Search Results - (( java implementation modified algorithm ) OR ( user computing among algorithm ))
Search alternatives:
- implementation modified »
- java implementation »
- computing among »
- among algorithm »
- user computing »
-
1
Direct approach for mining association rules from structured XML data
Published 2012“…The thesis also provides a two different implementation of the modified FLEX algorithm using a java based parsers and XQuery implementation. …”
Get full text
Get full text
Thesis -
2
OPTIMIZED MIN-MIN TASK SCHEDULING ALGORITHM FOR SCIENTIFIC WORKFLOWS IN A CLOUD ENVIRONMENT
Published 2023“…To achieve this, we propose a new noble mechanism called Optimized Min-Min (OMin-Min) algorithm, inspired by the Min-Min algorithm. The objectives of this work are: i) to provide a comprehensive review of the cloud and scheduling process; ii) to classify the scheduling strategies and scientific workflows; iii) to implement our proposed algorithm with various scheduling algorithms (i.e., Min-Min, Round-Robin, Max-Min, and Modified Max-Min) for performance comparison, within different cloudlet sizes (i.e., small, medium, large, and heavy) in three scientific workflows (i.e., Montage, Epigenomics, and SIPHT); and iv) to investigate the performance of the implemented algorithms by using CloudSim. …”
Review -
3
Performance-aware cost-effective brokering and load balancing algorithms for data center in large scale cloud computing
Published 2015“…In recent years, there has been an increasing interest in cloud computing among service providers and cloud users. …”
Get full text
Get full text
Thesis -
4
Prevention And Detection Mechanism For Security In Passive Rfid System
Published 2013“…The proposed protocol is designed with lightweight cryptographic algorithm, including XOR, Hamming distance, rotation and a modified linear congruential generator (MLCG). …”
Get full text
Get full text
Thesis -
5
Automatic generation of content security policy to mitigate cross site scripting
Published 2016“…It can be extended to support generating CSP for contents that are modified by JavaScript after loading. Current approach inspects the static contents of URLs.…”
Get full text
Get full text
Conference or Workshop Item -
6
SEDF: a spoofed email detection framework employed by a lightweight web browser plug-in for detecting the spoofed email / Al Ya@Geogiana Buja...[et al.]
Published 2014“…Boyer - Moore algorithm was claimed to be the fastest algorithm among the others. …”
Get full text
Get full text
Research Reports -
7
Behaviour Analysis Among Adolescents And Children For Cyberbullying Based On Twitter And Kaggle Dataset
Published 2023Get full text
Get full text
Undergraduates Project Papers -
8
-
9
-
10
Mobile game application development using evolutionary algorithms
Published 2014“…Smartphones have recently become very popular among mobile users. With more powerful smartphones being released by manufacturers around the world, it has encouraged more users to own this gadget. …”
Get full text
Get full text
Get full text
Thesis -
11
-
12
Optimized load balancing for efficient resource provisioning in the cloud
Published 2014“…Cloud Computing offers on demand provisioning of computing resources to users. …”
Get full text
Get full text
Conference or Workshop Item -
13
-
14
Efficient radio resource allocation scheme for 5G networks with device-to-device communication
Published 2024journal::journal article -
15
Cloudlet deployment and task offloading in mobile edge computing using variable-length whale and differential evolution optimization and analytical hierarchical process for decisio...
Published 2023“…In MEC environment, cloudlets that represent a relatively powerful computing resource can be collocated with the base station to enable good coverage of computing service due to the high demand and random distribution of users. …”
Get full text
Get full text
Thesis -
16
-
17
-
18
-
19
Fairness Of the TCP-based new AIMD congestion control algorithm.
Published 2009“…Hence congestion control is an effort to adapt the performance of a network to change in the traffic load without adversely affecting users perceived utilities. AIMD (Additive Increase Multiplicative Decrease) is the best algorithm among the set of linear algorithms because it reflects good efficiency as well as good fairness. …”
Get full text
Get full text
Article -
20
Designing and implementation of robot mapping algorithm for mobile robot
Published 2014Get full text
Get full text
Get full text
Proceeding Paper
