Search Results - (( using solution cloud algorithm ) OR ( java implementation _ algorithm ))
Search alternatives:
- java implementation »
- cloud algorithm »
- using solution »
-
1
OPTIMIZED MIN-MIN TASK SCHEDULING ALGORITHM FOR SCIENTIFIC WORKFLOWS IN A CLOUD ENVIRONMENT
Published 2023“…To achieve this, we propose a new noble mechanism called Optimized Min-Min (OMin-Min) algorithm, inspired by the Min-Min algorithm. The objectives of this work are: i) to provide a comprehensive review of the cloud and scheduling process; ii) to classify the scheduling strategies and scientific workflows; iii) to implement our proposed algorithm with various scheduling algorithms (i.e., Min-Min, Round-Robin, Max-Min, and Modified Max-Min) for performance comparison, within different cloudlet sizes (i.e., small, medium, large, and heavy) in three scientific workflows (i.e., Montage, Epigenomics, and SIPHT); and iv) to investigate the performance of the implemented algorithms by using CloudSim. …”
Review -
2
Improving the security and encryption performance of cloud storage by using elliptic curve cryptography
Published 2016“…They can be used in a wide variety of applications ranging from cloud storage, cloud computing, and cloud applications. …”
Get full text
Get full text
Thesis -
3
An enhanced discrete symbiotic organism search algorithm for optimal task scheduling in the cloud
Published 2021“…The local search space of the DSOS is diversified by substituting the best value with any candidate in the population at the mutualism phase of the DSOS algorithm, which makes it worthy for use in task scheduling problems in the cloud. …”
Get full text
Get full text
Article -
4
Tag clouds algorithm with the inclusion of personality traits
Published 2015“…Furthermore, the algorithm to generate tag cloud visualization based on personality traits has not been explored. …”
Get full text
Get full text
Get full text
Thesis -
5
Hybrid Henry Gas-Harris Hawks comprehensive-opposition algorithm for task scheduling in cloud computing
Published 2025“…The suggested technique was tested using CloudSim on the NASA, HPC2N, and Synthetic datasets. …”
Get full text
Get full text
Get full text
Article -
6
System program management environment in cloud computing using hybrid Genetic Algorithm and Moth Flame Optimization (GA-MFO)
Published 2022“…The result of the proposed algorithm found, the optimal solution for the system program of management and equal distribution of tasks to cloud has been provided, and less total execution time consumption has been achieved compared with other algorithm.…”
Get full text
Get full text
Get full text
Academic Exercise -
7
Two objectives big data task scheduling using swarm intelligence in cloud computing
Published 2016“…Either one of the objective is violated or the results are far from the optimal solution. In this direction, this paper first gives review of some previous scheduling algorithms used in cloud. …”
Get full text
Get full text
Get full text
Article -
8
Impatient job scheduling under cloud computing
Published 2012“…The proposed algorithm was transplanted in an adopted scheduling algorithm and tested using simu-lation with a synthetic dataset. …”
Get full text
Get full text
Thesis -
9
RSA Encryption & Decryption using JAVA
Published 2006“…Today, with online marketing, banking, healthcare and other services, even the average householder is aware of encryption. The implementation of this project will be based on Rapid Application Design Methodology (RAD) and will be more focusing on research and finding, ideas and the implementation of the algorithm, and finally running and testing the algorithm. …”
Get full text
Get full text
Final Year Project -
10
Empowering cloud providers: optimised locust-inspired algorithm for SLA violation mitigation in green cloud computing
Published 2025“…It enhances the locust-inspired algorithm by integrating SLA-awareness and adaptive host classification and is evaluated using real workload traces in the CloudSim toolkit. …”
Get full text
Get full text
Get full text
Article -
11
Enhancing user authentication for cloud web-based application / Detar Beqo
Published 2018“…We aim to improve on passwords with respect to both usability as well as security. It uses an enhanced encryption algorithm, and the data is stored securely in the cloud systems. …”
Get full text
Get full text
Get full text
Thesis -
12
FLA-SLA aware cloud collation formation using fuzzy preference relationship multi-decision approach for federated cloud
Published 2020“…In FS-ACCF algorithm, fuzzy preference relationship multi-decision approach was used to validate the preferences among cloud providers for forming collation and gaining maximum profit. …”
Get full text
Get full text
Get full text
Article -
13
Efficient task scheduling strategies using symbiotic organisms search algorithm for cloud computing environment
Published 2022“…The SOS and its variants Discrete Symbiotic Organisms Search (DSOS) algorithm have been used to solve different optimisation problems including tasks scheduling in cloud computing environment where results obtained are promising in comparison with stateof- the-art metaheuristic algorithms. …”
Get full text
Get full text
Thesis -
14
Hybrid Cat Swarm Optimization and Simulated Annealing for Dynamic Task Scheduling on Cloud Computing Environment
Published 2018“…In this study, a Cloud Scalable Multi-Objective Cat Swarm Optimization-based Simulated Annealing algorithm is proposed. …”
Get full text
Get full text
Get full text
Article -
15
A Study On AI-Driven Solutions for Cloud Security Platform
Published 2024“…Finally, this research seeks to help organizations protect cloud structures and resources using intentioned AI solutions.…”
Get full text
Get full text
Get full text
Get full text
Article -
16
Accuracy assessment of Digital Terrain Model (DTM) Constructed Cloth Simulation Filter (CSF) and Multi Curvature Classification (MCC) algorithm on UAV LiDAR dataset / Mohamad Khair...
Published 2023“…Two algorithms, the Cloth Simulation Filter (CSF) in CloudCompare and the Multiscale Curvature Classification (MCC) in Global Mapper, were tested for this purpose. …”
Get full text
Get full text
Student Project -
17
Provider independent cryptographic tools
Published 2003“…The library is implemented by using Java cryptographic service provider framework that conforms to Java Cryptographic Architecture (JCA) and Java Cryptographic Extension (JCE). …”
Get full text
Get full text
Get full text
Monograph -
18
Direct approach for mining association rules from structured XML data
Published 2012“…The thesis also provides a two different implementation of the modified FLEX algorithm using a java based parsers and XQuery implementation. …”
Get full text
Get full text
Thesis -
19
AUTOMATED MODEL GENERATION OF FSM AND NUSMV MODEL FROM RSA JAVA SOURCE CODE FOR MODEL CHECKING
Published 2021“…RSA is one of these encryption algorithms that have been implemented in security systems. …”
Get full text
Get full text
Thesis -
20
Scheduling scientific workflow in multi-cloud: a multi-objective minimum weight optimization decision-making approach
Published 2023“…In particular, we use particle swarm optimization (PSO) to expand the FR-MOS multi-objective scheduling algorithm by using fuzzy resource management to maximize variety and obtain optimal Pareto convergence. …”
Get full text
Get full text
Article
