Search Results - (( based verification cloud algorithm ) OR ( java implication based algorithm ))

  • Showing 1 - 11 results of 11
Refine Results
  1. 1
  2. 2

    Mobile agent based multi-layer security framework for cloud data centers by Uddin, Mueen, Memon, Jamshed, Alsaqour, Raed A., Shah, Asadullah, Abdul Rozan, Mohd Zaidi

    Published 2015
    “…Objective:This paper proposes a new mobile agent based cloud security framework comprising four different security and authentication layers to establish the trust relationship between two entities before using cloud services. …”
    Get full text
    Get full text
    Get full text
    Article
  3. 3

    Secure lightweight client for cloud-based E-Health Model by Zhang, Xiaowei

    Published 2023
    “…In this study, a secure cloud-based electronic health system model (SCBEH) is proposed. …”
    Get full text
    Get full text
    Get full text
    Thesis
  4. 4

    Internet of Things-based Home Automation with Network Mapper and MQTT Protocol by Alam T., Rokonuzzaman M., Sarker S., Abadin A.F.M.Z., Debnath T., Hossain M.I.

    Published 2025
    “…Standard cloud-based IoT systems can't fully function in areas with unstable internet. …”
    Article
  5. 5

    Comparison of Landsat 8, Sentinel-2 and spectral indices combinations for Google Earth Engine-based land use mapping in the Johor River Basin, Malaysia by Ju, Zeng, Tan, Mou Leong, Narimah Samat, Chang, Chun Kiat

    Published 2021
    “…With development in big data and internet network, Google Earth Engine (GEE), a cloud-based computing platform allows users to perform satellite images processing more efficiently. …”
    Get full text
    Get full text
    Get full text
    Article
  6. 6

    Autonomous flight algorithm of a quadcopter sensing system for methane gas concentration measurements at landfill site by Bashi, Omar Ibrahim Dallal

    Published 2018
    “…During the tests the weather conditions were fine and acceptable to carry out the experiments These parameters were also selected based on the practical verification experiments. …”
    Get full text
    Get full text
    Thesis
  7. 7

    Dynamic and adaptive execution models for data stream mining applications in mobile edge cloud computing systems / Muhammad Habib Ur Rehman by Muhammad Habib , Ur Rehman

    Published 2016
    “…The execution models are based on either standalone mobile devices, mobile-to-mobile, mobile-to-edge, or mobile-to-cloud communication models. …”
    Get full text
    Get full text
    Get full text
    Thesis
  8. 8

    Efficient kerberos authentication scheme for cross-domain systems in industrial internet of things using ECC by Ismail, Haqi Khalid

    Published 2021
    “…The offline scheme utilizes a Time-based One-Time Password (TOTP) algorithm to allow users to authenticate to the vehicle without needing an Internet connection once they have registered online when Internet access is available. …”
    Get full text
    Get full text
    Thesis
  9. 9
  10. 10

    Multi-objective flow measurement in software defined networks (SDN) for datacenter / Hamid Tahaei by Hamid , Tahaei

    Published 2018
    “…The proposed framework is rigorously evaluated through several experiments, including emulation and simulation. The verification of both experiments is made with current state-of-the-art algorithms. …”
    Get full text
    Get full text
    Get full text
    Thesis
  11. 11