Search Results - (( java implication based algorithm ) OR ( programming language cloud algorithm ))
Search alternatives:
- implication based »
- java implication »
- cloud algorithm »
-
1
-
2
Computer remote monitoring via mobile phones using socket programming / Samih Omer Fadlelmola Elkhider
Published 2011“…Such methodology can be achieved by java programming language for mobile clients J2ME, and by using a second generation mobile phones. …”
Get full text
Get full text
Thesis -
3
Designing a new E-Commerce authentication framework for a cloud-based environment
Published 2024Conference Paper -
4
SG-PBFS : Shortest Gap-Priority Based Fair Scheduling technique for job scheduling in cloud environment
Published 2024“…To conduct this experiment, we employed the CloudSim simulator, which is implemented using the Java programming language.…”
Get full text
Get full text
Get full text
Get full text
Article -
5
Attribute reduction based scheduling algorithm with enhanced hybrid genetic algorithm and particle swarm optimization for optimal device selection
Published 2022“…Enhance hybrid genetic algorithm and particle Swarm optimization are developed to select the optimal device in either fog or cloud. …”
Get full text
Get full text
Article -
6
Performance Analysis of Real Time Image Processing for Lightning Event Using Cython and Python Programming Languages
Published 2023Conference Paper -
7
-
8
Improved voting technique for ensemble of MLP system applied on various classification data / Saodah Omar, Iza Sazanita Isa and Junita Mohd Saleh.
Published 2010“…The work employs MATLAB Neural Network Toolbox and Borland C++ programming language as the tools to develop the proposed system. …”
Get full text
Get full text
Research Reports -
9
Automatic extraction of digital terrain model and Building Footprint from airborne LiDAR data using rule-based learning techniques
Published 2021“…In the last section, to achieve third goal, all process was written in Python computer language and DB-creator program was created and in a fully automatic process, the DTM and the Buildings Footprint were created and saved. …”
Get full text
Get full text
Get full text
Thesis -
10
Digital Quran With Storage Optimization Through Duplication Handling And Compressed Sparse Matrix Method
Published 2024thesis::doctoral thesis -
11
Efficient kerberos authentication scheme for cross-domain systems in industrial internet of things using ECC
Published 2021“…In addition, a proof of concept is constructed to validate the proposed multi-factor Kerberos authentication using Java programming language. As an extension to the scheme for enabling users to authenticate to the IIoT connected devices while Internet access is unavailable, a new offline multi-factor authentication scheme for the automotive industry is proposed. …”
Get full text
Get full text
Thesis
