Search Results - (( developing voting process algorithm ) OR ( java data normalization algorithm ))

  • Showing 1 - 15 results of 15
Refine Results
  1. 1

    Secure E-Voting With Blind Signature by Ibrahim, Subariah, Kamat, Maznah, Salleh, Mazleena, Abdul Aziz, Shah Rizan

    Published 2003
    “…We have developed an electronic voting system, E-Voting for a general election. …”
    Get full text
    Get full text
    Conference or Workshop Item
  2. 2

    Web-based clustering tool using fuzzy k-mean algorithm / Ahmad Zuladzlan Zulkifly by Zulkifly, Ahmad Zuladzlan

    Published 2019
    “…Even a normal people using clustering to grouping their data. …”
    Get full text
    Get full text
    Thesis
  3. 3

    SANAsms: Secure short messaging system for secure GSM mobile communication by Anuar, N.B., Azlan, I.M., Wahid, A.W.A., Zakaria, O.

    Published 2008
    “…The system is developed using Java 2 Micro Edition (J2ME) which is written in Java. …”
    Get full text
    Get full text
    Conference or Workshop Item
  4. 4

    TOPSIS-based Regression Algorithms Evaluation by Abu-Shareha, Ahmad Adel

    Published 2022
    “…The developed approach established the weights, which were the core of the evaluation process, to various values to mimic and address the regression’s utilization in multiple applications with different concerns and using distinct datasets. …”
    Get full text
    Get full text
    Article
  5. 5

    Features selection for intrusion detection system using hybridize PSO-SVM by Tabaan, Alaa Abdulrahman

    Published 2016
    “…Electing the best set of features will help to improve the classifier predictions in terms of the normal and abnormal pattern. The simulation will be carried on WEKA tool, which allows us to call some data mining methods under JAVA environment. …”
    Get full text
    Get full text
    Thesis
  6. 6
  7. 7

    Hotel recommendation system using machine learning by Wong, Wai On

    Published 2025
    “…The future work includes expanding the dataset, refining the recommendation algorithm, using natural language processing techniques with the addition of multilingual reviews, and deploying the system as a user-friendly application or mobile application.…”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  8. 8

    Challenges of hidden data in the unused area two within executable files by Naji, Ahmed Wathik, Zaidan, A.A., Zaidan, B.B.

    Published 2009
    “…The designed algorithms were intended to help in proposed system aim to hide and retract information (data file) with in unused area 2 of any execution file(exe.file). …”
    Get full text
    Get full text
    Get full text
    Article
  9. 9

    A hybrid approach for artificial immune recognition system / Mahmoud Reza Saybani by Mahmoud Reza, Saybani

    Published 2016
    “…Many researchers, who have developed methods and algorithms within the field of artificial intelligence, machine learning and data mining, have addressed extracting useful information from the data. …”
    Get full text
    Get full text
    Thesis
  10. 10

    Distance measure and its application to decision making, medical diagnosis, and pattern recognition problems under complex picture fuzzy sets by Khan Z., Hussain F., Rahim T., Jan R., Boulaaras S.

    Published 2025
    “…Finally, we developed an algorithm using complex picture fuzzy environments and applied it to a practical application concerning decision making, medical diagnosis, and pattern recognition problems. ? …”
    Article
  11. 11

    Pre-processing strategies for skin detection using MLP by Chelsia Amy Doukim

    Published 2011
    “…These features will be used as inputs to the MLP classifiers. A modified Growing algorithm for finding the number of neurons in the hidden layer of a neural network was also developed it was able to reduce the computational time compared to the conventional Growing algorithm. …”
    Get full text
    Get full text
    Get full text
    Thesis
  12. 12

    Augmenting the Robustness and Efficiency of Violence Detection Systems for Surveillance and Non-Surveillance Scenarios by MUHAMMAD, SHOAIB, ASAD, ULLAH, Irshad, Ahmed Abbasi, Fahad, Algarni, Adnan Shahid, Khan

    Published 2022
    “…EvoKeyNet utilizes an evolutionary algorithm to select optimal feature attributes, while KFCRNet employs an ensemble of LSTM, Bi-LSTM, and GRU models with a voting scheme. …”
    Get full text
    Get full text
    Get full text
    Article
  13. 13

    Anfis Modelling On Diabetic Ketoacidosis For Unrestricted Food Intake Conditions by Saraswati, Galuh Wilujeng

    Published 2017
    “…Two sets of experimental data involving 20 diabetic patients and 20 healthy subjects were collected from CITO laboratory Semarang Central Java, Indonesia. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  14. 14

    Exploring employee working productivity: initial insights from machine learning predictive analytics and visualization by Razali, Mohd Norhisham, Ibrahim, Norizuandi, Hanapi, Rozita, Mohd Zamri, Norfarahzila, Abdul Manaf, Syaifulnizam

    Published 2023
    “…Data from an academic institution were collected and pre-processed by encoding relevant features before applying various machine learning predictive models. …”
    Get full text
    Get full text
    Get full text
    Article
  15. 15

    Development of a hybrid machine learning model for rockfall source and hazard assessment using laser scanning data and GIS by Fanos, Ali Mutar

    Published 2019
    “…Different machine learning algorithms (Artificial Neural Network [ANN], K Nearest Neighbor [KNN] and Support Vector Machine [SVM]) were tested individually and with various ensemble models (bagging, voting, and boosting) to detect the probability of the landslide and rockfall occurrences. …”
    Get full text
    Get full text
    Thesis