Search Results - (( developing network cloud algorithm ) OR ( java application using algorithm ))

Refine Results
  1. 1

    A malware analysis and detection system for mobile devices / Ali Feizollah by Ali, Feizollah

    Published 2017
    “…We then used feature selection algorithms and deep learning algorithms to build a detection model. …”
    Get full text
    Get full text
    Get full text
    Thesis
  2. 2

    Network tool for preventing DDOS attacks on cloud computing by Yo, Kee Seng

    Published 2015
    “…Securing a cloud computing environment has been a major development in computer network. …”
    Get full text
    Get full text
    Get full text
    Final Year Project Report / IMRAD
  3. 3
  4. 4

    Optimizing Cloud Storage Costs: Introducing the Pre-Evaluation-Based Cost Optimization (PECSCO) Mechanism by Alomari M.F., Mahmoud M.A., Gharaei N., Rasool S.M., Hasan R.A.

    Published 2025
    “…The proposed algorithm aimed at reducing cloud storage cost by strategically determining the best locations for evaluators within a network of nodes for efficient monitoring, particularly in surveillance contexts indicated by the mention of CCTVs. …”
    Conference paper
  5. 5
  6. 6

    A Focal load balancer based algorithm for task assignment in cloud environment by Mohammed, Mostafa Abdulghfoor, Hasan, Raed Abdulkareem, Ahmed, Munef Abdullah, Tapus, Nicolae, Shnan, Marwan Ali, Khaleel, M. K., Ali, Ahmed H.

    Published 2019
    “…In this paper, a new load balancing system is presented Focal Load Balancer (F-LB), which has been developed to reduce the traffic in the Cloud, whilst assuring a smooth flow of data in the cloud network. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  7. 7
  8. 8

    Quantum Particle Swarm Optimization Technique for Load Balancing in Cloud Computing by Elrasheed Ismail, Sultan

    Published 2013
    “…The distributed Cloud Computing technology has been produced as the development of the computer network and distributed computing technology. …”
    Get full text
    Thesis
  9. 9

    Energy and performance efficient resource allocation for cloud-based data centers by Akhter, Nasrin

    Published 2015
    “…This thesis demonstrates that the dynamic consolidations of virtualmachines in cloud data centers by proposing energy efficient algorithms and policies. …”
    Get full text
    Get full text
    Thesis
  10. 10

    A krill herd behaviour inspired load balancing of tasks in cloud computing by Hasan, Raed Abdulkareem, Mohammed, Muamer N.

    Published 2017
    “…A developing trend in the IT environment is mobile cloud computing (MCC) with colossal infrastructural and resource requirements. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  11. 11
  12. 12

    Enhancing user authentication for cloud web-based application / Detar Beqo by Detar , Beqo

    Published 2018
    “…It uses an enhanced encryption algorithm, and the data is stored securely in the cloud systems. …”
    Get full text
    Get full text
    Get full text
    Thesis
  13. 13

    ECG encryption enhancement with multi-layers of AES and DNA computing by Kh-Madhloom, Jamal

    Published 2023
    “…The pairing-based encryption known as "DNA sequence Enhanced Advanced Encryption Standard (EAES)" can be used to protect medical ECG signals that are stored in the cloud for healthcare purposes using the nebula network architecture. …”
    Get full text
    Get full text
    Get full text
    Thesis
  14. 14

    Neural network methods to solve the Lane–Emden type equations arising in thermodynamic studies of the spherical gas cloud model by Ahmad, Iftikhar, Zahoor Raja, Muhammad Asif, Bilal, Muhammad, Ashraf, Farooq

    Published 2017
    “…In the present study, stochastic numerical computing approach is developed by applying artificial neural networks (ANNs) to compute the solution of Lane–Emden type boundary value problems arising in thermodynamic studies of the spherical gas cloud model. …”
    Get full text
    Get full text
    Get full text
    Article
  15. 15

    An augmented reality real-time cloud-based remote monitoring algorithm for a manufacturing system / Siti Aisyah Jaafar by Jaafar, Siti Aisyah

    Published 2021
    “…Therefore, in this research, the first objective is to develop an algorithm for a remote AR-IoT monitoring system. …”
    Get full text
    Get full text
    Thesis
  16. 16

    RSA Encryption & Decryption using JAVA by Ramli, Marliyana

    Published 2006
    “…References and theories to support the research of 'RSA Encryption/Decryption using Java' have been disclosed in Literature Review section. …”
    Get full text
    Get full text
    Final Year Project
  17. 17
  18. 18
  19. 19
  20. 20