Search Results - (( developing trust based algorithm ) OR ( java implementation among algorithm ))

Refine Results
  1. 1

    Plagiarism Detection System for Java Programming Assignments by Using Greedy String-Tilling Algorithm by Norulazmi, Kasim

    Published 2008
    “…The prototype system, known as Java Plagiarism Detection System (JPDS) implements the Greedy-String-Tiling algorithm to detect similarities among tokens in a Java source code files. …”
    Get full text
    Get full text
    Get full text
    Thesis
  2. 2

    Direct approach for mining association rules from structured XML data by Abazeed, Ashraf Riad

    Published 2012
    “…The thesis also provides a two different implementation of the modified FLEX algorithm using a java based parsers and XQuery implementation. …”
    Get full text
    Get full text
    Thesis
  3. 3

    A Toolkit for Simulation of Desktop Grid Environment by FOROUSHAN, PAYAM CHINI

    Published 2014
    “…A simulator for desktop grid environment has been developed using Java as the implementation language due to its wide popularity. …”
    Get full text
    Get full text
    Final Year Project
  4. 4

    Trust-based enhanced ACO algorithm for secure routing in IoT by Sharmin, Afsah, Motakabber, S M A, Hassan Abdalla Hashim, Aisha

    Published 2024
    “…In order to provide an energy-efficient and secure routing method for sensors deployed within a dynamic IoT network, this paper presents a trust-aware enhanced ant colony optimization (ACO)-based routing algorithm, incorporating a lightweight trust evaluation model. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  5. 5

    User recommendation algorithm in social tagging system based on hybrid user trust by Mustapha, Norwati, Wong, Pei Voon, Sulaiman, Md. Nasir

    Published 2013
    “…This method is a combination of developing trust network based on user interest similarity and trust network from social network analysis. …”
    Get full text
    Get full text
    Get full text
    Article
  6. 6

    OPTIMIZED MIN-MIN TASK SCHEDULING ALGORITHM FOR SCIENTIFIC WORKFLOWS IN A CLOUD ENVIRONMENT by Murad S.S., Badeel R., Alsandi N.S.A., Alshaaya R.F., Ahmed R.A., Muhammed A., Derahman M.

    Published 2023
    “…According to the simulation results, the proposed algorithm produces the best solution among all algorithms in the proposed cases. � 2021 Little Lion Scientific…”
    Review
  7. 7

    A trust aware secure ant colony optimization based routing algorithm for Internet of Things by Sharmin, Afsah, Anwar, Farhat, Motakabber, S. M. A., Hassan Abdalla Hashim, Aisha

    Published 2023
    “…With the rapid spread of Internet of Things (IoT) systems enhancing the development of IoT applications, the issue of designing a secure routing algorithm for IoT, including reasonable trust management, has attracted more and more research attention. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Proceeding Paper
  8. 8

    Network game (Literati) / Chung Mei Kuen by Chung, Mei Kuen

    Published 2003
    “…The main aspect of this thesis is to produce a networked gaming system, which process players. requested to play the game and enabling users to play the graphical game with people through the network. The algorithm design and implementation method must not only be workable, but also highly efficient in terms of execution speed and response time. …”
    Get full text
    Get full text
    Thesis
  9. 9

    Statistically controlled robust trust computing mechanism for cloud computing by Firdhous, Mohamed, Ghazali, Osman, Hassan, Suhaidi

    Published 2014
    “…Trust computing mechanisms can play an important role in identifying the right service providers who would meet the commitments specified in the Service Level Agreements.Literature has reported several trust computing mechanisms for different distributed systems based on various algorithms and functions.Almost all of them modify the trust scores monotonously even for momentary performance deviations that are reported.This paper proposes a trust computing mechanism that statistically validates the attribute monitored before modifying the trust scores using a hysteresis based algorithm.Hence the proposed mechanism can protect the trust scores from changes due to momentary fluctuations in system performances.The experiments conducted show that the trust scores computed using the proposed mechanism are more representative of the long-term system performance than the ones that were computed without the validation of the inputs.…”
    Get full text
    Get full text
    Get full text
    Article
  10. 10
  11. 11
  12. 12

    Secure ACO-Based Wireless Sensor Network Routing Algorithm for IoT by Sharmin, Afsah, Anwar, Farhat, Motakabber, S. M. A., Hassan Abdalla Hashim, Aisha

    Published 2021
    “…In this paper, a secure bio-inspired WSN (Wireless Sensor Network) routing protocol based on ant colony optimization (ACO) algorithm for IoT has been proposed and analyzed to find secure and optimal path that is energy-efficient as well as aiming at providing trust in IoT environment. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Proceeding Paper
  13. 13
  14. 14

    Comparison of performances of Jaya Algorithm and Cuckoo Search algorithm using benchmark functions by Ahmed, Mashuk, Nasser, Abdullah B., Kamal Z., Zamli, Heripracoyo, Sulistyo

    Published 2022
    “…CS and JA have implemented in the same platform (Intellij IDEA Community Edition 2020.2.3) using the same language (Java). …”
    Get full text
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  15. 15

    iBUST: An intelligent behavioural trust model for securing industrial cyber-physical systems by Azad, Saiful, Mahmud, Mufti, Kamal Zuhairi, Zamli, Kaiser, M. Shamim, Jahan, Sobhana, Razzaque, Md Abdur

    Published 2024
    “…Therefore, this paper proposes an ARL-based intelligent Behavioural Trust Model (iBUST) for securing the CPPS. …”
    Get full text
    Get full text
    Get full text
    Article
  16. 16

    An enhanced ant colony system algorithm for dynamic fault tolerance in grid computing by Saufi, Bukhari

    Published 2020
    “…The proposed algorithm was developed in a simulated grid environment called GridSim and evaluated against other fault tolerance algorithms such as trust-based ACO, fault tolerance ACO, ACO without fault tolerance and ACO with fault tolerance in terms of total execution time, average latency, average makespan, throughput, execution success rate and load balancing. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  17. 17

    Effect of business social responsibility (BSR) on performance of SMEs in Nigeria by Gorondutse, Abdulahi Hassan

    Published 2014
    “…A conceptual framework was developed based on extant literatures and the develop model is based on these BSR constructs Data was collected through hand delivery method by sending questionnaires to 800 SMEs managers/owners. …”
    Get full text
    Get full text
    Get full text
    Thesis
  18. 18

    Access control model based on trust, purpose, and role in materialized view for privacy protection by Salji, Mohd Rafiz

    Published 2019
    “…Previous access control models based on purpose and trust also do not consider protecting sensitive attributes. …”
    Get full text
    Get full text
    Thesis
  19. 19

    Developing a secure mechanism for Bluetooth-based Wireless Personal Area Networks (WPANs) by Othman, Marini, Hassan, Wan Haslina, Hassan Abdalla Hashim, Aisha

    Published 2007
    “…Our work involves developing a prototype for Bluetooth systems using RSA and DSA encryption algorithms. …”
    Get full text
    Get full text
    Get full text
    Proceeding Paper
  20. 20

    Secured agriculture sensor data based on end-to-end encryption using raspberry pi by Choo, Jia Huey

    Published 2025
    “…Additionally, a benchmarking tool was developed to evaluate and compare the performance of these algorithms in terms of speed, memory, CPU usage, and encryption overhead. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis