Search Results - "Abdulhamid, Muhammad"
-
1
Symbiotic Organism Search optimization based task scheduling in cloud computing environment
Published in Future generation computer systems (01-03-2016)“…Efficient task scheduling is one of the major steps for effectively harnessing the potential of cloud computing. In cloud computing, a number of tasks may need…”
Get full text
Journal Article -
2
Performance comparison of heuristic algorithms for task scheduling in IaaS cloud computing environment
Published in PloS one (03-05-2017)“…Cloud computing infrastructure is suitable for meeting computational needs of large task sizes. Optimal scheduling of tasks in cloud computing environment has…”
Get full text
Journal Article -
3
Whale optimization algorithm: a systematic review of contemporary applications, modifications and developments
Published in Neural computing & applications (01-10-2020)“…Whale optimization algorithm (WOA) is a recently developed swarm-based meta-heuristic algorithm that is based on the bubble-net hunting maneuver technique—of…”
Get full text
Journal Article -
4
A hybrid whale optimization algorithm with differential evolution optimization for multi-objective virtual machine scheduling in cloud computing
Published in Engineering optimization (02-12-2022)“…Virtual machine (VM) scheduling in a dynamic cloud environment is often bound with multiple quality of service parameters; therefore, it is classed as an…”
Get full text
Journal Article -
5
Secure Scientific Applications Scheduling Technique for Cloud Computing Environment Using Global League Championship Algorithm
Published in PloS one (06-07-2016)“…Cloud computing system is a huge cluster of interconnected servers residing in a datacenter and dynamically provisioned to clients on-demand via a front-end…”
Get full text
Journal Article -
6
Fault tolerance aware scheduling technique for cloud computing environment using dynamic clustering algorithm
Published in Neural computing & applications (2018)“…In cloud computing, resources are dynamically provisioned and delivered to users in a transparent manner automatically on-demand. Task execution failure is no…”
Get full text
Journal Article -
7
The Impact of Mitigation Strategies for Socio-Cultural Distance Issues in GSD: An Empirical Study
Published in IEEE access (01-01-2023)“…Global Software Development (GSD) offers several benefits to software development organizations, including reduced development costs, the availability of…”
Get full text
Journal Article -
8
A survey of symbiotic organisms search algorithms and applications
Published in Neural computing & applications (2020)“…Nature-inspired algorithms take inspiration from living things and imitate their behaviours to accomplish robust systems in engineering and computer science…”
Get full text
Journal Article -
9
Hybrid gradient descent cuckoo search (HGDCS) algorithm for resource scheduling in IaaS cloud computing environment
Published in Cluster computing (01-03-2019)“…Resource scheduling is a procedure for the distribution of resources over time to perform a required task and a decision making process in cloud computing…”
Get full text
Journal Article -
10
Multi-objective-Oriented Cuckoo Search Optimization-Based Resource Scheduling Algorithm for Clouds
Published in Arabian journal for science and engineering (2011) (01-04-2019)“…Scheduling problems in cloud computing environment are mostly influenced by multi-objective optimization but frequently deal with using single-objective…”
Get full text
Journal Article -
11
Genetic Algorithm based feature selection and Naïve Bayes for anomaly detection in fog computing environment
Published in Machine learning with applications (15-12-2021)“…The sharp rise in network attacks has been a major source of concern in cyber security, particularly that now internet usage and connectivity are in high…”
Get full text
Journal Article -
12
A Review on Mobile SMS Spam Filtering Techniques
Published in IEEE access (2017)“…Under short messaging service (SMS) spam is understood the unsolicited or undesired messages received on mobile phones. These SMS spams constitute a veritable…”
Get full text
Journal Article -
13
Brain MRI Image Super-Resolution Reconstruction: A Systematic Review
Published in IEEE access (2024)“…Magnetic Resonance Imaging (MRI) is pivotal in clinical diagnostics and neurological research, providing high-contrast, non-invasive imaging. However, the…”
Get full text
Journal Article -
14
Machine learning for email spam filtering: review, approaches and open research problems
Published in Heliyon (01-06-2019)“…The upsurge in the volume of unwanted emails called spam has created an intense need for the development of more dependable and robust antispam filters…”
Get full text
Journal Article -
15
SAppKG: Mobile App Recommendation Using Knowledge Graph and Side Information-A Secure Framework
Published in IEEE access (2023)“…Due to the rapid development of technology and the widespread usage of smartphones, the number of mobile applications is exponentially growing. Finding a…”
Get full text
Journal Article -
16
Analyzing Power and Energy Efficiency of Bitonic Mergesort Based on Performance Evaluation
Published in IEEE access (01-01-2018)“…In graphics processing unit ( GPU ) computing community, bitonic mergesort (BM) is recognized as one of the most investigated sorting algorithms. It is…”
Get full text
Journal Article -
17
Evaluating Power and Energy Efficiency of Bitonic Mergesort on Graphics Processing Unit
Published in IEEE access (01-01-2017)“…Excessive power consumption is expected to be the major obstacle to achieve exascale performance within a reasonable power budget in the upcoming years. In…”
Get full text
Journal Article -
18
Systematic literature review and metadata analysis of ransomware attacks and detection mechanisms
Published in Journal of reliable intelligent environments (01-07-2019)“…Ransomware is advanced and upgraded malicious software which comes in the forms of Crypto or Locker, with the intention to attack and take control of basic…”
Get full text
Journal Article -
19
Secure E-Examination Systems Compared: Case Studies from Two Countries
Published in Journal of Information Technology Education. Innovations in Practice (2017)“…Aim/Purpose: Electronic examinations have some inherent problems. Students have expressed negative opinions about electronic examinations (e-examinations) due…”
Get more information
Journal Article -
20
Resource scheduling for infrastructure as a service (IaaS) in cloud computing: Challenges and opportunities
Published in Journal of network and computer applications (01-06-2016)“…Resource scheduling assigns the precise and accurate task to CPU, network, and storage. The aim behind this is the extreme usage of resources. However, well…”
Get full text
Journal Article