Search Results - same ((cloud algorithm) OR (window algorithm))

Refine Results
  1. 1

    New CFAR algorithm and circuit development for radar receiver by Kamal, Mustafa Subhi

    Published 2020
    “…Therefore, the MSS-CA-CFAR is chosen to implement by practical digital circuit and there is another important feature in the MSS-CFAR algorithm that is parallel processing since the spike selection process is done at the same time with summing of samples process that makes this algorithm much less in processing time from any other algorithm using the same environment. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  2. 2

    Performance evaluation of load balancing algorithm for virtual machine in data centre in cloud computing by Parmesivan, Yuganes, Hasan, Sazlinah, Muhammed, Abdullah

    Published 2018
    “…Cloud computing has become biggest buzz in the computer era these days.It runs entire operating systems on the cloud and doeverything on cloud to store data off-site.Cloud computing is primarily based on grid computing, but it’s a new computational model.Cloud computing has emerged into a new opportunity to further enhance way of hosting data centre and provide services.The primary substance of cloud computing is to deal the computing power,storage,different sort of stages and services which assigned tothe external users on demand through the internet.Task scheduling in cloud computing is vital role optimisation and effective dynamic resource allocation for load balancing.In cloud, the issue focused is under utilisation and over utilisation of the resources to distribute workload of multiple network links for example,when cloud clients try to access and send request tothe same cloud server while the other cloud server remain idle at that moment, leads to the unbalanced of workload on cloud data centers.Thus, load balancing is to assign tasks to the individual cloud data centers of the shared system so that no single cloud data centers is overloaded or under loaded.A Hybrid approach of Honey Bee (HB) and Particle Swarm Optimisation (PSO) load balancing algorithm is combined in order to get effective response time.The proposed hybrid algorithm has been experimented by using CloudSim simulator.The result shows that the hybrid load balancing algorithm improves the cloud system performance by reducing the response time compared to the Honey Bee (HB) and Particle Swarm Optimisation (PSO) load balancing algorithm.…”
    Get full text
    Get full text
    Get full text
    Article
  3. 3

    Task scheduling in cloud computing environment using hybrid genetic algorithm and bat algorithm by Muhammad Syahril Mohamad Sainal

    Published 2022
    “…Furthermore, CloudSim simulator will be used to evaluate the performance of this algorithm. …”
    Get full text
    Get full text
    Get full text
    Academic Exercise
  4. 4

    Task scheduling in cloud computing using hybrid genetic algorithm and bald eagle search (GA-BES) by Kamal Khairi Supaprhman

    Published 2022
    “…Task scheduling and resource allocation are essential aspects of cloud computing. This Study proposes task scheduling in cloud computing using a hybrid genetic algorithm, and bald eagle search proposed to solve the task scheduling problem. …”
    Get full text
    Get full text
    Get full text
    Academic Exercise
  5. 5

    Securing cloud data system (SCDS) for key exposure using AES algorithm by Thabet Albatol, Mohammed Samer Hasan

    Published 2021
    “…After that we use to build securing cloud data system (SCDS) for key exposure using the AES algorithm for encrypting and decrypting our website cloud data and files. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  6. 6

    Impatient job scheduling under cloud computing by Mahdi, Nawfal A.

    Published 2012
    “…The first part focuses on review- ing the previous immediate mode scheduling and adopting them on cloud paradigm. The limitations of those algorithms were addressed and this leads to the proposition of an algorithm that has the ability to map the impatient jobs to virtual machines near its input, output, application, or forth party. …”
    Get full text
    Get full text
    Thesis
  7. 7

    Object Localization In 3D Point Cloud by Chung, Hui Sze

    Published 2020
    “…The results of object localization are often affected by many factors such as the quality of the point clouds and the sensitivity of the algorithms to the occlusion in the point clouds. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  8. 8

    Energy Efficient High-Performance Computing Aware Proactive Dynamic Virtual Machine Consolidation Technique in Cloud Computing by Rukshanda, Kamran

    Published 2022
    “…However, these algorithms do not consider the workloads' different nature, incredibly individual classes of HPC workload in the cloud data centre. …”
    Get full text
    Get full text
    Get full text
    Thesis
  9. 9

    User authentication in public cloud computing through adoption of electronic personal synthesis behavior by Mohanaad Talal Shakir

    Published 2023
    “…However, illegitimate access is considered one of the most significant challenges in public cloud computing. In the same context, Many researchers have reported password leaks as a major issue. …”
    text::Thesis
  10. 10

    Enhancing user authentication for cloud web-based application / Detar Beqo by Detar , Beqo

    Published 2018
    “…It uses an enhanced encryption algorithm, and the data is stored securely in the cloud systems. …”
    Get full text
    Get full text
    Get full text
    Thesis
  11. 11
  12. 12

    The optimization of resources allocation to minimize energy consumption within data center in cloud by Ayob, Fahrul Hakim, Jayatis, Punaya, Subramaniam, Shamala

    Published 2019
    “…When comparing with DVFS in a set of experiment, the proposed algorithm is better in terms of lower power consumption.…”
    Get full text
    Get full text
    Get full text
    Article
  13. 13

    Efficient task scheduling strategies using symbiotic organisms search algorithm for cloud computing environment by Sa'ad, Suleiman

    Published 2022
    “…However, the efficiency of the clouds drops as the size of the search space gets larger, like in the case of most metaheuristic optimisation algorithms. …”
    Get full text
    Get full text
    Thesis
  14. 14

    Cloudids: Cloud Intrusion Detection Model Inspired By Dendritic Cell Mechanism by Azuan Ahmad, Norbik Bashah Idris, Mohd Nazri Kama

    Published 2024
    “…The experiments show that the Cloud IDS model based on Dendritic Cell algorithm able to identify and detect novel threat that targeting Cloud environment.…”
    Article
  15. 15

    Fast method to find conflicts in optical multistage interconnection networks by Abed, Farzaneh, Othman, Mohamed

    Published 2008
    “…This algorithm applies Omega network. The comparison result shows the good performance of this algorithm. …”
    Get full text
    Get full text
    Get full text
    Article
  16. 16
  17. 17

    Enhanced replication strategy with balanced quorum technique and data center selection method in cloud environment by Mohd Ali, Fazlina

    Published 2022
    “…In order to validate the competence of these proposed algorithms, results were compared with another similar research work known as DPRS algorithm. …”
    Get full text
    Get full text
    Thesis
  18. 18

    Critical insight for MAPReduce optimization in Hadoop by Khan, Burhan ul Islam, Olanrewaju, Rashidah Funke, Altaf, Hunain, Shah, Asadullah

    Published 2014
    “…Cloud applications such as data storage, data retrieval and data portability have become significant requirements for cloud computing. …”
    Get full text
    Get full text
    Get full text
    Article
  19. 19

    Efficient DNS based Load Balancing for Bursty Web Application Traffic by Chin, Mei Lu, Chong, Eng Tan, Mohamad Imran, Bin Bandan

    Published 2012
    “…The proposed algorithm is evaluated via computer simulation and modeling where its performance is verified against the few selected algorithms of the same nature. …”
    Get full text
    Get full text
    Get full text
    Article
  20. 20