Search Results - (( data application cloud algorithm ) OR ( java implementation using algorithm ))

Refine Results
  1. 1
  2. 2

    A malware analysis and detection system for mobile devices / Ali Feizollah by Ali, Feizollah

    Published 2017
    “…We used a Drebin data sample, which is a collection of 5,560 applications, as well as clean data sample containing 1,846 applications. …”
    Get full text
    Get full text
    Get full text
    Thesis
  3. 3

    RSA Encryption & Decryption using JAVA by Ramli, Marliyana

    Published 2006
    “…References and theories to support the research of 'RSA Encryption/Decryption using Java' have been disclosed in Literature Review section. …”
    Get full text
    Get full text
    Final Year Project
  4. 4

    Performance-aware cost-effective brokering and load balancing algorithms for data center in large scale cloud computing by Naha, Ranesh Kumar

    Published 2015
    “…Proposed Cost Aware algorithm minimizes approximately 5.5% cost compared with closest data center algorithm. …”
    Get full text
    Get full text
    Thesis
  5. 5

    Provider independent cryptographic tools by Ibrahim, Subariah, Salleh, Mazleena, Abdul Aziz, Shah Rizan

    Published 2003
    “…The library is implemented by using Java cryptographic service provider framework that conforms to Java Cryptographic Architecture (JCA) and Java Cryptographic Extension (JCE). …”
    Get full text
    Get full text
    Get full text
    Monograph
  6. 6

    Direct approach for mining association rules from structured XML data by Abazeed, Ashraf Riad

    Published 2012
    “…The thesis also provides a two different implementation of the modified FLEX algorithm using a java based parsers and XQuery implementation. …”
    Get full text
    Get full text
    Thesis
  7. 7
  8. 8

    Plagiarism Detection System for Java Programming Assignments by Using Greedy String-Tilling Algorithm by Norulazmi, Kasim

    Published 2008
    “…The prototype system, known as Java Plagiarism Detection System (JPDS) implements the Greedy-String-Tiling algorithm to detect similarities among tokens in a Java source code files. …”
    Get full text
    Get full text
    Get full text
    Thesis
  9. 9
  10. 10

    Development of heuristic task scheduling algorithm in cloud computing by Diallo, Laouratou, Hassan Abdalla Hashim, Aisha, Olanrewaju, Rashidah Funke

    Published 2016
    “…As the immense growth of data have affected many organizations, there have been a need to adopt the cloud resources for processing big data applications which could cost highly by using traditional storage. …”
    Get full text
    Get full text
    Proceeding Paper
  11. 11
  12. 12

    A Penalty-Based Genetic Algorithm For The Composite Saas Placement Problem In The Cloud by Mohd Yusoh, Zeratul Izzah, Tong, Maolin

    Published 2010
    “…Cloud computing is a latest new computing paradigm where applications, data and IT services, are provided over the Internet. …”
    Get full text
    Get full text
    Conference or Workshop Item
  13. 13

    Dynamic Task Offloading Algorithm for optimising IoT network quality of service in the Mobile-Fog-Cloud System by Nwogbaga, Nweso Emmanuel

    Published 2023
    “…Therefore, offloading a massive amount of data from mobile devices to the fog or cloud introduces another problem of delay in choosing the optimal resources for processing the tasks resulting in incurring delay by the resource allocation algorithms. …”
    Get full text
    Get full text
    Thesis
  14. 14

    Impatient job scheduling under cloud computing by Mahdi, Nawfal A.

    Published 2012
    “…At the same time, these agencies also face IT problems because of the huge growth of applications, data and solution sizes. Many experts proposed that cloud computing is a solution to these problems such that each agency can execute its tasks via the cloud and expand their requirements based on the situation. …”
    Get full text
    Get full text
    Thesis
  15. 15

    Securing cloud data system (SCDS) for key exposure using AES algorithm by Thabet Albatol, Mohammed Samer Hasan

    Published 2021
    “…After that we use to build securing cloud data system (SCDS) for key exposure using the AES algorithm for encrypting and decrypting our website cloud data and files. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  16. 16

    Performance evaluation of real-time multiprocessor scheduling algorithms by Alhussian, H., Zakaria, N., Abdulkadir, S.J., Fageeri, S.O.

    Published 2016
    “…We hyave used the CPU profiler of Oracle JavaTM VisualVM to monitor the execution of LRE-TL as well as USG algorithms. …”
    Get full text
    Get full text
    Conference or Workshop Item
  17. 17

    Deadline guarantee for scientific workflow using dynamic scheduling algorithms on IaaS clouds by Alqaisy, Sarah Abdulrahman Shukur

    Published 2018
    “…Finally, we expected the scheduling algorithms PDC and DCCP to be improve the Cloud resource usage high efficiency in the IaaS Cloud with efficient scheduling for scientific workflow.…”
    Get full text
    Get full text
    Thesis
  18. 18

    An Integer Linear Programming model and Adaptive Genetic Algorithm approach to minimize energy consumption of Cloud computing data centers by Ibrahim, Huda, Aburukba, Raafat O., El-Fakih, Khaled

    Published 2018
    “…Data centers hosting Cloud applications consume massive amount of power, contributing to high carbon footprints to the environment. …”
    Get full text
    Get full text
    Article
  19. 19
  20. 20