Search Results - (( developing trust control algorithm ) OR ( java _ normalization algorithm ))
Search alternatives:
- normalization algorithm »
- developing trust »
- trust control »
-
1
-
2
Access control model based on trust, purpose, and role in materialized view for privacy protection
Published 2019“…An algorithm is discussed to describe the access control mechanism by first, authenticating user's role, purpose, and trust, before authorizing access of authorized and trusted user. …”
Get full text
Get full text
Thesis -
3
Rift: a high-performance consensus algorithm for Consortium Blockchain
Published 2019“…The advances in the consensus mechanism techniques and the development of different variants of consensus algorithms gives a huge impact on its progress. …”
Get full text
Get full text
Get full text
Get full text
Article -
4
Improving resource management with multi-instance broker scheduling algorithm in hierarchical grid computing
Published 2016“…The designed modules is in the form of algorithms, GridSim, Java Development Kits and Java Language used to support the design process whereas the Netbeans software serves as the platform to simulate the experiment so as to obtain the results. …”
Get full text
Get full text
Get full text
Thesis -
5
SANAsms: Secure short messaging system for secure GSM mobile communication
Published 2008“…The system is developed using Java 2 Micro Edition (J2ME) which is written in Java. …”
Get full text
Get full text
Conference or Workshop Item -
6
Web-based clustering tool using fuzzy k-mean algorithm / Ahmad Zuladzlan Zulkifly
Published 2019“…On the Construction phase, the development of the prototype has been started. All the algorithm for the engine has been developed by using Java script language. …”
Get full text
Get full text
Thesis -
7
Parallel distributed genetic algorithm development based on microcontrollers framework
Published 2023Conference paper -
8
Features selection for intrusion detection system using hybridize PSO-SVM
Published 2016“…Electing the best set of features will help to improve the classifier predictions in terms of the normal and abnormal pattern. The simulation will be carried on WEKA tool, which allows us to call some data mining methods under JAVA environment. …”
Get full text
Get full text
Thesis -
9
Trust-aware authentication and authorization for IoT: a federated machine learning approach
Published 2024“…The proposed solution for AA IoT utilizes a trust calculation algorithm based on Federated Learning (FL), which is suitable for IoT environments and enables data privacy and scalability. …”
Get full text
Get full text
Get full text
Get full text
Article -
10
Stability analysis of multirotor drone with water jet payload
Published 2022“…Even with external disturbance, control system algorithm can adjust tilting angle to stabilize quadcopter. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
11
A multi-filter feature selection in detecting distributed denial-of-service attack
Published 2019“…In addition, the proposed M2FS method is developed through WEKA API with Java Programming language using the IDE of Eclipse Java. …”
Get full text
Get full text
Get full text
Get full text
Conference or Workshop Item -
12
Enhancement of Security Architecture for Smartcard Based Authentication Protocols
Published 2004“…As with all software development, good design and engineering practices are important for software quality. …”
Get full text
Get full text
Thesis -
13
A Bio-Inspired Behavior-Based Hybrid Framework for Ransomware Detection
Published 2026journal-article -
14
Challenges of hidden data in the unused area two within executable files
Published 2009“…Results: The programs were coded in Java computer language and implemented on Pentium PC. …”
Get full text
Get full text
Get full text
Article -
15
Adaptive manet OLSR routing protocol for optimal route selection in high dynamic network
Published 2020“…To provide the necessary robustness, a new Cluster-based Adoptive Cooperative Algorithm (CACA) for VANET is introduced to improve the scalability of the network and reduce control overhead. …”
Get full text
Get full text
Thesis -
16
Anfis Modelling On Diabetic Ketoacidosis For Unrestricted Food Intake Conditions
Published 2017“…The project has also implemented the optimization process onto the proposed ANFIS model through the hybrid of Genetic Algorithm on the fuzzy membership function of the ANFIS model. …”
Get full text
Get full text
Get full text
Get full text
Thesis
