Search Results - (( based application ((svm algorithm) OR (_ algorithm)) ) OR ( its applications cloud algorithm ))
Search alternatives:
- applications cloud »
- based application »
- its applications »
- cloud algorithm »
- svm algorithm »
-
1
Cloud Worm Detection and Response Technique By Integrating The Enhanced Genetic Algorithm An Threat Level
Published 2024thesis::doctoral thesis -
2
A Penalty-Based Genetic Algorithm For The Composite Saas Placement Problem In The Cloud
Published 2010“…This paper proposes a penalty-based genetic algorithm (GA) to the composite SaaS placement problem in the Cloud. …”
Get full text
Get full text
Conference or Workshop Item -
3
Simulated annealing approach to cost-based multi- quality of service job scheduling in cloud computing enviroment
Published 2014“…The advent of cloud computing as a new model of service provisioning in distributed systems, encourages researchers to investigate its benefits and drawbacks in executing scientific applications such as workflows. …”
Get full text
Get full text
Get full text
Article -
4
Implementing Location-Based Cryptography on Mobile Application Design to Secure Data in Cloud Storage
Published 2024journal::journal article -
5
Impatient job scheduling under cloud computing
Published 2012“…The first part focuses on review- ing the previous immediate mode scheduling and adopting them on cloud paradigm. The limitations of those algorithms were addressed and this leads to the proposition of an algorithm that has the ability to map the impatient jobs to virtual machines near its input, output, application, or forth party. …”
Get full text
Get full text
Thesis -
6
Task scheduling in cloud computing using hybrid genetic algorithm and bald eagle search (GA-BES)
Published 2022“…The genetic algorithm was widely used because of its accuracy and simplicity. …”
Get full text
Get full text
Get full text
Academic Exercise -
7
-
8
Energy and performance efficient resource allocation for cloud-based data centers
Published 2015“…The underlying concept of cloud computing isthe separation of applications from the operating systems and the hardware on which they run. …”
Get full text
Get full text
Thesis -
9
Online Dynamic Replication and Placement Algorithms for Cost Optimization of Online Social Networks in Two-tier Multi-cloud
Published 2024journal::journal article -
10
A new priority rule cloud scheduling technique that utilizes gaps to increase the efficiency of jobs distribution
Published 2023“…These limitations lead to the poor performance of cloud-based mobile applications and other cloud services. …”
Get full text
Get full text
Thesis -
11
-
12
Quantum Particle Swarm Optimization Technique for Load Balancing in Cloud Computing
Published 2013“…Researches on data Cloud Computing become the necessary trend in the distributed Cloud Computing system domain since the sources and application of the data are distributed and the scale of the applications enlarges quickly. …”
Get full text
Thesis -
13
Efficient task scheduling strategies using symbiotic organisms search algorithm for cloud computing environment
Published 2022“…The SOS and its variants Discrete Symbiotic Organisms Search (DSOS) algorithm have been used to solve different optimisation problems including tasks scheduling in cloud computing environment where results obtained are promising in comparison with stateof- the-art metaheuristic algorithms. …”
Get full text
Get full text
Thesis -
14
Comparison of Logistic Regression, Random Forest, SVM, KNN Algorithm for Water Quality Classification Based on Contaminant Parameters
Published 2024“…This study compares four machine learning algorithms Logistic Regression, Random Forest, Support Vector Machine (SVM), and K-Nearest Neighbors (KNN) in water quality classification based on contaminant parameters. …”
Get full text
Get full text
Get full text
Get full text
Article -
15
Using the bees algorithm to optimise a support vector machine for wood defect classification
Published 2007“…The algorithm, which is a swarm-based algorithm inspired by the food foraging behavior of honey bees, was also employed to select the components making up the feature vectors to be presented to the SVM. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
16
Designing a new E-Commerce authentication framework for a cloud-based environment
Published 2024Conference Paper -
17
Enhancing user authentication for cloud web-based application / Detar Beqo
Published 2018“…We have developed a cloud-based application that adapts the enhanced authentication method, and its security measurement were evaluated using IBM Application Security on Cloud tool. …”
Get full text
Get full text
Get full text
Thesis -
18
-
19
-
20
Detection and classification of conflict flows in SDN using machine learning algorithms
Published 2021“…The EFDT and hybrid DT-SVM algorithms were designed and deployed based on DT and SVM algorithms to achieve improved performance. …”
Get full text
Get full text
Get full text
Get full text
Get full text
Article
