Search Results - (( developing commerce application algorithm ) OR ( java adaptation optimization algorithm ))

Refine Results
  1. 1
  2. 2
  3. 3
  4. 4
  5. 5

    Developing a prototype e-commerce application with credit card validation and secure transaction by M. A., Ameedeen

    Published 2005
    “…Therefore many are actually switching to e-commerce applications. Anyhow,the problem with e-commerce application is that many of them are not secure.This application is designed to enhance the e-commerce applications with additional security items.The security enhancement made was integrating an encryption module that secures the data that are stored in the databases. …”
    Get full text
    Get full text
    Undergraduates Project Papers
  6. 6
  7. 7
  8. 8
  9. 9

    A security payment model for financial payment using mykad by Ahmad Zahari, Nurul Huda

    Published 2011
    “…A system with security technique named Arbitrary Random Security Algorithm (ARSA) and a one-to-one multithreading model need to be developed in order to accelerate the authentication response time of MPM. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  10. 10
  11. 11

    Anfis Modelling On Diabetic Ketoacidosis For Unrestricted Food Intake Conditions by Saraswati, Galuh Wilujeng

    Published 2017
    “…The project has also implemented the optimization process onto the proposed ANFIS model through the hybrid of Genetic Algorithm on the fuzzy membership function of the ANFIS model. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  12. 12
  13. 13
  14. 14

    A Toolkit for Simulation of Desktop Grid Environment by FOROUSHAN, PAYAM CHINI

    Published 2014
    “…The selected methodology for the application development is based on prototyping methodology. …”
    Get full text
    Get full text
    Final Year Project
  15. 15

    Effects of integration on the cost reduction in distribution network design for perishable products by Firoozi, Zahra, Ismail, Napsiah, Ariafar, Shahram, Tang, Sai Hong, Mohd Ariffin, Mohd Khairol Anuar, Mamariani, A.

    Published 2014
    “…To solve the integrated model, a memetic algorithm (MA) is developed in this study. For verification of the proposed algorithm, its results are compared with the results of an adapted Lagrangian relaxation heuristic algorithm from the literature. …”
    Get full text
    Get full text
    Get full text
    Article
  16. 16

    Data hiding mobile application by using encryption and decryption / Nuha Bakizah Mohd Asri by Mohd Asri, Nuha Bakizah

    Published 2021
    “…The main for this techniques which was encryption and decryption were introduced and developed to provide security to these applications. …”
    Get full text
    Get full text
    Student Project
  17. 17
  18. 18

    A qualitative study of families of Edwards Curves and their applications in cryptography / Nurul Azwa Kamaruddin and Nurul Ain Mustakim by Kamaruddin, Nurul Azwa, Mustakim, Nurul Ain

    Published 2012
    “…Cryptography is the science of hiding information and its applications include ATM cards, computer passwords and electronic commerce in this modern world. …”
    Get full text
    Get full text
    Research Reports
  19. 19
  20. 20

    Deep learning model for predicting and detecting overlapping symptoms of cardiovascular diseases in hospitals of UAE by Abbas Alhadeethy, Najwa Fadhil, Khedher, Akram M Z M, Shah, Asadullah

    Published 2012
    “…Hence, the best clinical applications of DL require considerate problem solving solution, selection of the most suitable DL algorithms and information, and defining balance of outcome. …”
    Get full text
    Get full text
    Get full text
    Article