Showing 161 - 180 results of 691 for search '"cloud computing"', query time: 0.07s Refine Results
  1. 161
  2. 162
  3. 163
  4. 164
  5. 165
  6. 166
  7. 167
  8. 168

    Task scheduling scheme based on improved particle swarm optimization with biological symbiosis mechanism in cloud computing by Linjie WANG

    Published 2016-09-01
    “…For the issues that the existing task scheduling scheme based on intelligent algorithms can’t obtain the optimal solution in cloud computing and inspired by nature symbiosis,a new task scheduling scheme based on improved particle swarm optimization(PSO)with biological symbiosis mechanism(SM)was proposed.Firstly,the particles in PSO were divided into two populations,and the optimization process were performed alone.Then,after each execution of the k iteration of PSO,the individual in the two populations performed the mutualism and parasitism operation.The search process was optimized by mutualism operation to through the optimal solution region,which could enhance the search ability.The parasitism operation was used to avoid premature convergence by eliminating the poor and introducing the optimal solution.Finally,the optimal solution of the task scheduling was obtained.Simulation results show that the optimal scheduling scheme can obtain the minimum task completion time and response time.…”
    Get full text
    Article
  9. 169
  10. 170

    Efficient virtual machine placement in cloud computing environment using BSO-ANN based hybrid technique by Pradeep Singh Rawat, Sachin Gaur, Varun Barthwal, Punti Gupta, Debjani Ghosh, Deepak Gupta, Joel JP C. Rodrigues

    Published 2025-01-01
    “…Cloud computing has revolutionized the way businesses and individuals access and utilize computing resources. …”
    Get full text
    Article
  11. 171

    A Visual Review and Bibliometric Analysis of Cloud Computing Traffic Flow Forecasting for a Digital Africa by Sello Prince Sekwatlakwatla, Vusumuzi Malele

    Published 2025-01-01
    “…The use of cloud computing has grown globally in recent years. When allocating resources, cloud resources and traffic flow management need to be closely watched and controlled. …”
    Get full text
    Article
  12. 172
  13. 173
  14. 174
  15. 175
  16. 176

    User Revocation-Enabled Access Control Model Using Identity-Based Signature in the Cloud Computing Environment by Tarun Kumar, Prabhat Kumar, Suyel Namasudra

    Published 2025-01-01
    “…Advanced encryption and decryption techniques in cloud computing environments can be considered useful to achieve this aspect. …”
    Get full text
    Article
  17. 177
  18. 178

    IPTV Service Framework Based on Secure Authentication and Lightweight Content Encryption for Screen-Migration in Cloud Computing by Aymen Abdullah Alsaffar, Young-Rok Shin, Eui-Nam Huh

    Published 2015-01-01
    “…As result, we proposed framework of IPTV service based on secure authentication mechanism and lightweight content encryption method for screen-migration in Cloud computing. We used cryptographic nonce combined with user ID and password to authenticate user device in any mobile terminal they passes by. …”
    Get full text
    Article
  19. 179
  20. 180