Mobile Cloud Computing Solution for Visualization of Road Roughness
| Main Author: | Lam, Chen Riang |
|---|---|
| Format: | Final Year Project / Dissertation / Thesis |
| Published: |
2017
|
| Subjects: | |
| Online Access: | http://eprints.utar.edu.my/2744/ http://eprints.utar.edu.my/2744/1/SE%2D2017%2D1304334%2D1.pdf |
Similar Items
Editorial: when the cloud computing becomes mobile!
by: Pathan, Al-Sakib Khan
Published: (2013)
by: Pathan, Al-Sakib Khan
Published: (2013)
On protecting data storage in mobile cloud computing paradigm
by: Abdalla , Al-kindy Athman, et al.
Published: (2014)
by: Abdalla , Al-kindy Athman, et al.
Published: (2014)
Dynamic reciprocal authentication protocol for mobile cloud computing
by: Ahmed, Abdulghani Ali, et al.
Published: (2021)
by: Ahmed, Abdulghani Ali, et al.
Published: (2021)
A lightweight heterogeneous hybrid mobile cloud computing framework for compute-intensive mobile applications / Zohreh Sanaei Moghaddam
by: Moghaddam, Zohreh Sanaei
Published: (2014)
by: Moghaddam, Zohreh Sanaei
Published: (2014)
Process state synchronization for mobility support in mobile cloud computing / Ejaz Ahmed
by: Ejaz, Ahmed
Published: (2016)
by: Ejaz, Ahmed
Published: (2016)
Cloud Computing: Locally Sub-Clouds instead of Globally One Cloud
by: Khan, Nawsher, et al.
Published: (2012)
by: Khan, Nawsher, et al.
Published: (2012)
Integrated vector instruction translator and offloading framework for mobile cloud computing / Junaid Shuja
by: Junaid , Shuja
Published: (2017)
by: Junaid , Shuja
Published: (2017)
Authentication scheme using unique identification method with homomorphic encryption in Mobile Cloud Computing
by: Lim, Tsu Chean, et al.
Published: (2018)
by: Lim, Tsu Chean, et al.
Published: (2018)
A lightweight framework for intensive mobile application processing in mobile cloud computing / Muhammad Shiraz
by: Muhammad , Shiraz
Published: (2013)
by: Muhammad , Shiraz
Published: (2013)
Test case selection for penetration testing in mobile cloud computing applications: A proposed technique
by: Al-Ahmad, Ahmad Salah, et al.
Published: (2018)
by: Al-Ahmad, Ahmad Salah, et al.
Published: (2018)
Cloud Computing: Analysis of Various Platforms
by: Khan, Nawsher, et al.
Published: (2012)
by: Khan, Nawsher, et al.
Published: (2012)
International center for monitoring cloud computing providers (ICMCCP) for ensuring trusted clouds
by: Mohammed, Mohssen M. Z. E., et al.
Published: (2014)
by: Mohammed, Mohssen M. Z. E., et al.
Published: (2014)
Methods for Preventing DDoS Attacks in Cloud Computing
by: Jaber, Aws Naser, et al.
Published: (2017)
by: Jaber, Aws Naser, et al.
Published: (2017)
Building customer trust in cloud computing model
by: Pathan, Al-Sakib Khan
Published: (2015)
by: Pathan, Al-Sakib Khan
Published: (2015)
Cloud Computing: Architecture for Efficient Provision of Services
by: Khan, Nawsher, et al.
Published: (2012)
by: Khan, Nawsher, et al.
Published: (2012)
Cloud Computing Model for MyGRANTs Project
by: Fakhreldin, Mohammed Adam Ibrahim, et al.
Published: (2013)
by: Fakhreldin, Mohammed Adam Ibrahim, et al.
Published: (2013)
Visual computer: guest editorial
by: Shamsuddin, Siti Mariyam, et al.
Published: (2007)
by: Shamsuddin, Siti Mariyam, et al.
Published: (2007)
Hypervisor IDPS: DDoS Prevention Tool for Cloud Computing
by: Mohamad Fadli, Zolkipli, et al.
Published: (2017)
by: Mohamad Fadli, Zolkipli, et al.
Published: (2017)
Cloud Computing Delivery and Delivery Models: Opportunity and Challenges
by: Alajmi, Qasim, et al.
Published: (2018)
by: Alajmi, Qasim, et al.
Published: (2018)
Proactive Model for Locating and Collecting Cybercrime Evidences on Cloud Computing
by: Ahmed, Abdulghani Ali, et al.
Published: (2017)
by: Ahmed, Abdulghani Ali, et al.
Published: (2017)
IDPS: an integrated intrusion handling model for cloud computing environment
by: Alsafi, Hassen Mohammed, et al.
Published: (2012)
by: Alsafi, Hassen Mohammed, et al.
Published: (2012)
Dynamic and adaptive execution models for data stream mining applications in mobile edge cloud computing systems / Muhammad Habib Ur Rehman
by: Muhammad Habib , Ur Rehman
Published: (2016)
by: Muhammad Habib , Ur Rehman
Published: (2016)
Trusting Cloud Computing for Personal Files
by: Mazlina, Abdul Majid, et al.
Published: (2014)
by: Mazlina, Abdul Majid, et al.
Published: (2014)
Security Everywhere Cloud: An Intensive Review of DoS and DDoS Attacks in Cloud Computing
by: Mazlina, Abdul Majid, et al.
Published: (2014)
by: Mazlina, Abdul Majid, et al.
Published: (2014)
Mobile cloud computing for smartphones: Application development model and application piracy control / Atta Ur Rehman Khan
by: Khan, Atta Ur Rehman
Published: (2014)
by: Khan, Atta Ur Rehman
Published: (2014)
A Study in Data Security in Cloud Computing
by: Mazlina, Abdul Majid, et al.
Published: (2014)
by: Mazlina, Abdul Majid, et al.
Published: (2014)
Heterogeneity-aware task allocation in mobile ad hoc cloud / Ibrar Yaqoob
by: Ibrar, Yaqoob
Published: (2017)
by: Ibrar, Yaqoob
Published: (2017)
Factors Affecting the Continuous Use of Cloud Computing Services from Expert's Perspective
by: Al-Sharafi, Mohammed A., et al.
Published: (2017)
by: Al-Sharafi, Mohammed A., et al.
Published: (2017)
Building customer trust in cloud computing with an ICT-enabled global regulatory body
by: Pathan, Al-Sakib Khan, et al.
Published: (2015)
by: Pathan, Al-Sakib Khan, et al.
Published: (2015)
Literature Review Of Authentication Layer For Public Cloud Computing: A Meta-Analysis
by: Eldow, Abdalla, et al.
Published: (2019)
by: Eldow, Abdalla, et al.
Published: (2019)
Rough Set Granularity in Mobile Web Pre-Caching
by: Sulaiman, Sarina, et al.
by: Sulaiman, Sarina, et al.
Rough web caching
by: Sulaiman, Sarina, et al.
Published: (2009)
by: Sulaiman, Sarina, et al.
Published: (2009)
Visualization pipeline for medical datasets on grid computing environment
by: Ahmed, A. A., et al.
Published: (2007)
by: Ahmed, A. A., et al.
Published: (2007)
Two objectives big data task scheduling using swarm intelligence in cloud computing
by: Diallo, Laouratou, et al.
Published: (2016)
by: Diallo, Laouratou, et al.
Published: (2016)
Host Based Intrusion Detection and Prevention Model Against DDoS Attack in Cloud Computing
by: Jaber, Aws Naser, et al.
Published: (2018)
by: Jaber, Aws Naser, et al.
Published: (2018)
“What should be done to achieve greater use of cloud computing by higher education institutions”
by: Alajmi, Qasim, et al.
Published: (2016)
by: Alajmi, Qasim, et al.
Published: (2016)
The Adaptation of Cloud Solution for Peer Collaboration Work among Teachers in Maktab Nasional Secondary School
by: Romella Marie Sipaul,
Published: (2021)
by: Romella Marie Sipaul,
Published: (2021)
Data Integrity For Cloud Computing With Homomorphic Encryption
by: Awadallah, Ruba N S
Published: (2022)
by: Awadallah, Ruba N S
Published: (2022)
Cloud computing in Malaysia Universities
by: Razak, Siti Fatimah Abdul
Published: (2009)
by: Razak, Siti Fatimah Abdul
Published: (2009)
A systematic mapping study on cloud-based mobile application testing
by: Badamasi, Imam Ya'au, et al.
Published: (2019)
by: Badamasi, Imam Ya'au, et al.
Published: (2019)
Similar Items
-
Editorial: when the cloud computing becomes mobile!
by: Pathan, Al-Sakib Khan
Published: (2013) -
On protecting data storage in mobile cloud computing paradigm
by: Abdalla , Al-kindy Athman, et al.
Published: (2014) -
Dynamic reciprocal authentication protocol for mobile cloud computing
by: Ahmed, Abdulghani Ali, et al.
Published: (2021) -
A lightweight heterogeneous hybrid mobile cloud computing framework for compute-intensive mobile applications / Zohreh Sanaei Moghaddam
by: Moghaddam, Zohreh Sanaei
Published: (2014) -
Process state synchronization for mobility support in mobile cloud computing / Ejaz Ahmed
by: Ejaz, Ahmed
Published: (2016)