Search Results - (( developing preventing cloud algorithm ) OR ( java implication based algorithm ))

  • Showing 1 - 11 results of 11
Refine Results
  1. 1

    Network tool for preventing DDOS attacks on cloud computing by Yo, Kee Seng

    Published 2015
    “…Securing a cloud computing environment has been a major development in computer network. …”
    Get full text
    Get full text
    Get full text
    Final Year Project Report / IMRAD
  2. 2
  3. 3

    A classifier mechanism for host based intrusion detection and prevention system in cloud computing environment by Al-Zarqawee, Aws Naser

    Published 2018
    “…In order to design a more efficient classifier, it is necessary to develop a system for evaluating the classifier. In this thesis, a new mechanism for an H-IDPS classifier in a cloud environment has desigend. …”
    Get full text
    Get full text
    Thesis
  4. 4

    Performance analysis on multi-attribute combinatorial double auction model for resource allocation in cloud computing by Mohamed El-Sherksi, Suad Abdalla

    Published 2017
    “…Cloud computing is a distinctive form of the recent well-developed distributed computing which supplies multiple services to the customers on their demand. …”
    Get full text
    Get full text
    Thesis
  5. 5

    Secure lightweight client for cloud-based E-Health Model by Zhang, Xiaowei

    Published 2023
    “…The results of this study will remarkably facilitate the development of a practical secure cloud-based eHealth system.…”
    Get full text
    Get full text
    Get full text
    Thesis
  6. 6
  7. 7

    Smart site monitoring system / Muhammad Azmi and Muhammad Naim Mahyuddin by Azmi, Muhammad, Mahyuddin, Muhammad Naim

    Published 2023
    “…These devices collect and transmit data to a centralised cloud-based platform. Advanced data analytics and machine learning algorithms process this data, enabling the system to detect potential safety hazards, monitor construction progress, and predict resource requirements. …”
    Get full text
    Get full text
    Conference or Workshop Item
  8. 8

    Automatic extraction of digital terrain model and Building Footprint from airborne LiDAR data using rule-based learning techniques by Jifroudi, Hamidreza Maskani

    Published 2021
    “…Finally, the Buildings Footprint developed based on the algorithm was compared with the Buildings Footprint developed manually to assess the accuracy of the results. …”
    Get full text
    Get full text
    Get full text
    Thesis
  9. 9
  10. 10

    SVM, ANN, and PSF modelling approaches for prediction of iron dust minimum ignition temperature (MIT) based on the synergistic effect of dispersion pressure and concentration by Arshad, U., Taqvi, S.A.A., Buang, A., Awad, A.

    Published 2021
    “…Besides, a feed-forward artificial neural network with the backpropagation algorithm and a polynomial surface fit model have also been developed to predict the MIT. …”
    Get full text
    Get full text
    Article
  11. 11

    Monitoring cathodic protection system for underground pipeline by Thai, Seng Choong

    Published 2013
    “…An electronic prototype were designed, fabricated and tested to monitor the pipelines drain point voltage, transformer rectifier voltage, shunt current, humidity and temperature using a local server system whereby all the data collected are stored on a local storage before synchronizing to the internet’s web server database using the cloud system. In the software development, a mobile application was implemented on an Android platform to enable mobile users to view and monitor the cathodic protection seamlessly from anywhere around the world. …”
    Get full text
    Get full text
    Thesis