Search Results - (( developing complex cloud algorithm ) OR ( java application _ algorithm ))
Search alternatives:
- developing complex »
- java application »
- cloud algorithm »
- complex cloud »
-
1
Modeling approach of cloud 4D printing service composition optimization based on non-dominated sorting genetic algorithm III
Published 2024“…The study concludes that the NSGA III algorithm exhibits significant potential in optimizing the orchestration of cloud-based 4D printing service portfolios, underscoring its effectiveness in managing the complexities associated with these services. …”
Get full text
Get full text
Get full text
Article -
2
A comparative evaluation of heuristic and metaheuristic job scheduling algorithms for optimized resource management in cloud environments
Published 2026“…The selection of an appropriate scheduling algorithm is crucial for ensuring optimal performance, scalability, and resource efficiency as cloud environments become increasingly complex and dynamic. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
3
Honey bee based trust management system for cloud computing
Published 2011“…In this paper, the authors propose the concept that honey bee algorithm which has been developed to solve complex optimization problems can be successfully used to address this issue.The authors have taken a closer look at the optimization problems that had been solved using the honey bee algorithm and the similarity between these problems and the cloud computing environment.Thus concluding that the honey bee algorithm could be successfully used to solve the trust management issue in cloud computing.…”
Get full text
Get full text
Get full text
Conference or Workshop Item -
4
Completion time driven hyper-heuristic approach for optimisation of scientific workflow scheduling in cloud environment / Ehab Nabiel Mohammad
Published 2018“…The second stage (i.e. approach development stage) is the development of the proposed CTDHH approach, which includes two main parts, the cost optimisation model of SWFS and the dynamic hyper-heuristic algorithm. …”
Get full text
Get full text
Get full text
Thesis -
5
Enhancing user authentication for cloud web-based application / Detar Beqo
Published 2018“…It uses an enhanced encryption algorithm, and the data is stored securely in the cloud systems. …”
Get full text
Get full text
Get full text
Thesis -
6
Optimisation model for scheduling MapReduce jobs in big data processing / Ibrahim Abaker Targio Hashem
Published 2017“…The problem is even more complex using virtualized clusters in a cloud computing to execute a large number of tasks. …”
Get full text
Get full text
Get full text
Thesis -
7
The development of cloud modelling and motion analysis for virtual environment
Published 2005“…This invention uses the newly developed randomized algorithm to fill the cloud volume with particle systems. …”
Get full text
Get full text
Monograph -
8
The development of cloud modelling and motion analysis for virtual environment
Published 2005“…This invention uses the newly developed randomized algorithm to fill the cloud volume with particle systems. …”
Get full text
Get full text
Monograph -
9
-
10
Critical insight for MAPReduce optimization in Hadoop
Published 2014“…Apache Hadoop is one the most used cloud frame work for cloud infrastructure. The predominant philosophy behind Hadoop optimization is the optimization of MapReduce, which is a dominant programming platform effective in bringing a=bout many functional enhancements as per scheduling algorithms developed and implemented. …”
Get full text
Get full text
Get full text
Article -
11
RSA Encryption & Decryption using JAVA
Published 2006“…The implementation of this project will be based on Rapid Application Design Methodology (RAD) and will be more focusing on research and finding, ideas and the implementation of the algorithm, and finally running and testing the algorithm. …”
Get full text
Get full text
Final Year Project -
12
-
13
ECG encryption enhancement with multi-layers of AES and DNA computing
Published 2023“…Evaluations of algorithms reveal that the proposed algorithm has achieved a level of security and complexity that is 48 times superior to that of other methods that have been tried and tested. …”
Get full text
Get full text
Get full text
Thesis -
14
Provider independent cryptographic tools
Published 2003Get full text
Get full text
Get full text
Monograph -
15
-
16
Secure multi-authority attribute-based encryption access control with cache-aware scheduling in mobile cloud computing
Published 2021“…Mobile Cloud Computing (MCC) is the combination of cloud computing, mobile computing, and wireless network to bring rich computational resources to mobile users, network operators, as well as cloud computing providers. …”
Get full text
Get full text
Thesis -
17
Application of adaptive network based fuzzy inference system for model reconstruction in reverse engineering
Published 2004“…The system is developed to measure data for freeform surface with complex shape. …”
Get full text
Get full text
Book Section -
18
Multi-objective scheduling of MapReduce jobs in big data processing
Published 2018“…This problem can become increasingly complex when virtualized clusters in cloud computing are used to execute a large number of tasks. …”
Get full text
Get full text
Article -
19
MelScan: An Android Application for Early Detection of Melanoma
Published 2014“…Based on the findings, there were only 2 applications in the Google Market that was used for melanoma detection, and that the Prewitt operator makes for a good compromise between performance and complexity in developing the application. Overall, the application was developed successfully, and in the future, more functions would be added to make this application more marketable, such as cloud storage function and wearable technology…”
Get full text
Get full text
Final Year Project -
20
Real-Time Video Processing Using Native Programming on Android Platform
Published 2012“…However for the Android platform that based on the JAVA language, most of the software algorithm is running on JAVA that consumes more time to be compiled. …”
Get full text
Get full text
Get full text
Conference or Workshop Item
