Search Results - (( based evaluation cloud algorithm ) OR ( java implementation using algorithm ))

Refine Results
  1. 1
  2. 2

    Tag clouds algorithm with the inclusion of personality traits by Ahmad Affandi, Supli

    Published 2015
    “…Furthermore, the algorithm to generate tag cloud visualization based on personality traits has not been explored. …”
    Get full text
    Get full text
    Get full text
    Thesis
  3. 3

    Optimizing Cloud Storage Costs: Introducing the Pre-Evaluation-Based Cost Optimization (PECSCO) Mechanism by Alomari M.F., Mahmoud M.A., Gharaei N., Rasool S.M., Hasan R.A.

    Published 2025
    “…The core of the algorithm utilizes a Genetic Algorithm (GA) to find the optimal position for the first evaluator by minimizing the total distance between this evaluator and all CCTV nodes, aiming for surveillance efficiency. …”
    Conference paper
  4. 4
  5. 5

    3D Point Cloud Data Registration Algorithm Based on Augmented Reality Technology by Liying Feng, Ng Giap Weng, Liyao Ma

    Published 2023
    “…In order to solve the above problems, a 3D point cloud data registration algorithm based on augmented reality technology is proposed, and the 3D data registration model is constructed by combining augmented reality technology, build the evaluation index of 3D point cloud data registration, and carry out the initial registration of 3D point cloud based on the evaluation index. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  6. 6
  7. 7

    Efficient kerberos authentication scheme for cross-domain systems in industrial internet of things using ECC by Ismail, Haqi Khalid

    Published 2021
    “…A new multi-factor authentication scheme is designed using the AES-ECC algorithm based on Kerberos workflow to establish secure, efficient, and lightweight communication between the user and the targeted IIoT devices to avoid the issues. …”
    Get full text
    Get full text
    Thesis
  8. 8

    RSA Encryption & Decryption using JAVA by Ramli, Marliyana

    Published 2006
    “…References and theories to support the research of 'RSA Encryption/Decryption using Java' have been disclosed in Literature Review section. …”
    Get full text
    Get full text
    Final Year Project
  9. 9

    A comparative evaluation of heuristic and metaheuristic job scheduling algorithms for optimized resource management in cloud environments by Haque, Najmul, Zafril Rizal, M. Azmi, Murad, Saydul Akbar

    Published 2026
    “…The CloudSim simulator is applied to evaluate each algorithm using key performance metrics, including makespan, average flow time, and the number of cloudlets that fail to meet deadlines. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  10. 10

    MotionSure: a cloud-based algorithm for detection of injected object in data in motion by Islam, Thouhedul, Olanrewaju, Rashidah Funke, Khalifa, Othman Omran

    Published 2017
    “…Although there are few algorithms for data protection in the Cloud, However, such algorithms are still prone to attack, especially in real-time data movement due to the mechanism employed. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Proceeding Paper
  11. 11
  12. 12

    Priority based fair scheduling : Enhancing efficiency in cloud job distribution by Murad, Saydul Akbar, Zafril Rizal, M. Azmi, Brishti, Faria Jerin, Saib, Md, Bairagi, Anupam Kumar

    Published 2023
    “…These metrics were chosen to evaluate and analyze the effectiveness of the proposed scheduling algorithm.…”
    Get full text
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  13. 13

    Provider independent cryptographic tools by Ibrahim, Subariah, Salleh, Mazleena, Abdul Aziz, Shah Rizan

    Published 2003
    “…The library is implemented by using Java cryptographic service provider framework that conforms to Java Cryptographic Architecture (JCA) and Java Cryptographic Extension (JCE). …”
    Get full text
    Get full text
    Get full text
    Monograph
  14. 14

    Direct approach for mining association rules from structured XML data by Abazeed, Ashraf Riad

    Published 2012
    “…The thesis also provides a two different implementation of the modified FLEX algorithm using a java based parsers and XQuery implementation. …”
    Get full text
    Get full text
    Thesis
  15. 15

    Data in transit validation for cloud computing using cloud-based algorithm detection of injected objects by Olanrewaju, Rashidah Funke, Islam, Thouhedul, Khalifa, Othman Omran, Fajingbesi, Fawwaz Eniola

    Published 2018
    “…One major such security laps is that referred to as the Man in the Middle (MITM) attack where external data are injected to either hijack a data in transit or to manipulate the files and object by posing as a floating cloud base. Fresh algorithms’ for cloud data protection do exist however, they are still prone to attack especially in real-time data transmissions due to employed mechanism. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  16. 16

    Completion time driven hyper-heuristic approach for optimisation of scientific workflow scheduling in cloud environment / Ehab Nabiel Mohammad by Ehab Nabiel , Mohammad

    Published 2018
    “…The third and last stage (i.e. evaluation and analysis stage) aims at evaluating the proposed approach by considering two different experimental cloud environments: simulation-based environment and real-world based environment. …”
    Get full text
    Get full text
    Get full text
    Thesis
  17. 17

    Task scheduling in cloud computing environment using hybrid genetic algorithm and artificial bee colony by Mohd Izuddin Sipluk

    Published 2022
    “…In this project, a comparative evaluation of selected algorithms is done to ascertain their applicability, practicality, and adaptability in a cloud scenario. …”
    Get full text
    Get full text
    Get full text
    Academic Exercise
  18. 18

    Plagiarism Detection System for Java Programming Assignments by Using Greedy String-Tilling Algorithm by Norulazmi, Kasim

    Published 2008
    “…The prototype system, known as Java Plagiarism Detection System (JPDS) implements the Greedy-String-Tiling algorithm to detect similarities among tokens in a Java source code files. …”
    Get full text
    Get full text
    Get full text
    Thesis
  19. 19

    Locust- inspired meta-heuristic algorithm for optimising cloud computing performance by Fadhil, Mohammed Alaa

    Published 2023
    “…The proposed algorithm is evaluated using the WorkflowSim simulation with a real dataset. …”
    Get full text
    Get full text
    Thesis
  20. 20

    A hyper-heuristic cost optimisation approach for Scientific Workflow Scheduling in cloud computing by Alkhanak, Ehab Nabiel, Lee, Sai Peck

    Published 2018
    “…A real-world cloud based experimentation environment has been considered to evaluate the performance of the proposed CTDHH approach by comparing it with five baseline approaches, i.e. four population-based approaches and an existing hyper-heuristic approach named Hyper-Heuristic Scheduling Algorithm (HHSA). …”
    Get full text
    Get full text
    Article