Skip to main content
Skip to main navigation menu
Skip to site footer
Open Menu
Journal of Mathematical & Computer Applications
Current
Archives
About
About the Journal
Submissions
Privacy Statement
Contact
Search
Register
Login
Home
/
Archives
/
Vol. 2 No. 2 (2023): Volume 2 Issue 2
Vol. 2 No. 2 (2023): Volume 2 Issue 2
Published:
2023-06-30
Articles
Pi Calculation Reinvented a Trigonometry
Sami Almuaigel (Author)
1-2
View PDF
Audit Trails and Logging Biometric Authentication for Data Security in Banking Using Reporting Tools
Pranay Mungara (Author)
1-5
View PDF
New Discoveries in Number Theory and its Practical Application
Hussein Rabab (Author)
1-4
View PDF
Automating Clinical Data Cleaning and Analysis Using SAS Macros
Arvind Uttiramerur (Author)
1-4
View PDF
Solar Far Infrared-Induced Growth of Plants is Due to Non Thermal Effect of Infrared to Radio-Frequency Electromagnetic Energy: Verification by Quantum Chemistry Molecular Modeling (DFT/MM)
Shozo Yanagida, Takeko Matsumura (Author)
1-2
View PDF
Evolving Trends in Cybersecurity: Exploring the Latest Technologies and Strategies
Pavan Navandar (Author)
1-2
View PDF
Optimizing Real-Time Data Processing in Azure Stream Analytics with .NET: Techniques and Best Practices
Sai Vaibhav Medavarapu (Author)
1-4
View PDF
Climate Change May be Driven by Solar Microwaves and Radio Waves –A Molecular Modeling (DFT/MM) Study
Shozo Yanagida, Takeko Matsumura (Author)
1-2
View PDF
Containerization Strategies for Medical Device Software Development and Deployment
Prayag Ganoje (Author)
1-4
View PDF
Enhancing Road Safety: A System for Monitoring and Reporting Driver Violations
Sahil Nyati (Author)
1-6
View PDF
Enhanced image similarity search: Boundary of similarity approach with similarity hashing for Image Datasets
Sambu Patach Arrojula (Author)
1-4
View PDF
The Role of Data in Modernizing School Bus Transportation
Aditya Kumar Sharma (Author)
1-8
View PDF
Architecting Secure REST APIs with Authentication and Authorization Approaches for Web Services
Rajesh Kotha (Author)
1-5
View PDF
The Impact of Quantum Computing on Cybersecurity
Phani Sekhar Emmanni (Author)
1-4
View PDF
Advances in Distributed Storage Systems for Big Data
Nishanth Reddy Mandala (Author)
1-8
View PDF
Leveraging Spark and PySpark for Data-Driven Success: Insights and Best Practices Including Parallel Processing, Data Partitioning, and Fault Tolerance Mechanisms
Sree Sandhya kona (Author)
1-4
View PDF
Multi-Armed Bandit Algorithms in A/B Testing: Comparing the Performance of Various Multi-Armed Bandit Algorithms in the Context of A/B Testing
Suraj Kumar (Author)
1-4
View PDF
Cybersecurity in a Remote Work Era: Strategies for Securing Distributed Workforces
Nikhil Bhagat (Author)
1-5
View PDF
Custom SAP Fiori Application Development: Enhancing UX and Process Efficiency through UI5
Pavan Kumar Devarashetty (Author)
1-4
View PDF
Introduction to Algorithmic Trading Strategies
Bhupinder Paul Singh Sahni (Author)
1-4
View PDF
Cross-Platform vs Native iOS Development: Impacts on Cloud Integration
Rajesh Nadipalli (Author)
1-5
View PDF
Zero Trust Architecture in Kubernetes: Implementing Identity -Aware Network Controls
Sri Ramya Deevi (Author)
1-5
View PDF