Search Results - (( data virtualization technique algorithm ) OR ( java validation using algorithm ))
Search alternatives:
- virtualization technique »
- data virtualization »
- validation using »
- java validation »
- using algorithm »
-
1
-
2
An improved dynamic load balancing for virtualmachines in cloud computing using hybrid bat and bee colony algorithms
Published 2021“…Therefore, to overcome these problems, this study proposed an improved dynamic load balancing technique known as HBAC algorithm which dynamically allocates task by hybridizing Artificial Bee Colony (ABC) algorithm with Bat algorithm. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
3
Performance analysis of constrained device virtualization algorithm
Published 2020“…We have adopted this technique in our research to virtualize the entire Internet of Things network so that virtual TCP/IP based protocols can operate on virtual networks for enabling interoperability. …”
Get full text
Get full text
Get full text
Article -
4
A new image scrambling technique using block rotation algorithm based on Rubik’s cube
Published 2013“…Objectives: the objective of this paper is to develop a new efficient image scrambling algorithm by using the Rotation technique in order to break the relationship among image elements (pixels). …”
Get full text
Get full text
Get full text
Article -
5
-
6
Energy Efficient High-Performance Computing Aware Proactive Dynamic Virtual Machine Consolidation Technique in Cloud Computing
Published 2022“…However, these algorithms do not consider the workloads' different nature, incredibly individual classes of HPC workload in the cloud data centre. …”
Get full text
Get full text
Get full text
Thesis -
7
Priority and dynamic quantum time algorithms for central processing unit scheduling
Published 2018“…Central Processing Unit is scheduled using different types of scheduling algorithms. One of the most widely algorithm used in scheduling with sharing and batch operating systems is Round Robin. …”
Get full text
Get full text
Thesis -
8
A Model for Evaluation of Cryptography Algorithm on UUM Portal
Published 2004“…The simulation model was developed using Active Server Page, JavaScript and SQL 7.0 as database. …”
Get full text
Get full text
Get full text
Thesis -
9
Thermal-aware scheduling in green data centers / Muhammad Tayyab Chaudhry
Published 2015“…All these thermal-aware techniques are helpful in the establishment of green data centers.…”
Get full text
Get full text
Thesis -
10
Energy efficient virtual machine provisioning in cloud data centers
Published 2014Get full text
Get full text
Conference or Workshop Item -
11
Prevention And Detection Mechanism For Security In Passive Rfid System
Published 2013“…In addition, the randomness of the session key generated from the MLCG is verified using NIST test suite. Besides that, the security of the proposed protocol is validated using the formal analysis tool, AVISPA. …”
Get full text
Get full text
Thesis -
12
Secure policies for the distributed virtual machines in mobile cloud computing
Published 2020“…However, the lack of security aspect impedes the benefits of virtualization techniques, whereby malicious users can violate and damage sensitive data in distributed Virtual Machines (VMs). …”
Get full text
Get full text
Get full text
Get full text
Thesis -
13
Imperceptibility Analysis for Watermarking Technique Based on Image Block Division Scheme
Published 2021Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
14
Machine learning algorithms on price and rent predictions in real estate: A systematic literature review / Muhamad Harussani Abdul Salam ... [et al.]
Published 2022Get full text
Get full text
Conference or Workshop Item -
15
-
16
The development of spatio-temporal data model for dynamic visualization of virtual geographical information system
Published 2006“…Result shows that the proposed data model is able to perform well with a visualization algorithm using linear interpolation and an improved TIN structure. …”
Get full text
Get full text
Monograph -
17
Pose estimation algorithm for mobile Augmented Reality based on inertial sensor fusion
Published 2021“…We evaluated the performance of augmenting the 3D object using the techniques, vision-based, and incorporating the sensor data using the video data. …”
Get full text
Get full text
Get full text
Article -
18
HAPTIC VISUALIZATION USING VISUAL TEXTURE INFORMATION
Published 2011“…In the query process, accuracy is determined by the number of feature vector elements, data extraction, and similarity measurement algorithm. …”
Get full text
Get full text
Thesis -
19
A framework of test case prioritisation in regression testing using particle swarm-artificial bee colony algorithm
Published 2024“…Ten knowledge and domain experts provided positive feedback on the framework's verification, affirming the framework's robustness. Validation was conducted through three experiments involving four Java programs. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
20
Web-based clustering tool using fuzzy k-mean algorithm / Ahmad Zuladzlan Zulkifly
Published 2019“…On the Construction phase, the development of the prototype has been started. All the algorithm for the engine has been developed by using Java script language. …”
Get full text
Get full text
Thesis
