Search Results - (( solution communicative cloud algorithm ) OR ( java application mining algorithm ))

Refine Results
  1. 1
  2. 2
  3. 3
  4. 4

    Genetic algorithm based adaptive offloading for improving IoT device communication efficiency by Hussain, Azham, Manikanthan, S. V., Padmapriya, T., Nagalingam, Mahendran

    Published 2019
    “…With an extended support from cloud network, the mobile IoT devices demand flexibility and scalability in communication. …”
    Get full text
    Get full text
    Get full text
    Article
  5. 5

    Secure multi-authority attribute-based encryption access control with cache-aware scheduling in mobile cloud computing by Jamal, Fara

    Published 2021
    “…Mobile Cloud Computing (MCC) is the combination of cloud computing, mobile computing, and wireless network to bring rich computational resources to mobile users, network operators, as well as cloud computing providers. …”
    Get full text
    Get full text
    Thesis
  6. 6

    Study and Implementation of Data Mining in Urban Gardening by Mohana, Muniandy, Lee, Eu Vern

    Published 2019
    “…Attached sensors generate data and send these data to the Java Servlet application through a WIFI module. These data are processed and stored in appropriate formats in a MySQL server database. …”
    Get full text
    Get full text
    Get full text
    Article
  7. 7

    Mining Sequential Patterns Using I-PrefixSpan by Dhany , Saputra, Rambli Dayang, R.A., Foong, Oi Mean

    Published 2007
    “…Sequential pattern mining is a relatively new data-mining problem with many areas of application. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  8. 8

    A web-based implementation of k-means algorithms by Lee, Quan

    Published 2022
    “…This stinginess of proximity measures in data mining tools is stifling the performance of the algorithm. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  9. 9
  10. 10

    Performance analysis of constrained device virtualization algorithm by Haseeb, Shariq, Hassan Abdalla Hashim, Aisha, Khalifa, Othman Omran, Ismail, Ahmad Faris

    Published 2020
    “…However, majority of the solutions are at different layers of the communication stack but do not provide a holistic solution for the problem. …”
    Get full text
    Get full text
    Get full text
    Article
  11. 11

    Data collection in sensor-cloud: A systematic literature review by Ihsan Ali, Ismail Ahmedy, Abdullah Gani, Muhammad Talha, Muhammad Ahsan Raza, Mohammad Hossein Anisi

    Published 2020
    “…Knowing how weak WSNs are with regards to communication ability, how to collect and upload sensory data to the cloud in limited time has become an issue in Sensor-cloud. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  12. 12
  13. 13
  14. 14

    Deep reinforcement learning based resource allocation strategy in cloud-edge computing system by Ahmed Adhoni, Zameer, Habelalmateen, Mohammed, DR Janardhana, DR Janardhana, Abdul Sattar, Khalid Nazim, Audah, Lukman

    Published 2024
    “…Although the article limits simulations in areas to be covered and complexity in training, it brings the prospective benefits of MAL-DRL in the management of cloud-edge resources on the spot. In the course of this undertake, the effect of ensuring communication goals, moving learning strategies, and security measures for the ultimate goal of boosting this method's applicability in real-world antics can be explored…”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  15. 15

    Deep reinforcement learning based resource allocation strategy in cloud-edge computing system by Ahmed Adhoni, Zameer, Habelalmateen, Mohammed I, D R, Janardhana, Abdul Sattar, Khalid Nazim, Audah, Lukman

    Published 2024
    “…Although the article limits simulations in areas to be covered and complexity in training, it brings the prospective benefits of MAL-DRL in the management of cloud-edge resources on the spot. In the course of this undertake, the effect of ensuring communication goals, moving learning strategies, and security measures for the ultimate goal of boosting this method's applicability in real-world antics can be explored.…”
    Get full text
    Get full text
    Conference or Workshop Item
  16. 16

    Dynamic and adaptive execution models for data stream mining applications in mobile edge cloud computing systems / Muhammad Habib Ur Rehman by Muhammad Habib , Ur Rehman

    Published 2016
    “…At tertiary level, the architecture enables far-edge to cloud communication in case of unavailability of onboard computational and battery power resources and in the absence of any other mobile devices in the locality. …”
    Get full text
    Get full text
    Get full text
    Thesis
  17. 17

    ECG encryption enhancement with multi-layers of AES and DNA computing by Kh-Madhloom, Jamal

    Published 2023
    “…The solution that has been suggested is one that is both secure and effective when it is put to use in conjunction with the ECG and Covid-19 image encoding algorithms. …”
    Get full text
    Get full text
    Get full text
    Thesis
  18. 18

    Features selection for intrusion detection system using hybridize PSO-SVM by Tabaan, Alaa Abdulrahman

    Published 2016
    “…The simulation will be carried on WEKA tool, which allows us to call some data mining methods under JAVA environment. The proposed model will be tested and evaluated on both NSL-KDD and KDD-CUP 99 using several performance metrics.…”
    Get full text
    Get full text
    Thesis
  19. 19

    Investigation of An Early Prediction System of Cardiac Arrest Using Machine Learning Techniques by Muhammad Afnan, Mohammad Nasir

    Published 2022
    “…Random Forest algorithm be used in this study which is got the best performance with 83% accuracy then the other algorithms in WEKA. …”
    Get full text
    Get full text
    Undergraduates Project Papers
  20. 20