Search Results - (( _ application cloud algorithm ) OR ( based application design algorithm ))*
Search alternatives:
- application design »
- application cloud »
- based application »
- design algorithm »
- cloud algorithm »
-
1
Implementing Location-Based Cryptography on Mobile Application Design to Secure Data in Cloud Storage
Published 2024journal::journal article -
2
Deadline guarantee for scientific workflow using dynamic scheduling algorithms on IaaS clouds
Published 2018“…Finally, we expected the scheduling algorithms PDC and DCCP to be improve the Cloud resource usage high efficiency in the IaaS Cloud with efficient scheduling for scientific workflow.…”
Get full text
Get full text
Thesis -
3
-
4
-
5
Tag cloud algorithm with the inclusion of personality traits
Published 2014Get full text
Get full text
Get full text
Article -
6
Designing a new E-Commerce authentication framework for a cloud-based environment
Published 2024Conference Paper -
7
-
8
-
9
Intelligent transmission line fault diagnosis using the Apriori associated rule algorithm under cloud computing environment
Published 2024“…The leakage fault cases verify the algorithm�s applicability and complete the correlation diagnosis of water wall leakage fault. …”
Article -
10
Improving the security and encryption performance of cloud storage by using elliptic curve cryptography
Published 2016“…They can be used in a wide variety of applications ranging from cloud storage, cloud computing, and cloud applications. …”
Get full text
Get full text
Thesis -
11
Enhancing user authentication for cloud web-based application / Detar Beqo
Published 2018“…We have developed a cloud-based application that adapts the enhanced authentication method, and its security measurement were evaluated using IBM Application Security on Cloud tool. …”
Get full text
Get full text
Get full text
Thesis -
12
An augmented reality real-time cloud-based remote monitoring algorithm for a manufacturing system / Siti Aisyah Jaafar
Published 2021“…Conventional AR-IoT applications only specialize in the localized area for the on-site application and not applicable for a remote monitoring system. …”
Get full text
Get full text
Thesis -
13
-
14
User authentication in public cloud computing through adoption of electronic personal synthesis behavior
Published 2023text::Thesis -
15
Development of deep reinforcement learning based resource allocation techniques in cloud radio access network
Published 2022Get full text
Get full text
Final Year Project / Dissertation / Thesis -
16
E-history Malaysian secondary school textbook using TF-IDF algorithm and text visualization / Nur Hafizah Mohd Ridzuan
Published 2020“…As the future works, the system can be improved by applied the system using mobile apps application to make the system can have easier access and implementation of another technique such as semantic-based searching and the usage of stemming algorithm would be considered to produce more meaningful results.…”
Get full text
Get full text
Thesis -
17
Improving energy consumption in cloud computing datacenters using a combination of energy-aware resource allocation and scheduling mechanism
Published 2017“…In this study, to improve the utilization of cloud resources and reduce the energy consumption of datacenters, a combination of energy-aware resource allocation and scheduling mechanism including DNA based Fuzzy Genetic Algorithm (DFGA) is proposed. …”
Get full text
Get full text
Get full text
Thesis -
18
-
19
Peer to peer trade in HTM5 meta model for agent oriented cloud robotic systems
Published 2015“…Adaptation of cloud computing services for robotic applications is relatively straightforward while adaptation of underlying ideas will require a new design attitude. …”
Get full text
Get full text
Article -
20
Conceptual deployment models to secure cloud computing / Hajar Ziglari
Published 2012“…The next step will be about development and corresponding interfaces and design patterns for applications to fit the deployment models and working on security protocols and algorithms in the proposed models to have security support in the cryptography part.…”
Get full text
Get full text
Thesis
