Search Results - (( web application _ algorithm ) OR ( its application ((means algorithm) OR (cloud algorithm)) ))
Search alternatives:
- web application »
- its application »
- means algorithm »
- cloud algorithm »
-
1
-
2
Task scheduling in cloud computing environment using hybrid genetic algorithm and bat algorithm
Published 2022“…The result of the algorithm performance will be appeared in web application system. …”
Get full text
Get full text
Get full text
Academic Exercise -
3
Task scheduling in cloud computing using hybrid genetic algorithm and bald eagle search (GA-BES)
Published 2022“…The genetic algorithm was widely used because of its accuracy and simplicity. …”
Get full text
Get full text
Get full text
Academic Exercise -
4
Efficient DNS based Load Balancing for Bursty Web Application Traffic
Published 2012“…This research proposes a new efficient load balancing algorithm which applies to the local Domain Name Service (DNS) server for web based applications and services to ease the sudden increase in demand for the services. …”
Get full text
Get full text
Get full text
Article -
5
Enhancing user authentication for cloud web-based application / Detar Beqo
Published 2018“…We have developed a cloud-based application that adapts the enhanced authentication method, and its security measurement were evaluated using IBM Application Security on Cloud tool. …”
Get full text
Get full text
Get full text
Thesis -
6
Automatic marking system for programming subject
Published 2023“…This project is a web application designed for lecturer that teaching programming subject to automatically mark programming algorithm exercise. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
7
Quantum Particle Swarm Optimization Technique for Load Balancing in Cloud Computing
Published 2013“…Cloud Computing systems are widely applied in many fields such as communication data management, web application, network monitoring, financial management and so on. …”
Get full text
Thesis -
8
Securing cloud data system (SCDS) for key exposure using AES algorithm
Published 2021“…The AES algorithm has its own structure to encrypt and decrypt sensitive data that make the attackers difficult to get the real data when encrypting by AES algorithm. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
9
Designing a new E-Commerce authentication framework for a cloud-based environment
Published 2024Conference Paper -
10
A Hybrid Approach For Web Search Result Clustering Based On Genetic Algorithm With K-means
Published 2024Get full text
journal::journal article -
11
Cryptanalytic attacks on Rivest, Shamir, and Adleman (RSA) cryptosystem: issues and challenges
Published 2014“…Generally RSA algorithm gain a security support because of it’s frequently use in most applications where security of digital data is mostly a concern. …”
Get full text
Get full text
Get full text
Get full text
Article -
12
Web-Based Route Optimization System For Logistic Using Agglomerative Clustering And Genetic Algorithm
Published 2020“…Although all of the objectives had been achieved the current system restricted user to make changes on the calculated route directly, the clustering algorithm and the route optimization algorithm applied are not wise enough and several enhancements can be made for this system. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
13
-
14
Computer remote monitoring via mobile phones using socket programming / Samih Omer Fadlelmola Elkhider
Published 2011“…The approach of the mobile cloud is clearly occurring with web host servers expands thus large number of data around the world stored in huge servers, consumers of mobile devices and small computing devices have high performance expectations usually, therefore mobile cloud computing theorizes that the cloud will soon become a disruptive force in the mobile world, eventually becoming the dominant way in which mobile applications operates. …”
Get full text
Get full text
Thesis -
15
Artificial intelligent integrated into sun-tracking system to enhance the accuracy, reliability and long-term performance in solar energy harnessing
Published 2022Get full text
Get full text
Final Year Project / Dissertation / Thesis -
16
The development of cloud modelling and motion analysis for virtual environment
Published 2005“…This invention uses the newly developed randomized algorithm to fill the cloud volume with particle systems. …”
Get full text
Get full text
Monograph -
17
The development of cloud modelling and motion analysis for virtual environment
Published 2005“…This invention uses the newly developed randomized algorithm to fill the cloud volume with particle systems. …”
Get full text
Get full text
Monograph -
18
Cloud-based lightweight detection of hardhat compliance based on YOLOv5 in power construction site
Published 2025“…Experimental results demonstrate that the hardhat-YOLO model can accurately and efficiently detect hardhat-wearing compliance in real-time, ensuring its practical applicability in power workplace safety monitoring.…”
Get full text
Get full text
Thesis -
19
Cloud Worm Detection and Response Technique By Integrating The Enhanced Genetic Algorithm An Threat Level
Published 2024thesis::doctoral thesis -
20
A Penalty-Based Genetic Algorithm For The Composite Saas Placement Problem In The Cloud
Published 2010“…Cloud computing is a latest new computing paradigm where applications, data and IT services, are provided over the Internet. …”
Get full text
Get full text
Conference or Workshop Item
