Search Results - (( its applications ((new algorithm) OR (_ algorithm)) ) OR ( model application need algorithm ))
Search alternatives:
- model application »
- its applications »
- application need »
- need algorithm »
- new algorithm »
-
1
New approach of cryptography algorithm for e- mail applications
Published 2005“…Because of its short time execution and higher authentication, using this algorithm will ensure the security for internet applications.…”
Get full text
Get full text
Conference or Workshop Item -
2
Modified Data Encryption Standard Algorithm for Textbased Applications
Published 2006“…Because of its short time execution and higher authentication, using this algorithm will ensure the security for internet applications.…”
Get full text
Get full text
Thesis -
3
Solar photovoltaic system based on perturb and observe maximum power point tracking with trapezoidal rule approach under partial shading conditions
Published 2022“…Among all proposed algorithms, perturb and observe (P&O) algorithm is the most popular due to its simplicity and good convergence. …”
Get full text
Get full text
Get full text
Thesis -
4
Text spam messages classification using Artificial Immune System (AIS) algorithms
Published 2024thesis::master thesis -
5
Efficient prime-based method for interactive mining of frequent patterns.
Published 2011“…This is because the appropriate value depends on the type of application and expectation of the user. Moreover, in some real-time applications such as web mining and e-business, finding new correlations between patterns by changing the minimum support threshold is needed. …”
Get full text
Get full text
Article -
6
Efficient DNS based Load Balancing for Bursty Web Application Traffic
Published 2012“…The proposed algorithm is evaluated via computer simulation and modeling where its performance is verified against the few selected algorithms of the same nature. …”
Get full text
Get full text
Get full text
Article -
7
Impatient job scheduling under cloud computing
Published 2012“…The limitations of those algorithms were addressed and this leads to the proposition of an algorithm that has the ability to map the impatient jobs to virtual machines near its input, output, application, or forth party. …”
Get full text
Get full text
Thesis -
8
ChoCD : Usable and secure graphical password authentication scheme
Published 2024thesis::master thesis -
9
Hybrid moth flame optimization mppt algorithm for accurate real-time tracking under partially shaded photovoltaic system
Published 2021“…However, the high computational power of PSO becomes a disadvantage in real-time and highly dynamic MPPT application. In addition, with the continuous improvement effort and the possibility of a new-comer algorithm can show superior results on the current problem, a new MFO based MPPT algorithm was proposed. …”
Get full text
Get full text
Thesis -
10
-
11
Normalized Relational Storage for Extensible Markup Language (XML) Schema
Published 2011“…Problem statement: The use of XML as the common formats for representing, exchanging, storing, integrating and accessing data posses many new challenges to database systems. Most of application data are stored in relational databases due to its popularity and rich development experiences over it. …”
Get full text
Get full text
Journal -
12
Direct approach for mining association rules from structured XML data
Published 2012Get full text
Get full text
Thesis -
13
Shot boundary detection based on orthogonal polynomial
Published 2019Get full text
Get full text
Get full text
Article -
14
-
15
A security payment model for financial payment using mykad
Published 2011“…ARSA will automatically change its security algorithm based on times and attacks. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
16
Energy-efficient power allocation for downlink non orthogonal multiple access networks based on game theory and genetic algorithm / Reem Mustafa Mah’d Al Debes
Published 2025“…These results validate the algorithm's robustness, particularly under imperfect CSI conditions, where traditional methods often fail. …”
Get full text
Get full text
Get full text
Thesis -
17
-
18
Deep Learning-Driven Mobility And Utility-Based Resource Management In Mm-Wave Enable Ultradense Heterogeneous Networks
Published 2025thesis::doctoral thesis -
19
Development of a hybrid dynamic fuzzy encoder and decoder model for colour QR code
Published 2022“…The FQR code encoder algorithm provided a novel enhancement to the colour QR code by adding a colour reference to its structure. …”
Get full text
Get full text
Thesis -
20
