Search Results - "ABDULHAMİD, Shafi'i Muhammad"
-
1
A hybrid whale optimization algorithm with differential evolution optimization for multi-objective virtual machine scheduling in cloud computing
Published in Engineering optimization (02-12-2022)“…Virtual machine (VM) scheduling in a dynamic cloud environment is often bound with multiple quality of service parameters; therefore, it is classed as an…”
Get full text
Journal Article -
2
Fault tolerance aware scheduling technique for cloud computing environment using dynamic clustering algorithm
Published in Neural computing & applications (2018)“…In cloud computing, resources are dynamically provisioned and delivered to users in a transparent manner automatically on-demand. Task execution failure is no…”
Get full text
Journal Article -
3
The Impact of Mitigation Strategies for Socio-Cultural Distance Issues in GSD: An Empirical Study
Published in IEEE access (01-01-2023)“…Global Software Development (GSD) offers several benefits to software development organizations, including reduced development costs, the availability of…”
Get full text
Journal Article -
4
Multi-objective-Oriented Cuckoo Search Optimization-Based Resource Scheduling Algorithm for Clouds
Published in Arabian journal for science and engineering (2011) (01-04-2019)“…Scheduling problems in cloud computing environment are mostly influenced by multi-objective optimization but frequently deal with using single-objective…”
Get full text
Journal Article -
5
Genetic Algorithm based feature selection and Naïve Bayes for anomaly detection in fog computing environment
Published in Machine learning with applications (15-12-2021)“…The sharp rise in network attacks has been a major source of concern in cyber security, particularly that now internet usage and connectivity are in high…”
Get full text
Journal Article -
6
Symbiotic Organism Search optimization based task scheduling in cloud computing environment
Published in Future generation computer systems (01-03-2016)“…Efficient task scheduling is one of the major steps for effectively harnessing the potential of cloud computing. In cloud computing, a number of tasks may need…”
Get full text
Journal Article -
7
Performance comparison of heuristic algorithms for task scheduling in IaaS cloud computing environment
Published in PloS one (03-05-2017)“…Cloud computing infrastructure is suitable for meeting computational needs of large task sizes. Optimal scheduling of tasks in cloud computing environment has…”
Get full text
Journal Article -
8
Resource scheduling for infrastructure as a service (IaaS) in cloud computing: Challenges and opportunities
Published in Journal of network and computer applications (01-06-2016)“…Resource scheduling assigns the precise and accurate task to CPU, network, and storage. The aim behind this is the extreme usage of resources. However, well…”
Get full text
Journal Article -
9
Whale optimization algorithm: a systematic review of contemporary applications, modifications and developments
Published in Neural computing & applications (01-10-2020)“…Whale optimization algorithm (WOA) is a recently developed swarm-based meta-heuristic algorithm that is based on the bubble-net hunting maneuver technique—of…”
Get full text
Journal Article -
10
Machine learning for email spam filtering: review, approaches and open research problems
Published in Heliyon (01-06-2019)“…The upsurge in the volume of unwanted emails called spam has created an intense need for the development of more dependable and robust antispam filters…”
Get full text
Journal Article -
11
Recent advancements in resource allocation techniques for cloud computing environment: a systematic review
Published in Cluster computing (01-09-2017)“…There are two actors in cloud computing environment cloud providers and cloud users. On one hand cloud providers hold enormous computing resources in the cloud…”
Get full text
Journal Article -
12
An adaptive symbiotic organisms search for constrained task scheduling in cloud computing
Published in Journal of ambient intelligence and humanized computing (01-07-2023)“…Metaheuristic algorithms have been effective in obtaining near-optimal solutions for NP-Complete problems like task scheduling. However, most of these…”
Get full text
Journal Article -
13
A checkpointed league championship algorithm-based cloud scheduling scheme with secure fault tolerance responsiveness
Published in Applied soft computing (01-12-2017)“…[Display omitted] •CPLCA scheme for secure fault tolerance scheduling in cloud system is presented.•Checkpointing and job migration strategies are also…”
Get full text
Journal Article -
14
A survey of symbiotic organisms search algorithms and applications
Published in Neural computing & applications (2020)“…Nature-inspired algorithms take inspiration from living things and imitate their behaviours to accomplish robust systems in engineering and computer science…”
Get full text
Journal Article -
15
Hybrid gradient descent cuckoo search (HGDCS) algorithm for resource scheduling in IaaS cloud computing environment
Published in Cluster computing (01-03-2019)“…Resource scheduling is a procedure for the distribution of resources over time to perform a required task and a decision making process in cloud computing…”
Get full text
Journal Article -
16
Secure Scientific Applications Scheduling Technique for Cloud Computing Environment Using Global League Championship Algorithm
Published in PloS one (06-07-2016)“…Cloud computing system is a huge cluster of interconnected servers residing in a datacenter and dynamically provisioned to clients on-demand via a front-end…”
Get full text
Journal Article -
17
Whale optimization algorithm-based email spam feature selection method using rotation forest algorithm for classification
Published in SN applied sciences (01-05-2019)“…Email has continued to be an integral part of our lives and as a means for successful communication on the internet. The problem of spam mails occupying a huge…”
Get full text
Journal Article -
18
A Review on Mobile SMS Spam Filtering Techniques
Published in IEEE access (2017)“…Under short messaging service (SMS) spam is understood the unsolicited or undesired messages received on mobile phones. These SMS spams constitute a veritable…”
Get full text
Journal Article -
19
SAppKG: Mobile App Recommendation Using Knowledge Graph and Side Information-A Secure Framework
Published in IEEE access (2023)“…Due to the rapid development of technology and the widespread usage of smartphones, the number of mobile applications is exponentially growing. Finding a…”
Get full text
Journal Article -
20
Progress on Artificial Neural Networks for Big Data Analytics: A Survey
Published in IEEE access (2019)“…Approximately 2.5 quintillion bytes of data are emitted on a daily basis, and this has brought the world into the era of "big data." Artificial neural networks…”
Get full text
Journal Article