Search Results - (( java implementation during algorithm ) OR ( using trust based algorithm ))
Search alternatives:
- implementation during »
- java implementation »
- during algorithm »
- using trust »
-
1
Pairwise testing tools based on hill climbing algorithm (PTCA)
Published 2014“…The actual implementation of the algorithm which is in Java programming language, the program is implemented on Net Bean 7.0.1. …”
Get full text
Get full text
Undergraduates Project Papers -
2
Trust-based enhanced ACO algorithm for secure routing in IoT
Published 2024“…In order to provide an energy-efficient and secure routing method for sensors deployed within a dynamic IoT network, this paper presents a trust-aware enhanced ant colony optimization (ACO)-based routing algorithm, incorporating a lightweight trust evaluation model. …”
Get full text
Get full text
Get full text
Get full text
Article -
3
ETERS: A comprehensive energy aware trust-based efficient routing scheme for adversarial WSNs
Published 2021“…However, a trust-based attack detection algorithm (TADA) assesses the reliability of SNs to detect internal attacks. …”
Get full text
Get full text
Article -
4
Honey bee based trust management system for cloud computing
Published 2011Get full text
Get full text
Get full text
Conference or Workshop Item -
5
-
6
Statistically controlled robust trust computing mechanism for cloud computing
Published 2014“…Quality of service plays an important role in making distributed systems.Users prefer service providers who meet the commitments specified in the Service Level Agreements to these who violate them.Cloud computing has been the recent entrant to the distributed system market and has revolutionized it by transforming the way the resources are accessed and paid for.Users can access cloud services including hardware, development platform and applications and pay only for the usage similar to the other utilities. Trust computing mechanisms can play an important role in identifying the right service providers who would meet the commitments specified in the Service Level Agreements.Literature has reported several trust computing mechanisms for different distributed systems based on various algorithms and functions.Almost all of them modify the trust scores monotonously even for momentary performance deviations that are reported.This paper proposes a trust computing mechanism that statistically validates the attribute monitored before modifying the trust scores using a hysteresis based algorithm.Hence the proposed mechanism can protect the trust scores from changes due to momentary fluctuations in system performances.The experiments conducted show that the trust scores computed using the proposed mechanism are more representative of the long-term system performance than the ones that were computed without the validation of the inputs.…”
Get full text
Get full text
Get full text
Article -
7
A behavioral trust model for internet of healthcare things using an improved FP-growth algorithm and Naïve Bayes classifier
Published 2021“…Towards securing these frameworks through an intelligent TMM, this work proposes a machine learning based Behavioral Trust Model (BTM), where an improved Frequent Pattern Growth (iFP-Growth) algorithm is proposed and applied to extract behavioral signatures of various trust classes. …”
Get full text
Get full text
Get full text
Get full text
Conference or Workshop Item -
8
Embedded system for indoor guidance parking with Dijkstra’s algorithm and ant colony optimization
Published 2019“…The circuits have been designed by proteus, the microcontrollers have been programmed by micro C, and the Graphical User Interface (GUI) has been implemented in Java. Few by electronic components such as RFID, multiplexer, XBee, and servo motors have been used to realize the system. …”
Get full text
Get full text
Thesis -
9
Trust based Lightweight Security Protocol for Device to Device Multihop Cellular Communication
Published 2020“…In order to handle these issues, a trustworthy lightweight security scheme that allows multihop secure communication is designed that is called as Trust Based Lightweight Security Protocol in multihop D2D communication (TLwS). …”
Get full text
Get full text
Thesis -
10
An efficient trust-based decision-making approach for WSNs: Machine learning oriented approach
Published 2023“…Wireless Sensor Networks (WSNs) are often used for critical applications where trust and security are of paramount importance. …”
Get full text
Get full text
Article -
11
Statistically enhanced multi-dimensional trust computing mechanism for cloud computing
Published 2013“…Users can access cloud services and pay only for the usage similar to utilities.Trust computing systems can be employed for identifying the service providers quality in terms of their adherence to the committed in SLAs.Several trust computing mechanisms have been proposed in literature based on various algorithms and functions.Almost all of them are based on a single performance parameter and modify the trust scores monotonously when performance deviations are reported.This paper proposes a trust computing mechanism that statistically validates the attribute monitored before modifying the trust scores.Hence the proposed mechanism is protected from momentary fluctuations in system performances.The experiments conducted show that the trust scores computed using the proposed mechanism are more representative of the long term system performance than the ones that were computed without the validation of the inputs.…”
Get full text
Get full text
Article -
12
-
13
Mitigating malicious nodes using trust and reputation based model in wireless sensor networks
Published 2018“…In this research, three models have been proposed namely Trust and Reputation Model for Wireless Sensor Networks (TReM-WSN), Recommendation-based Trust Model (RecommTM) and a multidimensional Trust and Reputation Model using Social, Quality of service and Ant colony system (TRM-SQA). …”
Get full text
Get full text
Get full text
Thesis -
14
Talkout : Protecting mental health application with a lightweight message encryption
Published 2022“…The investigation of lightweight message encryption algorithms is conducted with systematic quantitative literature and experiment implementation in Java and Android running environment. …”
Get full text
Get full text
Get full text
Academic Exercise -
15
Design & Development of a Robotic System Using LEGO Mindstorm
Published 2006“…The system is capable in operating an off-line programming method, starting from its programming sequences until robotic implementation of the program. During early stages, the research is emphasis more towards designing a robotic system using RoboLab software and C++ programming language. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
16
Detecting sybil attacks in clustered wireless sensor networks based on energy trust system (ETS)
Published 2017“…It employs multi-level detection based on identity and position verification. Then, a trust algorithm is applied based on the energy of each sensor node. …”
Get full text
Get full text
Get full text
Article -
17
Does organizational culture matter in the relationship between trust and SMEs performance
Published 2018“…Findings – The research findings were established using SmartPLS Algorithm and bootstrapping functions. …”
Get full text
Get full text
Get full text
Article -
18
Secured dynamic request scheduling and optimal CSP selection for analyzing cloud service performance using intelligent approaches
Published 2023“…Every CSP’s trust value is modified based on user feedback over time. …”
Get full text
Get full text
Get full text
Article -
19
Data Hiding Techniques In Digital Images
Published 2003“…After all these studies, one of the algorithms in the masking technique is developed and implemented using JAVA program to embed message into true color image with a good quality and higher capacity. …”
Get full text
Get full text
Thesis -
20
An effective transmit packet coding with trust-based relay nodes in VANETs
Published 2020“…With network coding, the number of transmitted packets over the network can be reduced, ensuring efficient utilization of network devices and resources. Here, the trust-based graph optimization is performed using Cuckoo search algorithm to select the secure relay nodes. …”
Get full text
Get full text
Get full text
Article
