Search Results - (( java implementation ant algorithm ) OR ( using complex cloud algorithm ))
Search alternatives:
- java implementation »
- implementation ant »
- cloud algorithm »
- ant algorithm »
- using complex »
- complex cloud »
-
1
Embedded system for indoor guidance parking with Dijkstra’s algorithm and ant colony optimization
Published 2019“…This study proposes a car parking management system which applies Dijkstra’s algorithm, Ant Colony Optimization (ACO) and Binary Search Tree (BST) in structuring a guidance system for indoor parking. …”
Get full text
Get full text
Thesis -
2
Deadline guarantee for scientific workflow using dynamic scheduling algorithms on IaaS clouds
Published 2018“…Finally, we expected the scheduling algorithms PDC and DCCP to be improve the Cloud resource usage high efficiency in the IaaS Cloud with efficient scheduling for scientific workflow.…”
Get full text
Get full text
Thesis -
3
Honey bee based trust management system for cloud computing
Published 2011“…In this paper, the authors propose the concept that honey bee algorithm which has been developed to solve complex optimization problems can be successfully used to address this issue.The authors have taken a closer look at the optimization problems that had been solved using the honey bee algorithm and the similarity between these problems and the cloud computing environment.Thus concluding that the honey bee algorithm could be successfully used to solve the trust management issue in cloud computing.…”
Get full text
Get full text
Get full text
Conference or Workshop Item -
4
Energy-efficient data security schemes for mobile users in cloud environment / Abdul Nasir Khan
Published 2014“…In local execution approach, the computational complexities of cryptographic algorithms are reduced and the entire security operations are executed using limited computational power of mobile devices. …”
Get full text
Thesis -
5
A comparative evaluation of heuristic and metaheuristic job scheduling algorithms for optimized resource management in cloud environments
Published 2026“…The CloudSim simulator is applied to evaluate each algorithm using key performance metrics, including makespan, average flow time, and the number of cloudlets that fail to meet deadlines. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
6
Multi-objective scientific workflow scheduling algorithm in multi-cloud environment for satisfying QoS requirements
Published 2022“…All the proposed algorithms are simulated using the popular cloud simulator, Workflowsim 1.0. …”
Get full text
Get full text
Thesis -
7
Optimisation model for scheduling MapReduce jobs in big data processing / Ibrahim Abaker Targio Hashem
Published 2017“…The problem is even more complex using virtualized clusters in a cloud computing to execute a large number of tasks. …”
Get full text
Get full text
Get full text
Thesis -
8
Proposed system for data security in distributed computing in using triple data encryption standard and Rivest Shamir Adlemen
Published 2023“…In this paper, a comparative study is done between the two security algorithms on a cloud platform called eyeOS. From the comparative study it was found that the Rivest Shamir Adlemen (3kRSA) algorithm outperforms that triple data encryption standard (3DES) algorithm with respect to the complexity, and output bytes. …”
Article -
9
Implementing Location-Based Cryptography on Mobile Application Design to Secure Data in Cloud Storage
Published 2024journal::journal article -
10
Object Localization In 3D Point Cloud
Published 2020“…The results of object localization are often affected by many factors such as the quality of the point clouds and the sensitivity of the algorithms to the occlusion in the point clouds. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
11
Enhancing user authentication for cloud web-based application / Detar Beqo
Published 2018“…We aim to improve on passwords with respect to both usability as well as security. It uses an enhanced encryption algorithm, and the data is stored securely in the cloud systems. …”
Get full text
Get full text
Get full text
Thesis -
12
Efficient task scheduling strategies using symbiotic organisms search algorithm for cloud computing environment
Published 2022“…The SOS and its variants Discrete Symbiotic Organisms Search (DSOS) algorithm have been used to solve different optimisation problems including tasks scheduling in cloud computing environment where results obtained are promising in comparison with stateof- the-art metaheuristic algorithms. …”
Get full text
Get full text
Thesis -
13
Evaluating power efficient algorithms for efficiency and carbon emissions in cloud data centers: a review
Published 2015“…To minimize the power wasted by data center cooling systems is directly related to data center location and climate change. CloudSim simulator is used to implement the algorithms on an IaaS cloud infrastructure, to calculate the power consumption, and to analyze each algorithm's behavior for different parameters. …”
Get full text
Get full text
Get full text
Get full text
Get full text
Article -
14
-
15
The development of cloud modelling and motion analysis for virtual environment
Published 2005“…This invention uses the newly developed randomized algorithm to fill the cloud volume with particle systems. …”
Get full text
Get full text
Monograph -
16
The development of cloud modelling and motion analysis for virtual environment
Published 2005“…This invention uses the newly developed randomized algorithm to fill the cloud volume with particle systems. …”
Get full text
Get full text
Monograph -
17
Dynamic and adaptive execution models for data stream mining applications in mobile edge cloud computing systems / Muhammad Habib Ur Rehman
Published 2016“…To this end, the proposed execution models were tested with multiple MDSM applications mapping to a real-world use-case for activity detection using MECC systems. …”
Get full text
Get full text
Get full text
Thesis -
18
Alignment of 3D laser scanner point clouds using photogrammetric targets
Published 2006“…Existing registration method used corresponding features between the two scanned images as registration primitive and finally 3D transformation algorithm was applied to combine the images. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
19
Lightweight authentication technique for secure communication of edge/fog data-centers
Published 2020“…Edge computing has significantly enhanced the capabilities of cloud computing. Edge data-centres are used for storing data of the end-user devices. …”
Get full text
Get full text
Article -
20
Flexible content authorization using digital rights management in cloud computing / Ali Hussain
Published 2021“…The integrity of data is verified with the use of HMAC algorithm chain using the verify function of versifier in Macaroon. …”
Get full text
Get full text
Get full text
Thesis
