Search Results - (( java implementation based algorithm ) OR ( using process cloud algorithm ))
Search alternatives:
- implementation based »
- java implementation »
- cloud algorithm »
- using process »
-
1
Attribute reduction based scheduling algorithm with enhanced hybrid genetic algorithm and particle swarm optimization for optimal device selection
Published 2022“…The simulation is implemented with iFogSim and java programming language. …”
Get full text
Get full text
Article -
2
RSA Encryption & Decryption using JAVA
Published 2006“…Today, with online marketing, banking, healthcare and other services, even the average householder is aware of encryption. The implementation of this project will be based on Rapid Application Design Methodology (RAD) and will be more focusing on research and finding, ideas and the implementation of the algorithm, and finally running and testing the algorithm. …”
Get full text
Get full text
Final Year Project -
3
Direct approach for mining association rules from structured XML data
Published 2012“…The thesis also provides a two different implementation of the modified FLEX algorithm using a java based parsers and XQuery implementation. …”
Get full text
Get full text
Thesis -
4
Performance-aware cost-effective brokering and load balancing algorithms for data center in large scale cloud computing
Published 2015“…Proposed cloud brokering algorithms works with different types of cloud provider and deal with various user requirements. …”
Get full text
Get full text
Thesis -
5
Modified workflow scheduling using hybrid PSO-GA algorithm in cloud computing
Published 2019“…Business processes are managed using cloud-based workflow technology, which is one of the difficulties of using resources efficiently owing to the inter-task dependencies. …”
Get full text
Get full text
Thesis -
6
Automatic Number Plate Recognition on android platform: With some Java code excerpts
Published 2016“…The main challenges of implementing ANPR algorithm on mobile phone are how to produce a higher coding efficiency, lower computational complexity, and higher scalability. …”
Get full text
Get full text
Get full text
Book -
7
Audio Streaming System Using Real-Time Transport Protocol Based on Java Media Framework
Published 2004“…A design proposal was outlined to provide an adaptive client/server approach to stream audio contents using Real-Time Transport Protocol (RTP) involving architecture based on the Java Media Framework (JMF) Application Programmable Interfaces (API).RTP protocol is the Internet-standard protocol for the transport of real-time data, including audio and video and can be implemented by using Java Media Framework (JMF). …”
Get full text
Get full text
Thesis -
8
Securing cloud data system (SCDS) for key exposure using AES algorithm
Published 2021“…After that we use to build securing cloud data system (SCDS) for key exposure using the AES algorithm for encrypting and decrypting our website cloud data and files. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
9
Cloud Worm Detection and Response Technique By Integrating The Enhanced Genetic Algorithm An Threat Level
Published 2024thesis::doctoral thesis -
10
Implementing Location-Based Cryptography on Mobile Application Design to Secure Data in Cloud Storage
Published 2024journal::journal article -
11
Impatient task mapping in elastic cloud using genetic algorithm
Published 2011“…Cloudsim simulator was used to test the proposed algorithm with real datasets collected as a cloud benchmark. …”
Get full text
Get full text
Get full text
Article -
12
User authentication in public cloud computing through adoption of electronic personal synthesis behavior
Published 2023“…Moreover, the learning process of the proposed algorithm for behavior recognition designed as a matching factor with a password during the authentication process. …”
text::Thesis -
13
Hybrid cryptography algorithm to improve security cloud storage
Published 2017“…Security concerns are also very high due to increase in use of cloud computing by the general public. The weakness in user’s authentication process and lack of effective security policy in cloud storage leads to many challenges in cloud computing. …”
Get full text
Get full text
Get full text
Thesis -
14
Accuracy assessment of Digital Terrain Model (DTM) Constructed Cloth Simulation Filter (CSF) and Multi Curvature Classification (MCC) algorithm on UAV LiDAR dataset / Mohamad Khair...
Published 2023“…Comparative analysis of software packages, including Global Mapper and CloudCompare, was conducted based on their processing methods and point cloud accuracy. …”
Get full text
Get full text
Student Project -
15
An improved dynamic load balancing for virtualmachines in cloud computing using hybrid bat and bee colony algorithms
Published 2021“…The proposed HBAC algorithm was tested and compared with other stateof-the-art algorithms on 200 to 2000 even tasks by using CloudSim on standard workload format (SWF) data sets file size (200kb and 400kb). …”
Get full text
Get full text
Get full text
Get full text
Thesis -
16
Café Web Based System Using Priority Scheduling Approach
Published 2017“…The priority scheduling algorithm is based on Control Processing Unit scheduling algorithm where it has a priority to execute tasks. …”
Get full text
Get full text
Conference or Workshop Item -
17
-
18
-
19
An efficient VM scheduling algorithm to minimize the makespan and maximize the profit
Published 2019“…The second process is hyper analytical task scheduling algorithm, and based on the scheduled task, the policy based profit maximization algorithm was proposed in final process. …”
Get full text
Get full text
Thesis -
20
