Search Results - (( java implementation modified algorithm ) OR ( user computing among algorithm ))

Refine Results
  1. 1

    Direct approach for mining association rules from structured XML data by Abazeed, Ashraf Riad

    Published 2012
    “…The thesis also provides a two different implementation of the modified FLEX algorithm using a java based parsers and XQuery implementation. …”
    Get full text
    Get full text
    Thesis
  2. 2

    OPTIMIZED MIN-MIN TASK SCHEDULING ALGORITHM FOR SCIENTIFIC WORKFLOWS IN A CLOUD ENVIRONMENT by Murad S.S., Badeel R., Alsandi N.S.A., Alshaaya R.F., Ahmed R.A., Muhammed A., Derahman M.

    Published 2023
    “…To achieve this, we propose a new noble mechanism called Optimized Min-Min (OMin-Min) algorithm, inspired by the Min-Min algorithm. The objectives of this work are: i) to provide a comprehensive review of the cloud and scheduling process; ii) to classify the scheduling strategies and scientific workflows; iii) to implement our proposed algorithm with various scheduling algorithms (i.e., Min-Min, Round-Robin, Max-Min, and Modified Max-Min) for performance comparison, within different cloudlet sizes (i.e., small, medium, large, and heavy) in three scientific workflows (i.e., Montage, Epigenomics, and SIPHT); and iv) to investigate the performance of the implemented algorithms by using CloudSim. …”
    Review
  3. 3

    Performance-aware cost-effective brokering and load balancing algorithms for data center in large scale cloud computing by Naha, Ranesh Kumar

    Published 2015
    “…In recent years, there has been an increasing interest in cloud computing among service providers and cloud users. …”
    Get full text
    Get full text
    Thesis
  4. 4

    Prevention And Detection Mechanism For Security In Passive Rfid System by Khor, Jing Huey

    Published 2013
    “…The proposed protocol is designed with lightweight cryptographic algorithm, including XOR, Hamming distance, rotation and a modified linear congruential generator (MLCG). …”
    Get full text
    Get full text
    Thesis
  5. 5

    Automatic generation of content security policy to mitigate cross site scripting by Mhana, Samer Attallah, Din, Jamilah, Atan, Rodziah

    Published 2016
    “…It can be extended to support generating CSP for contents that are modified by JavaScript after loading. Current approach inspects the static contents of URLs.…”
    Get full text
    Get full text
    Conference or Workshop Item
  6. 6
  7. 7
  8. 8
  9. 9
  10. 10

    Mobile game application development using evolutionary algorithms by Ong, Jia Hui

    Published 2014
    “…Smartphones have recently become very popular among mobile users. With more powerful smartphones being released by manufacturers around the world, it has encouraged more users to own this gadget. …”
    Get full text
    Get full text
    Get full text
    Thesis
  11. 11
  12. 12

    Optimized load balancing for efficient resource provisioning in the cloud by Naha, Ranesh Kumar, Othman, Mohamed

    Published 2014
    “…Cloud Computing offers on demand provisioning of computing resources to users. …”
    Get full text
    Get full text
    Conference or Workshop Item
  13. 13
  14. 14
  15. 15

    Cloudlet deployment and task offloading in mobile edge computing using variable-length whale and differential evolution optimization and analytical hierarchical process for decisio... by Daba, Layth Muwafaq Abdulhussein

    Published 2023
    “…In MEC environment, cloudlets that represent a relatively powerful computing resource can be collocated with the base station to enable good coverage of computing service due to the high demand and random distribution of users. …”
    Get full text
    Get full text
    Thesis
  16. 16
  17. 17
  18. 18
  19. 19

    Fairness Of the TCP-based new AIMD congestion control algorithm. by Jasem, Hayder Natiq, Ahmad Zulkarnain, Zuriati, Othman, Mohamed, K. Subramaniam, Shamala

    Published 2009
    “…Hence congestion control is an effort to adapt the performance of a network to change in the traffic load without adversely affecting users perceived utilities. AIMD (Additive Increase Multiplicative Decrease) is the best algorithm among the set of linear algorithms because it reflects good efficiency as well as good fairness. …”
    Get full text
    Get full text
    Article
  20. 20