Search Results - (( developing trust data algorithm ) OR ( java estimation using algorithm ))

Refine Results
  1. 1

    Trust-based enhanced ACO algorithm for secure routing in IoT by Sharmin, Afsah, Motakabber, S M A, Hassan Abdalla Hashim, Aisha

    Published 2024
    “…The trust evaluation system has been enhanced in the development of the proposed routing algorithm and the node trust value is evaluated, sensor node misbehavior is identified, and energy conservation is maximized. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  2. 2

    Multi-floor indoor location estimation system based on wireless local area network by Chua, Tien Han

    Published 2007
    “…The most probable match is selected and returned as estimated location based on Bayesian filtering algorithm. …”
    Get full text
    Get full text
    Thesis
  3. 3

    Ant colony optimization algorithm for load balancing in grid computing by Ku-Mahamud, Ku Ruhana, Mohamed Din, Aniza

    Published 2012
    “…Global pheromone update is performed after the completion of processing the jobs in order to reduce the pheromone value of resources.A simulation environment was developed using Java programming to test the performance of the proposed EACO algorithm against other ant based algorithm, in terms of resource utilization. …”
    Get full text
    Get full text
    Get full text
    Monograph
  4. 4

    iBUST: An intelligent behavioural trust model for securing industrial cyber-physical systems by Azad, Saiful, Mahmud, Mufti, Kamal Zuhairi, Zamli, Kaiser, M. Shamim, Jahan, Sobhana, Razzaque, Md Abdur

    Published 2024
    “…Therefore, this paper proposes an ARL-based intelligent Behavioural Trust Model (iBUST) for securing the CPPS. For this intelligent TMM, a variant of Frequency Pattern Growth (FP-Growth), called enhanced FP-Growth (EFP-Growth) algorithm is developed by altering the internal data structures for faster execution and by developing a modified exponential decay function (MEDF) to automatically calculate minimum supports for adapting trust evolution characteristics. …”
    Get full text
    Get full text
    Get full text
    Article
  5. 5
  6. 6

    Enhancement of Ant Colony Optimization for Grid Job Scheduling and Load Balancing by Husna, Jamal Abdul Nasir

    Published 2011
    “…A simulation environment was developed using Java programming to test the performance of the proposed EACO algorithm against existing grid resource management algorithms such as Antz algorithm, Particle Swarm Optimization algorithm, Space Shared algorithm and Time Shared algorithm, in terms of processing time and resource utilization. …”
    Get full text
    Get full text
    Get full text
    Thesis
  7. 7
  8. 8

    Access control model based on trust, purpose, and role in materialized view for privacy protection by Salji, Mohd Rafiz

    Published 2019
    “…An algorithm is discussed to describe the access control mechanism by first, authenticating user's role, purpose, and trust, before authorizing access of authorized and trusted user. …”
    Get full text
    Get full text
    Thesis
  9. 9

    Secured agriculture sensor data based on end-to-end encryption using raspberry pi by Choo, Jia Huey

    Published 2025
    “…The system integrates multiple robust encryption algorithms—AES-128, AES-256, ChaCha20, and Twofish—for end-to-end data protection. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  10. 10

    Resource management in grid computing using ant colony optimization by Ku-Mahamud, Ku Ruhana, Mohamed Din, Aniza

    Published 2011
    “…Resources with high pheromone value are selected to process the submitted jobs.Global pheromone update is performed after completion processing the jobs in order to reduce the pheromone value of resources.A simulation environment was developed using Java programming to test the performance of the proposed EACO algorithm against other ant based algorithm, in terms of resource utilization.Experimental results show that EACO produced better grid resource management solution.…”
    Get full text
    Get full text
    Get full text
    Get full text
    Monograph
  11. 11

    Estimation of dielectric constant for various standard materials using microstrip ring resonator by Low, Pek Jin, Esa, Fahmiruddin, You, Kok Yeow, Abbas, Zulkifly

    Published 2017
    “…The differences in frequency shift were used in NetBeans IDE 8.1 algorithm of Java for dielectric constant calculation. …”
    Get full text
    Get full text
    Article
  12. 12

    Trust-aware authentication and authorization for IoT: a federated machine learning approach by Ahmed, Kazi Istiaque, Tahir, Mohammad, Lau, Sian Lun, Habaebi, Mohamed Hadi, Ahad, Abdul, Mughees, Amna

    Published 2024
    “…The proposed solution for AA IoT utilizes a trust calculation algorithm based on Federated Learning (FL), which is suitable for IoT environments and enables data privacy and scalability. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  13. 13

    JTAGGER by YAACOB, NORHANA

    Published 2006
    “…In this project, rule-based tagging algorithm is used as the mechanism to develop the system which named JTagger. …”
    Get full text
    Get full text
    Final Year Project
  14. 14

    Effect of business social responsibility (BSR) on performance of SMEs in Nigeria by Gorondutse, Abdulahi Hassan

    Published 2014
    “…A conceptual framework was developed based on extant literatures and the develop model is based on these BSR constructs Data was collected through hand delivery method by sending questionnaires to 800 SMEs managers/owners. …”
    Get full text
    Get full text
    Get full text
    Thesis
  15. 15

    Algorithmic fairness in AI-driven project management for post-conflict and developing regions: a critical review and framework for context-aware AI by Ahmed Al-Azazi, Saleem, Alawag, Aawag Mohsen, Saif, Amin

    Published 2026
    “…However, deploying AI uncritically in the data-poor and socially fragile environments of post-conflict and developing regions creates profound ethical risks. …”
    Get full text
    Get full text
    Get full text
    Article
  16. 16

    The influence of Robo-advisory services on Malaysia university student’s investment intention by Tan, Yung Hui, Lim, Jia Eng, Lim, Keh Xin, Zeng, Yi

    Published 2025
    “…These results highlight the need for fintech developers and financial service providers to focus on building secure, user-friendly platforms that foster trust and address risk concerns, particularly when targeting young, techsavvy investors. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  17. 17

    Visualisation tool to study malaria transmission using network modelling by Wong,, Ji Yeh

    Published 2014
    “…Java was used to implement the visualisation tool. …”
    Get full text
    Get full text
    Get full text
    Final Year Project Report / IMRAD
  18. 18
  19. 19
  20. 20

    Enhancing user authentication for cloud web-based application / Detar Beqo by Detar , Beqo

    Published 2018
    “…It uses an enhanced encryption algorithm, and the data is stored securely in the cloud systems. …”
    Get full text
    Get full text
    Get full text
    Thesis