Search Results - (( ((web application) OR (its application)) _ algorithm ) OR ( wave application need algorithm ))*
Search alternatives:
- wave application »
- application need »
- web application »
- its application »
- need algorithm »
-
1
Deep Learning-Driven Mobility And Utility-Based Resource Management In Mm-Wave Enable Ultradense Heterogeneous Networks
Published 2025thesis::doctoral thesis -
2
Secured mobile transaction using NFC Technology: Top-Up printing system
Published 2011“…NFC technology has become a success across a broad range of applications depending on its large- scale adoption by enterprises and consumers. …”
Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
3
Energy-efficient power allocation for downlink non orthogonal multiple access networks based on game theory and genetic algorithm / Reem Mustafa Mah’d Al Debes
Published 2025“…Furthermore, the research explores advanced applications such as integrating NOMA with Millimeter-Wave technology and optimizing user association strategies, enhancing system capacity and overall performance. …”
Get full text
Get full text
Get full text
Thesis -
4
A STUDY OF FRACTAL ANALYSIS AND SINGULARITY SPECTRUM AND ITS POTENTIAL APPLICATION IN THE OIL AND GAS INDUSTRY
Published 2012Get full text
Get full text
Final Year Project -
5
Machine learning in botda fibre sensor for distributed temperature measurement
Published 2023text::Thesis -
6
NFC secured online transaction in mobile computing business
Published 2012“…NFC technology has become a success across a broad range of applications depending on its large-scale adoption by enterprises and consumers. …”
Get full text
Get full text
Get full text
Article -
7
A novel methodology for hydrocarbon depth prediction in seabed logging: Gaussian process-based inverse modeling of electromagnetic data
Published 2021“…Seabed logging (SBL) is an application of electromagnetic (EM) waves for detecting potential marine hydrocarbon-saturated reservoirs reliant on a source-receiver system. …”
Get full text
Get full text
Article -
8
Intelligent agent for e-commerce using genetic algorithm / Kok Sun Sun
Published 2000“…In addition, the system is developed using the developing tools that are essential in web applications, namely. web server, database server, system server and web programming tools such as ASP and Visual Basic. …”
Get full text
Get full text
Thesis -
9
-
10
Web Usage Mining Using GSP Algorithm: A Study on Sultanah Bahiyah Library Online Databases
Published 2008“…Application of data mining to the World Wide Web referred as Web mining is at the cross road of research from several research communities which can be divided into three branches: Web Content Mining, Web Structure Mining and Web Usage Mining. …”
Get full text
Get full text
Get full text
Thesis -
11
Random traveling wave pulse coupled oscillator (RTWPCO) algorithm of energy-efficient wireless sensor networks
Published 2018“…As a result, it is more suitable and harder to identify demands in all applications. The pulse-coupled oscillator mechanism causing delay and uncharitable applications needs to reduce energy consumption to the smallest level. …”
Get full text
Get full text
Article -
12
Efficient DNS based Load Balancing for Bursty Web Application Traffic
Published 2012“…This research proposes a new efficient load balancing algorithm which applies to the local Domain Name Service (DNS) server for web based applications and services to ease the sudden increase in demand for the services. …”
Get full text
Get full text
Get full text
Article -
13
Adaptive security architecture for protecting RESTful web services in enterprise computing environment
Published 2018“…This SOA implementation does not possess adequate security solutions within it, and its security is completely dependent on network/transport layer security that is obsolete owing to latest web technologies such as Web 2.0 and its upgraded version, Web 3.0. …”
Get full text
Get full text
Article -
14
Adaptive security architecture for protecting RESTful web services in enterprise computing environment
Published 2018“…This SOA implementation does not possess adequate security solutions within it, and its security is completely dependent on network/transport layer security that is obsolete owing to latest web technologies such as Web 2.0 and its upgraded version, Web 3.0. …”
Get full text
Get full text
Article -
15
-
16
Cryptanalytic attacks on Rivest, Shamir, and Adleman (RSA) cryptosystem: issues and challenges
Published 2014“…Generally RSA algorithm gain a security support because of it’s frequently use in most applications where security of digital data is mostly a concern. …”
Get full text
Get full text
Get full text
Get full text
Article -
17
-
18
An approximation approach for free space wave propagation
Published 2009Get full text
Get full text
Conference or Workshop Item -
19
-
20
Web Based Supervisor Supervisee Project Matching System
Published 2010Get full text
Get full text
Get full text
Thesis
