Search Results - (( problems among cloud algorithm ) OR ( java application mining algorithm ))

Refine Results
  1. 1
  2. 2
  3. 3

    Impatient job scheduling under cloud computing by Mahdi, Nawfal A.

    Published 2012
    “…A mathematical model has also been drawn for this problem. It models the cloud computing infrastructure with the ability to inter-operate among the clouds. …”
    Get full text
    Get full text
    Thesis
  4. 4

    FLA-SLA aware cloud collation formation using fuzzy preference relationship multi-decision approach for federated cloud by Vadla, Pradeep Kumar, Kolla, Bhanu Prakash, Perumal, Thinagaran

    Published 2020
    “…In FS-ACCF algorithm, fuzzy preference relationship multi-decision approach was used to validate the preferences among cloud providers for forming collation and gaining maximum profit. …”
    Get full text
    Get full text
    Get full text
    Article
  5. 5

    Study and Implementation of Data Mining in Urban Gardening by Mohana, Muniandy, Lee, Eu Vern

    Published 2019
    “…Attached sensors generate data and send these data to the Java Servlet application through a WIFI module. These data are processed and stored in appropriate formats in a MySQL server database. …”
    Get full text
    Get full text
    Get full text
    Article
  6. 6

    Energy Efficient High-Performance Computing Aware Proactive Dynamic Virtual Machine Consolidation Technique in Cloud Computing by Rukshanda, Kamran

    Published 2022
    “…Since the VM consolidation problem is strictly NP-hard, many heuristic algorithms have been proposed to tackle the problem. …”
    Get full text
    Get full text
    Get full text
    Thesis
  7. 7

    OPTIMIZED MIN-MIN TASK SCHEDULING ALGORITHM FOR SCIENTIFIC WORKFLOWS IN A CLOUD ENVIRONMENT by Murad S.S., Badeel R., Alsandi N.S.A., Alshaaya R.F., Ahmed R.A., Muhammed A., Derahman M.

    Published 2023
    “…According to the simulation results, the proposed algorithm produces the best solution among all algorithms in the proposed cases. � 2021 Little Lion Scientific…”
    Review
  8. 8

    Mining Sequential Patterns Using I-PrefixSpan by Dhany , Saputra, Rambli Dayang, R.A., Foong, Oi Mean

    Published 2007
    “…Sequential pattern mining is a relatively new data-mining problem with many areas of application. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  9. 9

    A web-based implementation of k-means algorithms by Lee, Quan

    Published 2022
    “…This stinginess of proximity measures in data mining tools is stifling the performance of the algorithm. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  10. 10

    Load balancing and server consolidation in cloud computing environments: a meta-study by Fadhil, Mohammed Alaa, Othman, Mohamed

    Published 2019
    “…In terms of system behavior and workload, patterns of cloud computing are very dynamic; and that might serve to imbalance the load among data center resources. …”
    Get full text
    Get full text
    Get full text
    Article
  11. 11

    Development of deep reinforcement learning based resource allocation techniques in cloud radio access network by Amjad, Iqbal

    Published 2022
    “…The first proposed algorithm aims to optimize the EE by controlling the on/off status of RRH via a deep Q network (DQN) and subsequently solving a power optimization problem. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  12. 12
  13. 13

    Clustering-based cloud migration strategies by Aslam, M., Rahim, L.B.A., Watada, J., Hashmani, M.

    Published 2018
    “…The k-means algorithm of the partitioning clustering method is used to analyze cloud migration strategies in this study. …”
    Get full text
    Get full text
    Article
  14. 14

    Clustering-based cloud migration strategies by Aslam, M., Rahim, L.B.A., Watada, J., Hashmani, M.

    Published 2018
    “…The k-means algorithm of the partitioning clustering method is used to analyze cloud migration strategies in this study. …”
    Get full text
    Get full text
    Article
  15. 15
  16. 16

    Improved rsync algorithm to minimize communication cost using multi-agent systems for synchronization in multi-learning management systems by Mwinyi, Amir Kombo

    Published 2017
    “…Therefore, the aim of this study is to minimize the computation time during RFS by improving the standard rsync algorithm. Previously, several algorithms and techniques have been proposed for partial file synchronization but many of them were based on controlling the block size, checksums, and delta compression of the matched blocks, to solve the searching problem of the rsync algorithm. …”
    Get full text
    Get full text
    Get full text
    Thesis
  17. 17

    Role Minimization As An Optimization Metric In Role Mining Algorithms : A Literature Review by Ahmad, Rabiah, Abd Hamid, Nazirah, Selamat, Siti Rahayu

    Published 2018
    “…A recent access control model that could accommodate a dynamic structure such as cloud computing can be recognized as role based access control and the role management process of this access control can be identified as role mining.The current trend in role based access control is the role mining problem that can be described as the difficulty to uncover an optimum set of roles from the userpermission assignment.To solve this problem,the researchers have proposed role mining algorithms to produce role set and among the existing algorithms there is an intrinsic topic of the common perception to evaluate the goodness of the generated role set.Eventually,the value of the identified roles could be measured by the preferred metric of optimality namely the number of roles,sizes of userassignment and permission-assignment and Weighted Structural Complexity.Until now, there is some disagreement on the optimization metric but notably many researchers have agreed on the minimization of the number of roles as a solid metric.This paper discusses an overview of the current state-of-the-art on the recent role mining algorithms that focus on role minimization as an optimization metric to evaluate the goodness of the identified roles. …”
    Get full text
    Get full text
    Get full text
    Article
  18. 18

    Features selection for intrusion detection system using hybridize PSO-SVM by Tabaan, Alaa Abdulrahman

    Published 2016
    “…The simulation will be carried on WEKA tool, which allows us to call some data mining methods under JAVA environment. The proposed model will be tested and evaluated on both NSL-KDD and KDD-CUP 99 using several performance metrics.…”
    Get full text
    Get full text
    Thesis
  19. 19

    Secure multi-authority attribute-based encryption access control with cache-aware scheduling in mobile cloud computing by Jamal, Fara

    Published 2021
    “…These challenges are: 1) single point failure in the cryptography scheme, 2) key abuse problem in the key generating process, and 3) delayed access to the data in the cloud for the user. …”
    Get full text
    Get full text
    Thesis
  20. 20

    Dynamic and adaptive execution models for data stream mining applications in mobile edge cloud computing systems / Muhammad Habib Ur Rehman by Muhammad Habib , Ur Rehman

    Published 2016
    “…At platform level, the MDSM applications need to seamlessly switch the execution processes among mobile devices, edge servers, and cloud computing servers. …”
    Get full text
    Get full text
    Get full text
    Thesis