Search Results - (( java implementation using algorithm ) OR ( making based cloud algorithm ))
Search alternatives:
- implementation using »
- java implementation »
- using algorithm »
- cloud algorithm »
-
1
A malware analysis and detection system for mobile devices / Ali Feizollah
Published 2017“…We extracted 30 different features from network traffic. We then used feature selection algorithms and deep learning algorithms to build a detection model. …”
Get full text
Get full text
Get full text
Thesis -
2
A priority based job scheduling algorithm in cloud computing
Published 2012“…The proposed algorithm is based on multiple criteria decision making model.…”
Get full text
Get full text
Conference or Workshop Item -
3
Tag clouds algorithm with the inclusion of personality traits
Published 2015“…Furthermore, the algorithm to generate tag cloud visualization based on personality traits has not been explored. …”
Get full text
Get full text
Get full text
Thesis -
4
RSA Encryption & Decryption using JAVA
Published 2006“…References and theories to support the research of 'RSA Encryption/Decryption using Java' have been disclosed in Literature Review section. …”
Get full text
Get full text
Final Year Project -
5
Tag cloud algorithm with the inclusion of personality traits
Published 2014“…Therefore, the main objective of this study is to make tag cloud algorithm with the inclusion of personality traits by adjusting two prominent visual features (color and shape) as an integration of layout.In addition, the utilization of RBS (rule bas e system) approach as artificial intelligent method is also taken into account to make knowledge base that stores the relationship between the proper personality elements and particular layout.This paper also discusses findings from satisfaction evaluation of prototyping, which comprises three dimensions facet: overall layout, color, and shape .The findings showed that the majority mean value for each dimension is categorized in agree scale (6-point), which indicates that respondents are satisfied with the tag cloud layout display generated by proposed algorithm.The findings suggest interface designers to be careful in selecting the appropriate tag clouds layout to be displayed for users with varying personality differences.…”
Get full text
Get full text
Get full text
Article -
6
Performance-aware cost-effective brokering and load balancing algorithms for data center in large scale cloud computing
Published 2015“…Proposed cloud brokering algorithms works with different types of cloud provider and deal with various user requirements. …”
Get full text
Get full text
Thesis -
7
Efficient kerberos authentication scheme for cross-domain systems in industrial internet of things using ECC
Published 2021“…A new multi-factor authentication scheme is designed using the AES-ECC algorithm based on Kerberos workflow to establish secure, efficient, and lightweight communication between the user and the targeted IIoT devices to avoid the issues. …”
Get full text
Get full text
Thesis -
8
Provider independent cryptographic tools
Published 2003“…The library is implemented by using Java cryptographic service provider framework that conforms to Java Cryptographic Architecture (JCA) and Java Cryptographic Extension (JCE). …”
Get full text
Get full text
Get full text
Monograph -
9
Direct approach for mining association rules from structured XML data
Published 2012“…The thesis also provides a two different implementation of the modified FLEX algorithm using a java based parsers and XQuery implementation. …”
Get full text
Get full text
Thesis -
10
Empowering cloud providers: optimised locust-inspired algorithm for SLA violation mitigation in green cloud computing
Published 2025“…The algorithm also demonstrates strong scalability in large-scale data centre environments, making it a promising solution for sustainable and efficient cloud infrastructure management.…”
Get full text
Get full text
Get full text
Article -
11
Plagiarism Detection System for Java Programming Assignments by Using Greedy String-Tilling Algorithm
Published 2008“…The prototype system, known as Java Plagiarism Detection System (JPDS) implements the Greedy-String-Tiling algorithm to detect similarities among tokens in a Java source code files. …”
Get full text
Get full text
Get full text
Thesis -
12
Performance evaluation of real-time multiprocessor scheduling algorithms
Published 2016“…We hyave used the CPU profiler of Oracle JavaTM VisualVM to monitor the execution of LRE-TL as well as USG algorithms. …”
Get full text
Get full text
Conference or Workshop Item -
13
-
14
Automatic Number Plate Recognition on android platform: With some Java code excerpts
Published 2016“…On the other hand, the traditional algorithm using template matching only obtained 83.65% recognition rate with 0.97 second processing time. …”
Get full text
Get full text
Get full text
Book -
15
Efficient task scheduling strategies using symbiotic organisms search algorithm for cloud computing environment
Published 2022“…However, the efficiency of the clouds drops as the size of the search space gets larger, like in the case of most metaheuristic optimisation algorithms. …”
Get full text
Get full text
Thesis -
16
Dynamic Task Offloading Algorithm for optimising IoT network quality of service in the Mobile-Fog-Cloud System
Published 2023“…Finally, a Dynamic Task Offloading Algorithm (DTOA) based on rank accuracy estimation model to efficiently schedule tasks and resources in the Mobile-Fog-Cloud system is proposed. …”
Get full text
Get full text
Thesis -
17
Cloud computing load balancing technique with virtual machine migration / Rabiatul Addawiyah Mat Razali
Published 2017“…Based on this idea, an algorithm in activating and deciding on the virtual machine migration operation is proposed, in which the overall load balancing process could be improved. …”
Get full text
Get full text
Thesis -
18
Audio Streaming System Using Real-Time Transport Protocol Based on Java Media Framework
Published 2004“…Java Media Framework library and the RTP protocol for audio transmission were used as development tools.The developed system designed in this thesis together with experimental results proved that the system could be implemented successfully. …”
Get full text
Get full text
Thesis -
19
A fault-intrusion-tolerant system and deadline-aware algorithm for scheduling scientific workflow in the cloud
Published 2021“…Background: Recent technological developments have enabled the execution of more scientific solutions on cloud platforms. Cloud-based scientific workflows are subject to various risks, such as security breaches and unauthorized access to resources. …”
Get full text
Get full text
Article -
20
IOT-based fertigation system / Mohamad Amir Furqan Darus
Published 2024“…Decision-making algorithms consider factors such as plant type, growth stage, soil composition, and environmental conditions. …”
Get full text
Get full text
Student Project
