Search Results - (( iot applications cloud algorithm ) OR ( based application rsa algorithm ))*
Search alternatives:
- applications cloud »
- based application »
- iot applications »
- cloud algorithm »
- application rsa »
- rsa algorithm »
-
1
Dynamic Task Offloading Algorithm for optimising IoT network quality of service in the Mobile-Fog-Cloud System
Published 2023“…Most times, the approach of relying on cloud infrastructure for IoT application analysis may be inefficient in terms of the limited battery life of the mobile devices, resource allocation algorithm delay, and computational offloading processes that sometimes increases the response time. …”
Get full text
Get full text
Thesis -
2
An augmented reality real-time cloud-based remote monitoring algorithm for a manufacturing system / Siti Aisyah Jaafar
Published 2021“…Conventional AR-IoT applications only specialize in the localized area for the on-site application and not applicable for a remote monitoring system. …”
Get full text
Get full text
Thesis -
3
-
4
Loop-based RSA Key Generation Algorithm using String Identity
Published 2013Get full text
Get full text
Get full text
Conference or Workshop Item -
5
-
6
IOT-based fertigation system / Mohamad Amir Furqan Darus
Published 2024“…The Fertigation, the precise application of water and fertilizers in agriculture, has evolved with the integration of Internet of Things (IoT) technology. …”
Get full text
Get full text
Student Project -
7
-
8
Conclusion
Published 2019“…The book contains theoretical and practical knowledge of state-of-the-art authentication technologies and their applications in big data, IoT, and cloud computing with this technologically connected world. …”
Get full text
Get full text
Get full text
Book Chapter -
9
Parallel Processing of RSAAlgorithm Using MPI Library
Published 2006Get full text
Get full text
Final Year Project -
10
Process migration-based computational offloading framework for IOT-supported mobile edge/cloud computing
Published 2019“…Hence, the proposed framework shows profound potential for resource-intensive IoT application processing in MEC.…”
Get full text
Get full text
Get full text
Get full text
Article -
11
Enhance key generation algorithm based user string identity as public key
Published 2015“…This study aims to enhance a previous algorithm called the Tripathi algorithm. The Tripathi algorithm proposes an RSA based approach to generate cryptographic keys using a user’s identity, such as an E-mail address. …”
Get full text
Get full text
Thesis -
12
Enhancement of RSA Key Generation Using Identity
Published 2015Get full text
Get full text
Get full text
Book Chapter -
13
Task offloading paradigm in mobile edge computing-current issues, adopted approaches, and future directions
Published 2023“…Many enterprise companies migrate their services and applications to the cloud to benefit from cloud computing advantages. …”
Get full text
Get full text
Article -
14
RSA Encryption & Decryption using JAVA
Published 2006“…The implementation of this project will be based on Rapid Application Design Methodology (RAD) and will be more focusing on research and finding, ideas and the implementation of the algorithm, and finally running and testing the algorithm. …”
Get full text
Get full text
Final Year Project -
15
Process Migration-Based Computational Offloading Framework for IoT-Supported Mobile Edge/Cloud Computing
Published 2020“…Hence, the proposed framework shows profound potential for resource-intensive IoT application processing in MEC. © 2014 IEEE.…”
Get full text
Get full text
Article -
16
Attribute reduction based scheduling algorithm with enhanced hybrid genetic algorithm and particle swarm optimization for optimal device selection
Published 2022“…Enhance hybrid genetic algorithm and particle Swarm optimization are developed to select the optimal device in either fog or cloud. …”
Get full text
Get full text
Article -
17
A hardware implementation of Rivest-Shamir-Adleman co-processor for resource constrained embedded systems
Published 2006“…The designed RSA coprocessor core is actually a modular exponentiation hardware engine, which is the basic arithmetic operation in implementing a RSA public key encryption and decryption algorithm. …”
Get full text
Get full text
Thesis -
18
FPGA Implementation of RSA Public-Key Cryptographic Coprocessor
Published 2000Get full text
Get full text
Article -
19
-
20
Independent task scheduling algorithms in fog environments from users’ and service providers’ perspectives: a systematic review
Published 2025“…To assure unbiased evaluation, a benchmark to assess task scheduling algorithms is proposed based on comparison to state-or-art algorithms, applicability to real-world contexts, meeting the objectives of the study, negative impacts on other performance metrics, and sizes of datasets used for evaluation. …”
Get full text
Get full text
Get full text
Article
