Search Results - (( problem voting system algorithm ) OR ( java implementation using algorithm ))
Search alternatives:
- implementation using »
- java implementation »
- system algorithm »
- using algorithm »
- problem voting »
- voting system »
-
1
Voting algorithms for large scale fault-tolerant systems
Published 2011“…In a nut shell, we tried to introduce voting algorithms and structures suitable for large scale fault-tolerant systems which have optimal and proper time complexity (in parallel voting algorithms) and more reliability and availability (in enhanced m-out-of-n voting algorithm) compared to the basic types.…”
Get full text
Get full text
Thesis -
2
Ancestral dynamic voting algorithm for mutual exclusion in partitioned distributed systems
Published 2013“…Simulations show that the new algorithm, ancestral dynamic voting algorithm, improves the availability and lifetime of service in faulty environments, regardless of the number of sites and topology of the system. …”
Get full text
Get full text
Get full text
Article -
3
Exact parallel plurality voting algorithm for totally ordered object space fault-tolerant systems
Published 2012“…Since parallel algorithms normally have high processing speed and are especially appropriate for large scale systems, they are therefore used to achieve a new parallel plurality voting algorithm by using (n/log n) processors on EREW shared-memory PRAM. …”
Get full text
Get full text
Get full text
Article -
4
A secure, anonymous and verifiable E-Voting system
Published 2020“…Furthermore, this paper also proposes a more secure voting system which uses some encryption and hashing algorithms in order to solve the negative impacts of the existing voting systems. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
5
Sheet C1 Pattern Number Recognition Using Artificial Immune System Optimization
Published 2022“…In order to recognize the numerical patterns on sheet C1, we, therefore, require a method that uses the Artificial Immune System (AIS), specifically the CSA (Clonal Selection Algorithm) algorithm, which is one of the AIS system's algorithms for optimization. …”
Get full text
Get full text
Get full text
Article -
6
Improved voting technique for ensemble of MLP system applied on various classification data / Saodah Omar, Iza Sazanita Isa and Junita Mohd Saleh.
Published 2010“…Therefore, this project intends to investigate the capability of multiple MLP system with majority voting technique. It is a system which consists of all the best-performed MLPs and a single final output from these MLPs is selected by the voting system. …”
Get full text
Get full text
Research Reports -
7
RSA Encryption & Decryption using JAVA
Published 2006“…References and theories to support the research of 'RSA Encryption/Decryption using Java' have been disclosed in Literature Review section. …”
Get full text
Get full text
Final Year Project -
8
Preserving anonymity in eVoting using authentication techniques: a review / Nurain Nabilah Salehuddin, Siti Rahayu Abdul Aziz and Shahadan Saad
Published 2022“…As a result, the primary concentration of this article will be on the problem of maintaining voters' anonymity within electronic voting systems. …”
Get full text
Get full text
Conference or Workshop Item -
9
Provider independent cryptographic tools
Published 2003“…The library is implemented by using Java cryptographic service provider framework that conforms to Java Cryptographic Architecture (JCA) and Java Cryptographic Extension (JCE). …”
Get full text
Get full text
Get full text
Monograph -
10
Direct approach for mining association rules from structured XML data
Published 2012“…The thesis also provides a two different implementation of the modified FLEX algorithm using a java based parsers and XQuery implementation. …”
Get full text
Get full text
Thesis -
11
Plagiarism Detection System for Java Programming Assignments by Using Greedy String-Tilling Algorithm
Published 2008“…The prototype system, known as Java Plagiarism Detection System (JPDS) implements the Greedy-String-Tiling algorithm to detect similarities among tokens in a Java source code files. …”
Get full text
Get full text
Get full text
Thesis -
12
Ant system and weighted voting method for multiple classifier systems
Published 2018“…A diverse classifier ensemble is constructed by training them with different feature set partitions. The ant system-based algorithm is used to form the optimal feature set partitions. …”
Get full text
Get full text
Get full text
Article -
13
Managing MyGRANTS Fragmented Database Using Binary Vote Assignment Grid Quorum with Association Rule (BVAGQ-AR) Replication Model
Published 2015“…This paper propose a new algorithm namely Binary Vote Assignment on Grid Quorum with Association Rule (BVAGQ-AR) in order to handle fragmented database replication. …”
Get full text
Get full text
Conference or Workshop Item -
14
Performance evaluation of real-time multiprocessor scheduling algorithms
Published 2016“…We hyave used the CPU profiler of Oracle JavaTM VisualVM to monitor the execution of LRE-TL as well as USG algorithms. …”
Get full text
Get full text
Conference or Workshop Item -
15
Automatic Number Plate Recognition on android platform: With some Java code excerpts
Published 2016“…On the other hand, the traditional algorithm using template matching only obtained 83.65% recognition rate with 0.97 second processing time. …”
Get full text
Get full text
Get full text
Book -
16
K-gen phishguard: an ensemble approach for phishing detection with k-means and genetic algorithm
Published 2025“…In the first phase, the best set of features is identified by the Genetic algorithm and is utilised by the K-means clustering algorithm to divide the dataset into groups with similar traits. …”
Get full text
Get full text
Get full text
Article -
17
Audio Streaming System Using Real-Time Transport Protocol Based on Java Media Framework
Published 2004“…Java Media Framework library and the RTP protocol for audio transmission were used as development tools.The developed system designed in this thesis together with experimental results proved that the system could be implemented successfully. …”
Get full text
Get full text
Thesis -
18
Code-Based Signature Schemes For Online Voting System Based On The Blockchain Technology
Published 2022“…After the construction of these cryptographic primitives, we look into the possibility of implementations of these signature schemes for the online voting system based on the blockchain technology. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
19
Optimal assignments of versions to processors in fault-tolerant computer systems
Published 1988“…When k = 1; a linear assignment problem is obtained. For voting system, k must be at least 2 and, in this case the objective function is non-linear. …”
Get full text
Get full text
Article -
20
Classification of Mental Health Level of Students Using SMOTE and Soft Voting Ensemble Classifier and the DASS-21 Profile
“…This study proposes a comprehensive approach to address the rise in mental health problems among college students. It leverages the Synthetic Minority Over-sampling Technique (SMOTE) to address the class imbalance in the dataset and employs a Voting Ensemble with soft voting to combine several base algorithms (Logistic Regression, Random Forest, Gradient Boosting, and XGBoost/SVM) for accurate prediction of mental health levels (normal, mild, moderate, severe, very severe). …”
Get full text
Get full text
Get full text
Get full text
Article
