Search Results - (( data virtualization techniques algorithm ) OR ( java application design algorithm ))

Refine Results
  1. 1

    RSA Encryption & Decryption using JAVA by Ramli, Marliyana

    Published 2006
    “…The implementation of this project will be based on Rapid Application Design Methodology (RAD) and will be more focusing on research and finding, ideas and the implementation of the algorithm, and finally running and testing the algorithm. …”
    Get full text
    Get full text
    Final Year Project
  2. 2
  3. 3
  4. 4

    An improved dynamic load balancing for virtualmachines in cloud computing using hybrid bat and bee colony algorithms by Ullah, Arif

    Published 2021
    “…Therefore, to overcome these problems, this study proposed an improved dynamic load balancing technique known as HBAC algorithm which dynamically allocates task by hybridizing Artificial Bee Colony (ABC) algorithm with Bat algorithm. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  5. 5

    Performance analysis of constrained device virtualization algorithm by Haseeb, Shariq, Hassan Abdalla Hashim, Aisha, Khalifa, Othman Omran, Ismail, Ahmad Faris

    Published 2020
    “…We have adopted this technique in our research to virtualize the entire Internet of Things network so that virtual TCP/IP based protocols can operate on virtual networks for enabling interoperability. …”
    Get full text
    Get full text
    Get full text
    Article
  6. 6

    A new image scrambling technique using block rotation algorithm based on Rubik’s cube by Abugharsa, Ahmed Bashir, Hasan Basari, Abd Samad, Almangush, Hamida

    Published 2013
    “…Objectives: the objective of this paper is to develop a new efficient image scrambling algorithm by using the Rotation technique in order to break the relationship among image elements (pixels). …”
    Get full text
    Get full text
    Get full text
    Article
  7. 7
  8. 8
  9. 9

    Energy Efficient High-Performance Computing Aware Proactive Dynamic Virtual Machine Consolidation Technique in Cloud Computing by Rukshanda, Kamran

    Published 2022
    “…However, these algorithms do not consider the workloads' different nature, incredibly individual classes of HPC workload in the cloud data centre. …”
    Get full text
    Get full text
    Get full text
    Thesis
  10. 10

    Audio Streaming System Using Real-Time Transport Protocol Based on Java Media Framework by Asaad Aref, Ibrahim

    Published 2004
    “…Java Media Framework library and the RTP protocol for audio transmission were used as development tools.The developed system designed in this thesis together with experimental results proved that the system could be implemented successfully. …”
    Get full text
    Get full text
    Thesis
  11. 11

    Thermal-aware scheduling in green data centers / Muhammad Tayyab Chaudhry by Chaudhry, Muhammad Tayyab

    Published 2015
    “…All these thermal-aware techniques are helpful in the establishment of green data centers.…”
    Get full text
    Get full text
    Thesis
  12. 12
  13. 13
  14. 14
  15. 15
  16. 16

    Network game (Literati) / Chung Mei Kuen by Chung, Mei Kuen

    Published 2003
    “…The main aspect of this thesis is to produce a networked gaming system, which process players. requested to play the game and enabling users to play the graphical game with people through the network. The algorithm design and implementation method must not only be workable, but also highly efficient in terms of execution speed and response time. …”
    Get full text
    Get full text
    Thesis
  17. 17

    SANAsms: Secure short messaging system for secure GSM mobile communication by Anuar, N.B., Azlan, I.M., Wahid, A.W.A., Zakaria, O.

    Published 2008
    “…The application is designed to satisfy the user friendly interfaces and intent to be used by the end user without having the advanced knowledge in mobile security. …”
    Get full text
    Get full text
    Conference or Workshop Item
  18. 18

    Secure policies for the distributed virtual machines in mobile cloud computing by Annane, Boubakeur

    Published 2020
    “…However, the lack of security aspect impedes the benefits of virtualization techniques, whereby malicious users can violate and damage sensitive data in distributed Virtual Machines (VMs). …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  19. 19
  20. 20