Search Results - (( developing network trust algorithm ) OR ( java application during algorithm ))

Refine Results
  1. 1

    A trust aware secure ant colony optimization based routing algorithm for Internet of Things by Sharmin, Afsah, Anwar, Farhat, Motakabber, S. M. A., Hassan Abdalla Hashim, Aisha

    Published 2023
    “…With the rapid spread of Internet of Things (IoT) systems enhancing the development of IoT applications, the issue of designing a secure routing algorithm for IoT, including reasonable trust management, has attracted more and more research attention. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Proceeding Paper
  2. 2

    User recommendation algorithm in social tagging system based on hybrid user trust by Mustapha, Norwati, Wong, Pei Voon, Sulaiman, Md. Nasir

    Published 2013
    “…This method is a combination of developing trust network based on user interest similarity and trust network from social network analysis. …”
    Get full text
    Get full text
    Get full text
    Article
  3. 3

    Trust-based enhanced ACO algorithm for secure routing in IoT by Sharmin, Afsah, Motakabber, S M A, Hassan Abdalla Hashim, Aisha

    Published 2024
    “…The trust evaluation system has been enhanced in the development of the proposed routing algorithm and the node trust value is evaluated, sensor node misbehavior is identified, and energy conservation is maximized. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  4. 4

    Secure ACO-Based Wireless Sensor Network Routing Algorithm for IoT by Sharmin, Afsah, Anwar, Farhat, Motakabber, S. M. A., Hassan Abdalla Hashim, Aisha

    Published 2021
    “…The problem of developing effective and secure routing protocols has drawn more interest in network research with the popularization of IoT-connected devices. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Proceeding Paper
  5. 5
  6. 6

    iBUST: An intelligent behavioural trust model for securing industrial cyber-physical systems by Azad, Saiful, Mahmud, Mufti, Kamal Zuhairi, Zamli, Kaiser, M. Shamim, Jahan, Sobhana, Razzaque, Md Abdur

    Published 2024
    “…Therefore, this paper proposes an ARL-based intelligent Behavioural Trust Model (iBUST) for securing the CPPS. For this intelligent TMM, a variant of Frequency Pattern Growth (FP-Growth), called enhanced FP-Growth (EFP-Growth) algorithm is developed by altering the internal data structures for faster execution and by developing a modified exponential decay function (MEDF) to automatically calculate minimum supports for adapting trust evolution characteristics. …”
    Get full text
    Get full text
    Get full text
    Article
  7. 7

    BIOLOGICAL INSPIRED INTRUSION PREVENTION AND SELF-HEALING SYSTEM FOR CRITICAL SERVICES NETWORK by MOHAMED AHMED ELSHEIK, MUNA ELSADIG

    Published 2011
    “…With the explosive development of the critical services network systems and Internet, the need for networks security systems have become even critical with the enlargement of information technology in everyday life. …”
    Get full text
    Get full text
    Thesis
  8. 8

    Rift: a high-performance consensus algorithm for Consortium Blockchain by Khan, Fazeel Ahmed, Ibrahim, Adamu Abubakar, Marwan, Mahmoud, Al-Khasawneh, Mahmoud Ahmad, Alarood, Ala Abdulsalam

    Published 2019
    “…The advances in the consensus mechanism techniques and the development of different variants of consensus algorithms gives a huge impact on its progress. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  9. 9
  10. 10

    Developing a secure mechanism for Bluetooth-based Wireless Personal Area Networks (WPANs) by Othman, Marini, Hassan, Wan Haslina, Hassan Abdalla Hashim, Aisha

    Published 2007
    “…Our work involves developing a prototype for Bluetooth systems using RSA and DSA encryption algorithms. …”
    Get full text
    Get full text
    Get full text
    Proceeding Paper
  11. 11

    Individual And Ensemble Pattern Classification Models Using Enhanced Fuzzy Min-Max Neural Networks by F. M., Mohammed

    Published 2014
    “…In addition, an agent-based framework is capitalized as a robust ensemble model to house multiple EFMM-based networks. A useful trust measurement method known as Certified Belief in Strength (CBS) is developed and incorporated into the ensemble model for exploiting the predictive performances of different EFMM-based networks.…”
    Get full text
    Get full text
    Thesis
  12. 12

    A Voting Technique Of Multilayer Perceptron Ensemble For Classification Application by Talib, Hafizah

    Published 2014
    “…In order to choose the final output of MLPE, a new voting algorithm named Trust-Sum Voting (TSV) is proposed. …”
    Get full text
    Get full text
    Thesis
  13. 13

    SUDOKU HELPER by Abdul Razak, Muhammad Asyraf

    Published 2015
    “…In this paper research, author presents an algorithm to provide a tutorial for any Sudoku player who got stuck during the solving process. …”
    Get full text
    Get full text
    Final Year Project
  14. 14

    VANET SECURITY FRAMEWORK FOR LOW LATENCY SAFETY APPLICATIONS by WAGAN, ASIF ALI

    Published 2012
    “…The proposed framework is expected to improve the security mechanism in VANET by developing trust relationship among the neighboring nodes, hence forming trusted groups. …”
    Get full text
    Get full text
    Thesis
  15. 15

    Detection of black hole nodes in mobile ad hoc network using hybrid trustworthiness and energy consumption techniques by Mustafa, Ahmed Sudad

    Published 2017
    “…Mobile ad-hoc network (MANET) is an evolving technology that is utilized in different applications (i.e. military surveillance, personal network, etc.) and developed in the recent years. …”
    Get full text
    Get full text
    Get full text
    Thesis
  16. 16

    Secured agriculture sensor data based on end-to-end encryption using raspberry pi by Choo, Jia Huey

    Published 2025
    “…Additionally, a benchmarking tool was developed to evaluate and compare the performance of these algorithms in terms of speed, memory, CPU usage, and encryption overhead. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  17. 17

    Trust-aware authentication and authorization for IoT: a federated machine learning approach by Ahmed, Kazi Istiaque, Tahir, Mohammad, Lau, Sian Lun, Habaebi, Mohamed Hadi, Ahad, Abdul, Mughees, Amna

    Published 2024
    “…The proposed solution for AA IoT utilizes a trust calculation algorithm based on Federated Learning (FL), which is suitable for IoT environments and enables data privacy and scalability. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  18. 18

    Efficient node cooperation stimulation mechanism in wireless multihop networks by Samian, Normalia

    Published 2017
    “…The mechanism is called Trust Features-based Evidence (TFE) which is developed based on significant and unique trust features to ensure that the reported information is of actual behaviour of an observed node. …”
    Get full text
    Get full text
    Get full text
    Thesis
  19. 19

    Talkout : Protecting mental health application with a lightweight message encryption by Gavin Teo Juen

    Published 2022
    “…The investigation of lightweight message encryption algorithms is conducted with systematic quantitative literature and experiment implementation in Java and Android running environment. …”
    Get full text
    Get full text
    Get full text
    Academic Exercise
  20. 20

    Adaptive manet OLSR routing protocol for optimal route selection in high dynamic network by Al-Kharasani, Nori Mohammed Abdulkarem

    Published 2020
    “…The third objective considers reducing control topology overhead as well as improving the scalability of network. To provide the necessary robustness, a new Cluster-based Adoptive Cooperative Algorithm (CACA) for VANET is introduced to improve the scalability of the network and reduce control overhead. …”
    Get full text
    Get full text
    Thesis