Search Results - (( its application _ algorithm ) OR ( mobile application ((cloud algorithm) OR (bat algorithm)) ))
Search alternatives:
- its application »
- cloud algorithm »
- bat algorithm »
-
1
Performance evaluation of PID controller optimisation for wheel mobile robot using Bat based optimisation algorithm
Published 2022“…Three different optimization algorithms which are Bat Algorithm (BA), Bat Algorithm with Mutation (BAM) and Extended Bat Algorithm (EBA) are implemented to optimize the value of PID controller gain for wheel mobile robot. …”
Get full text
Get full text
Book Chapter -
2
PID controller design for mobile robot using Bat Algorithm with Mutation (BAM)
Published 2019“…Applications of mobile robots cover both industrial and domestic area. …”
Get full text
Get full text
Get full text
Get full text
Conference or Workshop Item -
3
Implementing Location-Based Cryptography on Mobile Application Design to Secure Data in Cloud Storage
Published 2024journal::journal article -
4
Computer remote monitoring via mobile phones using socket programming / Samih Omer Fadlelmola Elkhider
Published 2011“…Sockets programming is one f the most basic and useful method of achieving any client server connectivity. The approach of the mobile cloud is clearly occurring with web host servers expands thus large number of data around the world stored in huge servers, consumers of mobile devices and small computing devices have high performance expectations usually, therefore mobile cloud computing theorizes that the cloud will soon become a disruptive force in the mobile world, eventually becoming the dominant way in which mobile applications operates. …”
Get full text
Get full text
Thesis -
5
A new priority rule cloud scheduling technique that utilizes gaps to increase the efficiency of jobs distribution
Published 2023“…These limitations lead to the poor performance of cloud-based mobile applications and other cloud services. …”
Get full text
Get full text
Thesis -
6
Enhancing user authentication for cloud web-based application / Detar Beqo
Published 2018“…We have developed a cloud-based application that adapts the enhanced authentication method, and its security measurement were evaluated using IBM Application Security on Cloud tool. …”
Get full text
Get full text
Get full text
Thesis -
7
Cloudlet deployment and task offloading in mobile edge computing using variable-length whale and differential evolution optimization and analytical hierarchical process for decisio...
Published 2023“…Comparing this developed algorithm with other algorithms shows its superiority in multi-objective optimization (MOO) evaluation metrics. …”
Get full text
Get full text
Thesis -
8
-
9
Multi-Robot Learning with Bat Algorithm With Mutation (Bam)
Published 2022“…BAT algorithm is implemented to achieve the target. …”
Get full text
Get full text
Undergraduates Project Papers -
10
Dynamic Task Offloading Algorithm for optimising IoT network quality of service in the Mobile-Fog-Cloud System
Published 2023“…Most times, the approach of relying on cloud infrastructure for IoT application analysis may be inefficient in terms of the limited battery life of the mobile devices, resource allocation algorithm delay, and computational offloading processes that sometimes increases the response time. …”
Get full text
Get full text
Thesis -
11
MelScan: An Android Application for Early Detection of Melanoma
Published 2014“…Due to time constraints, the scope of this study was narrowed to analyzing current image processing technology used in melanoma detection, especially on the Android mobile platform, developing an Android application that can use one of the image processing algorithms for melanoma detection, and to improve accuracy of melanoma detection, in particular during its early stages. …”
Get full text
Get full text
Final Year Project -
12
-
13
Process state synchronization for mobility support in mobile cloud computing / Ejaz Ahmed
Published 2016“…This research addresses the effect of mobility on application execution for mobile cloud-based interactive applications. …”
Get full text
Get full text
Thesis -
14
On protecting data storage in mobile cloud computing paradigm
Published 2014Get full text
Get full text
Get full text
Article -
15
Secure policies for the distributed virtual machines in mobile cloud computing
Published 2020“…Mobile Cloud Computing (MCC) is a combination of cloud computing and mobile computing through wireless technology in order to overcome mobile devices' resource limitations. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
16
Energy-Aware Fault Tolerant Task offloading of Mobile Cloud Computing
Published 2023Conference Paper -
17
Mobile agent based multi-layer security framework for cloud data centers
Published 2015“…Objective:This paper proposes a new mobile agent based cloud security framework comprising four different security and authentication layers to establish the trust relationship between two entities before using cloud services. …”
Get full text
Get full text
Get full text
Article -
18
A fast knowledge-based plane reconstruction method from noisy 3D point cloud data
Published 2011Get full text
Working Paper -
19
Task offloading paradigm in mobile edge computing-current issues, adopted approaches, and future directions
Published 2023“…Many enterprise companies migrate their services and applications to the cloud to benefit from cloud computing advantages. …”
Get full text
Get full text
Article -
20
Adaptive and Priority-based Resource Allocation for Efficient Resources Utilization in Mobile Edge Computing
Published 2021“…Edge computing (EC) offers cloud-like services at the edge of mobile networks to satisfy the delay-sensitive and rapid computation applications in meeting the demands of rapidly increasing mobile devices and other IoTs. …”
Get full text
Get full text
Article
