Search Results - (( ((web application) OR (its application)) use algorithm ) OR ( wave application need algorithm ))

Refine Results
  1. 1
  2. 2

    Secured mobile transaction using NFC Technology: Top-Up printing system by Ayu, Media Anugerah, Mantoro, Teddy, Brotosaputro, Gunawan, Ain, Nur F., Ghazali, Noorzalina

    Published 2011
    “…NFC technology has become a success across a broad range of applications depending on its large- scale adoption by enterprises and consumers. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Proceeding Paper
  3. 3
  4. 4
  5. 5

    NFC secured online transaction in mobile computing business by Mantoro, Teddy, Ayu, Media Anugerah, Brotosaputro, Gunawan, Ain, Nur F., Ghazali, Noorzalina

    Published 2012
    “…NFC technology has become a success across a broad range of applications depending on its large-scale adoption by enterprises and consumers. …”
    Get full text
    Get full text
    Get full text
    Article
  6. 6
  7. 7

    Intelligent agent for e-commerce using genetic algorithm / Kok Sun Sun by Kok , Sun Sun

    Published 2000
    “…In addition, the system is developed using the developing tools that are essential in web applications, namely. web server, database server, system server and web programming tools such as ASP and Visual Basic. …”
    Get full text
    Get full text
    Thesis
  8. 8

    Web Usage Mining Using GSP Algorithm: A Study on Sultanah Bahiyah Library Online Databases by Hazzaimeh, Yousef Abd-AlMohdi

    Published 2008
    “…In this study web usage mining use sequential pattern technique with GSP algorithm. …”
    Get full text
    Get full text
    Get full text
    Thesis
  9. 9
  10. 10

    Adaptive security architecture for protecting RESTful web services in enterprise computing environment by Beer, M.I., Hassan, M.F.

    Published 2018
    “…This SOA implementation does not possess adequate security solutions within it, and its security is completely dependent on network/transport layer security that is obsolete owing to latest web technologies such as Web 2.0 and its upgraded version, Web 3.0. …”
    Get full text
    Get full text
    Article
  11. 11

    Adaptive security architecture for protecting RESTful web services in enterprise computing environment by Beer, M.I., Hassan, M.F.

    Published 2018
    “…This SOA implementation does not possess adequate security solutions within it, and its security is completely dependent on network/transport layer security that is obsolete owing to latest web technologies such as Web 2.0 and its upgraded version, Web 3.0. …”
    Get full text
    Get full text
    Article
  12. 12
  13. 13

    Cryptanalytic attacks on Rivest, Shamir, and Adleman (RSA) cryptosystem: issues and challenges by Abubakar, Adamu, Jabaka, Shehu, Tijani, Bello Idrith, Zeki, Akram M., Chiroma, Haruna, Usman, Mohammed Joda, Raji, Shakirat, Mahmud, Murni

    Published 2014
    “…Generally RSA algorithm gain a security support because of it’s frequently use in most applications where security of digital data is mostly a concern. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  14. 14
  15. 15
  16. 16
  17. 17
  18. 18
  19. 19
  20. 20

    Random traveling wave pulse coupled oscillator (RTWPCO) algorithm of energy-efficient wireless sensor networks by Al-Mekhlafi, Zeyad Ghaleb Aqlan, Mohd Hanapi, Zurina, Othman, Mohamed, Ahmad Zukarnain, Zuriati, Shamsan Saleh, Ahmed M.

    Published 2018
    “…As a result, it is more suitable and harder to identify demands in all applications. The pulse-coupled oscillator mechanism causing delay and uncharitable applications needs to reduce energy consumption to the smallest level. …”
    Get full text
    Get full text
    Article