Search Results - (( its application a algorithm ) OR ( ((wave application) OR (web application)) using algorithm ))*
Search alternatives:
- wave application »
- its application »
- web application »
- using algorithm »
- application a »
- a algorithm »
-
1
Design and implementation of cordic algorithm with sinusoidal pulse width modulation switching strategy
Published 2017“…Usually, one sinusoidal wave is used for one inverter. In this design, SPWM is used for multilevel inverter application in photovoltaic (PV) system. …”
Get full text
Get full text
Student Project -
2
-
3
Intelligent agent for e-commerce using genetic algorithm / Kok Sun Sun
Published 2000“…In addition, the system is developed using the developing tools that are essential in web applications, namely. web server, database server, system server and web programming tools such as ASP and Visual Basic. …”
Get full text
Get full text
Thesis -
4
Quasi linear algorithm for modelling shoreline change from AIRSAR/POLSAR polarized data
Published 2007Get full text
Get full text
Conference or Workshop Item -
5
-
6
Web Usage Mining Using GSP Algorithm: A Study on Sultanah Bahiyah Library Online Databases
Published 2008“…In this study web usage mining use sequential pattern technique with GSP algorithm. …”
Get full text
Get full text
Get full text
Thesis -
7
Cryptanalytic attacks on Rivest, Shamir, and Adleman (RSA) cryptosystem: issues and challenges
Published 2014“…Generally RSA algorithm gain a security support because of it’s frequently use in most applications where security of digital data is mostly a concern. …”
Get full text
Get full text
Get full text
Get full text
Article -
8
-
9
A Proposed False Report Identification Algorithm for a Mobile Application in the IoT Environment
Published 2024Proceedings Paper -
10
Deep Learning-Driven Mobility And Utility-Based Resource Management In Mm-Wave Enable Ultradense Heterogeneous Networks
Published 2025thesis::doctoral thesis -
11
A Hybrid Approach For Web Search Result Clustering Based On Genetic Algorithm With K-means
Published 2024Get full text
journal::journal article -
12
-
13
Secured mobile transaction using NFC Technology: Top-Up printing system
Published 2011“…NFC technology has become a success across a broad range of applications depending on its large- scale adoption by enterprises and consumers. …”
Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
14
Improvement of Auditory Brainstem Response (ABR) wave V amplitude using novel MLS nonlinear algorithm
Published 2011Get full text
Get full text
Get full text
Proceeding Paper -
15
Adaptive security architecture for protecting RESTful web services in enterprise computing environment
Published 2018“…In this modern era of enterprise computing, the enterprise application integration (EAI) is a well-known industry-recognized architectural principle that is built based on loosely coupled application architecture, where service-oriented architecture (SOA) is the architectural pattern for the implementation of EAI, whose computational elements are called as â��services.â�� Though SOA can be implemented in a wide range of technologies, the web services implementation of SOA becomes the current selective choice due to its simplicity that works on basic Internet protocols. …”
Get full text
Get full text
Article -
16
Adaptive security architecture for protecting RESTful web services in enterprise computing environment
Published 2018“…In this modern era of enterprise computing, the enterprise application integration (EAI) is a well-known industry-recognized architectural principle that is built based on loosely coupled application architecture, where service-oriented architecture (SOA) is the architectural pattern for the implementation of EAI, whose computational elements are called as â��services.â�� Though SOA can be implemented in a wide range of technologies, the web services implementation of SOA becomes the current selective choice due to its simplicity that works on basic Internet protocols. …”
Get full text
Get full text
Article -
17
Use of a non-linear algorithm to improve the maximum length sequence auditory brainstem response
Published 2012Get full text
Get full text
Proceeding Paper -
18
Image steganography using web application / Nor Arzami Othman ... [et al.]
Published 2023“…The web application proved to be a versatile and practical tool with applications in various fields such as cryptography and digital forensics. …”
Get full text
Get full text
Get full text
Article -
19
Modifying iEclat algorithm for infrequent patterns mining
Published 2018“…A few parts of this algorithm need a modification to assure that it is suitable for mining infrequent pattern. …”
Get full text
Get full text
Conference or Workshop Item -
20
Web Based Supervisor Supervisee Project Matching System
Published 2010Get full text
Get full text
Get full text
Thesis
