Search Results - (( mobile applications cloud algorithm ) OR ( based applications using algorithm ))*
Search alternatives:
- mobile applications »
- applications cloud »
- based applications »
- applications using »
- cloud algorithm »
- using algorithm »
-
1
Implementing Location-Based Cryptography on Mobile Application Design to Secure Data in Cloud Storage
Published 2024journal::journal article -
2
Autonomous mobile robots path planning with integrative edge cloud-based ant colony optimization
Published 2025“…To address these challenges, this study proposes an Integrative Edge Cloud-Based Ant Colony Optimization (IECACO) algorithm. …”
Get full text
Get full text
Get full text
Get full text
Article -
3
Hardware development of autonomous mobile robot based on actuating lidar
Published 2022“…As opposed to a point cloud generated from high-end LiDAR sensors where many algorithms have been developed for object detection, sparse LiDAR point clouds still possess large room for improvement. …”
Get full text
Get full text
Get full text
Article -
4
Task offloading paradigm in mobile edge computing-current issues, adopted approaches, and future directions
Published 2023“…Many enterprise companies migrate their services and applications to the cloud to benefit from cloud computing advantages. …”
Get full text
Get full text
Article -
5
Attribute reduction based scheduling algorithm with enhanced hybrid genetic algorithm and particle swarm optimization for optimal device selection
Published 2022“…Therefore, in this paper, we proposed Dynamic tasks scheduling algorithm based on attribute reduction with an enhanced hybrid Genetic Algorithm and Particle Swarm Optimization for optimal device selection. …”
Get full text
Get full text
Article -
6
WURFL detection engine using cosine string similarity algortlhm / Illiasaak Ahmad ... [et al.]
Published 2013“…In a cloud computing environment, a device can be varied from a high-end computing workstation to mobile devices like smart phone or PDA to respond efficiently to such diversified environment, a cloud-based system must possess mechanisms that allow applications requested delivered fit according to the client device's characteristics and capabilities. …”
Get full text
Get full text
Research Reports -
7
Mobile agent based multi-layer security framework for cloud data centers
Published 2015“…Objective:This paper proposes a new mobile agent based cloud security framework comprising four different security and authentication layers to establish the trust relationship between two entities before using cloud services. …”
Get full text
Get full text
Get full text
Article -
8
Enhancing user authentication for cloud web-based application / Detar Beqo
Published 2018“…Motivated by a number of security experts in cloud computing, we proposed an innovative solution of authentication for cloud web-based applications. …”
Get full text
Get full text
Get full text
Thesis -
9
E-history Malaysian secondary school textbook using TF-IDF algorithm and text visualization / Nur Hafizah Mohd Ridzuan
Published 2020“…As the future works, the system can be improved by applied the system using mobile apps application to make the system can have easier access and implementation of another technique such as semantic-based searching and the usage of stemming algorithm would be considered to produce more meaningful results.…”
Get full text
Get full text
Thesis -
10
Process migration-based computational offloading framework for IOT-supported mobile edge/cloud computing
Published 2019“…Mobile cloud computing and mobile edge computing (MEC) are emerging technologies that can meet the aforementioned requirements using offloading algorithms. …”
Get full text
Get full text
Get full text
Get full text
Article -
11
Secure policies for the distributed virtual machines in mobile cloud computing
Published 2020“…Mobile Cloud Computing (MCC) is a combination of cloud computing and mobile computing through wireless technology in order to overcome mobile devices' resource limitations. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
12
Process Migration-Based Computational Offloading Framework for IoT-Supported Mobile Edge/Cloud Computing
Published 2020“…Mobile cloud computing and mobile edge computing (MEC) are emerging technologies that can meet the aforementioned requirements using offloading algorithms. …”
Get full text
Get full text
Article -
13
Integrated examination and analysis model for improving mobile cloud forensic investigation
Published 2022“…Advanced forensic techniques become inevitable to investigate the malicious activities in Cloud-based Mobile Applications (CMA). It is challenging to analyse the casespecific evidential artifact from the Mobile Cloud Computing (MCC) environment under forensically sound conditions. …”
Get full text
Get full text
Thesis -
14
Cloudlet deployment and task offloading in mobile edge computing using variable-length whale and differential evolution optimization and analytical hierarchical process for decisio...
Published 2023“…Furthermore, it enables non-dominated evaluation of solutions based on four objectives using crowding distance for selection. …”
Get full text
Get full text
Thesis -
15
Dynamic and adaptive execution models for data stream mining applications in mobile edge cloud computing systems / Muhammad Habib Ur Rehman
Published 2016“…Considering the complexity factors, existing literature proposes static execution models for MDSM applications. The execution models are based on either standalone mobile devices, mobile-to-mobile, mobile-to-edge, or mobile-to-cloud communication models. …”
Get full text
Get full text
Get full text
Thesis -
16
-
17
ABC-PSO for vertical handover in heterogeneous wireless networks
Published 2017“…The ABC-PSO algorithm has been optimized to achieve small cost function that are powered using the IEEE 802.21 standard taking into account different available wireless networks, the application requirements and the user preferences to improve QoS. …”
Get full text
Get full text
Get full text
Get full text
Article -
18
DEVELOPMENT OF POINT CLOUD DESCRIPTORS FOR ROBUST 3D RECOGNITION
Published 2015“…These limitation prevented object recognition algorithms from being implemented on embedded devices (e.g: smartphones) and mobile robots specially for mapping applications.…”
Get full text
Get full text
Thesis -
19
MelScan: An Android Application for Early Detection of Melanoma
Published 2014“…Due to time constraints, the scope of this study was narrowed to analyzing current image processing technology used in melanoma detection, especially on the Android mobile platform, developing an Android application that can use one of the image processing algorithms for melanoma detection, and to improve accuracy of melanoma detection, in particular during its early stages. …”
Get full text
Get full text
Final Year Project -
20
Dynamic Task Offloading Algorithm for optimising IoT network quality of service in the Mobile-Fog-Cloud System
Published 2023“…Most times, the approach of relying on cloud infrastructure for IoT application analysis may be inefficient in terms of the limited battery life of the mobile devices, resource allocation algorithm delay, and computational offloading processes that sometimes increases the response time. …”
Get full text
Get full text
Thesis
