Search Results - (( mobile applications cloud algorithm ) OR ( its application a algorithm ))*

Refine Results
  1. 1
  2. 2

    Computer remote monitoring via mobile phones using socket programming / Samih Omer Fadlelmola Elkhider by Omer Fadlelmola Elkhider, Samih

    Published 2011
    “…In this dissertation a mobile cloud will be under consideration when designing the prototype, it is proven that mobile processors are tiny processors and could only handle a limited resources, thus the ability of making the applications processes in server, leaving the mobile clients a small part of only accessing data and interact with it. …”
    Get full text
    Get full text
    Thesis
  3. 3

    A new priority rule cloud scheduling technique that utilizes gaps to increase the efficiency of jobs distribution by Saydul Akbar, Murad

    Published 2023
    “…These limitations lead to the poor performance of cloud-based mobile applications and other cloud services. …”
    Get full text
    Get full text
    Thesis
  4. 4

    Enhancing user authentication for cloud web-based application / Detar Beqo by Detar , Beqo

    Published 2018
    “…We have developed a cloud-based application that adapts the enhanced authentication method, and its security measurement were evaluated using IBM Application Security on Cloud tool. …”
    Get full text
    Get full text
    Get full text
    Thesis
  5. 5

    Cloudlet deployment and task offloading in mobile edge computing using variable-length whale and differential evolution optimization and analytical hierarchical process for decisio... by Daba, Layth Muwafaq Abdulhussein

    Published 2023
    “…Comparing this developed algorithm with other algorithms shows its superiority in multi-objective optimization (MOO) evaluation metrics. …”
    Get full text
    Get full text
    Thesis
  6. 6
  7. 7

    MelScan: An Android Application for Early Detection of Melanoma by Nyambang, Edwin

    Published 2014
    “…This project was aimed at making a mobile application that can be used by civilians in the rural areas to detect melanoma at its early stages, because it was difficult for them to get help from dermatologists in rural areas, as well as getting access to the proper equipment for melanoma detection. …”
    Get full text
    Get full text
    Final Year Project
  8. 8

    Dynamic Task Offloading Algorithm for optimising IoT network quality of service in the Mobile-Fog-Cloud System by Nwogbaga, Nweso Emmanuel

    Published 2023
    “…Most times, the approach of relying on cloud infrastructure for IoT application analysis may be inefficient in terms of the limited battery life of the mobile devices, resource allocation algorithm delay, and computational offloading processes that sometimes increases the response time. …”
    Get full text
    Get full text
    Thesis
  9. 9
  10. 10

    Process state synchronization for mobility support in mobile cloud computing / Ejaz Ahmed by Ejaz, Ahmed

    Published 2016
    “…This research addresses the effect of mobility on application execution for mobile cloud-based interactive applications. …”
    Get full text
    Get full text
    Thesis
  11. 11
  12. 12
  13. 13

    Secure policies for the distributed virtual machines in mobile cloud computing by Annane, Boubakeur

    Published 2020
    “…Mobile Cloud Computing (MCC) is a combination of cloud computing and mobile computing through wireless technology in order to overcome mobile devices' resource limitations. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  14. 14
  15. 15

    Adaptive and Priority-based Resource Allocation for Efficient Resources Utilization in Mobile Edge Computing by Sharif, Z., Jung, L.T., Razzak, I., Alazab, M.

    Published 2021
    “…Edge computing (EC) offers cloud-like services at the edge of mobile networks to satisfy the delay-sensitive and rapid computation applications in meeting the demands of rapidly increasing mobile devices and other IoTs. …”
    Get full text
    Get full text
    Article
  16. 16
  17. 17

    Smart room system with dual authentication by Harun, Muhammad Hazmi, Abdul Rahid@Abdul Rashid, Nurul Najwa

    Published 2025
    “…A numeric keypad for password entry after face verification, a solenoid sensor for door locking, an LED light that can be controlled remotely via a mobile application, a buzzer for detecting failed attempts, and a DHT11 sensor for humidity and temperature monitoring inside the smart room are all equipment of additional IoT hardware. …”
    Get full text
    Get full text
    Get full text
    Article
  18. 18

    Mobile agent based multi-layer security framework for cloud data centers by Uddin, Mueen, Memon, Jamshed, Alsaqour, Raed A., Shah, Asadullah, Abdul Rozan, Mohd Zaidi

    Published 2015
    “…Objective:This paper proposes a new mobile agent based cloud security framework comprising four different security and authentication layers to establish the trust relationship between two entities before using cloud services. …”
    Get full text
    Get full text
    Get full text
    Article
  19. 19

    Task offloading paradigm in mobile edge computing-current issues, adopted approaches, and future directions by Akhlaqi, Mohammad Yahya, Mohd Hanapi, Zurina

    Published 2023
    “…Many enterprise companies migrate their services and applications to the cloud to benefit from cloud computing advantages. …”
    Get full text
    Get full text
    Article
  20. 20

    Hardware development of autonomous mobile robot based on actuating lidar by Mohd Romlay, Muhammad Rabani, Mohd Ibrahim, Azhar, Toha, Siti Fauziah, Rashid, Muhammad Mahbubur, Ahmad, Muhammad Syahmi

    Published 2022
    “…As opposed to a point cloud generated from high-end LiDAR sensors where many algorithms have been developed for object detection, sparse LiDAR point clouds still possess large room for improvement. …”
    Get full text
    Get full text
    Get full text
    Article