Search Results - same cloud algorithm
Search alternatives:
- cloud algorithm »
- same cloud »
-
1
Performance evaluation of load balancing algorithm for virtual machine in data centre in cloud computing
Published 2018“…Cloud computing has become biggest buzz in the computer era these days.It runs entire operating systems on the cloud and doeverything on cloud to store data off-site.Cloud computing is primarily based on grid computing, but it’s a new computational model.Cloud computing has emerged into a new opportunity to further enhance way of hosting data centre and provide services.The primary substance of cloud computing is to deal the computing power,storage,different sort of stages and services which assigned tothe external users on demand through the internet.Task scheduling in cloud computing is vital role optimisation and effective dynamic resource allocation for load balancing.In cloud, the issue focused is under utilisation and over utilisation of the resources to distribute workload of multiple network links for example,when cloud clients try to access and send request tothe same cloud server while the other cloud server remain idle at that moment, leads to the unbalanced of workload on cloud data centers.Thus, load balancing is to assign tasks to the individual cloud data centers of the shared system so that no single cloud data centers is overloaded or under loaded.A Hybrid approach of Honey Bee (HB) and Particle Swarm Optimisation (PSO) load balancing algorithm is combined in order to get effective response time.The proposed hybrid algorithm has been experimented by using CloudSim simulator.The result shows that the hybrid load balancing algorithm improves the cloud system performance by reducing the response time compared to the Honey Bee (HB) and Particle Swarm Optimisation (PSO) load balancing algorithm.…”
Get full text
Get full text
Get full text
Article -
2
Task scheduling in cloud computing environment using hybrid genetic algorithm and bat algorithm
Published 2022“…Furthermore, CloudSim simulator will be used to evaluate the performance of this algorithm. …”
Get full text
Get full text
Get full text
Academic Exercise -
3
Task scheduling in cloud computing using hybrid genetic algorithm and bald eagle search (GA-BES)
Published 2022“…Task scheduling and resource allocation are essential aspects of cloud computing. This Study proposes task scheduling in cloud computing using a hybrid genetic algorithm, and bald eagle search proposed to solve the task scheduling problem. …”
Get full text
Get full text
Get full text
Academic Exercise -
4
Securing cloud data system (SCDS) for key exposure using AES algorithm
Published 2021“…After that we use to build securing cloud data system (SCDS) for key exposure using the AES algorithm for encrypting and decrypting our website cloud data and files. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
5
Impatient job scheduling under cloud computing
Published 2012“…The first part focuses on review- ing the previous immediate mode scheduling and adopting them on cloud paradigm. The limitations of those algorithms were addressed and this leads to the proposition of an algorithm that has the ability to map the impatient jobs to virtual machines near its input, output, application, or forth party. …”
Get full text
Get full text
Thesis -
6
Object Localization In 3D Point Cloud
Published 2020“…The results of object localization are often affected by many factors such as the quality of the point clouds and the sensitivity of the algorithms to the occlusion in the point clouds. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
7
Energy Efficient High-Performance Computing Aware Proactive Dynamic Virtual Machine Consolidation Technique in Cloud Computing
Published 2022“…However, these algorithms do not consider the workloads' different nature, incredibly individual classes of HPC workload in the cloud data centre. …”
Get full text
Get full text
Get full text
Thesis -
8
User authentication in public cloud computing through adoption of electronic personal synthesis behavior
Published 2023“…However, illegitimate access is considered one of the most significant challenges in public cloud computing. In the same context, Many researchers have reported password leaks as a major issue. …”
text::Thesis -
9
Enhancing user authentication for cloud web-based application / Detar Beqo
Published 2018“…It uses an enhanced encryption algorithm, and the data is stored securely in the cloud systems. …”
Get full text
Get full text
Get full text
Thesis -
10
-
11
The optimization of resources allocation to minimize energy consumption within data center in cloud
Published 2019“…When comparing with DVFS in a set of experiment, the proposed algorithm is better in terms of lower power consumption.…”
Get full text
Get full text
Get full text
Article -
12
Efficient task scheduling strategies using symbiotic organisms search algorithm for cloud computing environment
Published 2022“…However, the efficiency of the clouds drops as the size of the search space gets larger, like in the case of most metaheuristic optimisation algorithms. …”
Get full text
Get full text
Thesis -
13
Cloudids: Cloud Intrusion Detection Model Inspired By Dendritic Cell Mechanism
Published 2024“…The experiments show that the Cloud IDS model based on Dendritic Cell algorithm able to identify and detect novel threat that targeting Cloud environment.…”
Article -
14
Enhanced replication strategy with balanced quorum technique and data center selection method in cloud environment
Published 2022“…In order to validate the competence of these proposed algorithms, results were compared with another similar research work known as DPRS algorithm. …”
Get full text
Get full text
Thesis -
15
Critical insight for MAPReduce optimization in Hadoop
Published 2014“…Cloud applications such as data storage, data retrieval and data portability have become significant requirements for cloud computing. …”
Get full text
Get full text
Get full text
Article -
16
Efficient DNS based Load Balancing for Bursty Web Application Traffic
Published 2012“…The proposed algorithm is evaluated via computer simulation and modeling where its performance is verified against the few selected algorithms of the same nature. …”
Get full text
Get full text
Get full text
Article -
17
Enhanced tight finite key scheme for quantum key distribution protocol to authenticate multi-party systems in cloud infrastructure
Published 2018“…We propose the enhanced tight finite key scheme for quantum key distribution (QKD) protocol to authenticate multi-party system in cloud infrastructure. The main attraction is to provide a secure channel between a cloud client to establish a connection among them by applying the theories from Von Neumann and Shannon entropies and also Shor's algorithm. …”
Get full text
Get full text
Thesis -
18
Deep reinforcement learning based resource allocation strategy in cloud-edge computing system
Published 2024“…In this work, the research focus on the simulation testing of the MAL-DRL algorithm against classical Random Allocation (RA) and singe agent DRL methods. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
19
Deep reinforcement learning based resource allocation strategy in cloud-edge computing system
Published 2024“…In this work, the research focus on the simulation testing of the MAL-DRL algorithm against classical Random Allocation (RA) and singe agent DRL methods. …”
Get full text
Get full text
Conference or Workshop Item -
20
