Search Results - (( ((web application) OR (its application)) use algorithm ) OR ( wave application need algorithm ))
Search alternatives:
- wave application »
- application need »
- web application »
- its application »
- need algorithm »
- use algorithm »
-
1
Deep Learning-Driven Mobility And Utility-Based Resource Management In Mm-Wave Enable Ultradense Heterogeneous Networks
Published 2025thesis::doctoral thesis -
2
Secured mobile transaction using NFC Technology: Top-Up printing system
Published 2011“…NFC technology has become a success across a broad range of applications depending on its large- scale adoption by enterprises and consumers. …”
Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
3
A STUDY OF FRACTAL ANALYSIS AND SINGULARITY SPECTRUM AND ITS POTENTIAL APPLICATION IN THE OIL AND GAS INDUSTRY
Published 2012Get full text
Get full text
Final Year Project -
4
Machine learning in botda fibre sensor for distributed temperature measurement
Published 2023text::Thesis -
5
NFC secured online transaction in mobile computing business
Published 2012“…NFC technology has become a success across a broad range of applications depending on its large-scale adoption by enterprises and consumers. …”
Get full text
Get full text
Get full text
Article -
6
A novel methodology for hydrocarbon depth prediction in seabed logging: Gaussian process-based inverse modeling of electromagnetic data
Published 2021“…Acquiring EM responses using mesh-based algorithms is a time-consuming task. …”
Get full text
Get full text
Article -
7
Intelligent agent for e-commerce using genetic algorithm / Kok Sun Sun
Published 2000“…In addition, the system is developed using the developing tools that are essential in web applications, namely. web server, database server, system server and web programming tools such as ASP and Visual Basic. …”
Get full text
Get full text
Thesis -
8
Web Usage Mining Using GSP Algorithm: A Study on Sultanah Bahiyah Library Online Databases
Published 2008“…In this study web usage mining use sequential pattern technique with GSP algorithm. …”
Get full text
Get full text
Get full text
Thesis -
9
-
10
Adaptive security architecture for protecting RESTful web services in enterprise computing environment
Published 2018“…This SOA implementation does not possess adequate security solutions within it, and its security is completely dependent on network/transport layer security that is obsolete owing to latest web technologies such as Web 2.0 and its upgraded version, Web 3.0. …”
Get full text
Get full text
Article -
11
Adaptive security architecture for protecting RESTful web services in enterprise computing environment
Published 2018“…This SOA implementation does not possess adequate security solutions within it, and its security is completely dependent on network/transport layer security that is obsolete owing to latest web technologies such as Web 2.0 and its upgraded version, Web 3.0. …”
Get full text
Get full text
Article -
12
-
13
Cryptanalytic attacks on Rivest, Shamir, and Adleman (RSA) cryptosystem: issues and challenges
Published 2014“…Generally RSA algorithm gain a security support because of it’s frequently use in most applications where security of digital data is mostly a concern. …”
Get full text
Get full text
Get full text
Get full text
Article -
14
-
15
Image steganography using web application / Nor Arzami Othman ... [et al.]
Published 2023“…The web application supports encoding and decoding images for concealing data in images. …”
Get full text
Get full text
Get full text
Article -
16
Web Based Supervisor Supervisee Project Matching System
Published 2010Get full text
Get full text
Get full text
Thesis -
17
A Hybrid Approach For Web Search Result Clustering Based On Genetic Algorithm With K-means
Published 2024Get full text
journal::journal article -
18
-
19
-
20
Random traveling wave pulse coupled oscillator (RTWPCO) algorithm of energy-efficient wireless sensor networks
Published 2018“…As a result, it is more suitable and harder to identify demands in all applications. The pulse-coupled oscillator mechanism causing delay and uncharitable applications needs to reduce energy consumption to the smallest level. …”
Get full text
Get full text
Article
