Search Results - (( its applications cloud algorithm ) OR ( some applications ((new algorithm) OR (_ algorithm)) ))*
Search alternatives:
- applications cloud »
- some applications »
- its applications »
- cloud algorithm »
- new algorithm »
-
1
Two objectives big data task scheduling using swarm intelligence in cloud computing
Published 2016“…In this direction, this paper first gives review of some previous scheduling algorithms used in cloud. …”
Get full text
Get full text
Get full text
Article -
2
Task scheduling in cloud computing using hybrid genetic algorithm and bald eagle search (GA-BES)
Published 2022“…The genetic algorithm was widely used because of its accuracy and simplicity. …”
Get full text
Get full text
Get full text
Academic Exercise -
3
Cloud-based lightweight detection of hardhat compliance based on YOLOv5 in power construction site
Published 2025“…Experimental results demonstrate that the hardhat-YOLO model can accurately and efficiently detect hardhat-wearing compliance in real-time, ensuring its practical applicability in power workplace safety monitoring.…”
Get full text
Get full text
Thesis -
4
Efficient task scheduling strategies using symbiotic organisms search algorithm for cloud computing environment
Published 2022“…The SOS and its variants Discrete Symbiotic Organisms Search (DSOS) algorithm have been used to solve different optimisation problems including tasks scheduling in cloud computing environment where results obtained are promising in comparison with stateof- the-art metaheuristic algorithms. …”
Get full text
Get full text
Thesis -
5
-
6
HISEC: a new lightweight block cipher algorithm
Published 2014“…The results showed that HISEC is better than some lightweight algorithms.…”
Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
7
An Efficient Computational Algorithm for Solving Arbitrary Sylvester Matrix Equations in Fuzzy Control Theory (S/O 14179)
Published 2021“…With that, the constructed algorithm is considered as a new contribution to the application of control system theory…”
Get full text
Get full text
Monograph -
8
-
9
Achieving security by combining Huffman and SLSB algorithms
Published 2013Get full text
Get full text
Get full text
Article -
10
Cryptography: A New Approach of Classical Hill Cipher
Published 2013Get full text
Get full text
Article -
11
-
12
Adaptive beamforming algorithm based on Simulated Kalman Filter
Published 2017“…Some of the metaheuristic algorithms have been modified from the original algorithms to improve the algorithms performance in adaptive beamforming application. …”
Get full text
Get full text
Thesis -
13
-
14
Multi-base number representation in application to scalar multiplication and pairing computation
Published 2011“…Multi-bases number representation is used to construct new versions of Miller’s algorithm. These algorithms are formulated for computing Tate and ate pairing. …”
Get full text
Get full text
Thesis -
15
DESIGN AND EVALUATION OF RESOURCE ALLOCATION AND JOB SCHEDULING ALGORITHMS ON COMPUTATIONAL GRIDS
Published 2012“…Thus, overall aim of this research is to introduce new grid scheduling algorithms for resource allocation as well as for job scheduling for enabling a highly efficient and effective utilization of the resources in executing various applications. …”
Get full text
Get full text
Thesis -
16
A new stepsize for gradient method via weak secant equation
Published 2007Get full text
Conference or Workshop Item -
17
Three-term backpropagation algorithm for classification problem
Published 2006“…Standard Backpropagation Algorithm (BP) is a widely used algorithm in training Neural Network that is proven to be very successful in many diverse application. …”
Get full text
Get full text
Thesis -
18
Cloud Worm Detection and Response Technique By Integrating The Enhanced Genetic Algorithm An Threat Level
Published 2024thesis::doctoral thesis -
19
-
20
Efficient algorithms for the key representation auditing scheme.
Published 2009Get full text
Get full text
Citation Index Journal
