Search Results - (( java applications cloud algorithm ) OR ( data evaluation using algorithm ))
Search alternatives:
- applications cloud »
- java applications »
- evaluation using »
- cloud algorithm »
- data evaluation »
- using algorithm »
-
1
Securing cloud data system (SCDS) for key exposure using AES algorithm
Published 2021“…After that we use to build securing cloud data system (SCDS) for key exposure using the AES algorithm for encrypting and decrypting our website cloud data and files. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
2
Attribute reduction based scheduling algorithm with enhanced hybrid genetic algorithm and particle swarm optimization for optimal device selection
Published 2022“…Enhance hybrid genetic algorithm and particle Swarm optimization are developed to select the optimal device in either fog or cloud. …”
Get full text
Get full text
Article -
3
Computer remote monitoring via mobile phones using socket programming / Samih Omer Fadlelmola Elkhider
Published 2011“…The approach of the mobile cloud is clearly occurring with web host servers expands thus large number of data around the world stored in huge servers, consumers of mobile devices and small computing devices have high performance expectations usually, therefore mobile cloud computing theorizes that the cloud will soon become a disruptive force in the mobile world, eventually becoming the dominant way in which mobile applications operates. …”
Get full text
Get full text
Thesis -
4
Evaluating power efficient algorithms for efficiency and carbon emissions in cloud data centers: a review
Published 2015“…The three algorithms are evaluated for performance using three parameters; power efficiency, cost effectiveness, and amount of CO2 emissions. …”
Get full text
Get full text
Get full text
Get full text
Get full text
Article -
5
Data depublication using : Hashing algorithm / Naimah Nayan
Published 2019“…The objective of this project is to compare MD5 & SHA-1 algorithm in data deduplication technique and to evaluate the MD5 & SHA-1 algorithm, length of message digest and speed using deduplication software. …”
Get full text
Get full text
Thesis -
6
Performance evaluation for different data encryption algorithms on wireless sensor network (WSN)
Published 2018“…Therefore, the aim of the project is to analyse and evaluate various different algorithms used image encryption in WSN. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
7
Performance evaluation of caching placement algorithms in named data network for video on demand service
Published 2016“…The purpose of this study is to evaluate the performance of caching placement algorithms (LCD, LCE, Prob, Pprob, Cross, Centrality, and Rand) in Named Data Network (NDN) for Video on Demand (VoD). …”
Get full text
Get full text
Get full text
Thesis -
8
Adaptive grid-meshed-buffer clustering algorithm for outlier detection in evolving data stream
Published 2023“…The results indicate that the AGMB algorithm outperformed existing benchmark algorithms in terms of predefined evaluation criteria with an overall 72% accuracy compared to benchmark algorithms which is 11 % only. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
9
Multistep forecasting for highly volatile data using new algorithm of Box-Jenkins and GARCH
Published 2018“…In evaluating the performance of the multistep ahead forecast, the proposed algorithm is employed to daily world gold price series of 5-year data. …”
Get full text
Get full text
Conference or Workshop Item -
10
Case Slicing Technique for Feature Selection
Published 2004“…Since the 1960s, many algorithms for data classification have been proposed. …”
Get full text
Get full text
Thesis -
11
Sentiment analysis of domestic violence prediction using Naive Bayes algorithm / Nurulizzah Mohd Rahiman
Published 2024“…The evaluation of algorithms consists of comparing the accuracy, specificity, and other evaluation metrics. …”
Get full text
Get full text
Thesis -
12
Evaluation of data mining classification and clustering techniques for diabetes / Tuba Pala and Ali Yilmaz Camurcu
Published 2014“…The success evaluation of data mining classification algorithms have been realized through the data mining programs Weka and RapidMiner. …”
Get full text
Get full text
Get full text
Article -
13
Sentiment analysis for malay newspaper (SAMNews) using negative selection algorithm / Nur Amalina Redzuan
Published 2013“…The sentiment analysis in this project utilized 1000 newspaper’s sentences for the training and classification phase and testing data to evaluate the average of accurateness. The evaluation is made on three experiments which in Experiment I used 700 newspaper’s sentences as the training data and 300 newspaper’s sentences as the testing data. …”
Get full text
Get full text
Thesis -
14
A Comparative Study Of Blockchain Algorithms For Non-Fungible Token
Published 2023“…In this research, there will be some selected algorithms, which is Proof-of-Work and Proof-of-Stakes from open resource and modified to the suitable testing criteria to evaluate valid and sufficient data for data visualization. …”
Get full text
Get full text
Undergraduates Project Papers -
15
Workflow optimization in distributed computing environment for stream-based data processing model / Saima Gulzar Ahmad
Published 2017“…To avoid such overheads many techniques have been used, however in this thesis stream-based data processing model is used in which data is processed in the form of continuous instances of data items. …”
Get full text
Get full text
Get full text
Thesis -
16
Objective evaluation of speech enhancement using compressive sensing algorithm
Published 2013“…Perceptual evaluation of speech quality (PESQ) is an objective evaluation of speech enhancement algorithm used to measure the enhanced speech quality. …”
Get full text
Get full text
Get full text
Proceeding Paper -
17
An Enhanced Hybrid Method Using AES Algorithm And Arabic Text Steganography
Published 2024thesis::master thesis -
18
Evaluation of Lightning Current Using Inverse Procedure Algorithm.
Published 2013“…The proposed method can be used for preparing of current data bank that is very useful for considering on lightning effects on the power lines and setting appropriate protection levels on the power systems.…”
Get full text
Get full text
Article -
19
Replica Creation Algorithm for Data Grids
Published 2012“…The new Data Replica Creation Algorithm (DRCM) improves performance of data grid systems by reducing job execution time and making the best use of data grid resources (network bandwidth and storage space). …”
Get full text
Get full text
Get full text
Get full text
Thesis -
20
A malware analysis and detection system for mobile devices / Ali Feizollah
Published 2017“…We then used feature selection algorithms and deep learning algorithms to build a detection model. …”
Get full text
Get full text
Get full text
Thesis
