time dan membuat proses penghitungan hasil voting menjadi lebih cepat.
APA, Harvard, Vancouver, ISO, and other styles
6

Cassel, Carol A. "Hispanic Turnout: Estimates from Validated Voting Data." Political Research Quarterly 55, no. 2 (June 2002): 391. http://dx.doi.org/10.2307/3088058.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Tsai, Rung-Ching. "Structural equation modeling of approval voting data." Behavior Research Methods 42, no. 3 (August 2010): 798–808. http://dx.doi.org/10.3758/brm.42.3.798.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Krilavičius, Tomas, and Antanas Žilinskas. "On Structural Analysis of Parliamentarian Voting Data." Informatica 19, no. 3 (January 1, 2008): 377–90. http://dx.doi.org/10.15388/informatica.2008.219.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Brown, Philip J., and Clive D. Payne. "Aggregate Data, Ecological Regression, and Voting Transitions." Journal of the American Statistical Association 81, no. 394 (June 1986): 452–60. http://dx.doi.org/10.1080/01621459.1986.10478290.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Cassel, Carol A. "Hispanic Turnout: Estimates from Validated Voting Data." Political Research Quarterly 55, no. 2 (June 2002): 391–408. http://dx.doi.org/10.1177/106591290205500206.

Full text
APA, Harvard, Vancouver, ISO, and other styles
11

Mauw, S., J. Verschuren, and E. P. de Vink. "Data Anonymity in the FOO Voting Scheme." Electronic Notes in Theoretical Computer Science 168 (February 2007): 5–28. http://dx.doi.org/10.1016/j.entcs.2006.11.001.

Full text
APA, Harvard, Vancouver, ISO, and other styles
12

Lau, Richard R., and David P. Redlawsk. "Voting Correctly." American Political Science Review 91, no. 3 (September 1997): 585–98. http://dx.doi.org/10.2307/2952076.

Full text
Abstract:
The average voter falls far short of the prescriptions of classic democratic theory in terms of interest, knowledge, and participation in politics. We suggest a more realistic standard: Citizens fulfill their democratic duties if, most of the time, they vote “correctly.” Relying on an operationalization of correct voting based on fully informed interests, we present experimental data showing that, most of the time, people do indeed manage to vote correctly. We also show that voters' determinations of their correct vote choices can be predicted reasonably well with widely available survey data. We illustrate how this measure can be used to determine the proportion of the electorate voting correctly, which we calculate at about 75% for the five American presidential elections between 1972 and 1988. With a standard for correct vote decisions, political science can turn to exploring the factors that make it more likely that people will vote correctly.
APA, Harvard, Vancouver, ISO, and other styles
13

Zulkiawan, Asdar, Nataniel Dengen, Novianti Puspitasari, and Almasari Aksenta. "Penerapan Metode User Authentication Pada Sistem Monitoring, E-Voting, dan Evaluasi PEMIRA." Jurnal Rekayasa Teknologi Informasi (JURTI) 4, no. 2 (December 30, 2020): 172. http://dx.doi.org/10.30872/jurti.v4i2.5821.

Full text
Abstract:
PEMIRA merupakan ajang pesta demokrasi bagi mahasiswa di tataran perguruan tinggi dalam rangka pemilihan presiden dan wakil presiden badan eksekutif mahasiswa (BEM). Pemira sangat penting untuk proses transisi kepemimpinan BEM, sehingga agenda ini wajib diselenggarakan sebaik mungkin oleh dewan perwakilan mahasiswa (DPM) selaku penanggunjawab pelaksanaan pemira. Pelaksanaan pemira meliputi pendaftaran pasangan calon (paslon), voting oleh mahasiswa, pengawasan data voting, rekapitulasi data voting dan pengumuman paslon terpilih. Dalam penelitian ini dikembangkan sebuah sistem electronic voting (E-voting) dengan tambahan fitur untuk melakukan monitoring dan evaluasi PEMIRA. Sistem yang dibangun mengutamakan keamanan data voting dan data mahasiswa yang melakukan voting menggunakan metode user authentication. Hasil penelitian menunjukkan sistem ini dapat meningkatkan efektivitas dan efisiensi pengunaan waktu, materi dan sumber daya serta meminimalisir kemungkinan terjadinya manipulasi data hasil voting pemilihan.
APA, Harvard, Vancouver, ISO, and other styles
14

Zulkiawan, Asdar, Nataniel Dengen, Novianti Puspitasari, and Almasari Aksenta. "Penerapan Metode User Authentication Pada Sistem Monitoring, E-Voting, dan Evaluasi PEMIRA." Jurnal Rekayasa Teknologi Informasi (JURTI) 4, no. 2 (December 30, 2020): 172. http://dx.doi.org/10.30872/jurti.v4i2.5821.

Full text
Abstract:
PEMIRA merupakan ajang pesta demokrasi bagi mahasiswa di tataran perguruan tinggi dalam rangka pemilihan presiden dan wakil presiden badan eksekutif mahasiswa (BEM). Pemira sangat penting untuk proses transisi kepemimpinan BEM, sehingga agenda ini wajib diselenggarakan sebaik mungkin oleh dewan perwakilan mahasiswa (DPM) selaku penanggunjawab pelaksanaan pemira. Pelaksanaan pemira meliputi pendaftaran pasangan calon (paslon), voting oleh mahasiswa, pengawasan data voting, rekapitulasi data voting dan pengumuman paslon terpilih. Dalam penelitian ini dikembangkan sebuah sistem electronic voting (E-voting) dengan tambahan fitur untuk melakukan monitoring dan evaluasi PEMIRA. Sistem yang dibangun mengutamakan keamanan data voting dan data mahasiswa yang melakukan voting menggunakan metode user authentication. Hasil penelitian menunjukkan sistem ini dapat meningkatkan efektivitas dan efisiensi pengunaan waktu, materi dan sumber daya serta meminimalisir kemungkinan terjadinya manipulasi data hasil voting pemilihan.
APA, Harvard, Vancouver, ISO, and other styles
15

Abedini, Mohammadali, Farzaneh Ahmadzadeh, and Rassoul Noorossana. "Customer credit scoring using a hybrid data mining approach." Kybernetes 45, no. 10 (November 7, 2016): 1576–88. http://dx.doi.org/10.1108/k-09-2015-0228.

Full text
Abstract:
Purpose A crucial decision in financial services is how to classify credit or loan applicants into good and bad applicants. The purpose of this paper is to propose a four-stage hybrid data mining approach to support the decision-making process. Design/methodology/approach The approach is inspired by the bagging ensemble learning method and proposes a new voting method, namely two-level majority voting in the last stage. First some training subsets are generated. Then some different base classifiers are tuned and afterward some ensemble methods are applied to strengthen tuned classifiers. Finally, two-level majority voting schemes help the approach to achieve more accuracy. Findings A comparison of results shows the proposed model outperforms powerful single classifiers such as multilayer perceptron (MLP), support vector machine, logistic regression (LR). In addition, it is more accurate than ensemble learning methods such as bagging-LR or rotation forest (RF)-MLP. The model outperforms single classifiers in terms of type I and II errors; it is close to some ensemble approaches such as bagging-LR and RF-MLP but fails to outperform them in terms of type I and II errors. Moreover, majority voting in the final stage provides more reliable results. Practical implications The study concludes the approach would be beneficial for banks, credit card companies and other credit provider organisations. Originality/value A novel four stages hybrid approach inspired by bagging ensemble method proposed. Moreover the two-level majority voting in two different schemes in the last stage provides more accuracy. An integrated evaluation criterion for classification errors provides an enhanced insight for error comparisons.
APA, Harvard, Vancouver, ISO, and other styles
16

Khlaponin, Yuriy, Volodymyr Vyshniakov, Viktoriia Ternavska, Oleksandr Selyukov, and Oleg Komarnytskyi. "Development of audit and data protection principles in electronic voting systems." Eastern-European Journal of Enterprise Technologies 4, no. 2(112) (August 31, 2021): 47–57. http://dx.doi.org/10.15587/1729-4061.2021.238259.

Full text
Abstract:
It is assumed in standard information protection technologies that there are owners of this information who put forward requirements for protection. In secret voting systems, the information belongs to the community of citizens, and to protect it, vote organizers must create conditions that allow each voter to make sure that the vote secrecy and accuracy of vote counting are preserved. In developed democracies, this issue is resolved through a widely available audit of all procedures that may be mistrusted. Any voter can conduct such an audit. The anxiety of citizens of democratic countries is based on the idea that if electronic voting is introduced, it will be impossible to conduct such an audit. The article proposes principles of auditing all those software and hardware tools and processes of the online voting system that can generate voter distrust. This audit is carried out using a dedicated server open to voters and their fiduciaries. This server provides continuous monitoring of actions of the service staff in terms of possible interference in the operation of the voting system. Also, due to this server, auditors receive data on the integrity of the voting system hardware and software including its audit tools and an alarm signal in the event of a threat. It was possible to reduce the average time of processing the voter requests to two seconds. This means that processing a maximum of 2,500 voter requests at a vote station will take no more than two hours. Simultaneous access of 50 voters to the server will not make them wait in the queue for more than 2 minutes. Implementation results were described and links were given for conducting experimental voting on the Internet.
APA, Harvard, Vancouver, ISO, and other styles
17

Helmiawan, Muhammad Agreindra, Dani Indra Juna, and Billy Ramdhani. "PENGAMANAN SISTEM DAN DATA E-VOTING BERBASIS NETWORK." INTERNAL (Information System Journal) 1, no. 1 (November 2, 2018): 1–10. http://dx.doi.org/10.32627/internal.v1i1.27.

Full text
Abstract:
Security in a system is vital and can not be ignored at all. System security has an important role to operate a system and keep running in running business processes that support an organization. In every organization, it must have important data and stored in a system mechanism either stand-alone or network-based. Ssytem that has been connected to the network will provide opportunities for the outside world to be able to get information presented by the system in realtime. One example of a system that provides information in realtime is E-Voting, E-Voting system is processing data entered by the user in giving his opinion. If a system that has been corrupted by an outsider or in the sense of an opinion of a user being changed for a particular purpose may be detrimental to the organization. Data security will be very necessary to keep intrupsi on system. The design and application of security methods in the E-Voting system aims to maintain the data provided by the user so that the data is genuine in accordance with the input and the data is original and feasible to be informed.
APA, Harvard, Vancouver, ISO, and other styles
18

Helmiawan, Muhammad Agreindra, Dani Indra Juna, and Billy Ramdhani. "PENGAMANAN SISTEM DAN DATA E-VOTING BERBASIS NETWORK." INTERNAL (Information System Journal) 1, no. 1 (November 2, 2018): 1–10. http://dx.doi.org/10.32627/internal.v1i1.329.

Full text
Abstract:
Security in a system is vital and can not be ignored at all. System security has an important role to operate a system and keep running in running business processes that support an organization. In every organization, it must have important data and stored in a system mechanism either stand-alone or network-based. Ssytem that has been connected to the network will provide opportunities for the outside world to be able to get information presented by the system in realtime. One example of a system that provides information in realtime is E-Voting, E-Voting system is processing data entered by the user in giving his opinion. If a system that has been corrupted by an outsider or in the sense of an opinion of a user being changed for a particular purpose may be detrimental to the organization. Data security will be very necessary to keep intrupsi on system. The design and application of security methods in the E-Voting system aims to maintain the data provided by the user so that the data is genuine in accordance with the input and the data is original and feasible to be informed.
APA, Harvard, Vancouver, ISO, and other styles
19

HEALY, ANDREW J., MIKAEL PERSSON, and ERIK SNOWBERG. "Digging into the Pocketbook: Evidence on Economic Voting from Income Registry Data Matched to a Voter Survey." American Political Science Review 111, no. 4 (September 5, 2017): 771–85. http://dx.doi.org/10.1017/s0003055417000314.

Full text
Abstract:
To paint a fuller picture of economic voters, we combine personal income records with a representative election survey. We examine three central topics in the economic voting literature: pocketbook versus sociotropic voting, the effects of partisanship on economic evaluations, and voter myopia. First, we show that voters who appear in survey data to be voting based on the national economy are, in fact, voting equally on the basis of their personal financial conditions. Second, there is strong evidence of both partisan bias and economic information in economic evaluations, but personal economic data is required to separate the two. Third, although in experiments and aggregate historical data recent economic conditions appear to drive vote choice, we find no evidence of myopia when we examine actual personal economic data.
APA, Harvard, Vancouver, ISO, and other styles
20

Sarkawi, Adib, Aiza Johari, Azlina Bujang, and Zainon Haji Bibi. "Usability and Users’ Satisfaction on Online Electronic Voting System." International Journal of Service Management and Sustainability 6, no. 2 (September 28, 2021): 131. http://dx.doi.org/10.24191/ijsms.v6i2.15577.

Full text
Abstract:
This paper identifies the respondents’ views towards e-Voting (electronic technology voting) such as the process, users’ satisfaction, and relevancy, and to determine the usability criteria of e- voting’s interface, in which it employs a quantitative method, using self-administered adapted questionnaires. The survey involves 250 respondents (voters), who immediately completed five Likert scales survey after they had voted for the committee members in two general elections: a social club for the university’s staff (using Internet) and an organization for the female staff of the university (using the Intranet). The respondents were of different demographic backgrounds and they casted their online votes at two different periods (two years difference). The data were analysed using the SPSS software. The study found positive responses from most of the voters in which they expressed their satisfaction that e-Voting was convenient and easy to be used in the voting process, where the system illustrated relevant content and generated adequate procedures. Notably, the usability criteria of the interface of e-Voting as indicated by most respondents are between good to very good scales (navigation, graphic, user-friendliness andconsistency, content, and transparency).
APA, Harvard, Vancouver, ISO, and other styles
21

Li, Xuerui, Lican Kang, Yanyan Liu, and Yuanshan Wu. "Distributed Bayesian posterior voting strategy for massive data." Electronic Research Archive 30, no. 5 (2022): 1936–53. http://dx.doi.org/10.3934/era.2022098.

Full text
Abstract:
<abstract><p>The emergence of massive data has driven recent interest in developing statistical learning and large-scale algorithms for analysis on distributed platforms. One of the widely used statistical approaches is split-and-conquer (SaC), which was originally performed by aggregating all local solutions through a simple average to reduce the computational burden caused by communication costs. Aiming at lower computation cost and satisfactorily acceptable accuracy, this paper extends SaC to Bayesian variable selection for ultra-high dimensional linear regression and builds BVSaC for aggregation. Suppose ultrahigh-dimensional data are stored in a distributed manner across multiple computing nodes, with each computing resource containing a disjoint subset of data. On each node machine, we perform variable selection and coefficient estimation through a hierarchical Bayes formulation. Then, a weighted majority voting method BVSaC is used to combine the local results to retain good performance. The proposed approach only requires a small portion of computation cost on each local dataset and therefore eases the computational burden, especially in Bayesian computation, meanwhile, pays a little cost to receive accuracy, which in turn increases the feasibility of analyzing extraordinarily large datasets. Simulations and a real-world example show that the proposed approach performed as well as the whole sample hierarchical Bayes method in terms of the accuracy of variable selection and estimation.</p></abstract>
APA, Harvard, Vancouver, ISO, and other styles
22

Sameh, Dalia, Ghada Khoriba, and Mohamed Haggag. "Behaviour Analysis Voting Model Using Social Media Data." International Journal of Intelligent Engineering and Systems 12, no. 2 (April 30, 2019): 211–21. http://dx.doi.org/10.22266/ijies2019.0430.21.

Full text
APA, Harvard, Vancouver, ISO, and other styles
23

McGregor, R. Michael. "Measuring “Correct Voting” Using Comparative Manifestos Project Data." Journal of Elections, Public Opinion and Parties 23, no. 1 (June 19, 2012): 1–26. http://dx.doi.org/10.1080/17457289.2012.691883.

Full text
APA, Harvard, Vancouver, ISO, and other styles
24

Videras, Julio. "Religion and animal welfare: Evidence from voting data." Journal of Socio-Economics 35, no. 4 (August 2006): 652–59. http://dx.doi.org/10.1016/j.socec.2005.11.033.

Full text
APA, Harvard, Vancouver, ISO, and other styles
25

Chafid, Nurul, and Herlina Soffiana. "IMPELEMENTASI ALGORITMA KRIPTOGRAFI KLASIK CAESAR UNTUK RANCANG BANGUN APLIKASI E-VOTING BERBASIS WEB (STUDI KASUS : SMAN 10 TANGERANG)." Jurnal Ilmiah Sains dan Teknologi 6, no. 2 (September 21, 2022): 133–45. http://dx.doi.org/10.47080/saintek.v6i2.2249.

Full text
Abstract:
Elections or we are familiar with the term voting are not only carried out in the election of the legislative council of political parties in a country, the election is also carried out in a school and university organization in the election of candidates for the chairman of the organization or student president. The voting system is always carried out by voting if political opponents or opponents of potential leaders experience the same vote. Voting is an activity carried out to choose a candidate for a predetermined election. In today's modern era, a lot of work is done automatically, including voting, which was previously done manually. Voting that is done manually is done by voting on paper, and the results are calculated on each paper which makes the calculation process take longer. Created a system that can facilitate the voting process. E-Voting is a candidate selection system and the most votes are made and processed in a digital system. System In this voting process there is a process for nominating candidates, selecting candidates, and voting results. With the existence of e-voting to conduct candidate selection with clear and not manipulated data. The data security process is carried out by encrypting data from an existing database using Caesar's Classical Cryptography Algorithm.
APA, Harvard, Vancouver, ISO, and other styles
26

Rao, K. Nishanth, and N. Vasudheva Reddy. "Human Data Acquisition through Biometrics using LabVIEW." International Journal of Electrical and Computer Engineering (IJECE) 7, no. 1 (February 1, 2017): 225. http://dx.doi.org/10.11591/ijece.v7i1.pp225-229.

Full text
Abstract:
<p>Human Data Acquisition is an innovative work done based on fingerprints of a particular person. Using the fingerprints we can get each and every detail of any individual. Through this, the data acquired can be used in many applications such as Airport Security System, Voting System, and Employee login System, in finding the thieves etc. We in our project have implemented in Voting System. In this we use the components such as MyDAQ which is data acquisition device. The coding here is in done in a Graphical Programming language named LabVIEW where the execution of any program is done in a sequential way or step by step according to the data received.</p>
APA, Harvard, Vancouver, ISO, and other styles
27

CLINTON, JOSHUA, SIMON JACKMAN, and DOUGLAS RIVERS. "The Statistical Analysis of Roll Call Data." American Political Science Review 98, no. 2 (May 2004): 355–70. http://dx.doi.org/10.1017/s0003055404001194.

Full text
Abstract:
We develop a Bayesian procedure for estimation and inference for spatial models of roll call voting. This approach is extremely flexible, applicable to any legislative setting, irrespective of size, the extremism of the legislators' voting histories, or the number of roll calls available for analysis. The model is easily extended to let other sources of information inform the analysis of roll call data, such as the number and nature of the underlying dimensions, the presence of party whipping, the determinants of legislator preferences, and the evolution of the legislative agenda; this is especially helpful since generally it is inappropriate to use estimates of extant methods (usually generated under assumptions of sincere voting) to test models embodying alternate assumptions (e.g., log-rolling, party discipline). A Bayesian approach also provides a coherent framework for estimation and inference with roll call data that eludes extant methods; moreover, via Bayesian simulation methods, it is straightforward to generate uncertainty assessments or hypothesis tests concerning any auxiliary quantity of interest or to formally compare models. In a series of examples we show how our method is easily extended to accommodate theoretically interesting models of legislative behavior. Our goal is to provide a statistical framework for combining the measurement of legislative preferences with tests of models of legislative behavior.
APA, Harvard, Vancouver, ISO, and other styles
28

Agrawal, Divya, and Padma Bonde. "Improving Classification Accuracy on Imbalanced Data by Ensembling Technique." Journal of Cases on Information Technology 19, no. 1 (January 2017): 42–49. http://dx.doi.org/10.4018/jcit.2017010104.

Full text
Abstract:
Prediction using classification techniques is one of the fundamental feature widely applied in various fields. Classification accuracy is still a great challenge due to data imbalance problem. The increased volume of data is also posing a challenge for data handling and prediction, particularly when technology is used as the interface between customers and the company. As the data imbalance increases it directly affects the classification accuracy of the entire system. AUC (area under the curve) and lift proved to be good evaluation metrics. Classification techniques help to improve classification accuracy, but in case of imbalanced dataset classification accuracy does not predict well and other techniques, such as oversampling needs to be resorted. Paper presented Voting based ensembling technique to improve classification accuracy in case of imbalanced data. The voting based ensemble is based on taking the votes on the best class obtained by the three classification techniques, namely, Logistics Regression, Classification Trees and Discriminant Analysis. The observed result revealed improvement in classification accuracy by using voting ensembling technique.
APA, Harvard, Vancouver, ISO, and other styles
29

Laslier, Jean-François. "Spatial Approval Voting." Political Analysis 14, no. 2 (2006): 160–85. http://dx.doi.org/10.1093/pan/mpj002.

Full text
Abstract:
This article provides a model for analyzing approval voting elections. Within a standard probabilistic spatial voting setting, we show that principal component analysis makes it possible to derive candidates' relative locations from the approval votes. We apply this technique to original experimental data from the French 2002 presidential election.
APA, Harvard, Vancouver, ISO, and other styles
30

., Faisal, Muhammad Ridwan, and Mardawati . "The Expert Choice Implementation in Selecting the Electronic Voting Software." International Journal of Engineering & Technology 7, no. 2.29 (May 22, 2018): 811. http://dx.doi.org/10.14419/ijet.v7i2.29.14262.

Full text
Abstract:
The voting service process conducted today is still done manually so that it becomes a decision to utilize the electronic voting. The electronic voting greatly reduces human control and human direct influence on this voting process. Problems faced by end users in the selection are there are so many choices of electronic voting software. Decision making, essentially a form of election of the various alternatives of action or multi-criteria decision making that can be selected. Decision support system in this research is used to select the type of electronic voting software. The method used in this research is the multi criteria decision making and analytical hierarchy process using expert choice software. And aims to make decisions that can make certain parties to take the best decision in choosing the type of electronic voting software. From the data processing is concluded that the first sequence is online voting 58.3%, express vote 17.2%, simply voting 17% and ballot online 7.5%. Processing of data obtained from the respondent expert inconsistencies value ratio is less than 0.1, thus the combined geometric calculation result data is fairly consistent.
APA, Harvard, Vancouver, ISO, and other styles
31

KATZ, RICHARD S. "Preference Voting in Italy." Comparative Political Studies 18, no. 2 (July 1985): 229–49. http://dx.doi.org/10.1177/0010414085018002005.

Full text
Abstract:
Intraparty preference voting is a potentially important possibility for voters in many proportional representation systems, especially the Italian system. Three hypotheses—that preference voting is an indicator of traditionalism or the voto di scambio, sophistication or the voto d'opinione, and mobilization or the voto d'appartenenza—are considered using survey data and logistic regression models. All three hypotheses are supported by the data. Although the support for the individual-level traditionalism account is weakest, the data suggest that traditional political culture may contribute to the contextual prerequisites for sophistication or mobilization to lead to preference voting. Overall, it is suggested that the three explanations are complementary rather than contradictory, and that contextual effects must be considered in a full account of preference voting.
APA, Harvard, Vancouver, ISO, and other styles
32

Shiwal, Prajwal, Dhruv Morey, Harshad Shivankar, Suraj Jagtap, and Prof S. S. Adagale. "Decentralized E-Voting System Using Blockchain." International Journal for Research in Applied Science and Engineering Technology 10, no. 12 (December 31, 2022): 147–49. http://dx.doi.org/10.22214/ijraset.2022.47827.

Full text
Abstract:
Abstract: Voting is a primary right of every citizen living ina country. Traditional methods used for voting includes paper ballot system, EVMs (Electronic Voting Machines), etc. which are still followed and trusted by every voter or citizen blindly. These voting systems can have ambiguity as the data is maintainedunder a centralized environment whether it is counting the paper ballots or storing the vote caste on a computer server. Thisuse of a centralized database for the voting system has some security issues such as Data modification through the third party in the network due to the use of the central database systemas well as the result of the voting is not shown in real-time, or manipulation with the data which can hamper the result and thus have an impact on not only system integrity but also lose faith in democracy, government, nation, etc. The voting methods used in an election should be legal, accurate, safe, and convenient.
APA, Harvard, Vancouver, ISO, and other styles
33

Alvarez, R. Michael, Ines Levin, Julia Pomares, and Marcelo Leiras. "Voting Made Safe and Easy: The Impact of e-voting on Citizen Perceptions." Political Science Research and Methods 1, no. 1 (June 2013): 117–37. http://dx.doi.org/10.1017/psrm.2013.2.

Full text
Abstract:
Voting technologies frame the voting experience. Different ways of presenting information to voters, registering voter choices and counting ballots may change the voting experience and cause individuals to re-evaluate the legitimacy of the electoral process. Yet few field experiments have evaluated how voting technologies affect the voting experience. This article uses unique data from a recent e-voting field experiment in Salta, Argentina to study these questions. It employs propensity-score matching methods to measure the causal effect of replacing traditional voting technology with e-voting on the voting experience. The study's main finding is that while e-voters perceive the new technology as easier to use and more likely to register votes as intended—and support replacing traditional voting technologies with e-voting—the new technologies also raise some concerns about ballot secrecy.
APA, Harvard, Vancouver, ISO, and other styles
34

Zýková, Petra. "Comparison Between Data Envelopment Analysis Models with Penalties." Acta Universitatis Agriculturae et Silviculturae Mendelianae Brunensis 67, no. 6 (2019): 1665–69. http://dx.doi.org/10.11118/actaun201967061665.

Full text
Abstract:
The paper deals with Data Envelopment Analysis (DEA) models with advanced voting systems for ranking of candidates with penalties. The main aims of the system are to find a general winner and ranking of all candidates. Every voter gives the ranking of the first t-candidates and can give penalties to candidates who he/she surely does not want to vote for. Advanced voting systems are being used based on the use of data envelopment analysis models. The original contribution of the paper consists in the formulation of a new DEA/AR model with penalties. This model is derived from the DEA/AR model with penalties. The proposed models are illustrated on a simulated data set. This paper aims to compare DEA models with penalties.
APA, Harvard, Vancouver, ISO, and other styles
35

Ridwan, Muhammad, Zainal Arifin, and Yulianto Yulianto. "Rancang Bangun E-Voting Dengan Menggunakan Keamanan Algoritma Rivest Shamir Adleman (RSA) Berbasis Web (Studi Kasus : Pemilihan Ketua Bem Fmipa)." Informatika Mulawarman : Jurnal Ilmiah Ilmu Komputer 11, no. 2 (September 12, 2016): 22. http://dx.doi.org/10.30872/jim.v11i2.210.

Full text
Abstract:
E-voting adalah suatu sistem pemilihan dimana data dicatat, disimpan dan diproses dalam bentuk informasi digital. Dengan kata lain, e-voting merupakan pemungutan suara yang proses pelaksanaannya mulai dari pendaftaraan pemilih, pelaksanaan pemilihan, perhitungan suara dan pengiriman hasil suara dilaksanakan secara elektonik (digital) (Rokhman A, 2011). Namun kepercayaan masyarakat terhadap e-voting masih rendah. Hal ini disebabkan akan ketakutan masyarakat akan manipulasi hasil perolehan setiap kandidat. Untuk itu perlu dibuat sebuah sistem yang dapat menjamin akurasi hasil e-voting, integritas data ketika melakukan pengiriman hasil voting dari pemilih ke sistem, dan memvalidasi pemilih yang sesungguhnya dalam penerimaan hasil voting. Pada penelitian ini, penulis menerapkan metode keamanan RSA yaitu public key dan private key, untuk melakukan verifikasi. Aplikasi e-voting dibangun dengan bahasa pemrograman PHP, serta memanfaatkan database MySQLi sebagai database server. Dari hasil pengujian yang dilakukan, dapat disimpulkan bahwa sistem dapat bekerja dengan baik, dapat memvalidasi pemilih dan memverifikasi hasil voting apakah mengalami perubahan selama pengiri man.
APA, Harvard, Vancouver, ISO, and other styles
36

Suwarjono, Suwarjono, Lilik Sumaryanti, and Lusia Lamalewa. "Cryptography Implementation for electronic voting security." E3S Web of Conferences 328 (2021): 03005. http://dx.doi.org/10.1051/e3sconf/202132803005.

Full text
Abstract:
Electronic voting is done by recording election data centrally and presenting it into fast digital information. E-voting is an internet technology, which aims to improve the performance of the voting process, and is expected to be a breakthrough in technological development that helps human work. Security constraints in e-voting include the distribution of voting, for example voters who distribute voting rights, are illegitimate and can abuse voters’ rights, because they know the voter’s account to access the system. This study implements cryptographic methods as a password security for voter accounts, and the results of voting, so that the secrecy of the voters’ data and the results of voting are maintained. RSA algorithm to implement cryptographic techniques based on two mathematical problems, namely factorization and modulo operations on composite numbers, which use two different keys for encryption and decryption processes. The public key is used encryption process to encode text, and the private key is used description process, namely translating ciphertext into plaintext.
APA, Harvard, Vancouver, ISO, and other styles
37

Kawai, Kei, and Yasutora Watanabe. "Inferring Strategic Voting." American Economic Review 103, no. 2 (April 1, 2013): 624–62. http://dx.doi.org/10.1257/aer.103.2.624.

Full text
Abstract:
We estimate a model of strategic voting and quantify the impact it has on election outcomes. Because the model exhibits multiplicity of outcomes, we adopt a set estimator. Using Japanese general-election data, we find a large fraction (63.4 percent, 84.9 percent) of strategic voters, only a small fraction (1.4 percent, 4.2 percent) of whom voted for a candidate other than the one they most preferred (misaligned voting). Existing empirical literature has not distinguished between the two, estimating misaligned voting instead of strategic voting. Accordingly, while our estimate of strategic voting is high, our estimate of misaligned voting is comparable to previous studies. (JEL D72)
APA, Harvard, Vancouver, ISO, and other styles
38

Knauer, Uwe, Cornelius Styp von Rekowski, Marianne Stecklina, Tilman Krokotsch, Tuan Pham Minh, Viola Hauffe, David Kilias, et al. "Tree Species Classification Based on Hybrid Ensembles of a Convolutional Neural Network (CNN) and Random Forest Classifiers." Remote Sensing 11, no. 23 (November 26, 2019): 2788. http://dx.doi.org/10.3390/rs11232788.

Full text
Abstract:
In this paper, we evaluate different popular voting strategies for fusion of classifier results. A convolutional neural network (CNN) and different variants of random forest (RF) classifiers were trained to discriminate between 15 tree species based on airborne hyperspectral imaging data. The spectral data was preprocessed with a multi-class linear discriminant analysis (MCLDA) as a means to reduce dimensionality and to obtain spatial–spectral features. The best individual classifier was a CNN with a classification accuracy of 0.73 +/− 0.086. The classification performance increased to an accuracy of 0.78 +/− 0.053 by using precision weighted voting for a hybrid ensemble of the CNN and two RF classifiers. This voting strategy clearly outperformed majority voting (0.74), accuracy weighted voting (0.75), and presidential voting (0.75).
APA, Harvard, Vancouver, ISO, and other styles
39

Patil, Sneha N., and Vidyullata Devmane. "An Implementation of Online Voting System using Okamoto-Uchiyama Encryption Scheme." INTERNATIONAL JOURNAL OF COMPUTERS & TECHNOLOGY 17, no. 2 (September 28, 2018): 7326–34. http://dx.doi.org/10.24297/ijct.v17i2.7632.

Full text
Abstract:
Electronic voting (e-Voting) has totally replaced the traditional voting system. Due to the rapid growth of computer networks and cloud computing the existing e-Voting system can be replaced with online voting system.When data is on cloud,the major challenge in voting system is confidentiality, security and accuracy. The advances in cryptography can be used to a face these challenges. The presented work implements Okamoto-Uchiyama algorithm with its additive homomorphic property. This work focuses on serving voting system on large scale of voters. We have made our system more user friendly and faster but secured than existing systems.
APA, Harvard, Vancouver, ISO, and other styles
40

Shikano, Susumu, and Bernhard Kittel. "Dynamics of Voting Propensity." Political Research Quarterly 69, no. 4 (September 28, 2016): 813–29. http://dx.doi.org/10.1177/1065912916663654.

Full text
Abstract:
This paper aims to deliver experimental evidence on the dispute between two behavioral models of electoral turnout. Both models share the idea that the subjects’ voting propensities are updated from their past propensities, aspirations, and realized payoffs. However, they differ in the exact specification of the feedback mechanism. The first model has a strong feedback mechanism toward 50 percent, while the other has only moderate feedback. This difference leads to two distinct distributions of voter types: the first model generates more casual voters who vote and abstain from time to time. The latter generates more habitual voting behavior. Thus far, the latter model seemed to be better supported empirically because survey data reveal more habitual voters and abstainers than casual voters. Given that the two models differ in their propensity updating mechanism in dynamic processes, a more direct test of their assumptions as well as implications with survey data is still pending. We designed a laboratory experiment in which subjects repeatedly make turnout and voting decisions. The result from experimental data is mixed, but more supportive of the second model with habitual voters and abstainers.
APA, Harvard, Vancouver, ISO, and other styles
41

Pardosi, Irpan Adiputra, and Ronsen Purba. "Pengembangan Web E-Voting Menggunakan Secure Election Protocol." Jurnal SIFO Mikroskil 16, no. 1 (April 29, 2015): 73–82. http://dx.doi.org/10.55601/jsm.v16i1.180.

Full text
Abstract:
Sistem e-voting akan memberikan kemudahan kepada pemilih dan panitia pelaksana dari segi waktu maupun biaya. Sistem voting melalui internet (e-voting) akan menemui permasalahan terkait keamanan komunikasi dan data sehingga diperlukan sebuah protokol kriptografi yang disebut Secure Election Protocol. Prosedur kerja dari Secure Election Protocol dengan dua panitia sentral menggunakan CTF dan CLA menjadi panitia. Protokol ini menggunakan algoritma AES-128 untuk mengamankan data yang dikirimkan, dan algoritma RSA untuk mengamankan kunci AES-128 serta menggunakan kombinasi algoritma DSA dan SHA-1 untuk membentuk tanda tangan digital dari pesan yang dikirimkan. Perangkat lunak e-voting menggunakan Secure Election Protocol dengan dua panitia sentral ini mampu mengamankan proses pemilihan online (e-voting) untuk pemilihan Ketua BITSMIKRO dengan baik dan benar. Kebutuhan teknologi e-voting yang aman di masa mendatang akan semakin besar. Penerapan kriptografi pada penelitian ini telah membuktikan perannya dalam mengamankan pemilihan online (e-voting).
APA, Harvard, Vancouver, ISO, and other styles
42

CESARINI, DAVID, MAGNUS JOHANNESSON, and SVEN OSKARSSON. "Pre-Birth Factors, Post-Birth Factors, and Voting: Evidence from Swedish Adoption Data." American Political Science Review 108, no. 1 (January 31, 2014): 71–87. http://dx.doi.org/10.1017/s0003055413000592.

Full text
Abstract:
This article analyzes a rich Swedish data set with information on the electoral turnout of a large sample of adoptees, their siblings, their adoptive parents, and their biological parents. We use a simple regression framework to decompose the parent-child resemblance in voting into pre-birth factors, measured by biological parents’ voting, and post-birth factors, measured by adoptive parents’ voting. Adoptees are more likely to vote if their biological parents were voters and if they were assigned to families in which the adoptive parents vote. We find evidence of interactions between the pre- and post-birth factors: the effect of the post-birth environment on turnout is greater amongst adoptees whose biological mothers are nonvoters. We also show that the relationships between parental characteristics, such as education, and child turnout, persist even in the absence of a genetic link between parent and child. The regression-based framework we utilize provides a basis for the integration of behavior-genetic research into mainstream political science.
APA, Harvard, Vancouver, ISO, and other styles
43

Sen, Anamika, Malabika Sen, and Aarti Ambekar. "Improved Electronic Voting Machine with Real Time Data Analysis." Communications on Applied Electronics 6, no. 1 (October 26, 2016): 47–49. http://dx.doi.org/10.5120/cae2016652420.

Full text
APA, Harvard, Vancouver, ISO, and other styles
44

Lewis, Jeffrey B. "Estimating Voter Preference Distributions from Individual-Level Voting Data." Political Analysis 9, no. 3 (January 2001): 275–97. http://dx.doi.org/10.1093/polana/9.3.275.

Full text
Abstract:
This paper presents a method for inferring the distribution of voter ideal points on a single dimension from individual-level binary choice data. The statistical model and estimation technique draw heavily on the psychometric literature on test taking and, in particular, on the work of Bock and Aitkin (1981) and are similar to several recent methods of estimating legislative ideal points (Londregan 2000; Bailey 2001). I present Monte Carlo results validating the method. The method is then applied to determining the partisan and ideological basis of support for presidential candidates in 1992 and to U.S. mass and congressional partisan realignment on abortion policy since 1973.
APA, Harvard, Vancouver, ISO, and other styles
45

Chen, Duen Kai. "Data Mining Based Intelligent System for Voting Behavior Analysis." Applied Mechanics and Materials 284-287 (January 2013): 3070–73. http://dx.doi.org/10.4028/www.scientific.net/amm.284-287.3070.

Full text
Abstract:
In this study, we report a voting behavior analysis intelligent system based on data mining technology. From previous literature, we have witnessed increasing number of studies applied information technology to facilitate voting behavior analysis. In this study, we built a likely voter identification model through the use of data mining technology, the classification algorithm used here constructs decision tree model to identify voters and non voters. This model is evaluated by its accuracy and number of attributes used to correctly identify likely voter. Our goal is to try to use just a small number of survey questions while maintaining the accuracy rates of other similar models. This model was built and tested on Taiwan’s Election and Democratization Study (TEDS) data sets. According to the experimental results, the proposed model can improve likely voter identification rate and this finding is consistent with previous studies based on American National Election Studies.
APA, Harvard, Vancouver, ISO, and other styles
46

O' Hare, William. "The Use of Demographic Data in Voting Rights Litigation." Evaluation Review 15, no. 6 (December 1991): 729–45. http://dx.doi.org/10.1177/0193841x9101500605.

Full text
APA, Harvard, Vancouver, ISO, and other styles
47

Yan, Yuan-Ting, Yan-Ping Zhang, Jie Chen, and Yi-Wen Zhang. "Incomplete data classification with voting based extreme learning machine." Neurocomputing 193 (June 2016): 167–75. http://dx.doi.org/10.1016/j.neucom.2016.01.068.

Full text
APA, Harvard, Vancouver, ISO, and other styles
48

Bailey, Michael A., Anton Strezhnev, and Erik Voeten. "Estimating Dynamic State Preferences from United Nations Voting Data." Journal of Conflict Resolution 61, no. 2 (July 10, 2016): 430–56. http://dx.doi.org/10.1177/0022002715595700.

Full text
Abstract:
United Nations (UN) General Assembly votes have become the standard data source for measures of states preferences over foreign policy. Most papers use dyadic indicators of voting similarity between states. We propose a dynamic ordinal spatial model to estimate state ideal points from 1946 to 2012 on a single dimension that reflects state positions toward the US-led liberal order. We use information about the content of the UN’s agenda to make estimates comparable across time. Compared to existing measures, our estimates better separate signal from noise in identifying foreign policy shifts, have greater face validity, allow for better intertemporal comparisons, are less sensitive to shifts in the UN’ agenda, and are strongly correlated with measures of liberalism. We show that the choice of preference measures affects conclusions about the democratic peace.
APA, Harvard, Vancouver, ISO, and other styles
49

Laver, Michael. "Analysing Structures of Party Preference in Electronic Voting Data." Party Politics 10, no. 5 (September 2004): 521–41. http://dx.doi.org/10.1177/1354068804045386.

Full text
APA, Harvard, Vancouver, ISO, and other styles
50

Awaludin. "STUDI MALAPRAKTEK PEMILU DI TEMPAT PEMUNGUTAN SUARA PADA PEMUNGUTAN DAN PENGHITUNGAN SUARA PEMILU SERENTAK TAHUN 2019 DI KABUPATEN BUTON." Electoral Governance Jurnal Tata Kelola Pemilu Indonesia 1, no. 1 (November 13, 2019): 104. http://dx.doi.org/10.46874/tkp.v1i1.34.

Full text
Abstract:
This study aims to determine the forms of Election malpractice that occur in the process of voting and counting at polling stations (TPS) in the implementation of simultaneous elections in 2019 in Buton District. Other than that, this study also aims to identify what factors influence the occurrence of Election Malappractice in Buton District, focus on the process of voting and counting at polling stations. The method used in this study is description research. Data sources in writing this thesis consist of primary data and secondary data. Primary data in the form of interviews and observations. Structured interviews were conducted with election organizers in Buton Regency in this case members of Bawaslu, KPU, PPK, PPS and KPPS. While observations in the voting and counting process are conducted in 2 (two) different polling stations, namely TPS 001 Bungi Village, and 004 TPS, Kombeli Village. Meanwhile, secondary data in the form of voter data, data on the results of voting and counting, recapitulation of the results of vote counting, letters, and regulations related to the voting and counting process. The data that has been obtained is then analyzed by reducing, presenting and drawing conclusions. The results of the study showed that there were malpractices in the election in the process of voting and counting at polling stations in the form of ghost voters, double voting, writing inaccurate C1 form, manipulation of vote acquisition of Election participants, lack of logistics, inaccurate voter data, voting that does not provide comfort for all groups of voters and the implementation of voting and counting in a certain degree it is not transparent and inaccurate. While the factors that influence the occurrence of malpractice are in the form of heavy workload, lack of competency of KPPS officers, changing regulations and no legal certainty, witnesses to the Election participants did not understand their duties and roles at the polling station, and a large amount of logistics.
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography