Search Results - (( java implementation path algorithm ) OR ( using server machine algorithm ))
Search alternatives:
- java implementation »
- implementation path »
- machine algorithm »
- path algorithm »
- using server »
-
1
Heavy Transportation Shortest Route using Dijkstra’s algorithm (HETRO) / Nurul Aqilah Ahmad Nezer
Published 2017“…The development tools used in developing this project is NetBeans by using Java for the implementation of the coding. The methodology that used for developing this system is the Dijkstra’s algorithm. …”
Get full text
Get full text
Thesis -
2
Implementation of locust inspired scheduling algorithm with huge number of servers for energy efficiency in a cloud datacenter
Published 2019“…LACE algorithm is used to schedule and optimize Virtual Machine (VMs) allocation across the servers according to behaviour obtained from locust nature. …”
Get full text
Get full text
Thesis -
3
Embedded system for indoor guidance parking with Dijkstra’s algorithm and ant colony optimization
Published 2019“…BST inserts the nodes in the way that the Dijkstra’s can find the empty parking in fastest way. Dijkstra’s algorithm initials the paths to finding the shortest path while ACO optimizes the paths. …”
Get full text
Get full text
Thesis -
4
Locust- inspired meta-heuristic algorithm for optimising cloud computing performance
Published 2023“…This algorithm can also be used for task scheduling. The proposed algorithm efficiently maps and achieves the objective function for server consolidation, optimising energy consumption, VM migrations, and server utilisation. …”
Get full text
Get full text
Thesis -
5
Path planning for unmanned aerial vehicle (UAV) using rotated accelerated method in static outdoor environment
Published 2021“…In this study, a fast iterative method known as Rotated Successive Over-Relaxation (RSOR) is introduced. The algorithm is implemented in a self-developed 2D Java tool, UAV Planner. …”
Get full text
Get full text
Get full text
Get full text
Article -
6
Smart appointment organizer for mobile application / Mohd Syafiq Adam
Published 2009“…The main component of this prototype is the use of Dijkstra algorithm to compute the shortest path from source of appointment to the 6 points of destinations within UiTM Shah Alam. …”
Get full text
Get full text
Thesis -
7
Thermal-aware scheduling in green data centers / Muhammad Tayyab Chaudhry
Published 2015“…WCPM is applied for offline hotspot-resistant virtual machine deployment algorithm (HVMDA) and hotspot-aware server arrangement algorithm (HSLERA). …”
Get full text
Get full text
Thesis -
8
An improved dynamic load balancing for virtualmachines in cloud computing using hybrid bat and bee colony algorithms
Published 2021“…In virtualization, a physical server changes into the virtual machine (VM) and acts as a physical server. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
9
-
10
-
11
Energy-efficient algorithms for dynamic virtual machine consolidation in cloud data centers
Published 2017“…Dynamic consolidation of virtual machines (VMs) using live migration and putting idle nodes in sleep mode allows cloud providers to optimize resource utilization and reduce energy consumption. …”
Get full text
Get full text
Get full text
Article -
12
Smart grid: Bio-inspired algorithms energy distributions for data centers
Published 2025“…Virtualisation technology enables multiple virtual machines (VMs) to run on a single physical server, improving resource sharing and utilisation. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
13
A comparative analysis of task scheduling algorithms of virtual machines in cloud environment
Published 2023“…Cloud computing offers an environment with low cost, ease of use and low power consumption by utilizing server virtualization in its offered services (e.g., Infrastructure as a Service). …”
Article -
14
Detection of SQL injection attack using machine learning
Published 2024Get full text
Get full text
Final Year Project / Dissertation / Thesis -
15
Intelligent cooperative web caching policies for media objects based on decision tree supervised machine learning algorithm
Published 2014“…In this work, new intelligent cooperative web caching approaches based on decision tree supervised machine learning algorithm are presented. A simulation is carried out to evaluate the performance of the proposed approaches. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
16
AI recommendation penetration testing tool for cross-site scripting: support vector machine algorithm
Published 2025“…This research introduces a new approach to enhancing cybersecurity by integrating Support Vector Machine (SVM) algorithms with penetration testing to develop a recommendation system focused on Cross-Site Scripting (XSS) attack detection. …”
Get full text
Get full text
Get full text
Article -
17
Malware Classification and Detection using Variations of Machine Learning Algorithm Models
Published 2025“…Attack data was obtained from the ClaMP dataset, which has an unbalanced data set, and has very high noise, so it is necessary to analyze data packets in network logs and optimize feature extraction which is then analyzed statistically with machine learning algorithms. The purpose of the study is to detect, classify malware attacks using a variety of ML Algorithm models such as SVM, KNN and Neural Network and testing detection performance. …”
Get full text
Get full text
Get full text
Article -
18
Network bandwidth utilization based on collaborative web caching using machine learning algorithms in peer-to-peer systems for media web objects
Published 2018“…Furthermore, retrieving the same media object from the origin server many times consumes the network bandwidth. …”
Get full text
Get full text
Thesis -
19
BCLH2Pro: a novel computational tools approach for hydrogen production prediction via machine learning in biomass chemical looping processes
Published 2024“…The algorithm has been developed into a user-friendly tool, BCLH2Pro, accessible via a web server. …”
Get full text
Get full text
Get full text
Article -
20
Mitigating Slow Hypertext Transfer Protocol Distributed Denial of Service Attacks in Software Defined Networks
Published 2021“…This study contributes to the ongoing research in detecting and mitigating slow HTTP DDoS attacks with emphasis on the use of machine learning classification and meta-heuristic algorithms.…”
Get full text
Get full text
Get full text
Get full text
Article
