Search Results - (( java based verification algorithm ) OR ( basic computer cloud algorithm ))
Search alternatives:
- verification algorithm »
- based verification »
- cloud algorithm »
- basic computer »
- java »
-
1
Scheduling scientific workflow using multiobjective algorithm with fuzzy resource utilization in multi-cloud environment
Published 2020“…Simulation experiments reveal that FR-MOS outperforms the basic MOS over the PSO algorithm.…”
Get full text
Get full text
Article -
2
Comparative study on job scheduling using priority rule and machine learning
Published 2021“…Cloud computing is a potential technique for running resource-intensive applications on a wide scale. …”
Get full text
Get full text
Get full text
Get full text
Conference or Workshop Item -
3
Computer remote monitoring via mobile phones using socket programming / Samih Omer Fadlelmola Elkhider
Published 2011“…The approach of the mobile cloud is clearly occurring with web host servers expands thus large number of data around the world stored in huge servers, consumers of mobile devices and small computing devices have high performance expectations usually, therefore mobile cloud computing theorizes that the cloud will soon become a disruptive force in the mobile world, eventually becoming the dominant way in which mobile applications operates. …”
Get full text
Get full text
Thesis -
4
Design of Improved Stream Cipher Algorithms for GSM Communication
Published 2024thesis::master thesis -
5
On uniform traffic pattern of symmetric midimew connected mesh network
Published 2015Get full text
Get full text
Get full text
Proceeding Paper -
6
Design & Development of a Robotic System Using LEGO Mindstorm
Published 2006“…For this research, several set of robots by using Lego has been developed and it uses LeJos and C programming techniques as a platform. A Java-based robot development tool has been set up as alternative programming methods incorporating LeJos and the controller. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
7
Efficient kerberos authentication scheme for cross-domain systems in industrial internet of things using ECC
Published 2021“…The offline scheme utilizes a Time-based One-Time Password (TOTP) algorithm to allow users to authenticate to the vehicle without needing an Internet connection once they have registered online when Internet access is available. …”
Get full text
Get full text
Thesis -
8
A framework of test case prioritisation in regression testing using particle swarm-artificial bee colony algorithm
Published 2024“…The developed framework, grounded in fault-based testing theory, comprises three key components: inputs, prioritization factors, and a prioritization algorithm. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
9
Comparison of Landsat 8, Sentinel-2 and spectral indices combinations for Google Earth Engine-based land use mapping in the Johor River Basin, Malaysia
Published 2021“…With development in big data and internet network, Google Earth Engine (GEE), a cloud-based computing platform allows users to perform satellite images processing more efficiently. …”
Get full text
Get full text
Get full text
Article -
10
Campus study buddy : collaborative learning and resource sharing app
Published 2024Get full text
Get full text
Final Year Project / Dissertation / Thesis -
11
Automatic extraction of digital terrain model and Building Footprint from airborne LiDAR data using rule-based learning techniques
Published 2021“…To achieve the first goal, the last reflection is separated from the LiDAR point cloud and the effective distance was calculated. …”
Get full text
Get full text
Get full text
Thesis -
12
An approach to improve detecting and removing cross- site scripting vulnerabilities in web applications
Published 2015“…This research work was limited to Java based web applications. In future research, the method can be extended to include other programming languages as well as other similar web application security vulnerabilities.…”
Get full text
Get full text
Thesis
