Search Results - (( java implementation case algorithm ) OR ( using practical cloud algorithm ))
Search alternatives:
- java implementation »
- implementation case »
- using practical »
- cloud algorithm »
- case algorithm »
-
1
Plagiarism Detection System for Java Programming Assignments by Using Greedy String-Tilling Algorithm
Published 2008“…The prototype system, known as Java Plagiarism Detection System (JPDS) implements the Greedy-String-Tiling algorithm to detect similarities among tokens in a Java source code files. …”
Get full text
Get full text
Get full text
Thesis -
2
-
3
Task scheduling in cloud computing environment using hybrid genetic algorithm and artificial bee colony
Published 2022Get full text
Get full text
Get full text
Academic Exercise -
4
Honey bee based trust management system for cloud computing
Published 2011“…In this paper, the authors propose the concept that honey bee algorithm which has been developed to solve complex optimization problems can be successfully used to address this issue.The authors have taken a closer look at the optimization problems that had been solved using the honey bee algorithm and the similarity between these problems and the cloud computing environment.Thus concluding that the honey bee algorithm could be successfully used to solve the trust management issue in cloud computing.…”
Get full text
Get full text
Get full text
Conference or Workshop Item -
5
Pairwise testing tools based on hill climbing algorithm (PTCA)
Published 2014“…The actual implementation of the algorithm which is in Java programming language, the program is implemented on Net Bean 7.0.1. …”
Get full text
Get full text
Undergraduates Project Papers -
6
Examination timetabling using genetic algorithm case study: KUiTTHO
Published 2005Get full text
Get full text
Thesis -
7
Java based expert system for selection of natural fibre composite materials
Published 2013“…In this paper, we develop a technology for the materials selection system using Java based expert system. The weighted-range method (WRM) was implemented to identify the range value and to scrutinise the candidate materials. …”
Get full text
Get full text
Get full text
Article -
8
Implementing Location-Based Cryptography on Mobile Application Design to Secure Data in Cloud Storage
Published 2024journal::journal article -
9
Cloud co-residency denial of service threat detection inspired by artificial immune system
Published 2024journal::journal article -
10
-
11
OPTIMIZED MIN-MIN TASK SCHEDULING ALGORITHM FOR SCIENTIFIC WORKFLOWS IN A CLOUD ENVIRONMENT
Published 2023“…According to the simulation results, the proposed algorithm produces the best solution among all algorithms in the proposed cases. � 2021 Little Lion Scientific…”
Review -
12
Cloud Co-Residency Denial of Service Threat Detection Inspired by Artificial Immune System
Published 2024“…A review of the literature shows that there is still a lack of works on cloud IDS that focused on implementing real-time hybrid detections using Dendritic Cell algorithm (DCA) as a practical approach. …”
Proceedings Paper -
13
Cloud co-residency denial of service threat detection inspired by artificial immune system
Published 2018“…A review of the literature shows that there is still a lack of works on cloud IDS that focused on implementing real-time hybrid detections using Dendritic Cell algorithm (DCA) as a practical approach. …”
Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
14
Comparison of performances of Jaya Algorithm and Cuckoo Search algorithm using benchmark functions
Published 2022“…CS and JA have implemented in the same platform (Intellij IDEA Community Edition 2020.2.3) using the same language (Java). …”
Get full text
Get full text
Get full text
Get full text
Conference or Workshop Item -
15
Near-sea-level langley calibration algorithm
Published 2014“…To solve this, a new Langley calibration algorithm has been designed for AOD measurement using spectroradiometer instrument. …”
Get full text
Get full text
Get full text
Chapter In Book -
16
SANAsms: Secure short messaging system for secure GSM mobile communication
Published 2008“…The system is developed using Java 2 Micro Edition (J2ME) which is written in Java. …”
Get full text
Get full text
Conference or Workshop Item -
17
Web-based clustering tool using fuzzy k-mean algorithm / Ahmad Zuladzlan Zulkifly
Published 2019“…This project will use fuzzy k-means clustering algorithm to cluster the data because it is easy to implement and have many advantages. …”
Get full text
Get full text
Thesis -
18
-
19
Secure lightweight client for cloud-based E-Health Model
Published 2023“…The results of this study will remarkably facilitate the development of a practical secure cloud-based eHealth system.…”
Get full text
Get full text
Get full text
Thesis -
20
Web-based expert system for material selection of natural fiber- reinforced polymer composites
Published 2015“…In this research, first the implementation of Analytical Hierarchy Process (AHP) computational tool was explored for deciding optimum material for automotive components. …”
Get full text
Get full text
Thesis
