Search Results - (( solution communicative cloud algorithm ) OR ( java implementation phase algorithm ))
Search alternatives:
- solution communicative »
- implementation phase »
- communicative cloud »
- java implementation »
- cloud algorithm »
- phase algorithm »
-
1
-
2
Genetic algorithm based adaptive offloading for improving IoT device communication efficiency
Published 2019“…With an extended support from cloud network, the mobile IoT devices demand flexibility and scalability in communication. …”
Get full text
Get full text
Get full text
Article -
3
Secure multi-authority attribute-based encryption access control with cache-aware scheduling in mobile cloud computing
Published 2021“…Mobile Cloud Computing (MCC) is the combination of cloud computing, mobile computing, and wireless network to bring rich computational resources to mobile users, network operators, as well as cloud computing providers. …”
Get full text
Get full text
Thesis -
4
Web-based clustering tool using fuzzy k-mean algorithm / Ahmad Zuladzlan Zulkifly
Published 2019“…All the algorithm for the engine has been developed by using Java script language. …”
Get full text
Get full text
Thesis -
5
Performance analysis of constrained device virtualization algorithm
Published 2020“…However, majority of the solutions are at different layers of the communication stack but do not provide a holistic solution for the problem. …”
Get full text
Get full text
Get full text
Article -
6
Data collection in sensor-cloud: A systematic literature review
Published 2020“…Knowing how weak WSNs are with regards to communication ability, how to collect and upload sensory data to the cloud in limited time has become an issue in Sensor-cloud. …”
Get full text
Get full text
Get full text
Get full text
Get full text
Article -
7
Critical insight for MAPReduce optimization in Hadoop
Published 2014Get full text
Get full text
Get full text
Article -
8
-
9
Deep reinforcement learning based resource allocation strategy in cloud-edge computing system
Published 2024“…Although the article limits simulations in areas to be covered and complexity in training, it brings the prospective benefits of MAL-DRL in the management of cloud-edge resources on the spot. In the course of this undertake, the effect of ensuring communication goals, moving learning strategies, and security measures for the ultimate goal of boosting this method's applicability in real-world antics can be explored…”
Get full text
Get full text
Get full text
Conference or Workshop Item -
10
Deep reinforcement learning based resource allocation strategy in cloud-edge computing system
Published 2024“…Although the article limits simulations in areas to be covered and complexity in training, it brings the prospective benefits of MAL-DRL in the management of cloud-edge resources on the spot. In the course of this undertake, the effect of ensuring communication goals, moving learning strategies, and security measures for the ultimate goal of boosting this method's applicability in real-world antics can be explored.…”
Get full text
Get full text
Conference or Workshop Item -
11
Dynamic and adaptive execution models for data stream mining applications in mobile edge cloud computing systems / Muhammad Habib Ur Rehman
Published 2016“…At tertiary level, the architecture enables far-edge to cloud communication in case of unavailability of onboard computational and battery power resources and in the absence of any other mobile devices in the locality. …”
Get full text
Get full text
Get full text
Thesis -
12
Optimal route checking using genetic algorithm for UiTM's bus services / Tengku Salman Fathi Tengku Jaafar
Published 2006“…Although from human logical thinking, the route can be generated easily but the calculation of checking the route whether it is optimal route or not is difficult and will take long time to be implemented. This research study with the development of the Optimal Route Checking Using Genetic Algorithm system should solve this scenario. …”
Get full text
Get full text
Thesis -
13
ECG encryption enhancement with multi-layers of AES and DNA computing
Published 2023“…The solution that has been suggested is one that is both secure and effective when it is put to use in conjunction with the ECG and Covid-19 image encoding algorithms. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
14
Investigation of An Early Prediction System of Cardiac Arrest Using Machine Learning Techniques
Published 2022“…Random Forest algorithm be used in this study which is got the best performance with 83% accuracy then the other algorithms in WEKA. …”
Get full text
Get full text
Undergraduates Project Papers -
15
-
16
Internet of Things-based Home Automation with Network Mapper and MQTT Protocol
Published 2025“…This paper addresses these challenges and proposes a solution to integrate edge computing concepts. The proposed system is developed using a Raspberry Pi 3 Home Server (RHS) driven by the Support Vector Machine (SVM) algorithm. …”
Article -
17
-
18
Design of monitoring and control system of electricity power limiter using internet of things
Published 2025Get full text
Get full text
Book Section -
19
Efficient kerberos authentication scheme for cross-domain systems in industrial internet of things using ECC
Published 2021“…A new multi-factor authentication scheme is designed using the AES-ECC algorithm based on Kerberos workflow to establish secure, efficient, and lightweight communication between the user and the targeted IIoT devices to avoid the issues. …”
Get full text
Get full text
Thesis -
20
Multi-objective flow measurement in software defined networks (SDN) for datacenter / Hamid Tahaei
Published 2018“…Despite the multitude of efforts proposed for traffic measurement in SDN, current solutions still incur high cost and limitations. These costs are seen as a multi-objective problem as it involves different overheads in the data and control plane such as controller overhead, communication overhead, and message interaction overhead. …”
Get full text
Get full text
Get full text
Thesis
