Search Results - (( data virtualization techniques algorithm ) OR ( java generation learning algorithm ))
Search alternatives:
- virtualization techniques »
- data virtualization »
- generation learning »
- learning algorithm »
- java generation »
-
1
-
2
An improved dynamic load balancing for virtualmachines in cloud computing using hybrid bat and bee colony algorithms
Published 2021“…Therefore, to overcome these problems, this study proposed an improved dynamic load balancing technique known as HBAC algorithm which dynamically allocates task by hybridizing Artificial Bee Colony (ABC) algorithm with Bat algorithm. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
3
Performance analysis of constrained device virtualization algorithm
Published 2020“…We have adopted this technique in our research to virtualize the entire Internet of Things network so that virtual TCP/IP based protocols can operate on virtual networks for enabling interoperability. …”
Get full text
Get full text
Get full text
Article -
4
Object-Oriented Programming semantics representation utilizing agents
Published 2011“…A formal algorithm that can be applied to any two related Java-based source codes examples is invented to generate the semantics of these source codes. …”
Get full text
Get full text
Get full text
Article -
5
A new image scrambling technique using block rotation algorithm based on Rubik’s cube
Published 2013“…Objectives: the objective of this paper is to develop a new efficient image scrambling algorithm by using the Rotation technique in order to break the relationship among image elements (pixels). …”
Get full text
Get full text
Get full text
Article -
6
-
7
Energy Efficient High-Performance Computing Aware Proactive Dynamic Virtual Machine Consolidation Technique in Cloud Computing
Published 2022“…However, these algorithms do not consider the workloads' different nature, incredibly individual classes of HPC workload in the cloud data centre. …”
Get full text
Get full text
Get full text
Thesis -
8
Thermal-aware scheduling in green data centers / Muhammad Tayyab Chaudhry
Published 2015“…All these thermal-aware techniques are helpful in the establishment of green data centers.…”
Get full text
Get full text
Thesis -
9
Features selection for intrusion detection system using hybridize PSO-SVM
Published 2016“…An Intrusion Detection System is software or application which is used to detect thread, malicious activities and the unauthorized access to the computer system and warn the administrators by generating alarms. Features selection process can be considered a problem of global combinatorial optimization in machine learning. …”
Get full text
Get full text
Thesis -
10
Energy efficient virtual machine provisioning in cloud data centers
Published 2014Get full text
Get full text
Conference or Workshop Item -
11
Secure policies for the distributed virtual machines in mobile cloud computing
Published 2020“…However, the lack of security aspect impedes the benefits of virtualization techniques, whereby malicious users can violate and damage sensitive data in distributed Virtual Machines (VMs). …”
Get full text
Get full text
Get full text
Get full text
Thesis -
12
Imperceptibility Analysis for Watermarking Technique Based on Image Block Division Scheme
Published 2021Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
13
Machine learning algorithms on price and rent predictions in real estate: A systematic literature review / Muhamad Harussani Abdul Salam ... [et al.]
Published 2022Get full text
Get full text
Conference or Workshop Item -
14
-
15
The development of spatio-temporal data model for dynamic visualization of virtual geographical information system
Published 2006“…Result shows that the proposed data model is able to perform well with a visualization algorithm using linear interpolation and an improved TIN structure. …”
Get full text
Get full text
Monograph -
16
Talkout : Protecting mental health application with a lightweight message encryption
Published 2022“…The investigation of lightweight message encryption algorithms is conducted with systematic quantitative literature and experiment implementation in Java and Android running environment. …”
Get full text
Get full text
Get full text
Academic Exercise -
17
Pose estimation algorithm for mobile Augmented Reality based on inertial sensor fusion
Published 2021“…We evaluated the performance of augmenting the 3D object using the techniques, vision-based, and incorporating the sensor data using the video data. …”
Get full text
Get full text
Get full text
Article -
18
HAPTIC VISUALIZATION USING VISUAL TEXTURE INFORMATION
Published 2011“…In the query process, accuracy is determined by the number of feature vector elements, data extraction, and similarity measurement algorithm. …”
Get full text
Get full text
Thesis -
19
3D hand posture recognition using multicam
Published 2011“…This technique is able to solve the problem of orientation, size and distance invariants by utilizing the distance data.…”
Get full text
Get full text
Conference or Workshop Item -
20
Frequency aware task scheduling using DVFS for energy efficiency in Cloud data centre
Published 2023“…The experiment result shows that our algorithm has outperformed and efficiently minimized the energy consumption in the Cloud data centre as compared with existing energy‐saving techniques. …”
Get full text
Get full text
Article
