Search Results - (( its application ((window algorithm) OR (cloud algorithm)) ) OR ( web application a algorithm ))*
Search alternatives:
- window algorithm »
- its application »
- cloud algorithm »
- web application »
- application a »
- a algorithm »
-
1
Designing a new E-Commerce authentication framework for a cloud-based environment
Published 2024Conference Paper -
2
Task scheduling in cloud computing using hybrid genetic algorithm and bald eagle search (GA-BES)
Published 2022“…The genetic algorithm was widely used because of its accuracy and simplicity. …”
Get full text
Get full text
Get full text
Academic Exercise -
3
Efficient DNS based Load Balancing for Bursty Web Application Traffic
Published 2012“…This research proposes a new efficient load balancing algorithm which applies to the local Domain Name Service (DNS) server for web based applications and services to ease the sudden increase in demand for the services. …”
Get full text
Get full text
Get full text
Article -
4
Enhancing user authentication for cloud web-based application / Detar Beqo
Published 2018“…Motivated by a number of security experts in cloud computing, we proposed an innovative solution of authentication for cloud web-based applications. …”
Get full text
Get full text
Get full text
Thesis -
5
Automatic marking system for programming subject
Published 2023“…This project is a web application designed for lecturer that teaching programming subject to automatically mark programming algorithm exercise. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
6
Quantum Particle Swarm Optimization Technique for Load Balancing in Cloud Computing
Published 2013“…Cloud Computing systems are widely applied in many fields such as communication data management, web application, network monitoring, financial management and so on. …”
Get full text
Thesis -
7
Web-Based Route Optimization System For Logistic Using Agglomerative Clustering And Genetic Algorithm
Published 2020“…To solve the system’s current limitations, several improvements like enable user to set priority on the D/O, enable user to add/remove a particular D/O on the planned route, review on others clustering and optimization algorithm can be performed in the future.…”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
8
Computer remote monitoring via mobile phones using socket programming / Samih Omer Fadlelmola Elkhider
Published 2011“…Presently, many researches have been made on remote monitoring and its techniques. The studies show beyond technical algorithms, physical aspects plays a big rule in client server model. …”
Get full text
Get full text
Thesis -
9
Final exam question paper data encryption and decryption using advance encryption standard / Khairul Nashran Nazari
Published 2017“…AES is being used widely in many applications since it is known for its faster encryption and decryption process and its strength. …”
Get full text
Get full text
Thesis -
10
Face recognition and identification system (FaceRec) / Khew Jye Huei
Published 2004“…Face recognition is a technique to identify an individual by his/her physical characteristic and has been of interest to a growing number of researchers due to its applications on security. …”
Get full text
Get full text
Thesis -
11
Monitoring cathodic protection system for underground pipeline
Published 2013“…A local server running on windows platform was used to capture and display the readings on graph. …”
Get full text
Get full text
Thesis -
12
Cloud Worm Detection and Response Technique By Integrating The Enhanced Genetic Algorithm An Threat Level
Published 2024thesis::doctoral thesis -
13
A Penalty-Based Genetic Algorithm For The Composite Saas Placement Problem In The Cloud
Published 2010“…Cloud computing is a latest new computing paradigm where applications, data and IT services, are provided over the Internet. …”
Get full text
Get full text
Conference or Workshop Item -
14
Two objectives big data task scheduling using swarm intelligence in cloud computing
Published 2016“…Although many scheduling algorithms have been implemented for cloud computing, it has been realized that most of the applications nowadays require different objectives that simple scheduling algorithms fail to achieve. …”
Get full text
Get full text
Get full text
Article -
15
Impatient job scheduling under cloud computing
Published 2012“…The first part focuses on review- ing the previous immediate mode scheduling and adopting them on cloud paradigm. The limitations of those algorithms were addressed and this leads to the proposition of an algorithm that has the ability to map the impatient jobs to virtual machines near its input, output, application, or forth party. …”
Get full text
Get full text
Thesis -
16
Task scheduling in cloud computing environment using hybrid genetic algorithm and bat algorithm
Published 2022“…Genetic algorithm was widely used because of its accuracy and simplicity. …”
Get full text
Get full text
Get full text
Academic Exercise -
17
Simulated annealing approach to cost-based multi- quality of service job scheduling in cloud computing enviroment
Published 2014“…The advent of cloud computing as a new model of service provisioning in distributed systems, encourages researchers to investigate its benefits and drawbacks in executing scientific applications such as workflows. …”
Get full text
Get full text
Get full text
Article -
18
Adaptive linux-based TCP congestion control algorithm for high-speed networks
Published 2017“…Although TCP is the predominant transmission protocol used in Internet, its Congestion Control Algorithm (CCA) is still unable to adapt to high-speed networks, which are not the typical environment for which most CCAs were designed. …”
Get full text
Get full text
Thesis -
19
Energy and performance efficient resource allocation for cloud-based data centers
Published 2015“…The underlying concept of cloud computing isthe separation of applications from the operating systems and the hardware on which they run. …”
Get full text
Get full text
Thesis -
20
Implementing Location-Based Cryptography on Mobile Application Design to Secure Data in Cloud Storage
Published 2024journal::journal article
