Search Results - (( java application system algorithm ) OR ( using linear cloud algorithm ))
Search alternatives:
- java application »
- system algorithm »
- cloud algorithm »
- linear cloud »
-
1
Privacy-preserving multi-keyword hybrid search over encrypted data in cloud
Published 2022“…The proposed research work uses this technique along with the n-gram corpus algorithm that helps to achieve relevancy score and sub-linear search time. …”
Get full text
Get full text
Article -
2
-
3
Privacy-preserving multi-keyword hybrid search over encrypted data in cloud
Published 2022“…The proposed research work uses this technique along with the n-gram corpus algorithm that helps to achieve relevancy score and sub-linear search time. …”
Get full text
Get full text
Article -
4
Provider independent cryptographic tools
Published 2003Get full text
Get full text
Get full text
Monograph -
5
-
6
Scheduling scientific workflow in multi-cloud: a multi-objective minimum weight optimization decision-making approach
Published 2023“…In particular, we use particle swarm optimization (PSO) to expand the FR-MOS multi-objective scheduling algorithm by using fuzzy resource management to maximize variety and obtain optimal Pareto convergence. …”
Get full text
Get full text
Article -
7
Real-time algorithmic music composition application.
Published 2022“…In addition, the system also utilises JavaFx and jFugue for its graphical user interface and music programming respectively. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
8
Route Optimization System
Published 2005“…After much research into the many algorithms available, and considering some, including Genetic Algorithm (GA), the author selected Dijkstra's Algorithm (DA). …”
Get full text
Get full text
Final Year Project -
9
Host Based Intrusion Detection and Prevention Model Against DDoS Attack in Cloud Computing
Published 2018“…The prevention model uses principal component analysis and linear discriminant analysis with a hybrid, nature-inspired metaheuristic algorithm called Ant Lion optimisation for feature selection and artificial neural networks to classify and configure the cloud server. …”
Get full text
Get full text
Get full text
Book Chapter -
10
-
11
Optimization of blood vessel detection in retina images using multithreading and native code for portable devices
Published 2013Get full text
Get full text
Conference or Workshop Item -
12
-
13
Audio Streaming System Using Real-Time Transport Protocol Based on Java Media Framework
Published 2004“…Java Media Framework library and the RTP protocol for audio transmission were used as development tools.The developed system designed in this thesis together with experimental results proved that the system could be implemented successfully. …”
Get full text
Get full text
Thesis -
14
Integrated examination and analysis model for improving mobile cloud forensic investigation
Published 2022“…In this context, proposing Forensic Examination and Analysis Methodology using Data mining (FED) and Forensic Examination and analysis methodology using Data mining and Optimization (FEDO) models address these issues. …”
Get full text
Get full text
Thesis -
15
Quasi linear algorithm for modelling shoreline change from AIRSAR/POLSAR polarized data
Published 2007Get full text
Get full text
Conference or Workshop Item -
16
Secure Image Steganography Using Encryption Algorithm
Published 2016“…A system based on the proposed algorithm will be implemented using Java and it will be more secured due to double-layer of security mechanisms which are RSA and Diffie-Hellman.…”
Get full text
Get full text
Conference or Workshop Item -
17
Network game (Literati) / Chung Mei Kuen
Published 2003“…The possible applications of multimedia-networked system are endless, as the demand to support interactive communication among groups of users has increased significantly. …”
Get full text
Get full text
Thesis -
18
Assessment of landsat 7 scan line corrector-off data gap-filling methods for seagrass distribution mapping
Published 2015“…For optimal performance of the GNSPI algorithm, cloud and shadow in the primary and auxiliary images had to be removed by cloud removal methods prior to filling data gaps. …”
Get full text
Get full text
Article -
19
SANAsms: Secure short messaging system for secure GSM mobile communication
Published 2008“…The system is developed using Java 2 Micro Edition (J2ME) which is written in Java. …”
Get full text
Get full text
Conference or Workshop Item -
20
A Toolkit for Simulation of Desktop Grid Environment
Published 2014“…The prototypes will be developed using JAVA language united with a MySQL database. Core functionality of the simulator are job generation, volunteer generation, simulating algorithms, generating graphical charts and generating reports. …”
Get full text
Get full text
Final Year Project
