Search Results - (( _ application server algorithm ) OR ( mobile application new algorithm ))*
Search alternatives:
- application server »
- server algorithm »
- application new »
- new algorithm »
-
1
On protecting data storage in mobile cloud computing paradigm
Published 2014Get full text
Get full text
Get full text
Article -
2
-
3
A malware analysis and detection system for mobile devices / Ali Feizollah
Published 2017“…Unlike current systems that either perform analyses on the device or send the whole application to a server for analyses, our system has the distinction of extracting features on the device and analysing them on the Google App Engine servers using an offloading technique. …”
Get full text
Get full text
Get full text
Thesis -
4
Enhancing XSS vulnerability detection and removal in web applications using genetic algorithms
Published 2024“…Also, as more users are browsing the Internet through their mobile applications, this approach will help in protecting their private data and make browsing safer for them with both Desktop and Mobile web applications.…”
Get full text
Get full text
Get full text
Thesis -
5
Data hiding mobile application by using encryption and decryption / Nuha Bakizah Mohd Asri
Published 2021“…The phenomenal growth of e-commerce applications in the World Wide Web requires the need to increase the security of data communications over the Internet, especially for highly sensitive document transfer. …”
Get full text
Get full text
Student Project -
6
Effectiveness of mobile agent for query retrieval
Published 2002Get full text
Get full text
Get full text
Article -
7
Wi-Fi signal strengths database construction for indoor positioning systems using Wi-Fi RFID
Published 2013Get full text
Get full text
Conference or Workshop Item -
8
Improving the quality of service of fixed WiMAX networks by decreasing application response time using a distributed model
Published 2022“…A brand new distributed Client-Server model was designed for the fixed WiMAX Network in order to reduce application response time. …”
Get full text
Get full text
Get full text
Get full text
Article -
9
Mobile agent based multi-layer security framework for cloud data centers
Published 2015“…Findings:The framework uses authenticated mobile agents from both client and cloud server provider to perform the task on behalf of users to establish trustworthy computing relationship. …”
Get full text
Get full text
Get full text
Article -
10
-
11
-
12
-
13
Efficient Discovery Protocol for Ubiquitous Communication in Wireless Environment
Published 2009“…The problem is that the most of service discovery protocols are not effective for wireless Ad- Hoc networks and ubiquities environments, efficiency in case of service quality and power consumption. In this research a new mechanism and algorithm is designed to improve current wireless service discovery protocols. …”
Get full text
Get full text
Thesis -
14
Embedded gateway services for Internet of Things applications in ubiquitous healthcare
Published 2014Get full text
Get full text
Conference or Workshop Item -
15
Development of open platform controller for step-NC compliant CNC system
Published 2020“…While the UOCC AR mobile application allow users to view machining setup process through Augmented Reality guide therefore improving the average operating time for experienced users (42.46%) and non-experienced (28.36%). …”
Get full text
Get full text
Get full text
Get full text
Thesis -
16
Incremental learning for large-scale stream data and its application to cybersecurity
Published 2015“…In Chapter 2, we propose a new algorithm based on incremental Radial Basis Function Network (RBFN) to accelerate the learning in stream data. …”
Get full text
Get full text
Thesis -
17
A new efficient checkpointing algorithm for distributed mobile computing
Published 2015“…Such instability poses serious challenge for fault tolerant distributed mobile applications. Therefore, the classical checkpointing techniques, which make the applications more failure-resistant, are not always compatible with the mobile context. …”
Get full text
Get full text
Get full text
Get full text
Get full text
Article -
18
A new model of application response time for VoIP over WLAN and fixed WiMAX
Published 2015“…The model was simulated in the OPNET modeler (16.0) with Multiple Access Points (APs), Base Stations (BSs)as well as mobile devices, Subscribers Stations (SSs), and some server BSs that were selected based on Nearest Neighborhood Algorithm and Orthogonal Frequency Division Multiplexing (OFDM) techniques. …”
Get full text
Get full text
Conference or Workshop Item -
19
A technique of dispatching algorithms for web-server cluster
Published 2011Get full text
Working Paper -
20
Capacity Enhancement Of Cellular Network Using Wifi Offloading
Published 2019“…The growing popularity of bandwidth-intensive applications as well as the proliferation of mobile devices in Malaysia has resulted in the accelerated growth of mobile data traffic or also known as the mobile data explosion phenomena. …”
Get full text
Get full text
Get full text
Get full text
Thesis
