Search Results - (( mobile application based algorithm ) OR ( _ applications cloud algorithm ))

Refine Results
  1. 1

    Dynamic Task Offloading Algorithm for optimising IoT network quality of service in the Mobile-Fog-Cloud System by Nwogbaga, Nweso Emmanuel

    Published 2023
    “…Finally, a Dynamic Task Offloading Algorithm (DTOA) based on rank accuracy estimation model to efficiently schedule tasks and resources in the Mobile-Fog-Cloud system is proposed. …”
    Get full text
    Get full text
    Thesis
  2. 2
  3. 3

    Process state synchronization for mobility support in mobile cloud computing / Ejaz Ahmed by Ejaz, Ahmed

    Published 2016
    “…This research addresses the effect of mobility on application execution for mobile cloud-based interactive applications. …”
    Get full text
    Get full text
    Thesis
  4. 4
  5. 5

    Hardware development of autonomous mobile robot based on actuating lidar by Mohd Romlay, Muhammad Rabani, Mohd Ibrahim, Azhar, Toha, Siti Fauziah, Rashid, Muhammad Mahbubur, Ahmad, Muhammad Syahmi

    Published 2022
    “…As opposed to a point cloud generated from high-end LiDAR sensors where many algorithms have been developed for object detection, sparse LiDAR point clouds still possess large room for improvement. …”
    Get full text
    Get full text
    Get full text
    Article
  6. 6

    Attribute reduction based scheduling algorithm with enhanced hybrid genetic algorithm and particle swarm optimization for optimal device selection by Nwogbaga, Nweso Emmanuel, Latip, Rohaya, Affendey, Lilly Suriani, Abdul Rahiman, Amir Rizaan

    Published 2022
    “…Therefore, in this paper, we proposed Dynamic tasks scheduling algorithm based on attribute reduction with an enhanced hybrid Genetic Algorithm and Particle Swarm Optimization for optimal device selection. …”
    Get full text
    Get full text
    Article
  7. 7

    Task offloading paradigm in mobile edge computing-current issues, adopted approaches, and future directions by Akhlaqi, Mohammad Yahya, Mohd Hanapi, Zurina

    Published 2023
    “…Many enterprise companies migrate their services and applications to the cloud to benefit from cloud computing advantages. …”
    Get full text
    Get full text
    Article
  8. 8

    WURFL detection engine using cosine string similarity algortlhm / Illiasaak Ahmad ... [et al.] by Ahmad, Illiasaak, Anak Buja, Alya@Geogiana, Abdullah Sani, Anis Shobirin

    Published 2013
    “…In a cloud computing environment, a device can be varied from a high-end computing workstation to mobile devices like smart phone or PDA to respond efficiently to such diversified environment, a cloud-based system must possess mechanisms that allow applications requested delivered fit according to the client device's characteristics and capabilities. …”
    Get full text
    Get full text
    Research Reports
  9. 9

    A new priority rule cloud scheduling technique that utilizes gaps to increase the efficiency of jobs distribution by Saydul Akbar, Murad

    Published 2023
    “…These limitations lead to the poor performance of cloud-based mobile applications and other cloud services. …”
    Get full text
    Get full text
    Thesis
  10. 10

    Enhancing user authentication for cloud web-based application / Detar Beqo by Detar , Beqo

    Published 2018
    “…We have developed a cloud-based application that adapts the enhanced authentication method, and its security measurement were evaluated using IBM Application Security on Cloud tool. …”
    Get full text
    Get full text
    Get full text
    Thesis
  11. 11

    Mobile agent based multi-layer security framework for cloud data centers by Uddin, Mueen, Memon, Jamshed, Alsaqour, Raed A., Shah, Asadullah, Abdul Rozan, Mohd Zaidi

    Published 2015
    “…Objective:This paper proposes a new mobile agent based cloud security framework comprising four different security and authentication layers to establish the trust relationship between two entities before using cloud services. …”
    Get full text
    Get full text
    Get full text
    Article
  12. 12

    Secure policies for the distributed virtual machines in mobile cloud computing by Annane, Boubakeur

    Published 2020
    “…Mobile Cloud Computing (MCC) is a combination of cloud computing and mobile computing through wireless technology in order to overcome mobile devices' resource limitations. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  13. 13
  14. 14

    Process migration-based computational offloading framework for IOT-supported mobile edge/cloud computing by Abdullah Yousafzai, Ibrar Yaqoob, Muhammad Imran, Abdullah Gani, Rafidah Md Noor

    Published 2019
    “…Mobile cloud computing and mobile edge computing (MEC) are emerging technologies that can meet the aforementioned requirements using offloading algorithms. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  15. 15

    Process Migration-Based Computational Offloading Framework for IoT-Supported Mobile Edge/Cloud Computing by Yousafzai, Abdullah, Yaqoob, Ibrar, Imran, Muhammad, Gani, Abdullah, Noor, Rafidah Md

    Published 2020
    “…Mobile cloud computing and mobile edge computing (MEC) are emerging technologies that can meet the aforementioned requirements using offloading algorithms. …”
    Get full text
    Get full text
    Article
  16. 16

    E-history Malaysian secondary school textbook using TF-IDF algorithm and text visualization / Nur Hafizah Mohd Ridzuan by Mohd Ridzuan, Nur Hafizah

    Published 2020
    “…As the future works, the system can be improved by applied the system using mobile apps application to make the system can have easier access and implementation of another technique such as semantic-based searching and the usage of stemming algorithm would be considered to produce more meaningful results.…”
    Get full text
    Get full text
    Thesis
  17. 17
  18. 18

    Integrated examination and analysis model for improving mobile cloud forensic investigation by Alnajjar, Ibrahim Ali Mohammad

    Published 2022
    “…Advanced forensic techniques become inevitable to investigate the malicious activities in Cloud-based Mobile Applications (CMA). It is challenging to analyse the casespecific evidential artifact from the Mobile Cloud Computing (MCC) environment under forensically sound conditions. …”
    Get full text
    Get full text
    Thesis
  19. 19
  20. 20