Search Results - (( program communicative cloud algorithm ) OR ( java implementation bees algorithm ))
Search alternatives:
- program communicative »
- communicative cloud »
- java implementation »
- implementation bees »
- cloud algorithm »
- bees algorithm »
-
1
WURFL detection engine using cosine string similarity algortlhm / Illiasaak Ahmad ... [et al.]
Published 2013Get full text
Get full text
Research Reports -
2
Final exam question paper data encryption and decryption using advance encryption standard / Khairul Nashran Nazari
Published 2017“…With the implementation of AES, the question papers will be able to be distributed using online services such as emails or cloud storage. The distribution using online services will cut the cost of distributing and communications in the organizations. …”
Get full text
Get full text
Thesis -
3
Critical insight for MAPReduce optimization in Hadoop
Published 2014Get full text
Get full text
Get full text
Article -
4
Dynamic and adaptive execution models for data stream mining applications in mobile edge cloud computing systems / Muhammad Habib Ur Rehman
Published 2016“…At tertiary level, the architecture enables far-edge to cloud communication in case of unavailability of onboard computational and battery power resources and in the absence of any other mobile devices in the locality. …”
Get full text
Get full text
Get full text
Thesis -
5
Solar power inverter
Published 2013“…For systems with battery energy storage, the controller can control the charging as well as switch over to battery power once the sun sets or cloud cover reduces the PV output power. The controller executes the very precise algorithms required to invert the DC voltage generated by the solar module into AC This controller is programmed to perform the control loops necessary for all the power management functions necessary including DC/DC and DC/AC.…”
Get full text
Get full text
Undergraduates Project Papers -
6
A Development Of An Internet Of Things Equipped Unmanned Ground Vehicle For Surveilance Purpose
Published 2019“…The data stored in the cloud can be retrieved and processed using ThingSpeak software as this software allow user to aggregate, visualize, and analyze live data streams in the cloud. …”
Get full text
Get full text
Monograph -
7
Efficient kerberos authentication scheme for cross-domain systems in industrial internet of things using ECC
Published 2021“…A new multi-factor authentication scheme is designed using the AES-ECC algorithm based on Kerberos workflow to establish secure, efficient, and lightweight communication between the user and the targeted IIoT devices to avoid the issues. …”
Get full text
Get full text
Thesis
