Search Results - (( developing fog computing algorithm ) OR ( java application testing algorithm ))
Search alternatives:
- computing algorithm »
- application testing »
- testing algorithm »
- java application »
- developing fog »
- fog computing »
-
1
Multi-objective optimization for integrated task scheduling and load balancing in fog computing for IoT applications
Published 2025“…This study focuses on a Fog Optimized Computing System (FOCS) algorithm, which is developed to handle network congestion and processing challenges imposed by the increasing number of IoT devices. …”
Get full text
Get full text
Get full text
Thesis -
2
-
3
Fog-cloud scheduling simulator for reinforcement learning algorithms
Published 2023“…However, the main challenge with fog computing is that the edge nodes, called fog devices, have limited processing capabilities and storage for dynamic high-level operations. …”
Get full text
Get full text
Article -
4
Design and development of smart parking system based on fog computing and internet of things
Published 2021“…A multi‐layer architecture is developed that consists of multiple sensor nodes, and fog and cloud computing layers. …”
Get full text
Get full text
Get full text
Article -
5
SELAMAT: a new secure and lightweight multi-factor authentication scheme for cross-platform industrial IoT systems
Published 2021“…The development of the industrial Internet of Things (IIoT) promotes the integration of the cross-platform systems in fog computing, which enable users to obtain access to multiple application located in different geographical locations. …”
Get full text
Get full text
Article -
6
Attribute reduction based scheduling algorithm with enhanced hybrid genetic algorithm and particle swarm optimization for optimal device selection
Published 2022“…Enhance hybrid genetic algorithm and particle Swarm optimization are developed to select the optimal device in either fog or cloud. …”
Get full text
Get full text
Article -
7
ECG encryption enhancement with multi-layers of AES and DNA computing
Published 2023“…IoT study fields currently involve security and privacy due to the fact that the installation of Cryptographic Internet Communications "ICs" for protected IC applications like Fog Computing and Cloud Computing devices is extremely crucial in any developing technology. …”
Get full text
Get full text
Get full text
Thesis -
8
RSA Encryption & Decryption using JAVA
Published 2006“…The implementation of this project will be based on Rapid Application Design Methodology (RAD) and will be more focusing on research and finding, ideas and the implementation of the algorithm, and finally running and testing the algorithm. …”
Get full text
Get full text
Final Year Project -
9
Weather prediction system using ANN algorithm / Nur Afiqah Ahmad Sukri
Published 2024Get full text
Get full text
Thesis -
10
Comparison of Search Algorithms in Javanese-Indonesian Dictionary Application
Published 2020“…Performance Testing is used to test the performance of algorithm implementations in applications. …”
Get full text
Get full text
Journal -
11
-
12
-
13
Implementation of (AES) Advanced Encryption Standard algorithm in communication application
Published 2014“…The concept of ABS algorithm was firstly studied, including the definition, historical background, and a brief comparison was made between the ABS algorithm with other types of algorithm. …”
Get full text
Get full text
Undergraduates Project Papers -
14
Classification System for Heart Disease Using Bayesian Classifier
Published 2007“…This system was developing base on to three main part which is data processing, testing and implementation of the algorithm. In this system a Bayesian algorithm was used in order to implement the system. …”
Get full text
Get full text
Thesis -
15
The development of cloud modelling and motion analysis for virtual environment
Published 2005“…This invention uses the newly developed randomized algorithm to fill the cloud volume with particle systems. …”
Get full text
Get full text
Monograph -
16
Network analysis in a peer-to-peer energy trading model using blockchain and machine learning
Published 2024“…However, existing works related to the blockchain with P2P energy trading are engaged in increasing the cost related to resource allocation, latency, computational processing, and large network setup. The objective of this paper is to design and develop a three-tier architecture, an analytical model, and a hybrid algorithm for network analysis in a blockchain-based P2P energy trading system using reinforcement learning (RL) and feed forward neural network (FFNN) techniques. …”
Get full text
Get full text
Article -
17
-
18
-
19
Encrypted mobile messaging application using AES block cipher cryptography algorithm / Nur Rasyiqah Zulkifli
Published 2019“…The programming language that is used to write the program is Java Language that will run on android phones. As the result, this project was tested on the functionality of the mobile messaging application. …”
Get full text
Get full text
Student Project -
20
Design Of Robot Motion Planning Algorithm For Wall Following Robot
Published 2006Get full text
Get full text
Monograph
