Search Results - (( java implementation modified algorithm ) OR ( using voting process algorithm ))
Search alternatives:
- implementation modified »
- java implementation »
- process algorithm »
- voting process »
-
1
Voting algorithms for large scale fault-tolerant systems
Published 2011“…In addition to having all the features of sequential algorithm, this algorithm has far less time complexity and has higher processing speed in voting process in large scale systems. …”
Get full text
Get full text
Thesis -
2
E-voting system with physical verification using OTP algorithm / Badrul Amin Mohd Kassim
Published 2021Get full text
Get full text
Student Project -
3
Direct approach for mining association rules from structured XML data
Published 2012“…The thesis also provides a two different implementation of the modified FLEX algorithm using a java based parsers and XQuery implementation. …”
Get full text
Get full text
Thesis -
4
Exact parallel plurality voting algorithm for totally ordered object space fault-tolerant systems
Published 2012“…To resolve the problem associated with sequential plurality voter in dealing with large number of inputs, this paper introduces a new generation of plurality voter based on parallel algorithms. Since parallel algorithms normally have high processing speed and are especially appropriate for large scale systems, they are therefore used to achieve a new parallel plurality voting algorithm by using (n/log n) processors on EREW shared-memory PRAM. …”
Get full text
Get full text
Get full text
Article -
5
A secure, anonymous and verifiable E-Voting system
Published 2020“…Furthermore, this paper also proposes a more secure voting system which uses some encryption and hashing algorithms in order to solve the negative impacts of the existing voting systems. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
6
Secure E-Voting With Blind Signature
Published 2003“…We have developed an electronic voting system, E-Voting for a general election. E-Voting system employs cryptographic techniques to overcome the security issues in the election process. …”
Get full text
Get full text
Conference or Workshop Item -
7
OPTIMIZED MIN-MIN TASK SCHEDULING ALGORITHM FOR SCIENTIFIC WORKFLOWS IN A CLOUD ENVIRONMENT
Published 2023“…To achieve this, we propose a new noble mechanism called Optimized Min-Min (OMin-Min) algorithm, inspired by the Min-Min algorithm. The objectives of this work are: i) to provide a comprehensive review of the cloud and scheduling process; ii) to classify the scheduling strategies and scientific workflows; iii) to implement our proposed algorithm with various scheduling algorithms (i.e., Min-Min, Round-Robin, Max-Min, and Modified Max-Min) for performance comparison, within different cloudlet sizes (i.e., small, medium, large, and heavy) in three scientific workflows (i.e., Montage, Epigenomics, and SIPHT); and iv) to investigate the performance of the implemented algorithms by using CloudSim. …”
Review -
8
Managing MyGRANTS Fragmented Database Using Binary Vote Assignment Grid Quorum with Association Rule (BVAGQ-AR) Replication Model
Published 2015“…We address how to build reliable system by using the proposed BVAGQ-AR algorithm for distributed database fragmentation by using Malaysian Greater Research Network (MyGRANTS) data as a case study. …”
Get full text
Get full text
Conference or Workshop Item -
9
Binary Vote Assignment on Cloud Quorum Algorithm for Fragmented MyGRANTS Database Replication
Published 2015“…We address how to build reliable systems by using the proposed BVACQ algorithm for distributed database fragmentation by using Malaysian Greater Research Network (MyGRANTS) data in our case study. …”
Get full text
Get full text
Get full text
Article -
10
Extraction of forest plantation extents using majority voting classification fusion algorithm
Published 2018“…Three different classifiers methods (support vector machine, k-nearest neighborhood, and random forest) were employed and then fused by majority voting algorithm to generate more robust and precise classification result. …”
Get full text
Get full text
Conference or Workshop Item -
11
An e-voting application using cryptography technology
Published 2020“…This will ensure that users can achieve the effect of anonymous voting during the voting process, and only the system itself can know. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
12
A Preliminary Study On Firefly Algorithm Approach For Travelling Salesman Problem
Published 2013“…This paper explores the use of one of swarm intelligence available, Firefly Algorithm in finding the optimal solution of the problem. …”
Get full text
Get full text
Conference or Workshop Item -
13
Prevention And Detection Mechanism For Security In Passive Rfid System
Published 2013“…The proposed protocol is designed with lightweight cryptographic algorithm, including XOR, Hamming distance, rotation and a modified linear congruential generator (MLCG). …”
Get full text
Get full text
Thesis -
14
K-gen phishguard: an ensemble approach for phishing detection with k-means and genetic algorithm
Published 2025“…From the results, an accuracy of 99% is achieved using the voting ensemble technique with feature selection compared with 77.3% without feature selection. …”
Get full text
Get full text
Get full text
Article -
15
Automatic generation of content security policy to mitigate cross site scripting
Published 2016“…It can be extended to support generating CSP for contents that are modified by JavaScript after loading. Current approach inspects the static contents of URLs.…”
Get full text
Get full text
Conference or Workshop Item -
16
Condition diagnosis of bearing system using multiple classifiers of ANNs and adaptive probabilities in genetic algorithms
Published 2014“…The mANNs are used to provide several best initial weights which are optimized by APGAs.The set optimized weights from APGAs, afterward, are used as the best weights for condition diagnosis. …”
Get full text
Get full text
Get full text
Article -
17
Managing Fragmented Database Replication for Mygrants Using Binary Vote Assignment on Cloud Quorum
Published 2014“…In this paper, we will manage fragmented database replication and transaction management for Malaysian Greater Research Network (MyGRANTS) using a new proposed algorithm called Binary Vote Assignment on Cloud Quorum (BVACQ). …”
Get full text
Get full text
Get full text
Article -
18
Binary vote assignment on grid quorum replication technique with association rule
Published 2018“…First step is mining the data by using Apriori algorithm from Association Rules. It is used to discover the correlation between data. …”
Get full text
Get full text
Thesis -
19
Dense-cluster based voting approach for license plate identification
Published 2018“…This paper presents a new method called Dense Cluster based Voting (DCV) for identifying an input license plate image as normal or taxi such that suitable recognition algorithms can be used to achieve better recognition rate. …”
Get full text
Get full text
Article -
20
TOPSIS-based Regression Algorithms Evaluation
Published 2022“…The results showed that different preferences led to varying algorithm rankings, but top-ranked algorithms were distinguished using a specific dataset. …”
Get full text
Get full text
Article
