Search Results - (( developing new cloud algorithm ) OR ( java application using algorithm ))
Search alternatives:
- java application »
- cloud algorithm »
- using algorithm »
- developing new »
-
1
A malware analysis and detection system for mobile devices / Ali Feizollah
Published 2017“…We then used feature selection algorithms and deep learning algorithms to build a detection model. …”
Get full text
Get full text
Get full text
Thesis -
2
Development of Algorithm for QoS Model in Cloud Computing
Published 2021Get full text
Get full text
Get full text
Article -
3
A new priority rule cloud scheduling technique that utilizes gaps to increase the efficiency of jobs distribution
Published 2023“…To address this issue, the main objective of this research is to improve the existing PR cloud schedulers by developing a new dynamic scheduling algorithm by manipulating the gaps in the cloud job schedule. …”
Get full text
Get full text
Thesis -
4
A Focal load balancer based algorithm for task assignment in cloud environment
Published 2019“…In this paper, a new load balancing system is presented Focal Load Balancer (F-LB), which has been developed to reduce the traffic in the Cloud, whilst assuring a smooth flow of data in the cloud network. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
5
Cloud Resource Management Framework Using Monarch Butterfly Harmony Search And Case Based Reasoning
Published 2017“…In addition, a new ri is developed using case-based reasoning and is then plugged into the rop framework. …”
Get full text
Get full text
Thesis -
6
Wireless water quality cloud monitoring system with self-healing algorithm
Published 2017“…There are many works on storing environmental data in cloud storage in Malaysia. The new platform to date for the Internet of Things (IoT) and cloud database is Favoriot. …”
Get full text
Get full text
Conference or Workshop Item -
7
Conceptual deployment models to secure cloud computing / Hajar Ziglari
Published 2012“…Cloud computing is a choice of raising the capacity or adding extra capabilities with no new infrastructure investment to train new personnel, or get licence for new software. …”
Get full text
Get full text
Thesis -
8
Cloud Worm Detection and Response Technique By Integrating The Enhanced Genetic Algorithm An Threat Level
Published 2024thesis::doctoral thesis -
9
Hybrid cryptography algorithm to improve security cloud storage
Published 2017“…To improve secure of data in cloud storage by hybrid three algorithms (AES, ECC and RSA).All the existing algorithms has some sort of problems and issues, this had made us decide to develop a safe, correct ad efficient algorithm for having secured data in cloud storage. …”
Get full text
Get full text
Get full text
Thesis -
10
An adaptive QOS scheduling algorithm in service oriented grid and cloud environment / Ang Tan Fong
Published 2011“…An experimental testbed is developed to evaluate the performances of all the proposed algorithms. …”
Get full text
Get full text
Get full text
Get full text
Get full text
Thesis -
11
Honey bee based trust management system for cloud computing
Published 2011“…In this paper, the authors propose the concept that honey bee algorithm which has been developed to solve complex optimization problems can be successfully used to address this issue.The authors have taken a closer look at the optimization problems that had been solved using the honey bee algorithm and the similarity between these problems and the cloud computing environment.Thus concluding that the honey bee algorithm could be successfully used to solve the trust management issue in cloud computing.…”
Get full text
Get full text
Get full text
Conference or Workshop Item -
12
Cloudids: Cloud Intrusion Detection Model Inspired By Dendritic Cell Mechanism
Published 2024“…Cloud Computing Security is a new era of computer technology and opens a new research area and creates a lot of opportunity of exploration. …”
Article -
13
Energy and performance efficient resource allocation for cloud-based data centers
Published 2015“…The aim of this research is to propose a few new host overload detection and VMselection algorithms in order tominimize energy consumption. …”
Get full text
Get full text
Thesis -
14
RSA Encryption & Decryption using JAVA
Published 2006“…References and theories to support the research of 'RSA Encryption/Decryption using Java' have been disclosed in Literature Review section. …”
Get full text
Get full text
Final Year Project -
15
Priority based fair scheduling : Enhancing efficiency in cloud job distribution
Published 2023“…To overcome this challenge, numerous researchers have focused on improving existing Priority Rule (PR) cloud schedulers by developing dynamic scheduling algorithms, but they have fallen short of meeting user satisfaction. …”
Get full text
Get full text
Get full text
Get full text
Conference or Workshop Item -
16
-
17
Provider independent cryptographic tools
Published 2003Get full text
Get full text
Get full text
Monograph -
18
SG-PBFS : Shortest Gap-Priority Based Fair Scheduling technique for job scheduling in cloud environment
Published 2024“…To address this issue, the main objective of this research is to improve the existing Priority Rules (PR) cloud schedulers by developing a new dynamic scheduling algorithm by manipulating the gaps in the cloud job schedule. …”
Get full text
Get full text
Get full text
Get full text
Article -
19
Optimisation model for scheduling MapReduce jobs in big data processing / Ibrahim Abaker Targio Hashem
Published 2017“…In addition, NSGA-II algorithm was able to find the optimal solutions. We then proposed a multi-objective scheduling algorithm framework that considers resource allocation and task scheduling in a heterogonous cloud environment. …”
Get full text
Get full text
Get full text
Thesis -
20
