Search Results - (( developing trust selection algorithm ) OR ( java application customization algorithm ))
Search alternatives:
- customization algorithm »
- selection algorithm »
- developing trust »
- java application »
- trust selection »
-
1
User recommendation algorithm in social tagging system based on hybrid user trust
Published 2013“…This method is a combination of developing trust network based on user interest similarity and trust network from social network analysis. …”
Get full text
Get full text
Get full text
Article -
2
-
3
Effect of business social responsibility (BSR) on performance of SMEs in Nigeria
Published 2014“…This study used purposive sampling for sample selection. Partial Least Squares (PLS) algorithm and bootstrap techniques were used to test the study‘s hypotheses. …”
Get full text
Get full text
Get full text
Thesis -
4
Enhancing obfuscation technique for protecting source code against software reverse engineering
Published 2019“…The proposed technique can be enhanced in the future to protect games applications and mobile applications that are developed by java; it can improve the software development industry. …”
Get full text
Get full text
Thesis -
5
-
6
Individual And Ensemble Pattern Classification Models Using Enhanced Fuzzy Min-Max Neural Networks
Published 2014“…In addition, an agent-based framework is capitalized as a robust ensemble model to house multiple EFMM-based networks. A useful trust measurement method known as Certified Belief in Strength (CBS) is developed and incorporated into the ensemble model for exploiting the predictive performances of different EFMM-based networks.…”
Get full text
Get full text
Thesis -
7
An experiment of scalable video security solution using H.264/AVC and advanced encryption standard (AES): Selective cryptography
Published 2011“…This method took into consideration the good features of selective encryption algorithms with regard to computational complexity, and data compression performance. …”
Get full text
Get full text
Get full text
Article -
8
An experiment of scalable video security solution using H. 264/AVC and advanced encryption standard (AES): selective cryptography
Published 2011“…This method took into consideration the good features of selective encryption algorithms with regard to computational complexity, and data compression performance. …”
Get full text
Get full text
Get full text
Article -
9
A Bio-Inspired Behavior-Based Hybrid Framework for Ransomware Detection
Published 2026journal-article -
10
Adaptive manet OLSR routing protocol for optimal route selection in high dynamic network
Published 2020“…The proposed Quality of Path QoP metric is incorporated into the modified relay selection algorithm, which improves the efficiency of relay selection mechanism to find optimal path with high link quality. …”
Get full text
Get full text
Thesis -
11
Design & Development of a Robotic System Using LEGO Mindstorm
Published 2006“…Since the model is built using LEGO bricks, the model is fully customized, in term of its applications, to perform any relevant tasks. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
12
Explainable artificial intelligence-based intuitionistic fuzzy network TOPSIS preference relation models for sukuk investment decisions
Published 2025“…Three explainable models were developed, namely, intuitionistic fuzzy network TOPSIS, intuitionistic fuzzypreference relation, and intuitionistic fuzzy network preference relation with a weighting algorithm. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
13
Application of artificial neural network in discriminating the agarwood oil quality using significant chemical compounds / Mohd Hezri Fazalul Rahiman … [et al.]
Published 2014“…The ANN programming algorithm was developed and computed automatically via Matlab software version R2010a. …”
Get full text
Get full text
Get full text
Book Section -
14
Agent-Based Model of Virtual Community Cohesion (S/O: 13443)
Published 2021“…The formal specifications (differential equations) equations form the basis of algorithm development, which preceded the development of a virtual community cohesion prediction simulator. …”
Get full text
Get full text
Monograph
