Search Results - (( based coding ((cloud algorithm) OR (based algorithm)) ) OR ( java implication _ algorithm ))
Search alternatives:
- java implication »
- cloud algorithm »
- based coding »
-
1
Cloud Worm Detection and Response Technique By Integrating The Enhanced Genetic Algorithm An Threat Level
Published 2024thesis::doctoral thesis -
2
Scheduling scientific workflow using multiobjective algorithm with fuzzy resource utilization in multi-cloud environment
Published 2020“…In this respect, this paper proposes a new multi-objective scheduling algorithm with Fuzzy resource utilization (FR-MOS) for scheduling scientific workflow based on particle swarm optimization (PSO) method. …”
Get full text
Get full text
Article -
3
Task scheduling in cloud computing using hybrid genetic algorithm and bald eagle search (GA-BES)
Published 2022“…Task scheduling and resource allocation are essential aspects of cloud computing. This Study proposes task scheduling in cloud computing using a hybrid genetic algorithm, and bald eagle search proposed to solve the task scheduling problem. …”
Get full text
Get full text
Get full text
Academic Exercise -
4
-
5
Efficient DNS based Load Balancing for Bursty Web Application Traffic
Published 2012“…This research proposes a new efficient load balancing algorithm which applies to the local Domain Name Service (DNS) server for web based applications and services to ease the sudden increase in demand for the services. …”
Get full text
Get full text
Get full text
Article -
6
Fog-cloud scheduling simulator for reinforcement learning algorithms
Published 2023Get full text
Get full text
Article -
7
-
8
Space allocation for examination scheduling using Genetic Algorithm / Alya Kauthar Azman
Published 2025“…The research adopts a Genetic Algorithm-based approach, where examination scheduling details such as date, time, course code, program code, student group, student numbers, and available spaces are encoded as chromosomes. …”
Get full text
Get full text
Thesis -
9
The implications for ahybrid detection technique against malicious sqlattacks on web applications
Published 2025“…The outcome of this study will add to the body of knowledge the most important and recent proposed solutions to mitigate SQL injection attack, in particular those based on machine learning algorithm…”
Get full text
Get full text
Get full text
Article -
10
Improved rsync algorithm to minimize communication cost using multi-agent systems for synchronization in multi-learning management systems
Published 2017“…The integration of the proposed MLMS model with irsync algorithm was further tested through a prototype with MAS and show significant improvement over the cloud synchronization system which based on CDMI technology. …”
Get full text
Get full text
Get full text
Thesis -
11
-
12
Task offloading paradigm in mobile edge computing-current issues, adopted approaches, and future directions
Published 2023“…Major offloading-related issues in MEC are investigated, and the taxonomy of journal papers based on adopted approaches is presented. For further future exploration, we suggest the potential areas of research, the contribution of the algorithms and technique, and the research direction in MEC. …”
Get full text
Get full text
Article -
13
Secret sharing scheme for key management of secure data sharing in cloud
Published 2019“…There are five (5) phases for this study, identify problems and requirement analysis, design and analysis, design an algorithm, code development and result analysis, and documentations. …”
Get full text
Get full text
Thesis -
14
-
15
Genetic algorithm based network coding in wireless ad hoc networks
Published 2013“…Genetic algorithm based coding-aware routing (GACAR) is embedded in the wireless ad hoc network with network coding capabilities to search for coding opportunities for unicast sessions. …”
Get full text
Get full text
Get full text
Thesis -
16
Static code analysis of permission-based features for android malware classification using apriori algorithm with particle swarm optimization
Published 2015“…In this method, permission-based features were extracted from Android applications byte-code through static code analysis, selected and were used to train supervised classifiers. …”
Get full text
Get full text
Get full text
Article -
17
Expanding the data capacity of QR codes using multiple compression algorithms and base64 encode/decode
Published 2017“…This study focuses on the selection of compression algorithms and use base64 encoder/decoder to increase the capacity of data which is to be stored in the QR code. …”
Get full text
Get full text
Get full text
Article -
18
Fast algorithm for VQ-based wavelet coding system
Published 2003Get full text
Get full text
Get full text
Proceeding Paper -
19
Development of computer aided three-dimensional geometric modeler based on designer's idea in twodimensional
Published 2006“…This study has proposed better solutions in terms of an enhanced thinning algorithm, a modified Freeman chain code and Vertex chain code algorithm as picture description language, and a new computational algorithm and neural network classifier for corner detection. …”
Get full text
Get full text
Monograph -
20
Evolutionary algorithm based network coding for optmization of intelligent vehicular ad hoc network
Published 2017“…However, the chances to perform NC in wireless network is highly unlikely if the packet is not transmit to the potential NC node. Therefore, GA based network routing (GANeR) is embedded into network to search for shortest path from the source to the destination, and PSO based coding aware routing (CAR) is also proposed to further converge the solutions obtained from GANeR. …”
Get full text
Get full text
Thesis
