Search Results - (( process learning cloud algorithm ) OR ( java application using algorithm ))
Search alternatives:
- process learning »
- java application »
- cloud algorithm »
- using algorithm »
- learning cloud »
-
1
Fog-cloud scheduling simulator for reinforcement learning algorithms
Published 2023“…Therefore, supplying optimized scheduling algorithms to provide satisfactory quality service for the node’s task execution and processing becomes demanding. …”
Get full text
Get full text
Article -
2
Multi-objective algorithms for effective resource management in Edge-Fog-Cloud computing
Published 2023“…Simulations were conducted to evaluate the proposed algorithms compared to the PSO algorithm, Cloud-Fog Cooperation Scheduling algorithm, and Task offloading algorithm. …”
Get full text
Get full text
Get full text
Thesis -
3
User authentication in public cloud computing through adoption of electronic personal synthesis behavior
Published 2023“…Moreover, the learning process of the proposed algorithm for behavior recognition designed as a matching factor with a password during the authentication process. …”
text::Thesis -
4
Intrusion-Detection System Based on Fast Learning Network in Cloud Computing
Published 2018“…This paper includes an overview of the intrusion-detection system and introduces to the reader some fundamental concepts of IDS work in cloud computing, also propose a new algorithm Fast Learning Network to work based on an intrusion detection.…”
Get full text
Get full text
Get full text
Article -
5
A Principled Design of Intelligent Agent for the SLA negotiation process in cloud computing
Published 2022“…IANS uses a behavioural learning analysis algorithm between consumers and CSP to select a reliable, secure server at a minimum cost. …”
Get full text
Get full text
Conference or Workshop Item -
6
A Principled Design of Intelligent Agent for the SLA negotiation process in cloud computing
Published 2022“…IANS uses a behavioural learning analysis algorithm between consumers and CSP to select a reliable, secure server at a minimum cost. …”
Get full text
Get full text
Conference or Workshop Item -
7
Architecture for latency reduction in healthcare internet-of-things using reinforcement learning and fuzzy based fog computing
Published 2019“…This hybrid approach integrates healthcare IoT devices with the cloud and uses fog services with Fuzzy Reinforcement Learning Data Packet Allocation (FRLDPA) algorithm. …”
Get full text
Get full text
Article -
8
Architecture for latency reduction in healthcare internet-of-things using reinforcement learning and fuzzy based fog computing
Published 2019“…This hybrid approach integrates healthcare IoT devices with the cloud and uses fog services with Fuzzy Reinforcement Learning Data Packet Allocation (FRLDPA) algorithm. …”
Get full text
Get full text
Article -
9
Hybrid Henry Gas-Harris Hawks comprehensive-opposition algorithm for task scheduling in cloud computing
Published 2025“…By optimizing task scheduling, cloud computing solutions can decrease processing times, boost efficiency, and improve overall system performance. …”
Get full text
Get full text
Get full text
Article -
10
Latency Analysis of Cloud Infrastructure for Time-Critical IoT Use Cases
Published 2022“…The time-critical Internet of Things (IoT) use cases such as driverless cars and robotic surgical arms need high bandwidth and low latency for real-time intelligent data processing and trained machine learning inference. Latency in real-time processing is influenced by many factors such as artificial intelligence (AI) computing algorithm, device processing capabilities, the frameworks, and also the distance from the cloud infrastructure. …”
Get full text
Get full text
Get full text
Proceeding -
11
Performances of machine learning algorithms for binary classification of network anomaly detection system
Published 2018Get full text
Get full text
Get full text
Conference or Workshop Item -
12
IOT-based fertigation system / Mohamad Amir Furqan Darus
Published 2024“…These sensors provide real-time data about the crops’ environment, which is then sent to a central hub or cloud platform. Advanced algorithms and machine learning processes this data to determine the ideal irrigation and fertilization needs. …”
Get full text
Get full text
Student Project -
13
RSA Encryption & Decryption using JAVA
Published 2006“…References and theories to support the research of 'RSA Encryption/Decryption using Java' have been disclosed in Literature Review section. …”
Get full text
Get full text
Final Year Project -
14
Improved rsync algorithm to minimize communication cost using multi-agent systems for synchronization in multi-learning management systems
Published 2017“…The problem of rsync algorithm synchronization process is that rsync tries to check folders and files one by one, which takes long time to synchronize them. …”
Get full text
Get full text
Get full text
Thesis -
15
Oil palm mapping over Peninsular Malaysia using Google Earth Engine and machine learning algorithms
Published 2020“…In this study, 30 m Landsat 8 data were processed using a cloud computing platform of Google Earth Engine (GEE) in order to classify oil palm land cover using non-parametric machine learning algorithms such as Support Vector Machine (SVM), Classification and Regression Tree (CART) and Random Forest (RF) for the first time over Peninsular Malaysia. …”
Get full text
Get full text
Get full text
Article -
16
-
17
Study of machine learning in computer vision using Raspberry Pi
Published 2024text::Final Year Project -
18
Deep reinforcement learning based resource allocation strategy in cloud-edge computing system
Published 2024“…A lot of real time processing as well as resourceintensive apps is what is needed more and thus, cloud-edge computing systems require compelling resource allocation schemes. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
19
Deep reinforcement learning based resource allocation strategy in cloud-edge computing system
Published 2024“…A lot of real time processing as well as resourceintensive apps is what is needed more and thus, cloud-edge computing systems require compelling resource allocation schemes. …”
Get full text
Get full text
Conference or Workshop Item -
20
Provider independent cryptographic tools
Published 2003Get full text
Get full text
Get full text
Monograph
