Search Results - (( software migration model algorithm ) OR ( java implication force algorithm ))
Search alternatives:
- implication force »
- java implication »
- migration model »
- model algorithm »
- force algorithm »
-
1
Experimental Model for Teaching Software Testing
Published 2015“…In this paper, we propose the concept of teaching software testing with an experimental model for pairwise testing; developed with Migrating Birds Optimization (MBO) algorithm called Experimental Model for Teaching Software Testing (EMTST). …”
Get full text
Get full text
Get full text
Article -
2
Clustering-based cloud migration strategies
Published 2018“…This helps to link the cloud migration strategies across the cloud service models (software as a service, platform as a service, and infrastructure as a service). …”
Get full text
Get full text
Article -
3
Clustering-based cloud migration strategies
Published 2018“…This helps to link the cloud migration strategies across the cloud service models (software as a service, platform as a service, and infrastructure as a service). …”
Get full text
Get full text
Article -
4
Classification model for water quality using machine learning techniques
Published 2015Get full text
Get full text
Article -
5
Experimenting the dendrite cell algorithm for disease outbreak detection model
Published 2014Get full text
Get full text
Get full text
Conference or Workshop Item -
6
Improving oil palm fresh fruit bunch grading system via software and hardware modifications
Published 2016“…This problem is due to the size of the image captured which is 1Gb per image. Therefore, the algorithm was migrated to a standalone software using LabVIEW. …”
Get full text
Get full text
Thesis -
7
Energy and performance efficient resource allocation for cloud-based data centers
Published 2015“…In this study, we found that our proposed algorithms able to reduce energy consumption by 3% and 19% for host overload detection and VM selection algorithm respectively.…”
Get full text
Get full text
Thesis -
8
Conceptual deployment models to secure cloud computing / Hajar Ziglari
Published 2012“…Ekatarina Yadova to see the effectiveness of the models. The next step will be about development and corresponding interfaces and design patterns for applications to fit the deployment models and working on security protocols and algorithms in the proposed models to have security support in the cryptography part.…”
Get full text
Get full text
Thesis -
9
Reliability-aware swarm based multi-objective optimization for controller placement in distributed SDN architecture
Published 2023“…Thus, we consider the control plane fault tolerance for cost-effective and accurate controller location models during control plane failures. This fault-tolerance strategy has been applied to distributed SDN control architecture, which allows each switch to migrate to next controller to enhance network performance. …”
Get full text
Get full text
Article -
10
A behavioral trust model for internet of healthcare things using an improved FP-growth algorithm and Naïve Bayes classifier
Published 2021Get full text
Get full text
Get full text
Get full text
Conference or Workshop Item -
11
Software agent as an effective tool for managing the Internet of thing data complexity
Published 2017“…The Internet has created new business opportunity and models that are not even considered in the pre-internet era. …”
Get full text
Get full text
Conference or Workshop Item
