Search Results - (( mobile application server algorithm ) OR ( java application using algorithm ))
Search alternatives:
- application server »
- server algorithm »
- java application »
- using algorithm »
-
1
Computer remote monitoring via mobile phones using socket programming / Samih Omer Fadlelmola Elkhider
Published 2011“…Such methodology can be achieved by java programming language for mobile clients J2ME, and by using a second generation mobile phones. …”
Get full text
Get full text
Thesis -
2
Network game (Literati) / Chung Mei Kuen
Published 2003“…Java applet is a well-known and widely used example of mobile code (a variation on the traditional client-server model). …”
Get full text
Get full text
Thesis -
3
A malware analysis and detection system for mobile devices / Ali Feizollah
Published 2017“…We then used feature selection algorithms and deep learning algorithms to build a detection model. …”
Get full text
Get full text
Get full text
Thesis -
4
A framework of rough cultural algorithms in optimizing mobile web caching performance
Published 2007“…The common cause of poor performance is due to the direct access to the server (e.g. pitiable performance of server-side applications or during burst crowds) and network infrastructure (e.g. long geographical distances, network overloads, etc.). …”
Get full text
Get full text
Article -
5
-
6
On protecting data storage in mobile cloud computing paradigm
Published 2014Get full text
Get full text
Get full text
Article -
7
Development of open platform controller for step-NC compliant CNC system
Published 2020“…Moreover, UOCC system has been extended to online environment via Wi-Fi which utilizes Transmission Control Protocol (TCP) Socket in Java which used the PC as server to create socket thus establishing bind connection between UOCC RM mobile phone and the UOCC system, allowing users to remotely monitor the machining process on mobile platform. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
8
Mobile application design for protecting the data in cloud using enhanced technique of encryption
Published 2024journal::journal article -
9
Process state synchronization for mobility support in mobile cloud computing / Ejaz Ahmed
Published 2016“…Mobile Cloud Computing (MCC) enables the resource-constrained mobile devices to execute the compute-intensive mobile applications either in client/server model or through cyber foraging of the tasks to the cloud servers. …”
Get full text
Get full text
Thesis -
10
Objects tracking from natural features in mobile augmented reality
Published 2013“…The adapted algorithm was tested in a mobile AR-prototype application using iPhone. …”
Get full text
Get full text
Get full text
Article -
11
-
12
-
13
RSA Encryption & Decryption using JAVA
Published 2006“…References and theories to support the research of 'RSA Encryption/Decryption using Java' have been disclosed in Literature Review section. …”
Get full text
Get full text
Final Year Project -
14
-
15
Energy-Aware Fault Tolerant Task offloading of Mobile Cloud Computing
Published 2023Conference Paper -
16
Provider independent cryptographic tools
Published 2003Get full text
Get full text
Get full text
Monograph -
17
-
18
Secure policies for the distributed virtual machines in mobile cloud computing
Published 2020“…This study serves to provide integrity and confidentiality in exchanging sensitive information among multistakeholder in distributed mobile applications.…”
Get full text
Get full text
Get full text
Get full text
Thesis -
19
Dynamic and adaptive execution models for data stream mining applications in mobile edge cloud computing systems / Muhammad Habib Ur Rehman
Published 2016“…At platform level, the MDSM applications need to seamlessly switch the execution processes among mobile devices, edge servers, and cloud computing servers. …”
Get full text
Get full text
Get full text
Thesis -
20
Predictive Mobility Management Using Optimized Delays And Security Enhancements In IEEE 802.11 Infrastructure Networks
Published 2008“…Our contribution to mobility management is to propose a mobility prediction algorithm using location tracking and data mining, to propose a delay management approach that cuts down major delays, and to propose a two stage resource reservation scheme. …”
Get full text
Get full text
Get full text
Thesis
