Search Results - (( developing reading cloud algorithm ) OR ( java application based algorithm ))

Refine Results
  1. 1

    Hybrid cryptography algorithm to improve security cloud storage by Abd Almohsen, Inam Razzaq

    Published 2017
    “…To improve secure of data in cloud storage by hybrid three algorithms (AES, ECC and RSA).All the existing algorithms has some sort of problems and issues, this had made us decide to develop a safe, correct ad efficient algorithm for having secured data in cloud storage. …”
    Get full text
    Get full text
    Get full text
    Thesis
  2. 2

    The optimization of resources allocation to minimize energy consumption within data center in cloud by Ayob, Fahrul Hakim, Jayatis, Punaya, Subramaniam, Shamala

    Published 2019
    “…The advantages of these services are extremely significant, but the data centers that offer this kind of service are suffering from over power consumption that impose serious threats to the environment due to the emission of carbon dioxide to the atmosphere.Because of some disadvantages in Dynamic Voltage Frequency Scheduling (DVFS), this paper proposes a cloud scheduling algorithm adapted from Dynamic Resource Allocation Method (DRA) to be developed with the goal of dynamically virtual machines (VMs) migration when resource utilization reaches above or below threshold readings in order to optimize the power consumption towards energy saving in cloud data center. …”
    Get full text
    Get full text
    Get full text
    Article
  3. 3

    Iot health monitoring system for self quarantined covid-19 patients by Vikneswaran, Balakrishnan

    Published 2022
    “…Then to get the temperature reading we use some algorithm to calculate the temperature reading from sensor. …”
    Get full text
    Get full text
    Undergraduates Project Papers
  4. 4

    IoT-BSEM internet of things-based smart energy meter for domestic house by Abdul Razak, Nur Atiqah Husna, Ramlee, Ridza Azri, Ahmed Kamal, Ibrahim Faris, Andre, H, Khmag, Asem

    Published 2023
    “…The microcontroller receives the measured data from the sensor and calculated using developed algorithm, then data sent to the IoT cloud. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  5. 5

    RSA Encryption & Decryption using JAVA by Ramli, Marliyana

    Published 2006
    “…The implementation of this project will be based on Rapid Application Design Methodology (RAD) and will be more focusing on research and finding, ideas and the implementation of the algorithm, and finally running and testing the algorithm. …”
    Get full text
    Get full text
    Final Year Project
  6. 6

    Secure multi-authority attribute-based encryption access control with cache-aware scheduling in mobile cloud computing by Jamal, Fara

    Published 2021
    “…By leveraging the existing work, a cache-aware scheduling technique was developed to minimize communication and read time between cloud storage and the mobile device to reduce the unavailability of required data. …”
    Get full text
    Get full text
    Thesis
  7. 7
  8. 8

    Application of genetic algorithm and JFugue in an evolutionary music generator by Tang, Jia Rou

    Published 2025
    “…This project explores the application of Genetic Algorithms (GA) with JFugue, which is a Java-based music programming library to develop an Evolutionary Music Generator. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  9. 9
  10. 10
  11. 11

    Real-Time Video Processing Using Native Programming on Android Platform by Saipullah, Khairul Muzzammil

    Published 2012
    “…However for the Android platform that based on the JAVA language, most of the software algorithm is running on JAVA that consumes more time to be compiled. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  12. 12
  13. 13

    Real-time algorithmic music composition application. by Yap, Alisa Yi Hui

    Published 2022
    “…This project is about the study of evolutionary music, and focuses on the development of an algorithmic music composer using the Java programming language. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  14. 14

    Audio Streaming System Using Real-Time Transport Protocol Based on Java Media Framework by Asaad Aref, Ibrahim

    Published 2004
    “…A design proposal was outlined to provide an adaptive client/server approach to stream audio contents using Real-Time Transport Protocol (RTP) involving architecture based on the Java Media Framework (JMF) Application Programmable Interfaces (API).RTP protocol is the Internet-standard protocol for the transport of real-time data, including audio and video and can be implemented by using Java Media Framework (JMF). …”
    Get full text
    Get full text
    Thesis
  15. 15
  16. 16

    A Toolkit for Simulation of Desktop Grid Environment by FOROUSHAN, PAYAM CHINI

    Published 2014
    “…The selected methodology for the application development is based on prototyping methodology. …”
    Get full text
    Get full text
    Final Year Project
  17. 17

    DESIGN OF SMART TRAFFIC LIGHT SYSTEM BASED ON INTERNET OF THINGS by MUHAMMAD AMIR AFIQ, MOHAMED

    Published 2018
    “…The level of congestion is taken from the infrared sensor through the traffic light system by the microcontroller and the data is kept in the cloud storage for use in homegrown and national development models and traffic estimation. …”
    Get full text
    Get full text
    Final Year Project Report / IMRAD
  18. 18

    Internet of wearable things-based on lora and wi-fi healthcare monitoring system for medical applications by Suliman Abdulmalek, Hamood Ahmed

    Published 2024
    “…The data is transmitted through LoRaWAN and Wi-Fi networks and stored in the cloud for remote monitoring via a dashboard. The system underwent thorough testing, showing stable and accurate readings for vital parameters. …”
    Get full text
    Get full text
    Thesis
  19. 19
  20. 20

    Secure Image Steganography Using Encryption Algorithm by Siti Dhalila, Mohd Satar, Roslinda, Muda, Fatimah, Ghazali, Mustafa, Mamat, Nazirah, Abd Hamid, An, P.K

    Published 2016
    “…A system based on the proposed algorithm will be implemented using Java and it will be more secured due to double-layer of security mechanisms which are RSA and Diffie-Hellman.…”
    Get full text
    Get full text
    Conference or Workshop Item