Search Results - (( based voting process algorithm ) OR ( java application customization algorithm ))

Refine Results
  1. 1

    Voting algorithms for large scale fault-tolerant systems by Karimi, Abbas

    Published 2011
    “…In addition to having all the features of sequential algorithm, this algorithm has far less time complexity and has higher processing speed in voting process in large scale systems. …”
    Get full text
    Get full text
    Thesis
  2. 2

    Exact parallel plurality voting algorithm for totally ordered object space fault-tolerant systems by Karimi, Abbas, Zarafshan, Faraneh, Jantan, Adznan, Ramli, Abdul Rahman, Saripan, M. Iqbal, Syed Mohamed, Syed Abdul Rahman Al-Haddad

    Published 2012
    “…To resolve the problem associated with sequential plurality voter in dealing with large number of inputs, this paper introduces a new generation of plurality voter based on parallel algorithms. Since parallel algorithms normally have high processing speed and are especially appropriate for large scale systems, they are therefore used to achieve a new parallel plurality voting algorithm by using (n/log n) processors on EREW shared-memory PRAM. …”
    Get full text
    Get full text
    Get full text
    Article
  3. 3

    Secure E-Voting With Blind Signature by Ibrahim, Subariah, Kamat, Maznah, Salleh, Mazleena, Abdul Aziz, Shah Rizan

    Published 2003
    “…We have developed an electronic voting system, E-Voting for a general election. E-Voting system employs cryptographic techniques to overcome the security issues in the election process. …”
    Get full text
    Get full text
    Conference or Workshop Item
  4. 4

    Stability of individual object in construction of voting-merged approach by Shamsuddin, Norin Rahayu, Mahat, Nor Idayu

    Published 2019
    “…In this paper, we propose a voting-merged method - a combination of voting-based method and merging process. …”
    Get full text
    Get full text
    Get full text
    Article
  5. 5

    Dense-cluster based voting approach for license plate identification by Asadzadehkaljahi, Maryam, Shivakumara, Palaiahnakote, Roy, Sangheeta, Olatunde, Mojeed Salmon, Anisi, Mohammad Hossein, Lu, Tong, Pal, Umapada

    Published 2018
    “…This paper presents a new method called Dense Cluster based Voting (DCV) for identifying an input license plate image as normal or taxi such that suitable recognition algorithms can be used to achieve better recognition rate. …”
    Get full text
    Get full text
    Article
  6. 6

    Consensus algorithms blockchain: a comparative study by hattab, Siham, Alyaseen, Imad Fakhri Taha

    Published 2019
    “…In this research, we also presented a new category of the Blockchain consensus algorithms, which consist of three groups as follows; the proof based on Hardware, the proof based on stake, and the proof based on voting.…”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  7. 7

    TOPSIS-based Regression Algorithms Evaluation by Abu-Shareha, Ahmad Adel

    Published 2022
    “…Following that, using three datasets, namely Combined Cycle Power Plant, Real Estate, and Concrete, Voting using multiple classifiers (k-means-based classifiers) was the top-ranked in the Combined Cycle Power Plant and Real Estate datasets. …”
    Get full text
    Get full text
    Article
  8. 8

    Binary vote assignment on grid quorum replication technique with association rule by Ainul Azila, Che Fauzi

    Published 2018
    “…Then, the databases that are resulted after the fragmentation process are allocated at their assigned sites. Finally, after allocation process, each site has a database file and ready for any transaction and replication process. …”
    Get full text
    Get full text
    Thesis
  9. 9
  10. 10
  11. 11
  12. 12

    Object Localization In 3D Point Cloud by Chung, Hui Sze

    Published 2020
    “…The high accuracy rate of the feature matching process indicated that the process was able to generate correct correspondences between the scene and the model. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  13. 13

    Data mining reduction methods and performances of rules by Ahmad, Faudziah, Basir, Mohammad Aizat

    Published 2009
    “…In summary, results show that in terms of performance of rules, Genetic Algorithm has produced the highest number of rules followed by Johnson’s Algorithm and Holte’s 1R.The best classifier for extracting rules in this study is VOT (Voting of Object Tracking).In terms of performance of rules, best results comes from rules with 30 attributes, followed by rules with 1 intersection attribute and lastly rules with 3 intersection attributes. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  14. 14
  15. 15

    Enhancing obfuscation technique for protecting source code against software reverse engineering by Mahfoudh, Asma

    Published 2019
    “…The proposed technique can be enhanced in the future to protect games applications and mobile applications that are developed by java; it can improve the software development industry. …”
    Get full text
    Get full text
    Thesis
  16. 16

    Rough Set Discretize Classification of Intrusion Detection System by Noor Suhana, Sulaiman, Rohani, Abu Bakar

    Published 2016
    “…In proposed framework, analysis should been done to discretization, reduct and rules stage to determine the significant algorithm and core element in IDS data. The classification using standard voting, since it is a rule-based classification.…”
    Get full text
    Get full text
    Get full text
    Article
  17. 17

    Hotel recommendation system using machine learning by Wong, Wai On

    Published 2025
    “…The future work includes expanding the dataset, refining the recommendation algorithm, using natural language processing techniques with the addition of multilingual reviews, and deploying the system as a user-friendly application or mobile application.…”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  18. 18

    A hybrid approach for artificial immune recognition system / Mahmoud Reza Saybani by Mahmoud Reza, Saybani

    Published 2016
    “…The components of the AIRS2 algorithm that pose problems will be modified. This thesis proposes three new hybrid algorithms: The FRA-AIRS2 algorithm uses fuzzy logic to improve data reduction capability of AIRS2 and to solve the linearity problem associated with resource allocation of AIRS. …”
    Get full text
    Get full text
    Thesis
  19. 19

    Semantic shot classification in soccer videos via playfield ratio and object size considerations. by Abdul Halin, Alfian, Mohd Sharef, Nurfadhlina, Jantan, Azrul Hazri

    Published 2013
    “…Class labels are then accordingly assigned to each frame based on carefully constructed rule-sets. Majority voting is finally performed where the dominant frame labels within each shot is used as the ultimate class label. …”
    Get full text
    Get full text
    Article
  20. 20

    2D and 3D video scene text classification by Xu, J., Shivakumara, P., Lu, T., Tan, C.L.

    Published 2014
    “…In this paper, we propose a novel horizontal and vertical symmetry feature by calculating the gradient direction and the gradient magnitude of each text candidate, which results in Potential Text Candidates (PTCs) after applying the k-means clustering algorithm on the gradient image of each input frame to verify PTC , we explore temporal information of video by proposing an iterative process that continuously verifies the PTCs of the first frame and the successive frames, until the process meets the converging criterion. …”
    Get full text
    Get full text
    Conference or Workshop Item