Search Results - (( java implementation modified algorithm ) OR ( using simple cloud algorithm ))
Search alternatives:
- implementation modified »
- java implementation »
- cloud algorithm »
- simple »
-
1
Two objectives big data task scheduling using swarm intelligence in cloud computing
Published 2016“…On the other hand, scheduling algorithms; starting from traditional to Hyper-heuristic; are widely used in computing systems such as cloud computing to monitor the use of resources. …”
Get full text
Get full text
Get full text
Article -
2
Direct approach for mining association rules from structured XML data
Published 2012“…The thesis also provides a two different implementation of the modified FLEX algorithm using a java based parsers and XQuery implementation. …”
Get full text
Get full text
Thesis -
3
Scheduling tight deadlines for scientific workflows in the cloud
Published 2018“…Commercial clouds are also used for scientific analysis and computation because of their scalability, latest high-quality hardware as well as pay-per-use cost model. …”
Get full text
Get full text
Thesis -
4
-
5
Network tool for preventing DDOS attacks on cloud computing
Published 2015“…Cloud computing services are popular for its ease of use and dynamic scalability with great reliability feature. …”
Get full text
Get full text
Get full text
Final Year Project Report / IMRAD -
6
Retrieval Of Environmental Parameters Over Water Areas Using MODIS Data
Published 2012“…In this study, new and simple algorithms to retrieve cirrus cloud, sediment and aerosol optical depth (AOD) from Moderate Resolution Radiospectrometer (MODIS) imagery is suggested and demonstrated. …”
Get full text
Get full text
Thesis -
7
OPTIMIZED MIN-MIN TASK SCHEDULING ALGORITHM FOR SCIENTIFIC WORKFLOWS IN A CLOUD ENVIRONMENT
Published 2023“…To achieve this, we propose a new noble mechanism called Optimized Min-Min (OMin-Min) algorithm, inspired by the Min-Min algorithm. The objectives of this work are: i) to provide a comprehensive review of the cloud and scheduling process; ii) to classify the scheduling strategies and scientific workflows; iii) to implement our proposed algorithm with various scheduling algorithms (i.e., Min-Min, Round-Robin, Max-Min, and Modified Max-Min) for performance comparison, within different cloudlet sizes (i.e., small, medium, large, and heavy) in three scientific workflows (i.e., Montage, Epigenomics, and SIPHT); and iv) to investigate the performance of the implemented algorithms by using CloudSim. …”
Review -
8
The development of cloud modelling and motion analysis for virtual environment
Published 2005“…It is simple to use, efficient and gives extensive control over the cloud shapes. …”
Get full text
Get full text
Monograph -
9
The development of cloud modelling and motion analysis for virtual environment
Published 2005“…It is simple to use, efficient and gives extensive control over the cloud shapes. …”
Get full text
Get full text
Monograph -
10
Prevention And Detection Mechanism For Security In Passive Rfid System
Published 2013“…The proposed protocol is designed with lightweight cryptographic algorithm, including XOR, Hamming distance, rotation and a modified linear congruential generator (MLCG). …”
Get full text
Get full text
Thesis -
11
An augmented reality real-time cloud-based remote monitoring algorithm for a manufacturing system / Siti Aisyah Jaafar
Published 2021“…This was achieved through data transfer using Amazon Web Service (AWS-IoT) cloud connection. …”
Get full text
Get full text
Thesis -
12
Automatic generation of content security policy to mitigate cross site scripting
Published 2016“…It can be extended to support generating CSP for contents that are modified by JavaScript after loading. Current approach inspects the static contents of URLs.…”
Get full text
Get full text
Conference or Workshop Item -
13
E-Hadith DV: Hadith scriptures in Syafie Madhhab retrieval using data visualization / Nor Faezahtul Salme Norhisam
Published 2020“…Word cloud chart visualization is used to display the important word in a text. …”
Get full text
Get full text
Thesis -
14
Adaptive persistence layer for synchronous replication (PLSR) in heterogeneous system
Published 2011“…The PLSR architecture model, workflow and algorithms are described. The PLSR has been developed using Java Programming language. …”
Get full text
Get full text
Thesis -
15
A Development Of An Internet Of Things Equipped Unmanned Ground Vehicle For Surveilance Purpose
Published 2019“…The data stored in the cloud can be retrieved and processed using ThingSpeak software as this software allow user to aggregate, visualize, and analyze live data streams in the cloud. …”
Get full text
Get full text
Monograph -
16
Assessing Bat Roosts Using the LiDAR System at Wind Cave Nature Reserve in Sarawak, Malaysian Borneo
Published 2017“…Roost surface area of bats species was calculated based on point clouds extracted and using simple trigonometry. Wind Cave was successfully modelled into three dimensional (3D) cave images with bats roosting inside the cave. …”
Get full text
Get full text
Get full text
Get full text
Article -
17
P2P-Based Image Recognition for Component Tracking in a Large Engineering Domain
Published 2011Get full text
Get full text
Get full text
Conference or Workshop Item -
18
Challenges of hidden data in the unused area two within executable files
Published 2009“…Results: The programs were coded in Java computer language and implemented on Pentium PC. …”
Get full text
Get full text
Get full text
Article -
19
Depth value approximation of 2D complex-shape objects for 3D modelling using optical flow and trigonometry
Published 2015“…Future research may work on using the detected 3D point cloud as control points for texture coordinates to produce a fully texture mapped 3D model.…”
Get full text
Get full text
Thesis -
20
Fuzzy-based multi-agent approach for reliability assessment and improvement of power system protection
Published 2015“…Meanwhile, the second MAS model has been designed using two agents as follows: the first agent is a fault current agent that is to determine the fault current at all points before and after grounding; the second agent is the time operating of the agent which is used to determine the relay operating time before and after modifying fault current. The simulation results for the first and second models are done using the data obtained from Malaysia distribution network (DISCO-Net) and 69 bus test system that were implemented using Java Agent Development Framework package software. …”
Get full text
Get full text
Thesis
