Search Results - (( program work cloud algorithm ) OR ( java application drops algorithm ))
Search alternatives:
- application drops »
- java application »
- cloud algorithm »
- program work »
-
1
-
2
-
3
User authentication in public cloud computing through adoption of electronic personal synthesis behavior
Published 2023“…Authentication layer works to allow the legitimate user only to access into the public cloud. …”
text::Thesis -
4
Designing a new E-Commerce authentication framework for a cloud-based environment
Published 2024Conference Paper -
5
Critical insight for MAPReduce optimization in Hadoop
Published 2014“…Achieving an optimal approach for higher performance in terms of efficient load balancing, load distribution, optimum resource utilization, minimum overheads and least possible delay has been the vital issue for cloud infrastructure. Apache Hadoop is one the most used cloud frame work for cloud infrastructure. …”
Get full text
Get full text
Get full text
Article -
6
Space allocation for examination scheduling using Genetic Algorithm / Alya Kauthar Azman
Published 2025“…The research adopts a Genetic Algorithm-based approach, where examination scheduling details such as date, time, course code, program code, student group, student numbers, and available spaces are encoded as chromosomes. …”
Get full text
Get full text
Thesis -
7
-
8
Improved voting technique for ensemble of MLP system applied on various classification data / Saodah Omar, Iza Sazanita Isa and Junita Mohd Saleh.
Published 2010“…The MLP networks are trained using two types of learning algorithm, which are the Levenberg Marquardt and the Resilient Back Propagation algorithms. …”
Get full text
Get full text
Research Reports -
9
-
10
-
11
Membership function model for defining optimality of vapor pressure deficit in closed-field cultivation of tomato
Published 2016“…The objective of this work was to develop a membership function model for defining optimal VPD of greenhouse air for tomato cultivation (Lycopersicon esculentum) at different growth stages (GS) and light conditions (sun, cloud, night). …”
Get full text
Get full text
Get full text
Article -
12
Efficient kerberos authentication scheme for cross-domain systems in industrial internet of things using ECC
Published 2021“…These services are usually supplied with network and Internet security inside a cloud-based environment. Inter-connectivity capabilities make it possible for devices to work collaboratively to significantly improve efficiency and productivity with the assistance of automation. …”
Get full text
Get full text
Thesis
