Search Results - (( developing trust control algorithm ) OR ( java data normalization algorithm ))

  • Showing 1 - 13 results of 13
Refine Results
  1. 1

    Web-based clustering tool using fuzzy k-mean algorithm / Ahmad Zuladzlan Zulkifly by Zulkifly, Ahmad Zuladzlan

    Published 2019
    “…Even a normal people using clustering to grouping their data. …”
    Get full text
    Get full text
    Thesis
  2. 2
  3. 3

    SANAsms: Secure short messaging system for secure GSM mobile communication by Anuar, N.B., Azlan, I.M., Wahid, A.W.A., Zakaria, O.

    Published 2008
    “…The system is developed using Java 2 Micro Edition (J2ME) which is written in Java. …”
    Get full text
    Get full text
    Conference or Workshop Item
  4. 4

    Access control model based on trust, purpose, and role in materialized view for privacy protection by Salji, Mohd Rafiz

    Published 2019
    “…An algorithm is discussed to describe the access control mechanism by first, authenticating user's role, purpose, and trust, before authorizing access of authorized and trusted user. …”
    Get full text
    Get full text
    Thesis
  5. 5

    Rift: a high-performance consensus algorithm for Consortium Blockchain by Khan, Fazeel Ahmed, Ibrahim, Adamu Abubakar, Marwan, Mahmoud, Al-Khasawneh, Mahmoud Ahmad, Alarood, Ala Abdulsalam

    Published 2019
    “…The advances in the consensus mechanism techniques and the development of different variants of consensus algorithms gives a huge impact on its progress. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  6. 6

    Features selection for intrusion detection system using hybridize PSO-SVM by Tabaan, Alaa Abdulrahman

    Published 2016
    “…Electing the best set of features will help to improve the classifier predictions in terms of the normal and abnormal pattern. The simulation will be carried on WEKA tool, which allows us to call some data mining methods under JAVA environment. …”
    Get full text
    Get full text
    Thesis
  7. 7

    Trust-aware authentication and authorization for IoT: a federated machine learning approach by Ahmed, Kazi Istiaque, Tahir, Mohammad, Lau, Sian Lun, Habaebi, Mohamed Hadi, Ahad, Abdul, Mughees, Amna

    Published 2024
    “…The proposed solution for AA IoT utilizes a trust calculation algorithm based on Federated Learning (FL), which is suitable for IoT environments and enables data privacy and scalability. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  8. 8

    Stability analysis of multirotor drone with water jet payload by Nik Mohd Azrin, Nik Aziz, Daing Mohamad Nafiz, Daing Idris, Saiful Anwar, Che Ghani, Ahmad Fitri, Yusop, Mohd Adnin, Hamidi, Muhammad Hanif, Abd. Rasid

    Published 2022
    “…Even with external disturbance, control system algorithm can adjust tilting angle to stabilize quadcopter. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  9. 9

    Challenges of hidden data in the unused area two within executable files by Naji, Ahmed Wathik, Zaidan, A.A., Zaidan, B.B.

    Published 2009
    “…The designed algorithms were intended to help in proposed system aim to hide and retract information (data file) with in unused area 2 of any execution file(exe.file). …”
    Get full text
    Get full text
    Get full text
    Article
  10. 10

    Anfis Modelling On Diabetic Ketoacidosis For Unrestricted Food Intake Conditions by Saraswati, Galuh Wilujeng

    Published 2017
    “…Two sets of experimental data involving 20 diabetic patients and 20 healthy subjects were collected from CITO laboratory Semarang Central Java, Indonesia. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  11. 11

    Enhancement of Security Architecture for Smartcard Based Authentication Protocols by Mohammed, Lawan Ahmed

    Published 2004
    “…As with all software development, good design and engineering practices are important for software quality. …”
    Get full text
    Get full text
    Thesis
  12. 12
  13. 13

    Adaptive manet OLSR routing protocol for optimal route selection in high dynamic network by Al-Kharasani, Nori Mohammed Abdulkarem

    Published 2020
    “…To provide the necessary robustness, a new Cluster-based Adoptive Cooperative Algorithm (CACA) for VANET is introduced to improve the scalability of the network and reduce control overhead. …”
    Get full text
    Get full text
    Thesis