Search Results - (( mobile application server algorithm ) OR ( web application using algorithm ))*
Search alternatives:
- application server »
- server algorithm »
- web application »
- using algorithm »
-
1
A framework of rough cultural algorithms in optimizing mobile web caching performance
Published 2007“…Nonetheless, users frequently experience poor performance in accessing web sites or downloading files primarily when they use mobile devices due to their limited storage, processing, display, power and communication resources.. …”
Get full text
Get full text
Article -
2
Enhancing XSS vulnerability detection and removal in web applications using genetic algorithms
Published 2024“…XSS-DETREM has been evaluated empirically using a data set of JSP and Android web applications that have been used in previous studies. …”
Get full text
Get full text
Get full text
Thesis -
3
Computer remote monitoring via mobile phones using socket programming / Samih Omer Fadlelmola Elkhider
Published 2011“…The approach of the mobile cloud is clearly occurring with web host servers expands thus large number of data around the world stored in huge servers, consumers of mobile devices and small computing devices have high performance expectations usually, therefore mobile cloud computing theorizes that the cloud will soon become a disruptive force in the mobile world, eventually becoming the dominant way in which mobile applications operates. …”
Get full text
Get full text
Thesis -
4
Objects tracking from natural features in mobile augmented reality
Published 2013“…The pose matrix from extracted features was calculated by Homography. The adapted algorithm was tested in a mobile AR-prototype application using iPhone. …”
Get full text
Get full text
Get full text
Article -
5
-
6
Data hiding mobile application by using encryption and decryption / Nuha Bakizah Mohd Asri
Published 2021“…The phenomenal growth of e-commerce applications in the World Wide Web requires the need to increase the security of data communications over the Internet, especially for highly sensitive document transfer. …”
Get full text
Get full text
Student Project -
7
A resource-aware content adaptation approach for e-learning environment / Mohd Faisal Ibrahim
Published 2017“…The rapid growth of web and mobile technologies has allowed people to access E-Learning content from heterogeneous client devices. …”
Get full text
Get full text
Thesis -
8
Monitoring cathodic protection system for underground pipeline
Published 2013“…As the world is emerging into mobile technology, an innovative plan was made to combine traditional monitoring system into smart phones mobile application. …”
Get full text
Get full text
Thesis -
9
Network game (Literati) / Chung Mei Kuen
Published 2003“…Java applet is a well-known and widely used example of mobile code (a variation on the traditional client-server model). …”
Get full text
Get full text
Thesis -
10
Design of monitoring and control system of electricity power limiter using internet of things
Published 2025“…Users can access information related to electricity usage via web-based or mobile applications that provide data display in the form of a reports. …”
Get full text
Get full text
Book Section -
11
Intuitive content management system via manipulation and duplication with if-else rules classification
Published 2018“…However, static websites load faster than dynamic ones, since the content is delivered as-is and can be cached by a content delivery network (CDN), and the web server does not need to perform any application logic or database queries. …”
Get full text
Get full text
Thesis -
12
-
13
Embedded gateway services for Internet of Things applications in ubiquitous healthcare
Published 2014Get full text
Get full text
Conference or Workshop Item -
14
On protecting data storage in mobile cloud computing paradigm
Published 2014Get full text
Get full text
Get full text
Article -
15
Mobile application design for protecting the data in cloud using enhanced technique of encryption
Published 2024journal::journal article -
16
Design and implementation of a private and public key crypto processor for next-generation it security applications
Published 2006“…This paper presents the design and implementation of a crypto processor, a special-purpose embedded system optimized for the execution of cryptographic algorithms in hardware. This cryptosystem can be used in wide range of electronic devices, which include PCs, PDAs, wireless handsets, smart cards, hardware security modules, network appliances, such as routers, gateways, firewalls, storage and web servers. …”
Get full text
Get full text
Get full text
Article -
17
Process state synchronization for mobility support in mobile cloud computing / Ejaz Ahmed
Published 2016“…Mobile Cloud Computing (MCC) enables the resource-constrained mobile devices to execute the compute-intensive mobile applications either in client/server model or through cyber foraging of the tasks to the cloud servers. …”
Get full text
Get full text
Thesis -
18
Smart energy meter based on a long-range wide-area network for a stand-alone photovoltaic system
Published 2022“…The AllThingsTalkMaker IoT server is integrated into the TTN to be accessed using Web/mobile application interfaces. …”
Get full text
Get full text
Get full text
Article -
19
-
20
