Search Results - (( mobile application cloud algorithm ) OR ( based application during algorithm ))*
Search alternatives:
- application during »
- application cloud »
- based application »
- during algorithm »
- cloud algorithm »
-
1
Enhancing user authentication for cloud web-based application / Detar Beqo
Published 2018“…We have developed a cloud-based application that adapts the enhanced authentication method, and its security measurement were evaluated using IBM Application Security on Cloud tool. …”
Get full text
Get full text
Get full text
Thesis -
2
E-history Malaysian secondary school textbook using TF-IDF algorithm and text visualization / Nur Hafizah Mohd Ridzuan
Published 2020“…Results show that all functions in the system is fully functioned and well-integrated plus most of the users provide good and promising feedbacks during the usability testing. As the future works, the system can be improved by applied the system using mobile apps application to make the system can have easier access and implementation of another technique such as semantic-based searching and the usage of stemming algorithm would be considered to produce more meaningful results.…”
Get full text
Get full text
Thesis -
3
MelScan: An Android Application for Early Detection of Melanoma
Published 2014“…Due to time constraints, the scope of this study was narrowed to analyzing current image processing technology used in melanoma detection, especially on the Android mobile platform, developing an Android application that can use one of the image processing algorithms for melanoma detection, and to improve accuracy of melanoma detection, in particular during its early stages. …”
Get full text
Get full text
Final Year Project -
4
ABC-PSO for vertical handover in heterogeneous wireless networks
Published 2017“…Cloud computing is currently emerging quickly as a client-server technology structure and, currently, providing distributed service applications. …”
Get full text
Get full text
Get full text
Get full text
Article -
5
A malware analysis and detection system for mobile devices / Ali Feizollah
Published 2017“…Power consumption is one major constraint that makes traditional detection methods impractical for mobile devices, while cloud-based techniques raise many privacy concerns. …”
Get full text
Get full text
Get full text
Thesis -
6
-
7
Detection of Yawning and Eye Closure for Monitoring Driver’s Drowsiness
Published 2020“…By utilising cloud services, computational expenses for executing the image processing algorithms on the mobile device can be minimised. …”
Get full text
Get full text
Get full text
Final Year Project Report / IMRAD -
8
Dynamic Task Offloading Algorithm for optimising IoT network quality of service in the Mobile-Fog-Cloud System
Published 2023“…Most times, the approach of relying on cloud infrastructure for IoT application analysis may be inefficient in terms of the limited battery life of the mobile devices, resource allocation algorithm delay, and computational offloading processes that sometimes increases the response time. …”
Get full text
Get full text
Thesis -
9
Process state synchronization for mobility support in mobile cloud computing / Ejaz Ahmed
Published 2016“…This research addresses the effect of mobility on application execution for mobile cloud-based interactive applications. …”
Get full text
Get full text
Thesis -
10
Implementing Location-Based Cryptography on Mobile Application Design to Secure Data in Cloud Storage
Published 2024journal::journal article -
11
On protecting data storage in mobile cloud computing paradigm
Published 2014Get full text
Get full text
Get full text
Article -
12
Secure policies for the distributed virtual machines in mobile cloud computing
Published 2020“…Mobile Cloud Computing (MCC) is a combination of cloud computing and mobile computing through wireless technology in order to overcome mobile devices' resource limitations. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
13
Computer remote monitoring via mobile phones using socket programming / Samih Omer Fadlelmola Elkhider
Published 2011“…Sockets programming is one f the most basic and useful method of achieving any client server connectivity. The approach of the mobile cloud is clearly occurring with web host servers expands thus large number of data around the world stored in huge servers, consumers of mobile devices and small computing devices have high performance expectations usually, therefore mobile cloud computing theorizes that the cloud will soon become a disruptive force in the mobile world, eventually becoming the dominant way in which mobile applications operates. …”
Get full text
Get full text
Thesis -
14
Energy-Aware Fault Tolerant Task offloading of Mobile Cloud Computing
Published 2023Conference Paper -
15
Mobile agent based multi-layer security framework for cloud data centers
Published 2015“…Objective:This paper proposes a new mobile agent based cloud security framework comprising four different security and authentication layers to establish the trust relationship between two entities before using cloud services. …”
Get full text
Get full text
Get full text
Article -
16
Task offloading paradigm in mobile edge computing-current issues, adopted approaches, and future directions
Published 2023“…Many enterprise companies migrate their services and applications to the cloud to benefit from cloud computing advantages. …”
Get full text
Get full text
Article -
17
Hardware development of autonomous mobile robot based on actuating lidar
Published 2022“…As opposed to a point cloud generated from high-end LiDAR sensors where many algorithms have been developed for object detection, sparse LiDAR point clouds still possess large room for improvement. …”
Get full text
Get full text
Get full text
Article -
18
Autonomous mobile robots path planning with integrative edge cloud-based ant colony optimization
Published 2025“…In recent years, Automated Mobile Robots (AMRs) have gained significant attention in industry and research applications, requiring efficient path-planning algorithms to optimize task performance. …”
Get full text
Get full text
Get full text
Get full text
Article -
19
Integrated examination and analysis model for improving mobile cloud forensic investigation
Published 2022“…Advanced forensic techniques become inevitable to investigate the malicious activities in Cloud-based Mobile Applications (CMA). It is challenging to analyse the casespecific evidential artifact from the Mobile Cloud Computing (MCC) environment under forensically sound conditions. …”
Get full text
Get full text
Thesis -
20
WURFL detection engine using cosine string similarity algortlhm / Illiasaak Ahmad ... [et al.]
Published 2013“…In a cloud computing environment, a device can be varied from a high-end computing workstation to mobile devices like smart phone or PDA to respond efficiently to such diversified environment, a cloud-based system must possess mechanisms that allow applications requested delivered fit according to the client device's characteristics and capabilities. …”
Get full text
Get full text
Research Reports
