Search Results - (( java application _ algorithm ) OR ( based interactive cloud algorithm ))

Refine Results
  1. 1

    A Penalty-Based Genetic Algorithm For The Composite Saas Placement Problem In The Cloud by Mohd Yusoh, Zeratul Izzah, Tong, Maolin

    Published 2010
    “…This paper proposes a penalty-based genetic algorithm (GA) to the composite SaaS placement problem in the Cloud. …”
    Get full text
    Get full text
    Conference or Workshop Item
  2. 2

    Process state synchronization for mobility support in mobile cloud computing / Ejaz Ahmed by Ejaz, Ahmed

    Published 2016
    “…This research addresses the effect of mobility on application execution for mobile cloud-based interactive applications. We propose Process State Synchronization (PSS) as a mechanism to mitigate the impact of network disconnections on cloud-based interactive mobile applications. …”
    Get full text
    Get full text
    Thesis
  3. 3
  4. 4

    Security framework based multi agent system architecture to facilitate data fetching from cloud data storage by Mohamed, Amir Mohamed Talib

    Published 2012
    “…Ontology-driven MAS architecture that helps in providing a unified agent-based interaction system on top of cloud services using Protégé is implemented. …”
    Get full text
    Get full text
    Thesis
  5. 5

    The development of cloud modelling and motion analysis for virtual environment by Sunar, Mohd. Shahrizal, Daman, Daut, Kari, Sarudin, Mohd. Suaib, Norhaida, Bade, Abdullah

    Published 2005
    “…The complexity of cloud formation, dynamics and light interaction makes real time cloud modelling a difficult task. …”
    Get full text
    Get full text
    Monograph
  6. 6

    The development of cloud modelling and motion analysis for virtual environment by Sunar, Mohd. Shahrizal, Daman, Daut, Kari, Sarudin, Mohd. Suaib, Norhaida, Bade, Abdullah

    Published 2005
    “…The complexity of cloud formation, dynamics and light interaction makes real time cloud modelling a difficult task. …”
    Get full text
    Get full text
    Monograph
  7. 7

    Conceptual deployment models to secure cloud computing / Hajar Ziglari by Ziglari, Hajar

    Published 2012
    “…Deployment models will be analyzed to address users' security concerns with cloud computing based on inter-cloud interaction and with multiple clouds to cooperate. …”
    Get full text
    Get full text
    Thesis
  8. 8

    Development of deep reinforcement learning based resource allocation techniques in cloud radio access network by Amjad, Iqbal

    Published 2022
    “…A step towards long network performance optimization is theterm use of deep reinforcement learning (DRL), which can learn the best policy via interaction with the environment. This thesis proposes three DRLbased resource allocation algorithms that optimize the CRAN performance in terms of energy efficiency (EE), spec tral efficiency (SE), and total power consumption. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  9. 9
  10. 10
  11. 11

    RSA Encryption & Decryption using JAVA by Ramli, Marliyana

    Published 2006
    “…The implementation of this project will be based on Rapid Application Design Methodology (RAD) and will be more focusing on research and finding, ideas and the implementation of the algorithm, and finally running and testing the algorithm. …”
    Get full text
    Get full text
    Final Year Project
  12. 12
  13. 13
  14. 14
  15. 15

    Space allocation for examination scheduling using Genetic Algorithm / Alya Kauthar Azman by Azman, Alya Kauthar

    Published 2025
    “…Implementing real-time data updates through cloud-based platforms could further improve system scalability. …”
    Get full text
    Get full text
    Thesis
  16. 16

    ECG encryption enhancement with multi-layers of AES and DNA computing by Kh-Madhloom, Jamal

    Published 2023
    “…The proposed model is able to protect the DNA sequence stored in the Fog Computing cloud from plain text attacks by generating (I) the main key, which is the key to the EAES encryption algorithm, (II) the rule 1 key, which represents the DNA base number of possible key probabilities, and (III) the rule 2 key, which represents the number of binding probabilities for the DNA helical structure. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  17. 17
  18. 18

    Internet of Things-based Home Automation with Network Mapper and MQTT Protocol by Alam T., Rokonuzzaman M., Sarker S., Abadin A.F.M.Z., Debnath T., Hossain M.I.

    Published 2025
    “…Standard cloud-based IoT systems can't fully function in areas with unstable internet. …”
    Article
  19. 19

    Revolutionizing video analytics: a review of action recognition using 3D by Jeddah, Yunusa Mohammed, Hassan Abdalla Hashim, Aisha, Khalifa, Othman Omran, Ibrahim, Adamu Abubakar

    Published 2024
    “…It also addresses the practicalities of implementing action recognition algorithms in real-world situations, which include tools like deep learning frameworks, pre-trained models, open-source libraries, cloud services, GPU acceleration, and evaluation metrics. …”
    Get full text
    Get full text
    Article
  20. 20

    Real-Time Video Processing Using Native Programming on Android Platform by Saipullah, Khairul Muzzammil

    Published 2012
    “…However for the Android platform that based on the JAVA language, most of the software algorithm is running on JAVA that consumes more time to be compiled. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item