Search Results - (( wave application need algorithm ) OR ( ((web application) OR (its application)) _ algorithm ))

Refine Results
  1. 1
  2. 2

    Secured mobile transaction using NFC Technology: Top-Up printing system by Ayu, Media Anugerah, Mantoro, Teddy, Brotosaputro, Gunawan, Ain, Nur F., Ghazali, Noorzalina

    Published 2011
    “…NFC technology has become a success across a broad range of applications depending on its large- scale adoption by enterprises and consumers. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Proceeding Paper
  3. 3

    Energy-efficient power allocation for downlink non orthogonal multiple access networks based on game theory and genetic algorithm / Reem Mustafa Mah’d Al Debes by Reem Mustafa , Mah’d Al Debes

    Published 2025
    “…Furthermore, the research explores advanced applications such as integrating NOMA with Millimeter-Wave technology and optimizing user association strategies, enhancing system capacity and overall performance. …”
    Get full text
    Get full text
    Get full text
    Thesis
  4. 4
  5. 5
  6. 6

    NFC secured online transaction in mobile computing business by Mantoro, Teddy, Ayu, Media Anugerah, Brotosaputro, Gunawan, Ain, Nur F., Ghazali, Noorzalina

    Published 2012
    “…NFC technology has become a success across a broad range of applications depending on its large-scale adoption by enterprises and consumers. …”
    Get full text
    Get full text
    Get full text
    Article
  7. 7

    A novel methodology for hydrocarbon depth prediction in seabed logging: Gaussian process-based inverse modeling of electromagnetic data by Daud, H., Mohd Aris, M.N., Mohd Noh, K.A., Dass, S.C.

    Published 2021
    “…Seabed logging (SBL) is an application of electromagnetic (EM) waves for detecting potential marine hydrocarbon-saturated reservoirs reliant on a source-receiver system. …”
    Get full text
    Get full text
    Article
  8. 8

    Intelligent agent for e-commerce using genetic algorithm / Kok Sun Sun by Kok , Sun Sun

    Published 2000
    “…In addition, the system is developed using the developing tools that are essential in web applications, namely. web server, database server, system server and web programming tools such as ASP and Visual Basic. …”
    Get full text
    Get full text
    Thesis
  9. 9
  10. 10

    Web Usage Mining Using GSP Algorithm: A Study on Sultanah Bahiyah Library Online Databases by Hazzaimeh, Yousef Abd-AlMohdi

    Published 2008
    “…Application of data mining to the World Wide Web referred as Web mining is at the cross road of research from several research communities which can be divided into three branches: Web Content Mining, Web Structure Mining and Web Usage Mining. …”
    Get full text
    Get full text
    Get full text
    Thesis
  11. 11

    Random traveling wave pulse coupled oscillator (RTWPCO) algorithm of energy-efficient wireless sensor networks by Al-Mekhlafi, Zeyad Ghaleb Aqlan, Mohd Hanapi, Zurina, Othman, Mohamed, Ahmad Zukarnain, Zuriati, Shamsan Saleh, Ahmed M.

    Published 2018
    “…As a result, it is more suitable and harder to identify demands in all applications. The pulse-coupled oscillator mechanism causing delay and uncharitable applications needs to reduce energy consumption to the smallest level. …”
    Get full text
    Get full text
    Article
  12. 12

    Efficient DNS based Load Balancing for Bursty Web Application Traffic by Chin, Mei Lu, Chong, Eng Tan, Mohamad Imran, Bin Bandan

    Published 2012
    “…This research proposes a new efficient load balancing algorithm which applies to the local Domain Name Service (DNS) server for web based applications and services to ease the sudden increase in demand for the services. …”
    Get full text
    Get full text
    Get full text
    Article
  13. 13

    Adaptive security architecture for protecting RESTful web services in enterprise computing environment by Beer, M.I., Hassan, M.F.

    Published 2018
    “…This SOA implementation does not possess adequate security solutions within it, and its security is completely dependent on network/transport layer security that is obsolete owing to latest web technologies such as Web 2.0 and its upgraded version, Web 3.0. …”
    Get full text
    Get full text
    Article
  14. 14

    Adaptive security architecture for protecting RESTful web services in enterprise computing environment by Beer, M.I., Hassan, M.F.

    Published 2018
    “…This SOA implementation does not possess adequate security solutions within it, and its security is completely dependent on network/transport layer security that is obsolete owing to latest web technologies such as Web 2.0 and its upgraded version, Web 3.0. …”
    Get full text
    Get full text
    Article
  15. 15
  16. 16

    Cryptanalytic attacks on Rivest, Shamir, and Adleman (RSA) cryptosystem: issues and challenges by Abubakar, Adamu, Jabaka, Shehu, Tijani, Bello Idrith, Zeki, Akram M., Chiroma, Haruna, Usman, Mohammed Joda, Raji, Shakirat, Mahmud, Murni

    Published 2014
    “…Generally RSA algorithm gain a security support because of it’s frequently use in most applications where security of digital data is mostly a concern. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  17. 17
  18. 18
  19. 19
  20. 20