Search Results - (( web application ((cloud algorithm) OR (means algorithm)) ) OR ( _ application a algorithm ))

Refine Results
  1. 1
  2. 2

    Final exam question paper data encryption and decryption using advance encryption standard / Khairul Nashran Nazari by Nazari, Khairul Nashran

    Published 2017
    “…The results from this research have proved that the AES is very effective in terms of time taken to encrypt and decrypt documents, strength of the algorithm and the reliability of the program. It is recommended that Final Examination Question Papers be enhanced using Encryptor Application by applying AES on a different domain to further strengthen information security.…”
    Get full text
    Get full text
    Thesis
  3. 3

    Task scheduling in cloud computing using hybrid genetic algorithm and bald eagle search (GA-BES) by Kamal Khairi Supaprhman

    Published 2022
    “…Task scheduling and resource allocation are essential aspects of cloud computing. This Study proposes task scheduling in cloud computing using a hybrid genetic algorithm, and bald eagle search proposed to solve the task scheduling problem. …”
    Get full text
    Get full text
    Get full text
    Academic Exercise
  4. 4

    Efficient DNS based Load Balancing for Bursty Web Application Traffic by Chin, Mei Lu, Chong, Eng Tan, Mohamad Imran, Bin Bandan

    Published 2012
    “…This research proposes a new efficient load balancing algorithm which applies to the local Domain Name Service (DNS) server for web based applications and services to ease the sudden increase in demand for the services. …”
    Get full text
    Get full text
    Get full text
    Article
  5. 5

    Clustering-based cloud migration strategies by Aslam, M., Rahim, L.B.A., Watada, J., Hashmani, M.

    Published 2018
    “…The k-means algorithm of the partitioning clustering method is used to analyze cloud migration strategies in this study. …”
    Get full text
    Get full text
    Article
  6. 6

    Clustering-based cloud migration strategies by Aslam, M., Rahim, L.B.A., Watada, J., Hashmani, M.

    Published 2018
    “…The k-means algorithm of the partitioning clustering method is used to analyze cloud migration strategies in this study. …”
    Get full text
    Get full text
    Article
  7. 7

    Enhancing user authentication for cloud web-based application / Detar Beqo by Detar , Beqo

    Published 2018
    “…Motivated by a number of security experts in cloud computing, we proposed an innovative solution of authentication for cloud web-based applications. …”
    Get full text
    Get full text
    Get full text
    Thesis
  8. 8

    Task scheduling in cloud computing environment using hybrid genetic algorithm and artificial bee colony by Mohd Izuddin Sipluk

    Published 2022
    “…In this project, a comparative evaluation of selected algorithms is done to ascertain their applicability, practicality, and adaptability in a cloud scenario. …”
    Get full text
    Get full text
    Get full text
    Academic Exercise
  9. 9

    A web-based implementation of k-means algorithms by Lee, Quan

    Published 2022
    “…The K-means algorithm has been around for over a century. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  10. 10

    Energy Efficient High-Performance Computing Aware Proactive Dynamic Virtual Machine Consolidation Technique in Cloud Computing by Rukshanda, Kamran

    Published 2022
    “…There is yet a promising research direction to explore techniques to efficiently schedule a mix of HPC and non-HPC applications to increase resource utilization in the cloud data centre. …”
    Get full text
    Get full text
    Get full text
    Thesis
  11. 11

    Automatic marking system for programming subject by Chan, Jin Yee

    Published 2023
    “…This project is a web application designed for lecturer that teaching programming subject to automatically mark programming algorithm exercise. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  12. 12
  13. 13

    Quantum Particle Swarm Optimization Technique for Load Balancing in Cloud Computing by Elrasheed Ismail, Sultan

    Published 2013
    “…Cloud Computing systems are widely applied in many fields such as communication data management, web application, network monitoring, financial management and so on. …”
    Get full text
    Thesis
  14. 14

    Web-Application for securing message using Steganography with LSB Algorithm and Hybrid Encryption / Muhammad Khairul Amin Mohd Nai and Siti Rahayu Abdul Aziz by Mohd Nai, Muhammad Khairul Amin, Abdul Aziz, Siti Rahayu

    Published 2021
    “…Web-Application for Securing Message using Steganography with LSB Algorithm and Hybrid Encryption is a web application that encrypt the messages user input and hide it in an image file to give an utmost security for the messages to be delivered and received. …”
    Get full text
    Get full text
    Get full text
    Book Section
  15. 15

    Web-Application for securing message using Steganography with LSB Algorithm and Hybrid Encryption / Muhammad Khairul Amin Mohd Nai and Siti Rahayu Abdul Aziz by Mohd Nai, Muhammad Khairul Amin, Abdul Aziz, Siti Rahayu

    Published 2021
    “…Web-Application for Securing Message using Steganography with LSB Algorithm and Hybrid Encryption is a web application that encrypt the messages user input and hide it in an image file to give an utmost security for the messages to be delivered and received. …”
    Get full text
    Get full text
    Get full text
    Book Section
  16. 16

    A modified π rough k-means algorithm for web page recommendation system by Zidane, Khaled Ali Othman

    Published 2018
    “…In order to tackle above problem, a modified algorithm for Web page recommendation is proposed. …”
    Get full text
    Get full text
    Get full text
    Thesis
  17. 17

    An augmented reality real-time cloud-based remote monitoring algorithm for a manufacturing system / Siti Aisyah Jaafar by Jaafar, Siti Aisyah

    Published 2021
    “…Conventional AR-IoT applications only specialize in the localized area for the on-site application and not applicable for a remote monitoring system. …”
    Get full text
    Get full text
    Thesis
  18. 18
  19. 19
  20. 20