Search Results - (( water distribution using algorithm ) OR ( _ validation ((cloud algorithm) OR (bee algorithm)) ))
Search alternatives:
- water distribution »
- using algorithm »
- cloud algorithm »
- bee algorithm »
-
1
Data in transit validation for cloud computing using cloud-based algorithm detection of injected objects
Published 2018“…Hence, a validation protocol algorithm based on hash function labelling provides a one-time security header for transferable files that protects data in transit against any unauthorized injection. …”
Get full text
Get full text
Get full text
Get full text
Article -
2
An Integer Linear Programming model and Adaptive Genetic Algorithm approach to minimize energy consumption of Cloud computing data centers
Published 2018“…The proposed adaptive GA is validated by simulating the Cloud infrastructure and conducting a set of performance and quality evaluation study in this environment. …”
Get full text
Get full text
Article -
3
Energy-efficient algorithms for dynamic virtual machine consolidation in cloud data centers
Published 2017“…The efficiency of the proposed algorithms is validated by conducting extensive simulations. …”
Get full text
Get full text
Get full text
Article -
4
Locust- inspired meta-heuristic algorithm for optimising cloud computing performance
Published 2023“…The first part involves a review of prior locustinspired algorithms, while the second part concerns the adaptation of the algorithm to the cloud computing paradigm. …”
Get full text
Get full text
Thesis -
5
Genetic algorithm optimized network in cloud data centre
Published 2016“…Experiments via simulation were conducted using our validated mathematical models. The results of the experiments show the effectiveness of our proposed methodology to enhance network speed in the cloud data centre. …”
Get full text
Get full text
Article -
6
Privacy-preserving multi-keyword hybrid search over encrypted data in cloud
Published 2022“…To validate the opposed approach, simulation analysis has been performed to preserve user-oriented privacy in a cloud environment. …”
Get full text
Get full text
Article -
7
FLA-SLA aware cloud collation formation using fuzzy preference relationship multi-decision approach for federated cloud
Published 2020“…In FS-ACCF algorithm, fuzzy preference relationship multi-decision approach was used to validate the preferences among cloud providers for forming collation and gaining maximum profit. …”
Get full text
Get full text
Get full text
Article -
8
Development Of Artificial Bee Colony (Abc) Variants And Memetic Optimization Algorithms
Published 2017“…One of BIAs, artificial bee colony (ABC) optimization algorithm, has shown excellent performance in many applications compared to other optimization algorithms. …”
Get full text
Get full text
Thesis -
9
Privacy-preserving multi-keyword hybrid search over encrypted data in cloud
Published 2022“…To validate the opposed approach, simulation analysis has been performed to preserve user-oriented privacy in a cloud environment. …”
Get full text
Get full text
Article -
10
-
11
Optimal sizing of static VAR compensator using bees algorithm for cost minimization
Published 2020“…This paper presents the application of Bees Algorithm (BA) technique to find the optimal sizing of Static Var Compensator (SVC) to achieve the power system economic generation and dispatch. …”
Get full text
Get full text
Article -
12
Bee colony optimisation of the travelling salesman problem in light rail systems
Published 2019“…Although various algorithms based on social insect species have successfully solved complex problems, bee behaviour in nature has inspired more significant solutions. …”
Get full text
Get full text
Article -
13
Economic and emission load dispatch solution via artificial bee colony algorithm
Published 2017“…This paper investigates the performances of Artificial Bee colony (ABC) algorithm for determining optimal solution for EELD problem. …”
Get full text
Get full text
Article -
14
Statistically controlled robust trust computing mechanism for cloud computing
Published 2014“…Trust computing mechanisms can play an important role in identifying the right service providers who would meet the commitments specified in the Service Level Agreements.Literature has reported several trust computing mechanisms for different distributed systems based on various algorithms and functions.Almost all of them modify the trust scores monotonously even for momentary performance deviations that are reported.This paper proposes a trust computing mechanism that statistically validates the attribute monitored before modifying the trust scores using a hysteresis based algorithm.Hence the proposed mechanism can protect the trust scores from changes due to momentary fluctuations in system performances.The experiments conducted show that the trust scores computed using the proposed mechanism are more representative of the long-term system performance than the ones that were computed without the validation of the inputs.…”
Get full text
Get full text
Get full text
Article -
15
Task scheduling in cloud computing using Harris-Hawk Optimization
Published 2024“…This paper presents a simulation of the Harris-Hawk Optimization (HHO) algorithm, which aims to minimize the makes pan of a specified task set in a cloud computing environment. …”
Get full text
Get full text
Get full text
Proceedings -
16
Enhancing user authentication for cloud web-based application / Detar Beqo
Published 2018“…It uses an enhanced encryption algorithm, and the data is stored securely in the cloud systems. …”
Get full text
Get full text
Get full text
Thesis -
17
Fog-cloud scheduling simulator for reinforcement learning algorithms
Published 2023“…Due to its decentralized architecture, fog computing offers low latency processing and ensures the preservation of information between the source and the cloud resources. Additionally, it can be integrated with the cloud to provide satisfactory and efficient service simultaneously. …”
Get full text
Get full text
Article -
18
LSSVM parameters tuning with enhanced artificial bee colony
Published 2014“…The proposed model was employed in predicting financial time series data and comparison is made against the standard Artificial Bee Colony (ABC) and Cross Validation (CV) technique.The simulation results assured the accuracy of parameter selection, thus proved the validity in improving the prediction accuracy with acceptable computational time.…”
Get full text
Get full text
Get full text
Article -
19
Designing a new E-Commerce authentication framework for a cloud-based environment
Published 2024Conference Paper -
20
Efficient task scheduling strategies using symbiotic organisms search algorithm for cloud computing environment
Published 2022“…However, the efficiency of the clouds drops as the size of the search space gets larger, like in the case of most metaheuristic optimisation algorithms. …”
Get full text
Get full text
Thesis
