Search Results - (( developing trust effect algorithm ) OR ( java validation using algorithm ))
Search alternatives:
- developing trust »
- effect algorithm »
- validation using »
- java validation »
- using algorithm »
-
1
Trust-based enhanced ACO algorithm for secure routing in IoT
Published 2024“…The trust evaluation system has been enhanced in the development of the proposed routing algorithm and the node trust value is evaluated, sensor node misbehavior is identified, and energy conservation is maximized. …”
Get full text
Get full text
Get full text
Get full text
Article -
2
The algorithm design for trust in peer-to-peer bitcoin transactions on blockchain/ Irni Eliana Khairuddin
Published 2021“…Hence, these are the primary motivation of this study, to design the algorithm for trust in peer-to-peer transaction. The design work was conducted by using a physical blockchain kit, namely BlocKit with 15 Bitcoin Blockchain experienced to explore the opportunity to develop the algorithm.…”
Get full text
Get full text
Get full text
Article -
3
Priority and dynamic quantum time algorithms for central processing unit scheduling
Published 2018“…Central Processing Unit is scheduled using different types of scheduling algorithms. One of the most widely algorithm used in scheduling with sharing and batch operating systems is Round Robin. …”
Get full text
Get full text
Thesis -
4
A trust aware secure ant colony optimization based routing algorithm for Internet of Things
Published 2023“…With the rapid spread of Internet of Things (IoT) systems enhancing the development of IoT applications, the issue of designing a secure routing algorithm for IoT, including reasonable trust management, has attracted more and more research attention. …”
Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
5
A Model for Evaluation of Cryptography Algorithm on UUM Portal
Published 2004“…The simulation model was developed using Active Server Page, JavaScript and SQL 7.0 as database. …”
Get full text
Get full text
Get full text
Thesis -
6
Rift: a high-performance consensus algorithm for Consortium Blockchain
Published 2019“…We also perform simulation on the proposed algorithm and determine the performance variables to evaluate the effectiveness of Rift. …”
Get full text
Get full text
Get full text
Get full text
Article -
7
Prevention And Detection Mechanism For Security In Passive Rfid System
Published 2013“…In addition, the randomness of the session key generated from the MLCG is verified using NIST test suite. Besides that, the security of the proposed protocol is validated using the formal analysis tool, AVISPA. …”
Get full text
Get full text
Thesis -
8
Effect of business social responsibility (BSR) on performance of SMEs in Nigeria
Published 2014“…Therefore, significant positive effects of commitment, trust, and perceived ethics suggest that the variables are important in relation to performance. …”
Get full text
Get full text
Get full text
Thesis -
9
A Voting Technique Of Multilayer Perceptron Ensemble For Classification Application
Published 2014“…In order to choose the final output of MLPE, a new voting algorithm named Trust-Sum Voting (TSV) is proposed. …”
Get full text
Get full text
Thesis -
10
A framework of test case prioritisation in regression testing using particle swarm-artificial bee colony algorithm
Published 2024“…Ten knowledge and domain experts provided positive feedback on the framework's verification, affirming the framework's robustness. Validation was conducted through three experiments involving four Java programs. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
11
Secure ACO-Based Wireless Sensor Network Routing Algorithm for IoT
Published 2021“…The problem of developing effective and secure routing protocols has drawn more interest in network research with the popularization of IoT-connected devices. …”
Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
12
An enhanced ant colony system algorithm for dynamic fault tolerance in grid computing
Published 2020“…The proposed algorithm was developed in a simulated grid environment called GridSim and evaluated against other fault tolerance algorithms such as trust-based ACO, fault tolerance ACO, ACO without fault tolerance and ACO with fault tolerance in terms of total execution time, average latency, average makespan, throughput, execution success rate and load balancing. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
13
Web-based clustering tool using fuzzy k-mean algorithm / Ahmad Zuladzlan Zulkifly
Published 2019“…On the Construction phase, the development of the prototype has been started. All the algorithm for the engine has been developed by using Java script language. …”
Get full text
Get full text
Thesis -
14
Embedded system for indoor guidance parking with Dijkstra’s algorithm and ant colony optimization
Published 2019“…The circuits have been designed by proteus, the microcontrollers have been programmed by micro C, and the Graphical User Interface (GUI) has been implemented in Java. Few by electronic components such as RFID, multiplexer, XBee, and servo motors have been used to realize the system. …”
Get full text
Get full text
Thesis -
15
Secure E-Voting With Blind Signature
Published 2003“…The voter’s private key for digital signature is protected by using password-based encryption with SHA and Twofish-CBC algorithm so that only valid voter can use it.…”
Get full text
Get full text
Conference or Workshop Item -
16
Trust-aware authentication and authorization for IoT: a federated machine learning approach
Published 2024“…The proposed solution for AA IoT utilizes a trust calculation algorithm based on Federated Learning (FL), which is suitable for IoT environments and enables data privacy and scalability. …”
Get full text
Get full text
Get full text
Get full text
Article -
17
Access control model based on trust, purpose, and role in materialized view for privacy protection
Published 2019“…An algorithm is discussed to describe the access control mechanism by first, authenticating user's role, purpose, and trust, before authorizing access of authorized and trusted user. …”
Get full text
Get full text
Thesis -
18
Visualisation tool to study malaria transmission using network modelling
Published 2014“…Java was used to implement the visualisation tool. …”
Get full text
Get full text
Get full text
Final Year Project Report / IMRAD -
19
The influence of Robo-advisory services on Malaysia university student’s investment intention
Published 2025“…The findings reveal that both trust and perceived ease of use have significant positive effects on students' intention to use robo-advisory services. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
20
Tacit knowledge for business intelligence framework using cognitive-based approach
Published 2022“…The framework was tested on 23 librarians from several university libraries in West Java and Yogyakarta, Indonesia. The algorithm starts with a content targeted interview to identify the list of problems faced by librarians. …”
Get full text
Get full text
Thesis
