Title: |
Optimally Efficient Multi Authority Secret Ballot e-Election Scheme |
Author: | G. Anjan Babu, Dr. M. Padmavathamma |
Source: | Journal of Theoretical and Applied Information Technology 5(2): 1-4, 2006 |
Abstract |
An electronic voting scheme is a set of protocols that allow a collection of voters to cost their votes, while enabling a collection of authorities to collect votes, compute the final tally, and communicate the final tally that is checked by talliers. This scheme is based on the RSA and factoring assumptions. We apply the protocols of [CDS – 88] to Guillon – Quisqnater’s identification protocol [GQ –88] to constant proofs of validity for ballots. |
|
Full Text |
|
Title: |
Reduction in run time using Trap analysis |
Author: | Prof. K.V.N.Sunitha, Dr V. Vijay Kumar |
Source: | Journal of Theoretical and Applied Information Technology 5(2): 5-9, 2006 |
Abstract |
Reduction in Runtime using trap analysis concentrates on finding the procedure for inserting traps at required places and optimizing runtime by moving the traps to low frequency regions. Using this, one can benefit in two ways: (i) being able to generate efficient code (ii) being able to produce more reliable programs by careful examination of errors in the programs. Traps are placed within a loop so as to avoid abrupt termination on bound violations. Since these traps are placed in high frequency regions, apply frequency reduction optimization technique to move this trap to low frequency regions. The results clearly indicates significant reduction in number of instructions, number of machine cycles and execution times for array bound checks applied on sorting techniques for inner loops as well as outer loops. In the present paper, the trap analysis is performed on all sorting techniques which have nested loops of depth two. However insertion of traps increases the run time, hence to overcome this disadvantage, an innovative method of optimization has been proposed in the present paper which move the checking code out of loops. |
| Full Text |
|
Title: |
Improving WLAN Performance with Enhanced MAC, Node Cooperation and Two-Stage FEC Scheme |
Author: | Kenguka M. Kenguka and Atindimile S. Kumchaya |
Source: | Journal of Theoretical and Applied Information Technology 5(2): 10-19, 2006 |
Abstract |
Signal interference, route disruption, congestion and fluctuations cause several consecutive bits arriving at the receiver in error. The error handling method in tradition communication protocols is error detection and retransmission. This method is inappropriate for distributed multimedia systems for two reasons: It introduces variable delay unacceptable for isochronous streams, and it is very inefficient and difficult to use in the multicast environment typical for many multimedia applications. We propose Enhanced MAC Node Cooperation with Two-Stage Forward Error Correction Scheme to be used on WLANs. The proposed scheme enables the joint optimization of protection strategies across the protocol stack. Node cooperation technique improves networks’ overall system throughput and reliability, reduces the cost of retransmission and energy consumption. In stage 1 of FEC, packet-level FEC is added across packets at the application layer to correct packet losses due to congestion and route disruption. In stage 2, bit-level FEC is processed within both application packets and stage 1 FEC packets to recover from bit errors in the MAC/PHY layer. Thus, we add FEC at the application layer to correct both application layer packet errors and MAC/PHY layer bit errors. MAC is enhanced to support node cooperation and header CRC. |
|
Full Text |
|
Title: |
AN E-VOTING SYSTEM FOR LEBANESE ELECTIONS |
Author: | Mohammad Hajjar, Anis Ismail, Bassam Daya, Haissam Hajjar |
Source: | Journal of Theoretical and Applied Information Technology 5(2): 20-26, 2006 |
Abstract |
In this paper, we present the electronic voting system (E-VS) we hope to be used in the Lebanese election. This system was developed to be user friendly, by novice end-user in computer through convivial Graphical User Interfaces. The complex treatments and features are achieved at the levels of applicative layer and the database. Processed data are saved in a relational database. Several security measurements were implemented in this system. Then, the election results will be revealed much sooner and more accurately. The E-VS should replace the conventional voting; therefore, simplifying the task for the three parties use the system: Voters, Chief of voting center, and main Election-Administrator. |
|
Full Text |
|