Search Results - (( developing trust effect algorithm ) OR ( java navigation using algorithm ))

Refine Results
  1. 1

    Design Of Robot Motion Planning Algorithm For Wall Following Robot by Ali Hassan, Muhamad Khairul

    Published 2006
    “…Algorithms are developed for a simulated mobile robot that uses an array of range finders for navigation. …”
    Get full text
    Get full text
    Monograph
  2. 2

    Visdom: Smart guide robot for visually impaired people by Lee, Zhen Ting

    Published 2025
    “…An Android mobile application, developed using Java and the java.net.Socket library, provides an intuitive and accessible user interface for seamless interaction with the robot. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  3. 3

    Trust-based enhanced ACO algorithm for secure routing in IoT by Sharmin, Afsah, Motakabber, S M A, Hassan Abdalla Hashim, Aisha

    Published 2024
    “…The trust evaluation system has been enhanced in the development of the proposed routing algorithm and the node trust value is evaluated, sensor node misbehavior is identified, and energy conservation is maximized. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  4. 4

    The algorithm design for trust in peer-to-peer bitcoin transactions on blockchain/ Irni Eliana Khairuddin by Khairuddin, Irni Eliana

    Published 2021
    “…Hence, these are the primary motivation of this study, to design the algorithm for trust in peer-to-peer transaction. The design work was conducted by using a physical blockchain kit, namely BlocKit with 15 Bitcoin Blockchain experienced to explore the opportunity to develop the algorithm.…”
    Get full text
    Get full text
    Get full text
    Article
  5. 5

    Path planning for unmanned aerial vehicle (UAV) using rotated accelerated method in static outdoor environment by Shaliza Hayati A. Wahab, Nordin Saad, Azali Saudi, Ali Chekima

    Published 2021
    “…In this study, a fast iterative method known as Rotated Successive Over-Relaxation (RSOR) is introduced. The algorithm is implemented in a self-developed 2D Java tool, UAV Planner. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  6. 6

    A trust aware secure ant colony optimization based routing algorithm for Internet of Things by Sharmin, Afsah, Anwar, Farhat, Motakabber, S. M. A., Hassan Abdalla Hashim, Aisha

    Published 2023
    “…With the rapid spread of Internet of Things (IoT) systems enhancing the development of IoT applications, the issue of designing a secure routing algorithm for IoT, including reasonable trust management, has attracted more and more research attention. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Proceeding Paper
  7. 7

    Rift: a high-performance consensus algorithm for Consortium Blockchain by Khan, Fazeel Ahmed, Ibrahim, Adamu Abubakar, Marwan, Mahmoud, Al-Khasawneh, Mahmoud Ahmad, Alarood, Ala Abdulsalam

    Published 2019
    “…We also perform simulation on the proposed algorithm and determine the performance variables to evaluate the effectiveness of Rift. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  8. 8

    Effect of business social responsibility (BSR) on performance of SMEs in Nigeria by Gorondutse, Abdulahi Hassan

    Published 2014
    “…Therefore, significant positive effects of commitment, trust, and perceived ethics suggest that the variables are important in relation to performance. …”
    Get full text
    Get full text
    Get full text
    Thesis
  9. 9

    A Voting Technique Of Multilayer Perceptron Ensemble For Classification Application by Talib, Hafizah

    Published 2014
    “…In order to choose the final output of MLPE, a new voting algorithm named Trust-Sum Voting (TSV) is proposed. …”
    Get full text
    Get full text
    Thesis
  10. 10

    Secure ACO-Based Wireless Sensor Network Routing Algorithm for IoT by Sharmin, Afsah, Anwar, Farhat, Motakabber, S. M. A., Hassan Abdalla Hashim, Aisha

    Published 2021
    “…The problem of developing effective and secure routing protocols has drawn more interest in network research with the popularization of IoT-connected devices. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Proceeding Paper
  11. 11

    An enhanced ant colony system algorithm for dynamic fault tolerance in grid computing by Saufi, Bukhari

    Published 2020
    “…The proposed algorithm was developed in a simulated grid environment called GridSim and evaluated against other fault tolerance algorithms such as trust-based ACO, fault tolerance ACO, ACO without fault tolerance and ACO with fault tolerance in terms of total execution time, average latency, average makespan, throughput, execution success rate and load balancing. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  12. 12

    Dynamic force-directed graph with weighted nodes for scholar network visualization by Mohd. Aris, Khalid Al-Walid, Ramasamy, Chitra, Mohd Aris, Teh Noranis, Zolkepli, Maslina

    Published 2022
    “…The approach is realized by creating a web-based interface using D3 JavaScript algorithm that allows the visualization to focus on how data are connected to each other more accurately than the conventional lines of data seen in traditional data representation. …”
    Get full text
    Get full text
    Article
  13. 13

    Trust-aware authentication and authorization for IoT: a federated machine learning approach by Ahmed, Kazi Istiaque, Tahir, Mohammad, Lau, Sian Lun, Habaebi, Mohamed Hadi, Ahad, Abdul, Mughees, Amna

    Published 2024
    “…The proposed solution for AA IoT utilizes a trust calculation algorithm based on Federated Learning (FL), which is suitable for IoT environments and enables data privacy and scalability. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  14. 14

    Access control model based on trust, purpose, and role in materialized view for privacy protection by Salji, Mohd Rafiz

    Published 2019
    “…An algorithm is discussed to describe the access control mechanism by first, authenticating user's role, purpose, and trust, before authorizing access of authorized and trusted user. …”
    Get full text
    Get full text
    Thesis
  15. 15

    The influence of Robo-advisory services on Malaysia university student’s investment intention by Tan, Yung Hui, Lim, Jia Eng, Lim, Keh Xin, Zeng, Yi

    Published 2025
    “…The findings reveal that both trust and perceived ease of use have significant positive effects on students' intention to use robo-advisory services. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  16. 16

    An Agent-Based System with Personalization and Intelligent Assistance Services for Facilitating Knowledge Sharing by Mohd Sharef, Nurfadhlina

    Published 2006
    “…KSFaci is embedded in web environment and is implemented using Java Servlet and runs under Apache server. …”
    Get full text
    Get full text
    Thesis
  17. 17

    Algorithmic fairness in AI-driven project management for post-conflict and developing regions: a critical review and framework for context-aware AI by Ahmed Al-Azazi, Saleem, Alawag, Aawag Mohsen, Saif, Amin

    Published 2026
    “…The paper concludes by arguing that the prevailing fixation on "big data" is a critical limitation and calls for a new research direction focused on developing robust AI systems that can effectively reason with "small data" and integrate rich qualitative inputs, thereby ensuring that AI serves as a tool for equitable and sustainable development rather than a driver of a new digital divide.…”
    Get full text
    Get full text
    Get full text
    Article
  18. 18

    Dietary supplement of collaborative recommendation system for athlete and fitness enthusiast / Anis Hafiza Gastani, Nur Asyira Naziron and Mohd Taufik Mishan by Gastani, Anis Hafiza, Naziron, Nur Asyira, Mishan, Mohd Taufik

    Published 2024
    “…Future recommendations include expanding data scraping techniques and exploring advanced collaborative filtering algorithms for enhanced personalization. In conclusion, the proposed system represents a significant advancement in ensuring safe, personalized, and effective supplement recommendations for athletes, fostering trust in their journey towards optimal health and performance.…”
    Get full text
    Get full text
    Get full text
    Article
  19. 19

    Enhancing user authentication for cloud web-based application / Detar Beqo by Detar , Beqo

    Published 2018
    “…It uses an enhanced encryption algorithm, and the data is stored securely in the cloud systems. …”
    Get full text
    Get full text
    Get full text
    Thesis
  20. 20

    SwiftCare: specialist appointment system by Yasir, Nurul Shafika Natasha

    Published 2025
    “…This system incorporates the use that mention real-time appointment scheduling, the capability to customize self-service on individual events, emergency appointment preferences, and compatibility with electronic medical records and scheduling appointments to coordinate patient influx in an effective manner. Made with an agile approach, the SwiftCare application has been developed on trusted platforms like Android Studio and Firebase that make it secure, scalable, and easy to navigate. …”
    Get full text
    Get full text
    Student Project