Search Results - (( java application customization algorithm ) OR ( data computer system algorithm ))
Search alternatives:
- customization algorithm »
- java application »
- system algorithm »
- computer system »
- data computer »
-
1
Enhancing obfuscation technique for protecting source code against software reverse engineering
Published 2019“…The proposed technique can be enhanced in the future to protect games applications and mobile applications that are developed by java; it can improve the software development industry. …”
Get full text
Get full text
Thesis -
2
Data discovery algorithm for scientific data grid environment
Published 2005“…By using this model, we study various discovery algorithms for locating data sets in a data grid system. …”
Get full text
Get full text
Get full text
Article -
3
Performance evaluation of load balancing algorithm for virtual machine in data centre in cloud computing
Published 2018“…Cloud computing has become biggest buzz in the computer era these days.It runs entire operating systems on the cloud and doeverything on cloud to store data off-site.Cloud computing is primarily based on grid computing, but it’s a new computational model.Cloud computing has emerged into a new opportunity to further enhance way of hosting data centre and provide services.The primary substance of cloud computing is to deal the computing power,storage,different sort of stages and services which assigned tothe external users on demand through the internet.Task scheduling in cloud computing is vital role optimisation and effective dynamic resource allocation for load balancing.In cloud, the issue focused is under utilisation and over utilisation of the resources to distribute workload of multiple network links for example,when cloud clients try to access and send request tothe same cloud server while the other cloud server remain idle at that moment, leads to the unbalanced of workload on cloud data centers.Thus, load balancing is to assign tasks to the individual cloud data centers of the shared system so that no single cloud data centers is overloaded or under loaded.A Hybrid approach of Honey Bee (HB) and Particle Swarm Optimisation (PSO) load balancing algorithm is combined in order to get effective response time.The proposed hybrid algorithm has been experimented by using CloudSim simulator.The result shows that the hybrid load balancing algorithm improves the cloud system performance by reducing the response time compared to the Honey Bee (HB) and Particle Swarm Optimisation (PSO) load balancing algorithm.…”
Get full text
Get full text
Get full text
Article -
4
Parallel algorithms for numerical simulations of EHD ion-drag micropump on distributed parallel computing systems
Published 2014“…The parallel computing laboratory is configured for homogeneous systems using MATLAB Distributed Computing Server (MDCS) with Windows 7 operating system. …”
Get full text
Get full text
Thesis -
5
Intelligent transmission line fault diagnosis using the Apriori associated rule algorithm under cloud computing environment
Published 2024Subjects:Article -
6
-
7
Investigation of evolutionary multi-objective algorithms in solving view selection problem / Seyed Hamid Talebian
Published 2013“…Today’s huge volumes of data are maintained in conventional database systems. …”
Get full text
Get full text
Thesis -
8
-
9
Two objectives big data task scheduling using swarm intelligence in cloud computing
Published 2016“…On the other hand, scheduling algorithms; starting from traditional to Hyper-heuristic; are widely used in computing systems such as cloud computing to monitor the use of resources. …”
Get full text
Get full text
Get full text
Article -
10
Dynamic Task Offloading Algorithm for optimising IoT network quality of service in the Mobile-Fog-Cloud System
Published 2023“…Therefore, an Energy-Efficient Canonical Polyadic Decomposition (EECPD) scheduling algorithm to minimize the mobile device energy consumption in the system is proposed. …”
Get full text
Get full text
Thesis -
11
Enhanced Storage Mechanism for Secured Parallel Network File System
Published 2018“…The challenges faced translates how the new techniques, lease and delegation algorithm for file locking, snapshot enabled locks and layouts for data state, integration of highly secured Kerberos security on storage for pNFS locks and layouts, data block size algorithm enabled deduplication on file, block and object patterns and the redundant array of independent disk data protection can create impact on storage computing system. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
12
An improvement on the valiantbrebner hypercube data broadcasting technique / Nasaruddin Zenon
Published 1990“…At the end of the writer's earlier article: A Model Solution for the Radar Surveillance Problem' [7] it is mentioned that a slight modification of the formulation given in the paper can be used to solve the problem of data broadcasting in multi processor computer system. …”
Get full text
Get full text
Article -
13
-
14
Restaurant locator using Djikstra Algorithm / Mohamad Aliff Hakimi Lukman Hakim
Published 2017Subjects: Get full text
Get full text
Thesis -
15
System identification using Extended Kalman Filter
Published 2017Get full text
Get full text
Student Project -
16
Development Of Generative Computer-Aided Process Planning System For Lathe Machining
Published 2019“…Therefore, a single automatic system that able to transfer CAD data into machining readable data through CAM data had been developed.…”
Get full text
Get full text
Thesis -
17
Quantum Particle Swarm Optimization Technique for Load Balancing in Cloud Computing
Published 2013“…Researches on data Cloud Computing become the necessary trend in the distributed Cloud Computing system domain since the sources and application of the data are distributed and the scale of the applications enlarges quickly. …”
Get full text
Thesis -
18
The Development Of System For Algorithms Visualization Using Simjava
Published 2020“…It does not simply fit data to a chart to visualize an algorithm, there is no main data set. …”
Get full text
Get full text
Get full text
Article -
19
Analysis of string matching compression algorithms
Published 2008“…This increasing processor-memory performance gap is the primary obstacle to improved computer system performance. As a result, the size of main memory has increased gradually. …”
Get full text
Get full text
Article -
20
A Comparative Study Of Blockchain Algorithms For Non-Fungible Token
Published 2023Get full text
Get full text
Undergraduates Project Papers
