Search Results - (( java implementation modified algorithm ) OR ( using complex cloud algorithm ))
Search alternatives:
- implementation modified »
- java implementation »
- cloud algorithm »
- using complex »
- complex cloud »
-
1
Deadline guarantee for scientific workflow using dynamic scheduling algorithms on IaaS clouds
Published 2018“…Finally, we expected the scheduling algorithms PDC and DCCP to be improve the Cloud resource usage high efficiency in the IaaS Cloud with efficient scheduling for scientific workflow.…”
Get full text
Get full text
Thesis -
2
Direct approach for mining association rules from structured XML data
Published 2012“…The thesis also provides a two different implementation of the modified FLEX algorithm using a java based parsers and XQuery implementation. …”
Get full text
Get full text
Thesis -
3
Honey bee based trust management system for cloud computing
Published 2011“…In this paper, the authors propose the concept that honey bee algorithm which has been developed to solve complex optimization problems can be successfully used to address this issue.The authors have taken a closer look at the optimization problems that had been solved using the honey bee algorithm and the similarity between these problems and the cloud computing environment.Thus concluding that the honey bee algorithm could be successfully used to solve the trust management issue in cloud computing.…”
Get full text
Get full text
Get full text
Conference or Workshop Item -
4
Energy-efficient data security schemes for mobile users in cloud environment / Abdul Nasir Khan
Published 2014“…In local execution approach, the computational complexities of cryptographic algorithms are reduced and the entire security operations are executed using limited computational power of mobile devices. …”
Get full text
Thesis -
5
A comparative evaluation of heuristic and metaheuristic job scheduling algorithms for optimized resource management in cloud environments
Published 2026“…The CloudSim simulator is applied to evaluate each algorithm using key performance metrics, including makespan, average flow time, and the number of cloudlets that fail to meet deadlines. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
6
Multi-objective scientific workflow scheduling algorithm in multi-cloud environment for satisfying QoS requirements
Published 2022“…All the proposed algorithms are simulated using the popular cloud simulator, Workflowsim 1.0. …”
Get full text
Get full text
Thesis -
7
Optimisation model for scheduling MapReduce jobs in big data processing / Ibrahim Abaker Targio Hashem
Published 2017“…The problem is even more complex using virtualized clusters in a cloud computing to execute a large number of tasks. …”
Get full text
Get full text
Get full text
Thesis -
8
Proposed system for data security in distributed computing in using triple data encryption standard and Rivest Shamir Adlemen
Published 2023“…In this paper, a comparative study is done between the two security algorithms on a cloud platform called eyeOS. From the comparative study it was found that the Rivest Shamir Adlemen (3kRSA) algorithm outperforms that triple data encryption standard (3DES) algorithm with respect to the complexity, and output bytes. …”
Article -
9
OPTIMIZED MIN-MIN TASK SCHEDULING ALGORITHM FOR SCIENTIFIC WORKFLOWS IN A CLOUD ENVIRONMENT
Published 2023“…To achieve this, we propose a new noble mechanism called Optimized Min-Min (OMin-Min) algorithm, inspired by the Min-Min algorithm. The objectives of this work are: i) to provide a comprehensive review of the cloud and scheduling process; ii) to classify the scheduling strategies and scientific workflows; iii) to implement our proposed algorithm with various scheduling algorithms (i.e., Min-Min, Round-Robin, Max-Min, and Modified Max-Min) for performance comparison, within different cloudlet sizes (i.e., small, medium, large, and heavy) in three scientific workflows (i.e., Montage, Epigenomics, and SIPHT); and iv) to investigate the performance of the implemented algorithms by using CloudSim. …”
Review -
10
Implementing Location-Based Cryptography on Mobile Application Design to Secure Data in Cloud Storage
Published 2024journal::journal article -
11
Object Localization In 3D Point Cloud
Published 2020“…The results of object localization are often affected by many factors such as the quality of the point clouds and the sensitivity of the algorithms to the occlusion in the point clouds. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
12
Enhancing user authentication for cloud web-based application / Detar Beqo
Published 2018“…We aim to improve on passwords with respect to both usability as well as security. It uses an enhanced encryption algorithm, and the data is stored securely in the cloud systems. …”
Get full text
Get full text
Get full text
Thesis -
13
Efficient task scheduling strategies using symbiotic organisms search algorithm for cloud computing environment
Published 2022“…The SOS and its variants Discrete Symbiotic Organisms Search (DSOS) algorithm have been used to solve different optimisation problems including tasks scheduling in cloud computing environment where results obtained are promising in comparison with stateof- the-art metaheuristic algorithms. …”
Get full text
Get full text
Thesis -
14
Evaluating power efficient algorithms for efficiency and carbon emissions in cloud data centers: a review
Published 2015“…To minimize the power wasted by data center cooling systems is directly related to data center location and climate change. CloudSim simulator is used to implement the algorithms on an IaaS cloud infrastructure, to calculate the power consumption, and to analyze each algorithm's behavior for different parameters. …”
Get full text
Get full text
Get full text
Get full text
Get full text
Article -
15
-
16
Prevention And Detection Mechanism For Security In Passive Rfid System
Published 2013“…The proposed protocol is designed with lightweight cryptographic algorithm, including XOR, Hamming distance, rotation and a modified linear congruential generator (MLCG). …”
Get full text
Get full text
Thesis -
17
The development of cloud modelling and motion analysis for virtual environment
Published 2005“…This invention uses the newly developed randomized algorithm to fill the cloud volume with particle systems. …”
Get full text
Get full text
Monograph -
18
The development of cloud modelling and motion analysis for virtual environment
Published 2005“…This invention uses the newly developed randomized algorithm to fill the cloud volume with particle systems. …”
Get full text
Get full text
Monograph -
19
Automatic generation of content security policy to mitigate cross site scripting
Published 2016“…It can be extended to support generating CSP for contents that are modified by JavaScript after loading. Current approach inspects the static contents of URLs.…”
Get full text
Get full text
Conference or Workshop Item -
20
Dynamic and adaptive execution models for data stream mining applications in mobile edge cloud computing systems / Muhammad Habib Ur Rehman
Published 2016“…To this end, the proposed execution models were tested with multiple MDSM applications mapping to a real-world use-case for activity detection using MECC systems. …”
Get full text
Get full text
Get full text
Thesis
