Search Results - (( java segmentation using algorithm ) OR ( using trust based algorithm ))
Search alternatives:
- java segmentation »
- using algorithm »
- using trust »
-
1
Image clustering comparison of two color segmentation techniques
Published 2010“…Finally, the algorithm found, which would solve the image segmentation problem.…”
Get full text
Get full text
Get full text
Get full text
Thesis -
2
Automatic Number Plate Recognition on android platform: With some Java code excerpts
Published 2016“…On the other hand, the traditional algorithm using template matching only obtained 83.65% recognition rate with 0.97 second processing time. …”
Get full text
Get full text
Get full text
Book -
3
Development of seven segment display recognition using TensorFlow on Raspberry Pi
Published 2022Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
4
Trust-based enhanced ACO algorithm for secure routing in IoT
Published 2024“…In order to provide an energy-efficient and secure routing method for sensors deployed within a dynamic IoT network, this paper presents a trust-aware enhanced ant colony optimization (ACO)-based routing algorithm, incorporating a lightweight trust evaluation model. …”
Get full text
Get full text
Get full text
Get full text
Article -
5
ETERS: A comprehensive energy aware trust-based efficient routing scheme for adversarial WSNs
Published 2021“…However, a trust-based attack detection algorithm (TADA) assesses the reliability of SNs to detect internal attacks. …”
Get full text
Get full text
Article -
6
Honey bee based trust management system for cloud computing
Published 2011Get full text
Get full text
Get full text
Conference or Workshop Item -
7
-
8
Statistically controlled robust trust computing mechanism for cloud computing
Published 2014“…Quality of service plays an important role in making distributed systems.Users prefer service providers who meet the commitments specified in the Service Level Agreements to these who violate them.Cloud computing has been the recent entrant to the distributed system market and has revolutionized it by transforming the way the resources are accessed and paid for.Users can access cloud services including hardware, development platform and applications and pay only for the usage similar to the other utilities. Trust computing mechanisms can play an important role in identifying the right service providers who would meet the commitments specified in the Service Level Agreements.Literature has reported several trust computing mechanisms for different distributed systems based on various algorithms and functions.Almost all of them modify the trust scores monotonously even for momentary performance deviations that are reported.This paper proposes a trust computing mechanism that statistically validates the attribute monitored before modifying the trust scores using a hysteresis based algorithm.Hence the proposed mechanism can protect the trust scores from changes due to momentary fluctuations in system performances.The experiments conducted show that the trust scores computed using the proposed mechanism are more representative of the long-term system performance than the ones that were computed without the validation of the inputs.…”
Get full text
Get full text
Get full text
Article -
9
A behavioral trust model for internet of healthcare things using an improved FP-growth algorithm and Naïve Bayes classifier
Published 2021“…Towards securing these frameworks through an intelligent TMM, this work proposes a machine learning based Behavioral Trust Model (BTM), where an improved Frequent Pattern Growth (iFP-Growth) algorithm is proposed and applied to extract behavioral signatures of various trust classes. …”
Get full text
Get full text
Get full text
Get full text
Conference or Workshop Item -
10
Trust based Lightweight Security Protocol for Device to Device Multihop Cellular Communication
Published 2020“…In order to handle these issues, a trustworthy lightweight security scheme that allows multihop secure communication is designed that is called as Trust Based Lightweight Security Protocol in multihop D2D communication (TLwS). …”
Get full text
Get full text
Thesis -
11
An efficient trust-based decision-making approach for WSNs: Machine learning oriented approach
Published 2023“…Wireless Sensor Networks (WSNs) are often used for critical applications where trust and security are of paramount importance. …”
Get full text
Get full text
Article -
12
Statistically enhanced multi-dimensional trust computing mechanism for cloud computing
Published 2013“…Users can access cloud services and pay only for the usage similar to utilities.Trust computing systems can be employed for identifying the service providers quality in terms of their adherence to the committed in SLAs.Several trust computing mechanisms have been proposed in literature based on various algorithms and functions.Almost all of them are based on a single performance parameter and modify the trust scores monotonously when performance deviations are reported.This paper proposes a trust computing mechanism that statistically validates the attribute monitored before modifying the trust scores.Hence the proposed mechanism is protected from momentary fluctuations in system performances.The experiments conducted show that the trust scores computed using the proposed mechanism are more representative of the long term system performance than the ones that were computed without the validation of the inputs.…”
Get full text
Get full text
Article -
13
-
14
Mitigating malicious nodes using trust and reputation based model in wireless sensor networks
Published 2018“…In this research, three models have been proposed namely Trust and Reputation Model for Wireless Sensor Networks (TReM-WSN), Recommendation-based Trust Model (RecommTM) and a multidimensional Trust and Reputation Model using Social, Quality of service and Ant colony system (TRM-SQA). …”
Get full text
Get full text
Get full text
Thesis -
15
Detecting sybil attacks in clustered wireless sensor networks based on energy trust system (ETS)
Published 2017“…It employs multi-level detection based on identity and position verification. Then, a trust algorithm is applied based on the energy of each sensor node. …”
Get full text
Get full text
Get full text
Article -
16
Does organizational culture matter in the relationship between trust and SMEs performance
Published 2018“…Findings – The research findings were established using SmartPLS Algorithm and bootstrapping functions. …”
Get full text
Get full text
Get full text
Article -
17
Secured dynamic request scheduling and optimal CSP selection for analyzing cloud service performance using intelligent approaches
Published 2023“…Every CSP’s trust value is modified based on user feedback over time. …”
Get full text
Get full text
Get full text
Article -
18
An effective transmit packet coding with trust-based relay nodes in VANETs
Published 2020“…With network coding, the number of transmitted packets over the network can be reduced, ensuring efficient utilization of network devices and resources. Here, the trust-based graph optimization is performed using Cuckoo search algorithm to select the secure relay nodes. …”
Get full text
Get full text
Get full text
Article -
19
Implementing RC5 Encrtption Algorithm On a Web Based Medical Cosultation System
Published 2007“…It proposes a cryptography approach using RC5 as fast and strong block cipher encryption algorithm. …”
Get full text
Get full text
Thesis -
20
Determinants to knowledge transfer and sharing in multimedia super corridor in Malaysia : the mediating role of trust
Published 2016“…Partial Least Squares Method (PLS) algorithm and bootstrap techniques were used to test the hypotheses. …”
Get full text
Get full text
Get full text
Thesis
