Search Results - (( leave application new algorithm ) OR ( java applications cloud algorithm ))*
Search alternatives:
- applications cloud »
- leave application »
- java applications »
- application new »
- cloud algorithm »
- new algorithm »
-
1
Securing cloud data system (SCDS) for key exposure using AES algorithm
Published 2021“…After that we use to build securing cloud data system (SCDS) for key exposure using the AES algorithm for encrypting and decrypting our website cloud data and files. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
2
Attribute reduction based scheduling algorithm with enhanced hybrid genetic algorithm and particle swarm optimization for optimal device selection
Published 2022“…Enhance hybrid genetic algorithm and particle Swarm optimization are developed to select the optimal device in either fog or cloud. …”
Get full text
Get full text
Article -
3
Computer remote monitoring via mobile phones using socket programming / Samih Omer Fadlelmola Elkhider
Published 2011“…The approach of the mobile cloud is clearly occurring with web host servers expands thus large number of data around the world stored in huge servers, consumers of mobile devices and small computing devices have high performance expectations usually, therefore mobile cloud computing theorizes that the cloud will soon become a disruptive force in the mobile world, eventually becoming the dominant way in which mobile applications operates. …”
Get full text
Get full text
Thesis -
4
-
5
-
6
An extended ID3 decision tree algorithm for spatial data
Published 2011Get full text
Get full text
Conference or Workshop Item -
7
A new multicast-based architecture to support host mobility in IPv6
Published 2003Get full text
Get full text
Conference or Workshop Item -
8
A malware analysis and detection system for mobile devices / Ali Feizollah
Published 2017“…We then used feature selection algorithms and deep learning algorithms to build a detection model. …”
Get full text
Get full text
Get full text
Thesis -
9
A new multicast-based architecture to support host mobility in IPv6
Published 2003Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
10
-
11
Classification model for hotspot occurrences using spatial decision tree algorithm
Published 2013“…As the ID3 algorithm that uses information gain in the attribute selection, the proposed algorithm uses spatial information gain to choose the best splitting layer from a set of explanatory layers. …”
Get full text
Get full text
Get full text
Article -
12
An efficient scalable batch-rekeying scheme for secure multicast communication using multiple logical key trees
Published 2014“…Furthermore, batch rekeying is proposed to reduce the rekeying cost by preform rekeying in predefined intervals instead of updating the keys after each join or leave. In this paper, a new scheme based on multiple key trees is proposed. …”
Get full text
Get full text
Get full text
Article -
13
A new mobile malware classification for call log exploitation
Published 2024journal::journal article -
14
Batch mode heuristic approaches for efficient task scheduling in grid computing system
Published 2016“…To address these problems, this research proposes three new distributed static batch mode inspired algorithms. …”
Get full text
Get full text
Get full text
Thesis -
15
Simple Screening Method of Maize Disease using Machine Learning
Published 2019“…Fuzzy C-Means is a new algorithm and very efficient to be used in object detection. …”
Get full text
Get full text
Get full text
Article -
16
-
17
-
18
Classification model for hotspot occurrences using a decision tree method
Published 2011“…This work demonstrates the application of a decision tree algorithm, namely the C4.5 algorithm, to develop a classification model from forest fire data in the Rokan Hilir district, Indonesia. …”
Get full text
Get full text
Get full text
Article -
19
Authenticated collaborative key agreement for dynamic peer groups
Published 2009Get full text
Working Paper -
20
Quality of service multicast routing protocol for large scale MANETs
Published 2009“…Also, it achieves a significant reduction in processing overhead than non hierarchical algorithm…”
Get full text
Get full text
Get full text
Proceeding Paper
