Search Results - (( mobile applications cloud algorithm ) OR ( its application during algorithm ))*

Refine Results
  1. 1

    Enhancing user authentication for cloud web-based application / Detar Beqo by Detar , Beqo

    Published 2018
    “…We have developed a cloud-based application that adapts the enhanced authentication method, and its security measurement were evaluated using IBM Application Security on Cloud tool. …”
    Get full text
    Get full text
    Get full text
    Thesis
  2. 2

    MelScan: An Android Application for Early Detection of Melanoma by Nyambang, Edwin

    Published 2014
    “…Due to time constraints, the scope of this study was narrowed to analyzing current image processing technology used in melanoma detection, especially on the Android mobile platform, developing an Android application that can use one of the image processing algorithms for melanoma detection, and to improve accuracy of melanoma detection, in particular during its early stages. …”
    Get full text
    Get full text
    Final Year Project
  3. 3
  4. 4

    Dynamic Task Offloading Algorithm for optimising IoT network quality of service in the Mobile-Fog-Cloud System by Nwogbaga, Nweso Emmanuel

    Published 2023
    “…Most times, the approach of relying on cloud infrastructure for IoT application analysis may be inefficient in terms of the limited battery life of the mobile devices, resource allocation algorithm delay, and computational offloading processes that sometimes increases the response time. …”
    Get full text
    Get full text
    Thesis
  5. 5

    Process state synchronization for mobility support in mobile cloud computing / Ejaz Ahmed by Ejaz, Ahmed

    Published 2016
    “…This research addresses the effect of mobility on application execution for mobile cloud-based interactive applications. …”
    Get full text
    Get full text
    Thesis
  6. 6

    Smart room system with dual authentication by Harun, Muhammad Hazmi, Abdul Rahid@Abdul Rashid, Nurul Najwa

    Published 2025
    “…In addition, a mobile application enables the administrator to monitor the door lock state either locked or unlocked, temperature, humidity, and LED light status either on or off, as well as change the LED light remotely. …”
    Get full text
    Get full text
    Get full text
    Article
  7. 7
  8. 8
  9. 9

    Secure policies for the distributed virtual machines in mobile cloud computing by Annane, Boubakeur

    Published 2020
    “…Mobile Cloud Computing (MCC) is a combination of cloud computing and mobile computing through wireless technology in order to overcome mobile devices' resource limitations. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  10. 10

    Computer remote monitoring via mobile phones using socket programming / Samih Omer Fadlelmola Elkhider by Omer Fadlelmola Elkhider, Samih

    Published 2011
    “…Sockets programming is one f the most basic and useful method of achieving any client server connectivity. The approach of the mobile cloud is clearly occurring with web host servers expands thus large number of data around the world stored in huge servers, consumers of mobile devices and small computing devices have high performance expectations usually, therefore mobile cloud computing theorizes that the cloud will soon become a disruptive force in the mobile world, eventually becoming the dominant way in which mobile applications operates. …”
    Get full text
    Get full text
    Thesis
  11. 11
  12. 12

    Mobile agent based multi-layer security framework for cloud data centers by Uddin, Mueen, Memon, Jamshed, Alsaqour, Raed A., Shah, Asadullah, Abdul Rozan, Mohd Zaidi

    Published 2015
    “…Objective:This paper proposes a new mobile agent based cloud security framework comprising four different security and authentication layers to establish the trust relationship between two entities before using cloud services. …”
    Get full text
    Get full text
    Get full text
    Article
  13. 13

    Task offloading paradigm in mobile edge computing-current issues, adopted approaches, and future directions by Akhlaqi, Mohammad Yahya, Mohd Hanapi, Zurina

    Published 2023
    “…Many enterprise companies migrate their services and applications to the cloud to benefit from cloud computing advantages. …”
    Get full text
    Get full text
    Article
  14. 14

    Hardware development of autonomous mobile robot based on actuating lidar by Mohd Romlay, Muhammad Rabani, Mohd Ibrahim, Azhar, Toha, Siti Fauziah, Rashid, Muhammad Mahbubur, Ahmad, Muhammad Syahmi

    Published 2022
    “…As opposed to a point cloud generated from high-end LiDAR sensors where many algorithms have been developed for object detection, sparse LiDAR point clouds still possess large room for improvement. …”
    Get full text
    Get full text
    Get full text
    Article
  15. 15

    Autonomous mobile robots path planning with integrative edge cloud-based ant colony optimization by Nor Azmi, Siti Nur Lyana Karmila, Anwar Apandi, Nur Ilyana, Rafique, Majid, Muhammad, Nor Aishah

    Published 2025
    “…In recent years, Automated Mobile Robots (AMRs) have gained significant attention in industry and research applications, requiring efficient path-planning algorithms to optimize task performance. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  16. 16

    Integrated examination and analysis model for improving mobile cloud forensic investigation by Alnajjar, Ibrahim Ali Mohammad

    Published 2022
    “…Advanced forensic techniques become inevitable to investigate the malicious activities in Cloud-based Mobile Applications (CMA). It is challenging to analyse the casespecific evidential artifact from the Mobile Cloud Computing (MCC) environment under forensically sound conditions. …”
    Get full text
    Get full text
    Thesis
  17. 17

    WURFL detection engine using cosine string similarity algortlhm / Illiasaak Ahmad ... [et al.] by Ahmad, Illiasaak, Anak Buja, Alya@Geogiana, Abdullah Sani, Anis Shobirin

    Published 2013
    “…In a cloud computing environment, a device can be varied from a high-end computing workstation to mobile devices like smart phone or PDA to respond efficiently to such diversified environment, a cloud-based system must possess mechanisms that allow applications requested delivered fit according to the client device's characteristics and capabilities. …”
    Get full text
    Get full text
    Research Reports
  18. 18

    Dynamic and adaptive execution models for data stream mining applications in mobile edge cloud computing systems / Muhammad Habib Ur Rehman by Muhammad Habib , Ur Rehman

    Published 2016
    “…Considering the complexity factors, existing literature proposes static execution models for MDSM applications. The execution models are based on either standalone mobile devices, mobile-to-mobile, mobile-to-edge, or mobile-to-cloud communication models. …”
    Get full text
    Get full text
    Get full text
    Thesis
  19. 19

    Process migration-based computational offloading framework for IOT-supported mobile edge/cloud computing by Abdullah Yousafzai, Ibrar Yaqoob, Muhammad Imran, Abdullah Gani, Rafidah Md Noor

    Published 2019
    “…Mobile cloud computing and mobile edge computing (MEC) are emerging technologies that can meet the aforementioned requirements using offloading algorithms. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  20. 20

    Process Migration-Based Computational Offloading Framework for IoT-Supported Mobile Edge/Cloud Computing by Yousafzai, Abdullah, Yaqoob, Ibrar, Imran, Muhammad, Gani, Abdullah, Noor, Rafidah Md

    Published 2020
    “…Mobile cloud computing and mobile edge computing (MEC) are emerging technologies that can meet the aforementioned requirements using offloading algorithms. …”
    Get full text
    Get full text
    Article