Search Results - (( developing technology trust algorithm ) OR ( java implication based algorithm ))
Search alternatives:
- developing technology »
- implication based »
- technology trust »
- java implication »
- trust algorithm »
-
1
The algorithm design for trust in peer-to-peer bitcoin transactions on blockchain/ Irni Eliana Khairuddin
Published 2021“…Hence, these are the primary motivation of this study, to design the algorithm for trust in peer-to-peer transaction. The design work was conducted by using a physical blockchain kit, namely BlocKit with 15 Bitcoin Blockchain experienced to explore the opportunity to develop the algorithm.…”
Get full text
Get full text
Get full text
Article -
2
User recommendation algorithm in social tagging system based on hybrid user trust
Published 2013“…This method is a combination of developing trust network based on user interest similarity and trust network from social network analysis. …”
Get full text
Get full text
Get full text
Article -
3
Rift: a high-performance consensus algorithm for Consortium Blockchain
Published 2019“…The advances in the consensus mechanism techniques and the development of different variants of consensus algorithms gives a huge impact on its progress. …”
Get full text
Get full text
Get full text
Get full text
Article -
4
-
5
-
6
-
7
The influence of Robo-advisory services on Malaysia university student’s investment intention
Published 2025“…Keywords: Robo-Advisory Services; Perceived Risk; Trust; Ease of Use; Technology Acceptance Model Subject Area: HG4501-6051 Investment, capital formation, speculation…”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
8
Secured agriculture sensor data based on end-to-end encryption using raspberry pi
Published 2025Get full text
Get full text
Final Year Project / Dissertation / Thesis -
9
BIOLOGICAL INSPIRED INTRUSION PREVENTION AND SELF-HEALING SYSTEM FOR CRITICAL SERVICES NETWORK
Published 2011“…With the explosive development of the critical services network systems and Internet, the need for networks security systems have become even critical with the enlargement of information technology in everyday life. …”
Get full text
Get full text
Thesis -
10
'Chapter 7: Smartphone penetration test: Securing Industry 5.0 mobile applications' in "1st Edition, The Future of Human-Computer Integration Industry 5.0 Technology, Tools, and Al...
Published 2024“…The Future of Human-Computer Integration: Industry 5.0 Technology, Tools, and Algorithms provides a valuable insight into how Industry 5.0 technologies, tools, and algorithms can revolutionise industries and drive innovation. …”
Get full text
Get full text
Get full text
Book Chapter -
11
-
12
Enhanced human activity recognition framework for wearable devices based on explainable AI
Published 2024Get full text
Get full text
Get full text
Conference or Workshop Item -
13
Digital Quran With Storage Optimization Through Duplication Handling And Compressed Sparse Matrix Method
Published 2024thesis::doctoral thesis -
14
VANET SECURITY FRAMEWORK FOR LOW LATENCY SAFETY APPLICATIONS
Published 2012“…The proposed framework is expected to improve the security mechanism in VANET by developing trust relationship among the neighboring nodes, hence forming trusted groups. …”
Get full text
Get full text
Thesis -
15
'Chapter 10: 5G-enabled IoT applications in healthcare: Transforming the Industry 5.0 healthcare landscape' in "1st Edition, The Future of Human-Computer Integration Industry 5.0 T...
Published 2024“…The Future of Human-Computer Integration: Industry 5.0 Technology, Tools, and Algorithms provides a valuable insight into how Industry 5.0 technologies, tools, and algorithms can revolutionise industries and drive innovation. …”
Get full text
Get full text
Get full text
Book Chapter -
16
A study on one way hashing function and its application for FTMSK webmail / Noor Hasimah Ibrahim Teo
Published 2005“…The research are aim to detemriine security of using one way hashing function at client side for FTMSK webmail login system and design framework for one way hashing function. A prototype is developed using MD5 algorithm and based on prototype approach, since it study on existing system. …”
Get full text
Get full text
Thesis -
17
Stability analysis of multirotor drone with water jet payload
Published 2022Get full text
Get full text
Get full text
Conference or Workshop Item -
18
SwiftCare: specialist appointment system
Published 2025“…Made with an agile approach, the SwiftCare application has been developed on trusted platforms like Android Studio and Firebase that make it secure, scalable, and easy to navigate. …”
Get full text
Get full text
Student Project -
19
Detection of black hole nodes in mobile ad hoc network using hybrid trustworthiness and energy consumption techniques
Published 2017“…Mobile ad-hoc network (MANET) is an evolving technology that is utilized in different applications (i.e. military surveillance, personal network, etc.) and developed in the recent years. …”
Get full text
Get full text
Get full text
Thesis -
20
Enhancing user authentication for cloud web-based application / Detar Beqo
Published 2018“…It uses an enhanced encryption algorithm, and the data is stored securely in the cloud systems. …”
Get full text
Get full text
Get full text
Thesis
