Search Results - (( development communication trust algorithm ) OR ( java implication tree algorithm ))

  • Showing 1 - 14 results of 14
Refine Results
  1. 1
  2. 2

    Ascertaining trust of information transmitted during a disaster by Yusoff, Y., Bakar, A.A., Aziz, N., Ismail, R., Ramli, R.

    Published 2016
    “…One of the potential solutions is to use trust algorithm to identify the trusted information. …”
    Get full text
    Get full text
    Article
  3. 3

    Ascertaining trust of information transmitted during a disaster by Yusoff, Y., Bakar, A.A., Aziz, N., Ismail, R., Ramli, R.

    Published 2016
    “…One of the potential solutions is to use trust algorithm to identify the trusted information. …”
    Get full text
    Get full text
    Article
  4. 4

    Ascertaining trust of information transmitted during a disaster by Yusoff Y., Bakar A.A., Aziz N., Ismail R., Ramli R.

    Published 2023
    “…One of the potential solutions is to use trust algorithm to identify the trusted information. …”
    Article
  5. 5
  6. 6

    VANET SECURITY FRAMEWORK FOR LOW LATENCY SAFETY APPLICATIONS by WAGAN, ASIF ALI

    Published 2012
    “…The trust is established via Trusted Platform Module (TPM) and group communication. …”
    Get full text
    Get full text
    Thesis
  7. 7
  8. 8

    iBUST: An intelligent behavioural trust model for securing industrial cyber-physical systems by Azad, Saiful, Mahmud, Mufti, Kamal Zuhairi, Zamli, Kaiser, M. Shamim, Jahan, Sobhana, Razzaque, Md Abdur

    Published 2024
    “…Therefore, this paper proposes an ARL-based intelligent Behavioural Trust Model (iBUST) for securing the CPPS. For this intelligent TMM, a variant of Frequency Pattern Growth (FP-Growth), called enhanced FP-Growth (EFP-Growth) algorithm is developed by altering the internal data structures for faster execution and by developing a modified exponential decay function (MEDF) to automatically calculate minimum supports for adapting trust evolution characteristics. …”
    Get full text
    Get full text
    Get full text
    Article
  9. 9

    The impact of Xiaohongshu as the primary information hub: a case study among utar undergraduates by Eu, Jin Hau

    Published 2025
    “…The findings have practical implications for educators, marketers, and platform developers who want to tailor communication strategies to the preferences of young audiences. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  10. 10

    The influence of Robo-advisory services on Malaysia university student’s investment intention by Tan, Yung Hui, Lim, Jia Eng, Lim, Keh Xin, Zeng, Yi

    Published 2025
    “…These results highlight the need for fintech developers and financial service providers to focus on building secure, user-friendly platforms that foster trust and address risk concerns, particularly when targeting young, techsavvy investors. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  11. 11

    Efficient node cooperation stimulation mechanism in wireless multihop networks by Samian, Normalia

    Published 2017
    “…The mechanism is called Trust Features-based Evidence (TFE) which is developed based on significant and unique trust features to ensure that the reported information is of actual behaviour of an observed node. …”
    Get full text
    Get full text
    Get full text
    Thesis
  12. 12

    Detection of black hole nodes in mobile ad hoc network using hybrid trustworthiness and energy consumption techniques by Mustafa, Ahmed Sudad

    Published 2017
    “…Network simulator (NS2) simulation findings demonstrate that the trust based algorithm achieves an average packet delivery ratio (PDR) of 87.3%, end to end delay (EED) of 7.47 ms and black hole detection accuracy of 90%. …”
    Get full text
    Get full text
    Get full text
    Thesis
  13. 13

    Enhancement of Security Architecture for Smartcard Based Authentication Protocols by Mohammed, Lawan Ahmed

    Published 2004
    “…Further, the thesis shows how to systematically transform solutions that work in a model of idealized authenticated communications into solutions that are secure in the realistic setting of wired communication channels such as access control, and online transactions involving contact communication schemes. …”
    Get full text
    Get full text
    Thesis
  14. 14

    Adaptive manet OLSR routing protocol for optimal route selection in high dynamic network by Al-Kharasani, Nori Mohammed Abdulkarem

    Published 2020
    “…The concept of multi-hop vehicle-to-vehicle wireless communications is essential for developing routing protocols. …”
    Get full text
    Get full text
    Thesis