Search Results - (( developing network cloud algorithm ) OR ( java application stemming algorithm ))
Search alternatives:
- application stemming »
- developing network »
- stemming algorithm »
- java application »
- cloud algorithm »
- network cloud »
-
1
Network tool for preventing DDOS attacks on cloud computing
Published 2015“…Securing a cloud computing environment has been a major development in computer network. …”
Get full text
Get full text
Get full text
Final Year Project Report / IMRAD -
2
-
3
Optimizing Cloud Storage Costs: Introducing the Pre-Evaluation-Based Cost Optimization (PECSCO) Mechanism
Published 2025“…The proposed algorithm aimed at reducing cloud storage cost by strategically determining the best locations for evaluators within a network of nodes for efficient monitoring, particularly in surveillance contexts indicated by the mention of CCTVs. …”
Conference paper -
4
Development of deep reinforcement learning based resource allocation techniques in cloud radio access network
Published 2022Get full text
Get full text
Final Year Project / Dissertation / Thesis -
5
A Focal load balancer based algorithm for task assignment in cloud environment
Published 2019“…In this paper, a new load balancing system is presented Focal Load Balancer (F-LB), which has been developed to reduce the traffic in the Cloud, whilst assuring a smooth flow of data in the cloud network. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
6
-
7
Quantum Particle Swarm Optimization Technique for Load Balancing in Cloud Computing
Published 2013“…The distributed Cloud Computing technology has been produced as the development of the computer network and distributed computing technology. …”
Get full text
Thesis -
8
Energy and performance efficient resource allocation for cloud-based data centers
Published 2015“…This thesis demonstrates that the dynamic consolidations of virtualmachines in cloud data centers by proposing energy efficient algorithms and policies. …”
Get full text
Get full text
Thesis -
9
A krill herd behaviour inspired load balancing of tasks in cloud computing
Published 2017“…A developing trend in the IT environment is mobile cloud computing (MCC) with colossal infrastructural and resource requirements. …”
Get full text
Get full text
Get full text
Get full text
Article -
10
Cloudids: Cloud Intrusion Detection Model Inspired By Dendritic Cell Mechanism
Published 2024Article -
11
Enhancing user authentication for cloud web-based application / Detar Beqo
Published 2018“…It uses an enhanced encryption algorithm, and the data is stored securely in the cloud systems. …”
Get full text
Get full text
Get full text
Thesis -
12
ECG encryption enhancement with multi-layers of AES and DNA computing
Published 2023“…The pairing-based encryption known as "DNA sequence Enhanced Advanced Encryption Standard (EAES)" can be used to protect medical ECG signals that are stored in the cloud for healthcare purposes using the nebula network architecture. …”
Get full text
Get full text
Get full text
Thesis -
13
Neural network methods to solve the Lane–Emden type equations arising in thermodynamic studies of the spherical gas cloud model
Published 2017“…In the present study, stochastic numerical computing approach is developed by applying artificial neural networks (ANNs) to compute the solution of Lane–Emden type boundary value problems arising in thermodynamic studies of the spherical gas cloud model. …”
Get full text
Get full text
Get full text
Article -
14
An augmented reality real-time cloud-based remote monitoring algorithm for a manufacturing system / Siti Aisyah Jaafar
Published 2021“…Therefore, in this research, the first objective is to develop an algorithm for a remote AR-IoT monitoring system. …”
Get full text
Get full text
Thesis -
15
-
16
-
17
A classifier mechanism for host based intrusion detection and prevention system in cloud computing environment
Published 2018“…Even with such systems in place, however, the security level of general cloud computing must be enhanced. More potent attacks attempt to take control of the cloud environment itself; such attacks include malicious virtual-machine (VM) hyperjacking as well as traditional network-security threats such as traffic snooping (which intercepts network traffic), address spoofing and the forging of VMs or IP addresses. …”
Get full text
Get full text
Thesis -
18
Prediction on weather forecast based on cloud shapes using CNN / Muhammad Ashraff Noor Azmi
Published 2024“…To overcome the limitations of traditional methods, this research proposes a system utilizing Convolutional Neural Networks (CNN) for accurate weather prediction based on cloud shapes. …”
Get full text
Get full text
Thesis -
19
3D LiDAR Vehicle Perception and Classification Using 3D Machine Learning Algorithm
Published 2024Get full text
Get full text
Get full text
Get full text
Conference or Workshop Item -
20
Critical insight for MAPReduce optimization in Hadoop
Published 2014“…Apache Hadoop is one the most used cloud frame work for cloud infrastructure. The predominant philosophy behind Hadoop optimization is the optimization of MapReduce, which is a dominant programming platform effective in bringing a=bout many functional enhancements as per scheduling algorithms developed and implemented. …”
Get full text
Get full text
Get full text
Article
