Search Results - (( _ application server algorithm ) OR ( mobile application use algorithm ))*
Search alternatives:
- application server »
- server algorithm »
- application use »
- use algorithm »
-
1
A framework of rough cultural algorithms in optimizing mobile web caching performance
Published 2007“…The common cause of poor performance is due to the direct access to the server (e.g. pitiable performance of server-side applications or during burst crowds) and network infrastructure (e.g. long geographical distances, network overloads, etc.). …”
Get full text
Get full text
Article -
2
Mobile application design for protecting the data in cloud using enhanced technique of encryption
Published 2024journal::journal article -
3
-
4
Computer remote monitoring via mobile phones using socket programming / Samih Omer Fadlelmola Elkhider
Published 2011“…The approach of the mobile cloud is clearly occurring with web host servers expands thus large number of data around the world stored in huge servers, consumers of mobile devices and small computing devices have high performance expectations usually, therefore mobile cloud computing theorizes that the cloud will soon become a disruptive force in the mobile world, eventually becoming the dominant way in which mobile applications operates. …”
Get full text
Get full text
Thesis -
5
Objects tracking from natural features in mobile augmented reality
Published 2013“…The pose matrix from extracted features was calculated by Homography. The adapted algorithm was tested in a mobile AR-prototype application using iPhone. …”
Get full text
Get full text
Get full text
Article -
6
-
7
A malware analysis and detection system for mobile devices / Ali Feizollah
Published 2017“…We then used feature selection algorithms and deep learning algorithms to build a detection model. …”
Get full text
Get full text
Get full text
Thesis -
8
-
9
-
10
Enhancing XSS vulnerability detection and removal in web applications using genetic algorithms
Published 2024“…XSS-DETREM has been evaluated empirically using a data set of JSP and Android web applications that have been used in previous studies. …”
Get full text
Get full text
Get full text
Thesis -
11
ABC-PSO for vertical handover in heterogeneous wireless networks
Published 2017“…The ABC-PSO algorithm has been optimized to achieve small cost function that are powered using the IEEE 802.21 standard taking into account different available wireless networks, the application requirements and the user preferences to improve QoS. …”
Get full text
Get full text
Get full text
Get full text
Article -
12
Bundle Sorting Mobile Application
Published 2020“…The camera will be connected with the mobile devices that installed the fabric sorting application to capture all the information and quantity of garments by using the Bluetooth or server. …”
Get full text
Get full text
Final Year Project -
13
-
14
Home intruder detection system using machine learning and IoT
Published 2022“…The main objectives of HIDES are to create a reliable home security system with the implementation of IoT, to implement the object detection algorithm to determine the presence of humans, and to develop a smart mobile application for users to monitor their houses from anywhere in the world and be alerted if any threats are detected. …”
Get full text
Get full text
Get full text
Article -
15
Maximizing Lifetime of Homogeneous Wireless Sensor Network through Energy Efficient Clustering Method
Published 2010Get full text
Get full text
Citation Index Journal -
16
Automated multi-factor analytics for cheat-proofing attendance-taking
Published 2018“…The second factor checks for the phone's unique International Mobile Equipment Identity (IMEI) number. The third factor checks attendance time using server time. …”
Get full text
Get full text
Article -
17
Data hiding mobile application by using encryption and decryption / Nuha Bakizah Mohd Asri
Published 2021“…The phenomenal growth of e-commerce applications in the World Wide Web requires the need to increase the security of data communications over the Internet, especially for highly sensitive document transfer. …”
Get full text
Get full text
Student Project -
18
Secure policies for the distributed virtual machines in mobile cloud computing
Published 2020“…Several experiments were conducted using real-world healthcare distributed application in terms of efficiency, coverage and execution time. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
19
Development of a Reliable Multicast Protocol in Mobile Ad Hoc Networks
Published 2008Get full text
Get full text
Thesis -
20
