Web transcript verification using check digit as secure number
The case of fraudulent on academic qualification document is increasing due to the advancement of editing technology. This makes document forgery easy to be done. It has becoming a worldwide problem to verify the academic documents including the degreeās certificate and academic transcript. It is fr...
| Main Authors: | Abd Halim, Muhamad Rais, Mahdin, Hairulnizam, Yaacob, Siti Salwani |
|---|---|
| Format: | Article |
| Language: | English |
| Published: |
Faculty of Electronic and Computer Engineering (FKEKK), Universiti Teknikal Malaysia Melaka (UTeM)
2017
|
| Subjects: | |
| Online Access: | http://eprints.uthm.edu.my/5276/ http://eprints.uthm.edu.my/5276/1/AJ%202017%20%28363%29%20Web%20transcript%20verification%20using%20check.pdf |
Similar Items
Web Link Classification And Aceessibillity Modelling For Web Security Enhancement
by: Chong, Chee Way
Published: (1999)
by: Chong, Chee Way
Published: (1999)
Web Link Classification And Aceessibillity Modelling For Web Security Enhancement
by: Chong, Chee Way
Published: (1999)
by: Chong, Chee Way
Published: (1999)
Integration of wavelet packet decomposition and random secret in iris verification
by: Chin, , CS, et al.
Published: (2005)
by: Chin, , CS, et al.
Published: (2005)
Sorted locally confined non-negative matrix factorization in face verification
by: Teoh, , ABJ, et al.
Published: (2005)
by: Teoh, , ABJ, et al.
Published: (2005)
Rainfall intensity forecast using ensemble
artificial neural network and data fusion
for tropical climate
by: Mohd Safar, Noor Zuraidin, et al.
Published: (2020)
by: Mohd Safar, Noor Zuraidin, et al.
Published: (2020)
A review on complex event processing in RFID system
by: Yaacob, Siti Salwani, et al.
Published: (2018)
by: Yaacob, Siti Salwani, et al.
Published: (2018)
Internet of things (IoT); security requirements, attacks and counter measures
by: Imdad, Maria, et al.
Published: (2020)
by: Imdad, Maria, et al.
Published: (2020)
Internet Security In China
by: Jia, Xu
Published: (2005)
by: Jia, Xu
Published: (2005)
Analysis Of Deflection Routing Multihop Lightwave Networks With Limited Number Of Wavelength Converters
by: Koa , Chong Gee
Published: (2005)
by: Koa , Chong Gee
Published: (2005)
Key Management For Multicast Security
by: Daw, Win Aye
Published: (2005)
by: Daw, Win Aye
Published: (2005)
Learning Environment For PDA Security
by: Velu , Vengadeshwaran
Published: (2002)
by: Velu , Vengadeshwaran
Published: (2002)
Analysis Tool For Semantic Web Ontology
by: Selathurai, Asha Devi
Published: (2006)
by: Selathurai, Asha Devi
Published: (2006)
Smart security system for home (IOT)
by: Abd Oun, Muhamed Obed
Published: (2020)
by: Abd Oun, Muhamed Obed
Published: (2020)
Enhancement of network security by use machine learning
by: Hasan, Ahmed Raheem
Published: (2019)
by: Hasan, Ahmed Raheem
Published: (2019)
Optimal Web Surfing And Congestion Control For Internet Routing
by: S.R., Sudharsanan
Published: (2000)
by: S.R., Sudharsanan
Published: (2000)
Optimal Web Surfing And Congestion Control For Internet Routing
by: S.R., Sudharsanan
Published: (2000)
by: S.R., Sudharsanan
Published: (2000)
Solving security staff scheduling by using genetic algorithm
by: Ang, Shin Yin
Published: (2021)
by: Ang, Shin Yin
Published: (2021)
Filtering redundant data from RFID data streams
by: Kamaludin, Hazalila, et al.
Published: (2015)
by: Kamaludin, Hazalila, et al.
Published: (2015)
Consumer Attitudes Toward Web Personalization: A Malaysian Perspective
by: Milin, Rondy M.
Published: (2005)
by: Milin, Rondy M.
Published: (2005)
Performance evaluation of World Wide Web over wireless networks
by: Ahmad, Nazrul Muhaimin
Published: (2006)
by: Ahmad, Nazrul Muhaimin
Published: (2006)
Internet of things security implementation using blockchain for wireless technology
by: Karim, Karim Jabur
Published: (2019)
by: Karim, Karim Jabur
Published: (2019)
Web-based Content Management System For SMIL-Based Interactive Multimedia Content
by: Cheong, Soon Nyean
Published: (2007)
by: Cheong, Soon Nyean
Published: (2007)
Smart home security access system using field programmable gate arrays
by: Saleh, Shukur, et al.
Published: (2018)
by: Saleh, Shukur, et al.
Published: (2018)
E-store management using bell-lapadula access control security model
by: Roslan, Saidah Nafisah, et al.
Published: (2018)
by: Roslan, Saidah Nafisah, et al.
Published: (2018)
JXME Security: Encryption Overhead In End-To-End J2ME-JXTA Systems
by: Mazlan, Rima
Published: (2008)
by: Mazlan, Rima
Published: (2008)
A QoS Aware Cluster Head Selection and Hybrid Cryptography Routing Protocol for Enhancingm Efficiency and Security of VANET
by: JUBAIR, MOHAMMED AHMED, et al.
Published: (2022)
by: JUBAIR, MOHAMMED AHMED, et al.
Published: (2022)
Radio Frequency Identification (RFID) based cable detection system
by: Hasan, Syahzani Arifah, et al.
Published: (2021)
by: Hasan, Syahzani Arifah, et al.
Published: (2021)
Adaptive MIMO-OFDM combining space-time block codes and spatial multiplexing in correlated frequency-selective channels
by: Halmi, Mohd Hairi
Published: (2005)
by: Halmi, Mohd Hairi
Published: (2005)
Providing Quality Of Service In IEEE 802.11 Wireless Local Area Network (WLAN)
by: Ng, Bryan Cheng Kuan
Published: (2005)
by: Ng, Bryan Cheng Kuan
Published: (2005)
A Case Study Of Redtone International Berhad
by: Mustafa, Muhamad Sabri
Published: (2005)
by: Mustafa, Muhamad Sabri
Published: (2005)
Wavelength Converters Placement In All Optical Networks Using Particle Swarm Optimization
by: Teo , Choon Fang
Published: (2005)
by: Teo , Choon Fang
Published: (2005)
A Case Study Of SOHU
by: Kui, Zhang Wen
Published: (2005)
by: Kui, Zhang Wen
Published: (2005)
Strategic Implications Of Multimedia Messaging Services (MMS) : Identifying The Opportunities
by: Wu, Chin Gang
Published: (2005)
by: Wu, Chin Gang
Published: (2005)
Usability Study Of Websites From The Perspective Of Student Internet Users
by: Jeyakuma, Robert
Published: (2005)
by: Jeyakuma, Robert
Published: (2005)
Analysis And Design Of Active Grating-Embedded Optical Filters
by: Lim , Kian Yong
Published: (2005)
by: Lim , Kian Yong
Published: (2005)
Evaluation Of Internet Protocal Version 6 (IPV6) Implementations And Comparative Performance Analysis On Different Platforms
by: Syed Mohamed, Sulaiman
Published: (2005)
by: Syed Mohamed, Sulaiman
Published: (2005)
Design Of A Multiwavelength Optical Light Source Using Optical Frequency Comb Generator (OFCG)
by: Thum , Ann
Published: (2005)
by: Thum , Ann
Published: (2005)
A Study On Service Convergence Within A Wireless Metropolitan Area Network (MAN) In Malaysia
by: Tan, Roy Yew Hoong
Published: (2005)
by: Tan, Roy Yew Hoong
Published: (2005)
The Preferences Of Mobile Contents Reguired By Consumers And Factory Influencing The Choice Of Mobile Contents By Different Types Of Consumers
by: Xin, Lim Ke
Published: (2004)
by: Xin, Lim Ke
Published: (2004)
Maxis Communications Berhad: Maintaining Dominance In The Malaysian Mobile Communications Industry
by: Abang Zainal Abidin, Dayang Nuryati
Published: (2004)
by: Abang Zainal Abidin, Dayang Nuryati
Published: (2004)
Similar Items
-
Web Link Classification And Aceessibillity Modelling For Web Security Enhancement
by: Chong, Chee Way
Published: (1999) -
Web Link Classification And Aceessibillity Modelling For Web Security Enhancement
by: Chong, Chee Way
Published: (1999) -
Integration of wavelet packet decomposition and random secret in iris verification
by: Chin, , CS, et al.
Published: (2005) -
Sorted locally confined non-negative matrix factorization in face verification
by: Teoh, , ABJ, et al.
Published: (2005) -
Rainfall intensity forecast using ensemble
artificial neural network and data fusion
for tropical climate
by: Mohd Safar, Noor Zuraidin, et al.
Published: (2020)