Search Results - (( developing mitigation clustering algorithm ) OR ( java applications cloud algorithm ))

  • Showing 1 - 10 results of 10
Refine Results
  1. 1

    Securing cloud data system (SCDS) for key exposure using AES algorithm by Thabet Albatol, Mohammed Samer Hasan

    Published 2021
    “…After that we use to build securing cloud data system (SCDS) for key exposure using the AES algorithm for encrypting and decrypting our website cloud data and files. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  2. 2

    Data-driven dynamic clustering framework for mitigating the adverse economic impact of Covid-19 lockdown practices by Rahman, Md. Arafatur, Nafees, Zaman, A. Taufiq, Asyhari, Al-Turjman, Fadi, Alam Bhuiyan, Md. Zakirul, Mohamad Fadli, Zolkipli

    Published 2020
    “…To mitigate such an impact, this paper proposes a data-driven dynamic clustering framework for moderating the adverse economic impact of COVID-19 flare-up. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  3. 3
  4. 4

    Computer remote monitoring via mobile phones using socket programming / Samih Omer Fadlelmola Elkhider by Omer Fadlelmola Elkhider, Samih

    Published 2011
    “…The approach of the mobile cloud is clearly occurring with web host servers expands thus large number of data around the world stored in huge servers, consumers of mobile devices and small computing devices have high performance expectations usually, therefore mobile cloud computing theorizes that the cloud will soon become a disruptive force in the mobile world, eventually becoming the dominant way in which mobile applications operates. …”
    Get full text
    Get full text
    Thesis
  5. 5

    Optimised content-social based features for fake news detection in social media using text clustering approach by Yahya, Adnan Hussein Ali

    Published 2025
    “…In general, the process of fake news detection was conducted in two different phases, the topic detection phase using a graph-based unsupervised clustering method based on HFPA and Markov Clustering Algorithm (MCL) called (HFPA-MCL) and the fake news detection phase using an unsupervised clustering method based on K-means algorithm. …”
    Get full text
    Get full text
    Get full text
    Thesis
  6. 6

    Hybrid metaheuristic method for clustering in wireless sensor networks / Bryan Raj Peter Jabaraj by Bryan Raj , Peter Jabaraj

    Published 2023
    “…Moreover, two improvised clustering techniques are introduced to reduce the energy overhead cost from the re-clustering process. …”
    Get full text
    Get full text
    Get full text
    Thesis
  7. 7

    An Effective Power Dispatch Strategy for Clustered Micro-grids while Implementing Optimal Energy Management and Power Sharing Control using Power Line Communication by Ahmed Mohamed, Ahmed Haidar, Adila, Fakhar, Muttaqi, Kashem M

    Published 2019
    “…This paper proposes an effective power dispatch strategy for clustered micro-grids. The developed hybrid algorithm implements optimal energy management and power sharing control using binary data. …”
    Get full text
    Get full text
    Get full text
    Proceeding
  8. 8
  9. 9

    A malware analysis and detection system for mobile devices / Ali Feizollah by Ali, Feizollah

    Published 2017
    “…We then used feature selection algorithms and deep learning algorithms to build a detection model. …”
    Get full text
    Get full text
    Get full text
    Thesis
  10. 10

    An enhanced synthetic oversampling framework with self-supervised contrastive learning for multi-class image imbalance by Xiaoling, Gao

    Published 2025
    “…The second contribution is the introduction of the Clustering and Nearest Centroid Neighbour-based Synthetic Minority Oversampling (CLNCN-SMOTE) algorithm to resolve multi-class imbalance. …”
    Get full text
    Get full text
    Thesis