Search Results - (( java application system algorithm ) OR ( programming problem cloud algorithm ))
Search alternatives:
- java application »
- system algorithm »
- cloud algorithm »
-
1
Attribute reduction based scheduling algorithm with enhanced hybrid genetic algorithm and particle swarm optimization for optimal device selection
Published 2022“…Enhance hybrid genetic algorithm and particle Swarm optimization are developed to select the optimal device in either fog or cloud. …”
Get full text
Get full text
Article -
2
System program management environment in cloud computing using hybrid Genetic Algorithm and Moth Flame Optimization (GA-MFO)
Published 2022“…The optimization old system program for cloud computing as a challenging issue has been considered as the NP-hard problem in cloud computing environment. …”
Get full text
Get full text
Get full text
Academic Exercise -
3
Hybrid cryptography algorithm to improve security cloud storage
Published 2017“…To improve secure of data in cloud storage by hybrid three algorithms (AES, ECC and RSA).All the existing algorithms has some sort of problems and issues, this had made us decide to develop a safe, correct ad efficient algorithm for having secured data in cloud storage. …”
Get full text
Get full text
Get full text
Thesis -
4
-
5
WURFL detection engine using cosine string similarity algortlhm / Illiasaak Ahmad ... [et al.]
Published 2013Get full text
Get full text
Research Reports -
6
-
7
User authentication in public cloud computing through adoption of electronic personal synthesis behavior
Published 2023“…Public cloud computing is one of the deployment services that can be accessed by all potential users through a website or program interface, at any time, from anywhere, and by using any device. …”
text::Thesis -
8
-
9
Provider independent cryptographic tools
Published 2003Get full text
Get full text
Get full text
Monograph -
10
-
11
Real-time algorithmic music composition application.
Published 2022“…In addition, the system also utilises JavaFx and jFugue for its graphical user interface and music programming respectively. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
12
Route Optimization System
Published 2005“…After much research into the many algorithms available, and considering some, including Genetic Algorithm (GA), the author selected Dijkstra's Algorithm (DA). …”
Get full text
Get full text
Final Year Project -
13
-
14
Optimization of blood vessel detection in retina images using multithreading and native code for portable devices
Published 2013Get full text
Get full text
Conference or Workshop Item -
15
Neural network methods to solve the Lane–Emden type equations arising in thermodynamic studies of the spherical gas cloud model
Published 2017“…Strength of efficient local optimization procedures based on active-set (AS), interior-point (IP) and sequential quadratic programming (SQP) algorithms is used to optimize the energy functions. …”
Get full text
Get full text
Get full text
Article -
16
Design and Implementation of Data-at-Rest Encryption for Hadoop
Published 2017“…The security aspects in Cloud computing is paramount in order to ensure high quality of Service Level Agreement (SLA) to the cloud computing customers. …”
Get full text
Get full text
Conference or Workshop Item -
17
Design and Implementation of Data-at-Rest Encryption for Hadoop
Published 2017“…The security aspects in Cloud computing is paramount in order to ensure high quality of Service Level Agreement (SLA) to the cloud computing customers. …”
Get full text
Get full text
Conference or Workshop Item -
18
-
19
Audio Streaming System Using Real-Time Transport Protocol Based on Java Media Framework
Published 2004“…Java Media Framework library and the RTP protocol for audio transmission were used as development tools.The developed system designed in this thesis together with experimental results proved that the system could be implemented successfully. …”
Get full text
Get full text
Thesis -
20
Secure Image Steganography Using Encryption Algorithm
Published 2016“…A system based on the proposed algorithm will be implemented using Java and it will be more secured due to double-layer of security mechanisms which are RSA and Diffie-Hellman.…”
Get full text
Get full text
Conference or Workshop Item
