Search Results - (( java implementation phase algorithm ) OR ( using server machine algorithm ))
Search alternatives:
- implementation phase »
- java implementation »
- machine algorithm »
- phase algorithm »
- using server »
-
1
Implementation of locust inspired scheduling algorithm with huge number of servers for energy efficiency in a cloud datacenter
Published 2019“…LACE algorithm is used to schedule and optimize Virtual Machine (VMs) allocation across the servers according to behaviour obtained from locust nature. …”
Get full text
Get full text
Thesis -
2
Locust- inspired meta-heuristic algorithm for optimising cloud computing performance
Published 2023“…This algorithm can also be used for task scheduling. The proposed algorithm efficiently maps and achieves the objective function for server consolidation, optimising energy consumption, VM migrations, and server utilisation. …”
Get full text
Get full text
Thesis -
3
Web-based clustering tool using fuzzy k-mean algorithm / Ahmad Zuladzlan Zulkifly
Published 2019“…All the algorithm for the engine has been developed by using Java script language. …”
Get full text
Get full text
Thesis -
4
Thermal-aware scheduling in green data centers / Muhammad Tayyab Chaudhry
Published 2015“…WCPM is applied for offline hotspot-resistant virtual machine deployment algorithm (HVMDA) and hotspot-aware server arrangement algorithm (HSLERA). …”
Get full text
Get full text
Thesis -
5
An improved dynamic load balancing for virtualmachines in cloud computing using hybrid bat and bee colony algorithms
Published 2021“…In virtualization, a physical server changes into the virtual machine (VM) and acts as a physical server. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
6
-
7
-
8
Energy-efficient algorithms for dynamic virtual machine consolidation in cloud data centers
Published 2017“…Dynamic consolidation of virtual machines (VMs) using live migration and putting idle nodes in sleep mode allows cloud providers to optimize resource utilization and reduce energy consumption. …”
Get full text
Get full text
Get full text
Article -
9
Smart grid: Bio-inspired algorithms energy distributions for data centers
Published 2025“…Virtualisation technology enables multiple virtual machines (VMs) to run on a single physical server, improving resource sharing and utilisation. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
10
A comparative analysis of task scheduling algorithms of virtual machines in cloud environment
Published 2023“…Cloud computing offers an environment with low cost, ease of use and low power consumption by utilizing server virtualization in its offered services (e.g., Infrastructure as a Service). …”
Article -
11
Detection of SQL injection attack using machine learning
Published 2024Get full text
Get full text
Final Year Project / Dissertation / Thesis -
12
Intelligent cooperative web caching policies for media objects based on decision tree supervised machine learning algorithm
Published 2014“…In this work, new intelligent cooperative web caching approaches based on decision tree supervised machine learning algorithm are presented. A simulation is carried out to evaluate the performance of the proposed approaches. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
13
AI recommendation penetration testing tool for cross-site scripting: support vector machine algorithm
Published 2025“…This research introduces a new approach to enhancing cybersecurity by integrating Support Vector Machine (SVM) algorithms with penetration testing to develop a recommendation system focused on Cross-Site Scripting (XSS) attack detection. …”
Get full text
Get full text
Get full text
Article -
14
Malware Classification and Detection using Variations of Machine Learning Algorithm Models
Published 2025“…Attack data was obtained from the ClaMP dataset, which has an unbalanced data set, and has very high noise, so it is necessary to analyze data packets in network logs and optimize feature extraction which is then analyzed statistically with machine learning algorithms. The purpose of the study is to detect, classify malware attacks using a variety of ML Algorithm models such as SVM, KNN and Neural Network and testing detection performance. …”
Get full text
Get full text
Get full text
Article -
15
Network bandwidth utilization based on collaborative web caching using machine learning algorithms in peer-to-peer systems for media web objects
Published 2018“…Furthermore, retrieving the same media object from the origin server many times consumes the network bandwidth. …”
Get full text
Get full text
Thesis -
16
BCLH2Pro: a novel computational tools approach for hydrogen production prediction via machine learning in biomass chemical looping processes
Published 2024“…The algorithm has been developed into a user-friendly tool, BCLH2Pro, accessible via a web server. …”
Get full text
Get full text
Get full text
Article -
17
Mitigating Slow Hypertext Transfer Protocol Distributed Denial of Service Attacks in Software Defined Networks
Published 2021“…This study contributes to the ongoing research in detecting and mitigating slow HTTP DDoS attacks with emphasis on the use of machine learning classification and meta-heuristic algorithms.…”
Get full text
Get full text
Get full text
Get full text
Article -
18
Intelligent cooperative web caching policies for media objects based on J48 decision tree and naïve Bayes supervised machine learning algorithms in structured peer-to-peer systems
Published 2016“…In this work, intelligent cooperative web caching approaches based on J48 decision tree and Naïve Bayes (NB) supervised machine learning algorithms are presented. The proposed approaches take the advantages of structured peer-to-peer systems where the contents of peers’ caches are shared using Distributed Hash Table (DHT) in order to enhance the performance of the web caching policy. …”
Get full text
Get full text
Get full text
Article -
19
VMware as an Intermediate Platform between Windows 7 and Linux Fedora 15 for Real-Time Malaysian Sign Language Translator
Published 2014“…The communication between client (Windows7) and server (LINUX Fedora 16) has been established using VMware. …”
Get full text
Get full text
Proceeding Paper -
20
Optimal route checking using genetic algorithm for UiTM's bus services / Tengku Salman Fathi Tengku Jaafar
Published 2006“…Although from human logical thinking, the route can be generated easily but the calculation of checking the route whether it is optimal route or not is difficult and will take long time to be implemented. This research study with the development of the Optimal Route Checking Using Genetic Algorithm system should solve this scenario. …”
Get full text
Get full text
Thesis
