Search Results - (( based evaluation cloud algorithm ) OR ( java implementation using algorithm ))
Search alternatives:
- implementation using »
- java implementation »
- based evaluation »
- evaluation cloud »
- cloud algorithm »
- using algorithm »
-
1
SG-PBFS : Shortest Gap-Priority Based Fair Scheduling technique for job scheduling in cloud environment
Published 2024“…To conduct this experiment, we employed the CloudSim simulator, which is implemented using the Java programming language.…”
Get full text
Get full text
Get full text
Get full text
Article -
2
Tag clouds algorithm with the inclusion of personality traits
Published 2015“…Furthermore, the algorithm to generate tag cloud visualization based on personality traits has not been explored. …”
Get full text
Get full text
Get full text
Thesis -
3
Optimizing Cloud Storage Costs: Introducing the Pre-Evaluation-Based Cost Optimization (PECSCO) Mechanism
Published 2025“…The core of the algorithm utilizes a Genetic Algorithm (GA) to find the optimal position for the first evaluator by minimizing the total distance between this evaluator and all CCTV nodes, aiming for surveillance efficiency. …”
Conference paper -
4
-
5
3D Point Cloud Data Registration Algorithm Based on Augmented Reality Technology
Published 2023“…In order to solve the above problems, a 3D point cloud data registration algorithm based on augmented reality technology is proposed, and the 3D data registration model is constructed by combining augmented reality technology, build the evaluation index of 3D point cloud data registration, and carry out the initial registration of 3D point cloud based on the evaluation index. …”
Get full text
Get full text
Get full text
Get full text
Article -
6
-
7
Efficient kerberos authentication scheme for cross-domain systems in industrial internet of things using ECC
Published 2021“…A new multi-factor authentication scheme is designed using the AES-ECC algorithm based on Kerberos workflow to establish secure, efficient, and lightweight communication between the user and the targeted IIoT devices to avoid the issues. …”
Get full text
Get full text
Thesis -
8
RSA Encryption & Decryption using JAVA
Published 2006“…References and theories to support the research of 'RSA Encryption/Decryption using Java' have been disclosed in Literature Review section. …”
Get full text
Get full text
Final Year Project -
9
A comparative evaluation of heuristic and metaheuristic job scheduling algorithms for optimized resource management in cloud environments
Published 2026“…The CloudSim simulator is applied to evaluate each algorithm using key performance metrics, including makespan, average flow time, and the number of cloudlets that fail to meet deadlines. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
10
MotionSure: a cloud-based algorithm for detection of injected object in data in motion
Published 2017“…Although there are few algorithms for data protection in the Cloud, However, such algorithms are still prone to attack, especially in real-time data movement due to the mechanism employed. …”
Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
11
Cloud Worm Detection and Response Technique By Integrating The Enhanced Genetic Algorithm An Threat Level
Published 2024thesis::doctoral thesis -
12
Priority based fair scheduling : Enhancing efficiency in cloud job distribution
Published 2023“…These metrics were chosen to evaluate and analyze the effectiveness of the proposed scheduling algorithm.…”
Get full text
Get full text
Get full text
Get full text
Conference or Workshop Item -
13
Provider independent cryptographic tools
Published 2003“…The library is implemented by using Java cryptographic service provider framework that conforms to Java Cryptographic Architecture (JCA) and Java Cryptographic Extension (JCE). …”
Get full text
Get full text
Get full text
Monograph -
14
Direct approach for mining association rules from structured XML data
Published 2012“…The thesis also provides a two different implementation of the modified FLEX algorithm using a java based parsers and XQuery implementation. …”
Get full text
Get full text
Thesis -
15
Data in transit validation for cloud computing using cloud-based algorithm detection of injected objects
Published 2018“…One major such security laps is that referred to as the Man in the Middle (MITM) attack where external data are injected to either hijack a data in transit or to manipulate the files and object by posing as a floating cloud base. Fresh algorithms’ for cloud data protection do exist however, they are still prone to attack especially in real-time data transmissions due to employed mechanism. …”
Get full text
Get full text
Get full text
Get full text
Article -
16
Completion time driven hyper-heuristic approach for optimisation of scientific workflow scheduling in cloud environment / Ehab Nabiel Mohammad
Published 2018“…The third and last stage (i.e. evaluation and analysis stage) aims at evaluating the proposed approach by considering two different experimental cloud environments: simulation-based environment and real-world based environment. …”
Get full text
Get full text
Get full text
Thesis -
17
Task scheduling in cloud computing environment using hybrid genetic algorithm and artificial bee colony
Published 2022“…In this project, a comparative evaluation of selected algorithms is done to ascertain their applicability, practicality, and adaptability in a cloud scenario. …”
Get full text
Get full text
Get full text
Academic Exercise -
18
Plagiarism Detection System for Java Programming Assignments by Using Greedy String-Tilling Algorithm
Published 2008“…The prototype system, known as Java Plagiarism Detection System (JPDS) implements the Greedy-String-Tiling algorithm to detect similarities among tokens in a Java source code files. …”
Get full text
Get full text
Get full text
Thesis -
19
Locust- inspired meta-heuristic algorithm for optimising cloud computing performance
Published 2023“…The proposed algorithm is evaluated using the WorkflowSim simulation with a real dataset. …”
Get full text
Get full text
Thesis -
20
A hyper-heuristic cost optimisation approach for Scientific Workflow Scheduling in cloud computing
Published 2018“…A real-world cloud based experimentation environment has been considered to evaluate the performance of the proposed CTDHH approach by comparing it with five baseline approaches, i.e. four population-based approaches and an existing hyper-heuristic approach named Hyper-Heuristic Scheduling Algorithm (HHSA). …”
Get full text
Get full text
Article
