Search Results - (( java implementation modified algorithm ) OR ( using case cloud algorithm ))

Refine Results
  1. 1

    OPTIMIZED MIN-MIN TASK SCHEDULING ALGORITHM FOR SCIENTIFIC WORKFLOWS IN A CLOUD ENVIRONMENT by Murad S.S., Badeel R., Alsandi N.S.A., Alshaaya R.F., Ahmed R.A., Muhammed A., Derahman M.

    Published 2023
    “…To achieve this, we propose a new noble mechanism called Optimized Min-Min (OMin-Min) algorithm, inspired by the Min-Min algorithm. The objectives of this work are: i) to provide a comprehensive review of the cloud and scheduling process; ii) to classify the scheduling strategies and scientific workflows; iii) to implement our proposed algorithm with various scheduling algorithms (i.e., Min-Min, Round-Robin, Max-Min, and Modified Max-Min) for performance comparison, within different cloudlet sizes (i.e., small, medium, large, and heavy) in three scientific workflows (i.e., Montage, Epigenomics, and SIPHT); and iv) to investigate the performance of the implemented algorithms by using CloudSim. …”
    Review
  2. 2

    Direct approach for mining association rules from structured XML data by Abazeed, Ashraf Riad

    Published 2012
    “…The thesis also provides a two different implementation of the modified FLEX algorithm using a java based parsers and XQuery implementation. …”
    Get full text
    Get full text
    Thesis
  3. 3
  4. 4

    Task scheduling in cloud computing environment using hybrid genetic algorithm and bat algorithm by Muhammad Syahril Mohamad Sainal

    Published 2022
    “…Furthermore, CloudSim simulator will be used to evaluate the performance of this algorithm. …”
    Get full text
    Get full text
    Get full text
    Academic Exercise
  5. 5

    Cloud Resource Management Framework Using Monarch Butterfly Harmony Search And Case Based Reasoning by Ahmed Mohamed Ghetas, Mohamed Rezk

    Published 2017
    “…In addition, a new ri is developed using case-based reasoning and is then plugged into the rop framework. …”
    Get full text
    Get full text
    Thesis
  6. 6
  7. 7
  8. 8
  9. 9
  10. 10

    Securing cloud data system (SCDS) for key exposure using AES algorithm by Thabet Albatol, Mohammed Samer Hasan

    Published 2021
    “…After that we use to build securing cloud data system (SCDS) for key exposure using the AES algorithm for encrypting and decrypting our website cloud data and files. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  11. 11

    Wireless water quality cloud monitoring system with self-healing algorithm by Syed Ariffin, Sharifah Hafizah, Baharudin, Muhammad Ariff, Mohd Fauzi, Mohd Husaini, Abdul Latiff, Nurul Mu'azzah, Syed Yusof, Sharifah Kamilah, Abdul Latiff, Nurul Adilah

    Published 2017
    “…It highlights the details of the hardware components and the algorithm as well as the software that is connected to the cloud. …”
    Get full text
    Get full text
    Conference or Workshop Item
  12. 12

    Latency Analysis of Cloud Infrastructure for Time-Critical IoT Use Cases by Kartinah, Zen, Saju, Mohanan, Seleviawati, Tarmizi, Noralifah, Annuar

    Published 2022
    “…However, the geographical distance between the data origin and data processing is one of the major factors contributing to the network latency for timecritical IoT use cases. In this paper, we analyzed the latency from a particular client point based on the live data generated by their cloud data centers. …”
    Get full text
    Get full text
    Get full text
    Proceeding
  13. 13

    Multi-objective scientific workflow scheduling algorithm in multi-cloud environment for satisfying QoS requirements by Ramadhan, Mazen Farid Ebrahim

    Published 2022
    “…All the proposed algorithms are simulated using the popular cloud simulator, Workflowsim 1.0. …”
    Get full text
    Get full text
    Thesis
  14. 14

    Impatient job scheduling under cloud computing by Mahdi, Nawfal A.

    Published 2012
    “…The proposed algorithm was transplanted in an adopted scheduling algorithm and tested using simu-lation with a synthetic dataset. …”
    Get full text
    Get full text
    Thesis
  15. 15

    Intelligent transmission line fault diagnosis using the Apriori associated rule algorithm under cloud computing environment by Al-Jumaili A.H.A., Muniyandi R.C., Hasan M.K., Singh M.J., Paw J.K.S.

    Published 2024
    “…Hadoop distributed architecture is used to design and implement the power private cloud computing cluster. …”
    Article
  16. 16

    Prevention And Detection Mechanism For Security In Passive Rfid System by Khor, Jing Huey

    Published 2013
    “…The proposed protocol is designed with lightweight cryptographic algorithm, including XOR, Hamming distance, rotation and a modified linear congruential generator (MLCG). …”
    Get full text
    Get full text
    Thesis
  17. 17
  18. 18

    Efficient task scheduling strategies using symbiotic organisms search algorithm for cloud computing environment by Sa'ad, Suleiman

    Published 2022
    “…However, the efficiency of the clouds drops as the size of the search space gets larger, like in the case of most metaheuristic optimisation algorithms. …”
    Get full text
    Get full text
    Thesis
  19. 19

    Binary Vote Assignment on Cloud Quorum Algorithm for Fragmented MyGRANTS Database Replication by Noraziah, Ahmad, Ainul Azila, Che Fauzi, Herawan, Tutut, Zailani, Abdullah

    Published 2015
    “…We address how to build reliable systems by using the proposed BVACQ algorithm for distributed database fragmentation by using Malaysian Greater Research Network (MyGRANTS) data in our case study. …”
    Get full text
    Get full text
    Get full text
    Article
  20. 20

    Automatic generation of content security policy to mitigate cross site scripting by Mhana, Samer Attallah, Din, Jamilah, Atan, Rodziah

    Published 2016
    “…It can be extended to support generating CSP for contents that are modified by JavaScript after loading. Current approach inspects the static contents of URLs.…”
    Get full text
    Get full text
    Conference or Workshop Item