Search Results - (( wave application need algorithm ) OR ( ((web application) OR (its application)) new algorithm ))

Refine Results
  1. 1
  2. 2

    Energy-efficient power allocation for downlink non orthogonal multiple access networks based on game theory and genetic algorithm / Reem Mustafa Mah’d Al Debes by Reem Mustafa , Mah’d Al Debes

    Published 2025
    “…Furthermore, the research explores advanced applications such as integrating NOMA with Millimeter-Wave technology and optimizing user association strategies, enhancing system capacity and overall performance. …”
    Get full text
    Get full text
    Get full text
    Thesis
  3. 3

    A novel methodology for hydrocarbon depth prediction in seabed logging: Gaussian process-based inverse modeling of electromagnetic data by Daud, H., Mohd Aris, M.N., Mohd Noh, K.A., Dass, S.C.

    Published 2021
    “…Seabed logging (SBL) is an application of electromagnetic (EM) waves for detecting potential marine hydrocarbon-saturated reservoirs reliant on a source-receiver system. …”
    Get full text
    Get full text
    Article
  4. 4

    Efficient DNS based Load Balancing for Bursty Web Application Traffic by Chin, Mei Lu, Chong, Eng Tan, Mohamad Imran, Bin Bandan

    Published 2012
    “…This research proposes a new efficient load balancing algorithm which applies to the local Domain Name Service (DNS) server for web based applications and services to ease the sudden increase in demand for the services. …”
    Get full text
    Get full text
    Get full text
    Article
  5. 5
  6. 6

    Adaptive security architecture for protecting RESTful web services in enterprise computing environment by Beer, M.I., Hassan, M.F.

    Published 2018
    “…This SOA implementation does not possess adequate security solutions within it, and its security is completely dependent on network/transport layer security that is obsolete owing to latest web technologies such as Web 2.0 and its upgraded version, Web 3.0. …”
    Get full text
    Get full text
    Article
  7. 7

    Adaptive security architecture for protecting RESTful web services in enterprise computing environment by Beer, M.I., Hassan, M.F.

    Published 2018
    “…This SOA implementation does not possess adequate security solutions within it, and its security is completely dependent on network/transport layer security that is obsolete owing to latest web technologies such as Web 2.0 and its upgraded version, Web 3.0. …”
    Get full text
    Get full text
    Article
  8. 8

    A new algorithm to measure relevance among Web pages by Sadi, M.S., Rahman, M.M. Hafizur, Horiguchi, Susumu

    Published 2006
    “…This paper proposes a new algorithm to measure relevance among Web pages (RWP) using a hybrid method of hyperlink analysis and content analysis. …”
    Get full text
    Get full text
    Get full text
    Article
  9. 9
  10. 10

    DESIGN AND EVALUATION OF RESOURCE ALLOCATION AND JOB SCHEDULING ALGORITHMS ON COMPUTATIONAL GRIDS by MEHMOOD SHAH, SYED NASIR

    Published 2012
    “…Thus, overall aim of this research is to introduce new grid scheduling algorithms for resource allocation as well as for job scheduling for enabling a highly efficient and effective utilization of the resources in executing various applications. …”
    Get full text
    Get full text
    Thesis
  11. 11
  12. 12
  13. 13
  14. 14
  15. 15

    Automatic marking system for programming subject by Chan, Jin Yee

    Published 2023
    “…This project is a web application designed for lecturer that teaching programming subject to automatically mark programming algorithm exercise. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  16. 16

    Content-based recommender system for an academic social network / Vala Ali Rohani by Vala Ali, Rohani

    Published 2014
    “…The rapid growth of Web 2.0 applications, such as blogs and social networks creates rich online information and provides various new sources of knowledge. …”
    Get full text
    Get full text
    Thesis
  17. 17

    A New Mobile Botnet Classification based on Permission and API Calls by Yusof, M, Saudi, MM, Ridzuan, F

    Published 2024
    “…Therefore, this paper presents a new mobile botnet classification based on permission and Application Programming Interface (API) calls in the smartphone. …”
    Proceedings Paper
  18. 18

    An Accurate and Efficient Shooting-and-bouncing-polygon Ray Tracer For Radio Propagation Modelling by Teh, Chin Hui

    Published 2019
    “…We have described the associated problems and proposed an algorithm to perform the transformation or projection.Thirdly, we have proposed a new spatial partitioning scheme to be used with the SBP ray tracer. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  19. 19

    Design and Implementation of Intelligent Interoperability Framework for Heterogeneous Subsystems in Smart Home Environment by Perumal, Thinagaran

    Published 2011
    “…Significant growths of subsystems are visible especially with new services, applications and devices in smart home environment. …”
    Get full text
    Get full text
    Thesis
  20. 20