Search Results - (( mobile applications using algorithm ) OR ( based application server algorithm ))*
Search alternatives:
- mobile applications »
- applications using »
- application server »
- based application »
- server algorithm »
- using algorithm »
-
1
Objects tracking from natural features in mobile augmented reality
Published 2013“…The pose matrix from extracted features was calculated by Homography. The adapted algorithm was tested in a mobile AR-prototype application using iPhone. …”
Get full text
Get full text
Get full text
Article -
2
-
3
Maximizing Lifetime of Homogeneous Wireless Sensor Network through Energy Efficient Clustering Method
Published 2010Get full text
Get full text
Citation Index Journal -
4
-
5
A malware analysis and detection system for mobile devices / Ali Feizollah
Published 2017“…We then used feature selection algorithms and deep learning algorithms to build a detection model. …”
Get full text
Get full text
Get full text
Thesis -
6
ABC-PSO for vertical handover in heterogeneous wireless networks
Published 2017“…The ABC-PSO algorithm has been optimized to achieve small cost function that are powered using the IEEE 802.21 standard taking into account different available wireless networks, the application requirements and the user preferences to improve QoS. …”
Get full text
Get full text
Get full text
Get full text
Article -
7
Data hiding mobile application by using encryption and decryption / Nuha Bakizah Mohd Asri
Published 2021“…Encryption and decryption are used for image-based authentication here. Encode is mainly achieved by changing the message into other code that any third-party will not understand, one with the database of the user and one with the database of the server. …”
Get full text
Get full text
Student Project -
8
Process Migration-Based Computational Offloading Framework for IoT-Supported Mobile Edge/Cloud Computing
Published 2020“…Mobile cloud computing and mobile edge computing (MEC) are emerging technologies that can meet the aforementioned requirements using offloading algorithms. …”
Get full text
Get full text
Article -
9
-
10
Secure policies for the distributed virtual machines in mobile cloud computing
Published 2020“…Several experiments were conducted using real-world healthcare distributed application in terms of efficiency, coverage and execution time. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
11
Process migration-based computational offloading framework for IOT-supported mobile edge/cloud computing
Published 2019“…Mobile cloud computing and mobile edge computing (MEC) are emerging technologies that can meet the aforementioned requirements using offloading algorithms. …”
Get full text
Get full text
Get full text
Get full text
Article -
12
Predictive Mobility Management Using Optimized Delays And Security Enhancements In IEEE 802.11 Infrastructure Networks
Published 2008“…Location tracking without the use of GPS (Global Positioning System) works by using a centralized server that helps to locate the current location of the mobile node within a restricted area, based on the Received Signal Strength Indicator (RSSI) value that the mobile node receives from the neighbouring access points. …”
Get full text
Get full text
Get full text
Thesis -
13
Mobile agent based multi-layer security framework for cloud data centers
Published 2015“…Findings:The framework uses authenticated mobile agents from both client and cloud server provider to perform the task on behalf of users to establish trustworthy computing relationship. …”
Get full text
Get full text
Get full text
Article -
14
Dynamic and adaptive execution models for data stream mining applications in mobile edge cloud computing systems / Muhammad Habib Ur Rehman
Published 2016“…At platform level, the MDSM applications need to seamlessly switch the execution processes among mobile devices, edge servers, and cloud computing servers. …”
Get full text
Get full text
Get full text
Thesis -
15
Network game (Literati) / Chung Mei Kuen
Published 2003“…Java applet is a well-known and widely used example of mobile code (a variation on the traditional client-server model). …”
Get full text
Get full text
Thesis -
16
Wi-Fi signal strengths database construction for indoor positioning systems using Wi-Fi RFID
Published 2013Get full text
Get full text
Conference or Workshop Item -
17
Improving the quality of service of fixed WiMAX networks by decreasing application response time using a distributed model
Published 2022“…The performance of the network was increased by the deployment of more Base Stations (BSs), Subscriber Stations, and the utilization of client-server Base Stations that were chosen by the Nearest Neighborhood Algorithm that was devised…”
Get full text
Get full text
Get full text
Get full text
Article -
18
SnapShare: AI Trained Mobile App to Share Snaps Automatically
Published 2020“…This study proposes a SnapShare mobile application that uses Face Recognition Algorithms to classify individuals in the photos and automatically shares photos with recognized individuals. …”
Get full text
Get full text
Get full text
Article -
19
-
20
A resource-aware content adaptation approach for e-learning environment / Mohd Faisal Ibrahim
Published 2017“…Second, network aware applications architecture for E-Learning system was also proposed to dynamically adjust the users' demand based on network resources. …”
Get full text
Get full text
Thesis
