Search Results - (( java implementation amh algorithm ) OR ( using code cloud algorithm ))
Search alternatives:
- java implementation »
- implementation amh »
- cloud algorithm »
- amh algorithm »
- using code »
-
1
Automatic marking system for programming subject
Published 2023“…To achieve this, this project use cloud compute resources that contain Docker container which act as an isolation for anonymous code execution. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
2
Cloud Worm Detection and Response Technique By Integrating The Enhanced Genetic Algorithm An Threat Level
Published 2024thesis::doctoral thesis -
3
Task scheduling in cloud computing using hybrid genetic algorithm and bald eagle search (GA-BES)
Published 2022“…Task scheduling and resource allocation are essential aspects of cloud computing. This Study proposes task scheduling in cloud computing using a hybrid genetic algorithm, and bald eagle search proposed to solve the task scheduling problem. …”
Get full text
Get full text
Get full text
Academic Exercise -
4
Scheduling scientific workflow using multiobjective algorithm with fuzzy resource utilization in multi-cloud environment
Published 2020“…The provision of resources and services for scientific workflow applications using a multi-cloud architecture and a pay-per-use rule has recently gained popularity within the cloud computing research domain. …”
Get full text
Get full text
Article -
5
Implementation of locust inspired scheduling algorithm with huge number of servers for energy efficiency in a cloud datacenter
Published 2019“…Cloudsim is used as Discrete Event Simulation tool and Java as coding language to evaluate LACE algorithm. …”
Get full text
Get full text
Thesis -
6
-
7
Fog-cloud scheduling simulator for reinforcement learning algorithms
Published 2023Get full text
Get full text
Article -
8
Task offloading paradigm in mobile edge computing-current issues, adopted approaches, and future directions
Published 2023“…Meanwhile, the rapidly increasing number of connected devices with the massive amount of generated data that use cloud services leads to high workload, congestion, and delay bottleneck in the centralized cloud architecture. …”
Get full text
Get full text
Article -
9
An augmented reality real-time cloud-based remote monitoring algorithm for a manufacturing system / Siti Aisyah Jaafar
Published 2021“…This was achieved through data transfer using Amazon Web Service (AWS-IoT) cloud connection. …”
Get full text
Get full text
Thesis -
10
Alignment of 3D laser scanner point clouds using photogrammetric targets
Published 2006“…Existing registration method used corresponding features between the two scanned images as registration primitive and finally 3D transformation algorithm was applied to combine the images. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
11
Secret sharing scheme for key management of secure data sharing in cloud
Published 2019“…One of the known issues in cloud storage is the high key generation time for large-scale users and limiting the use of cryptography for data encryption. …”
Get full text
Get full text
Thesis -
12
Space allocation for examination scheduling using Genetic Algorithm / Alya Kauthar Azman
Published 2025“…The research adopts a Genetic Algorithm-based approach, where examination scheduling details such as date, time, course code, program code, student group, student numbers, and available spaces are encoded as chromosomes. …”
Get full text
Get full text
Thesis -
13
-
14
-
15
Improved rsync algorithm to minimize communication cost using multi-agent systems for synchronization in multi-learning management systems
Published 2017“…To evaluate the computation time of the new techniques, standard datasets, which include two versions of source codes emacs-19.28 with emacs-19.29, and gcc-4.8.1 with gcc-4.8.2, were used. …”
Get full text
Get full text
Get full text
Thesis -
16
Iot health monitoring system for self quarantined covid-19 patients
Published 2022“…The software used to do coding is Arduino IDE which is suitable for all Arduino boards. …”
Get full text
Get full text
Undergraduates Project Papers -
17
-
18
-
19
A malware analysis and detection system for mobile devices / Ali Feizollah
Published 2017“…We extracted 30 different features from network traffic. We then used feature selection algorithms and deep learning algorithms to build a detection model. …”
Get full text
Get full text
Get full text
Thesis -
20
Underwater 3-D Scene Reconstruction Using Kinect v2 Based on Physical Models for Refraction and Time of Flight Correction
Published 2017“…The data set covers a large variety of objects scanned underwater and is publicly available for further use, along with the Kinect waterproof housing design and correction filter codes. …”
Get full text
Get full text
Article
