Search Results - (( data realization path algorithm ) OR ( java applications cloud algorithm ))

  • Showing 1 - 10 results of 10
Refine Results
  1. 1

    Securing cloud data system (SCDS) for key exposure using AES algorithm by Thabet Albatol, Mohammed Samer Hasan

    Published 2021
    “…After that we use to build securing cloud data system (SCDS) for key exposure using the AES algorithm for encrypting and decrypting our website cloud data and files. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  2. 2
  3. 3

    Computer remote monitoring via mobile phones using socket programming / Samih Omer Fadlelmola Elkhider by Omer Fadlelmola Elkhider, Samih

    Published 2011
    “…The approach of the mobile cloud is clearly occurring with web host servers expands thus large number of data around the world stored in huge servers, consumers of mobile devices and small computing devices have high performance expectations usually, therefore mobile cloud computing theorizes that the cloud will soon become a disruptive force in the mobile world, eventually becoming the dominant way in which mobile applications operates. …”
    Get full text
    Get full text
    Thesis
  4. 4
  5. 5

    Development of Path Loss Models for Smooth and Convex Surfaces Terrains in Malaysian Environment by Wong, Peng Kiong

    Published 2004
    “…The UPMPL program provides the utility for calculating the signal characteristics of radio propagation paths and is realized in the run time format version. …”
    Get full text
    Get full text
    Thesis
  6. 6

    A Development Of An Internet Of Things Equipped Unmanned Ground Vehicle For Surveilance Purpose by Azizan, Anis Natasha

    Published 2019
    “…Therefore, controller is used for navigation before and after approaching obstacles. Path planning algorithm in this project provides the best path to avoid the obstacle and create temporary new waypoints within split seconds. …”
    Get full text
    Get full text
    Monograph
  7. 7

    The enhanced fault-tolerant AODV routing protocol for Wireless Sensor Network by Che-Aron, Zamree, Mohammed Al-Khateeb, Wajdi Fawzi, Anwar, Farhat

    Published 2010
    “…We design and implement a backup route algorithm by creating a backup path for every node in the network. …”
    Get full text
    Get full text
    Get full text
    Proceeding Paper
  8. 8

    Surface defect detection and polishing parameter optimization using image processing for G3141 cold rolled steel by Zamri, Ruzaidi

    Published 2016
    “…In this study a new technique is developed where the Ga only read on the specific scratch line without considering the whole image. To realize this, automatic cropping algorithm is developed to detect the region of interest and interpret the Ga value. …”
    Get full text
    Get full text
    Thesis
  9. 9

    A malware analysis and detection system for mobile devices / Ali Feizollah by Ali, Feizollah

    Published 2017
    “…We then used feature selection algorithms and deep learning algorithms to build a detection model. …”
    Get full text
    Get full text
    Get full text
    Thesis
  10. 10

    Load balancing and congestion control in ATM using fuzzy logic and spiking neuron network / Tan Jiann Shin by Tan, Jiann Shin

    Published 2005
    “…The objective of this project is to propose an intelligent routing solution that is capable of increasing network performance in Asynchronous Transfer Mode (ATM) network for Available Bit Rate data traffic. The proposed intelligent routing algorithm, integrates spiking neuron network with fuzzy link cost for the dynamic routing computation. …”
    Get full text
    Get full text
    Thesis