Search Results - (( developing network cloud algorithm ) OR ( java application using algorithm ))
Search alternatives:
- developing network »
- java application »
- cloud algorithm »
- using algorithm »
- network cloud »
-
1
A malware analysis and detection system for mobile devices / Ali Feizollah
Published 2017“…We then used feature selection algorithms and deep learning algorithms to build a detection model. …”
Get full text
Get full text
Get full text
Thesis -
2
Network tool for preventing DDOS attacks on cloud computing
Published 2015“…Securing a cloud computing environment has been a major development in computer network. …”
Get full text
Get full text
Get full text
Final Year Project Report / IMRAD -
3
-
4
Optimizing Cloud Storage Costs: Introducing the Pre-Evaluation-Based Cost Optimization (PECSCO) Mechanism
Published 2025“…The proposed algorithm aimed at reducing cloud storage cost by strategically determining the best locations for evaluators within a network of nodes for efficient monitoring, particularly in surveillance contexts indicated by the mention of CCTVs. …”
Conference paper -
5
Development of deep reinforcement learning based resource allocation techniques in cloud radio access network
Published 2022Get full text
Get full text
Final Year Project / Dissertation / Thesis -
6
A Focal load balancer based algorithm for task assignment in cloud environment
Published 2019“…In this paper, a new load balancing system is presented Focal Load Balancer (F-LB), which has been developed to reduce the traffic in the Cloud, whilst assuring a smooth flow of data in the cloud network. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
7
-
8
Quantum Particle Swarm Optimization Technique for Load Balancing in Cloud Computing
Published 2013“…The distributed Cloud Computing technology has been produced as the development of the computer network and distributed computing technology. …”
Get full text
Thesis -
9
Energy and performance efficient resource allocation for cloud-based data centers
Published 2015“…This thesis demonstrates that the dynamic consolidations of virtualmachines in cloud data centers by proposing energy efficient algorithms and policies. …”
Get full text
Get full text
Thesis -
10
A krill herd behaviour inspired load balancing of tasks in cloud computing
Published 2017“…A developing trend in the IT environment is mobile cloud computing (MCC) with colossal infrastructural and resource requirements. …”
Get full text
Get full text
Get full text
Get full text
Article -
11
Cloudids: Cloud Intrusion Detection Model Inspired By Dendritic Cell Mechanism
Published 2024Article -
12
Enhancing user authentication for cloud web-based application / Detar Beqo
Published 2018“…It uses an enhanced encryption algorithm, and the data is stored securely in the cloud systems. …”
Get full text
Get full text
Get full text
Thesis -
13
ECG encryption enhancement with multi-layers of AES and DNA computing
Published 2023“…The pairing-based encryption known as "DNA sequence Enhanced Advanced Encryption Standard (EAES)" can be used to protect medical ECG signals that are stored in the cloud for healthcare purposes using the nebula network architecture. …”
Get full text
Get full text
Get full text
Thesis -
14
Neural network methods to solve the Lane–Emden type equations arising in thermodynamic studies of the spherical gas cloud model
Published 2017“…In the present study, stochastic numerical computing approach is developed by applying artificial neural networks (ANNs) to compute the solution of Lane–Emden type boundary value problems arising in thermodynamic studies of the spherical gas cloud model. …”
Get full text
Get full text
Get full text
Article -
15
An augmented reality real-time cloud-based remote monitoring algorithm for a manufacturing system / Siti Aisyah Jaafar
Published 2021“…Therefore, in this research, the first objective is to develop an algorithm for a remote AR-IoT monitoring system. …”
Get full text
Get full text
Thesis -
16
RSA Encryption & Decryption using JAVA
Published 2006“…References and theories to support the research of 'RSA Encryption/Decryption using Java' have been disclosed in Literature Review section. …”
Get full text
Get full text
Final Year Project -
17
-
18
Provider independent cryptographic tools
Published 2003Get full text
Get full text
Get full text
Monograph -
19
-
20
