Web transcript verification using dual check digit as secure number
An academic transcript is an official document that stated the record of the achievement of a student in every subject they took during the studies in their learning institution. It also covers other details such as the grade point average and cumulative grade point average for each semester. This d...
| Main Author: | Abd Halim, Muhamad Rais |
|---|---|
| Format: | Thesis |
| Language: | English English English |
| Published: |
2016
|
| Subjects: | |
| Online Access: | http://eprints.uthm.edu.my/9964/ http://eprints.uthm.edu.my/9964/1/24p%20MUHAMAD%20RAIS%20ABD%20HALIM.pdf http://eprints.uthm.edu.my/9964/2/MUHAMAD%20RAIS%20ABD%20HALIM%20COPYRIGHT%20DECLARATION.pdf http://eprints.uthm.edu.my/9964/3/MUHAMAD%20RAIS%20ABD%20HALIM%20WATERMARK.pdf |
Similar Items
Web transcript verification using check digit as secure number
by: Abd Halim, Muhamad Rais, et al.
Published: (2017)
by: Abd Halim, Muhamad Rais, et al.
Published: (2017)
In-building facial recognition check-in system
by: Yong, Li Jonn
Published: (2023)
by: Yong, Li Jonn
Published: (2023)
Linked up web apps and web services
by: Nazar Syafiq, Nazri
Published: (2013)
by: Nazar Syafiq, Nazri
Published: (2013)
Online signature verification discriminators
by: Omar, Nazaruddin, et al.
Published: (2006)
by: Omar, Nazaruddin, et al.
Published: (2006)
Rough clustering for web transactions
by: Yanto, Iwan Tri Riyadi
Published: (2011)
by: Yanto, Iwan Tri Riyadi
Published: (2011)
Web-Based Reporting Vulnerabilities System for Cyber Security
Maintenance
by: Hamid Ali, Firkhan Ali, et al.
Published: (2023)
by: Hamid Ali, Firkhan Ali, et al.
Published: (2023)
A dual-watermarking with DR code against cropping and resizing attack
by: Lau, Wei Khang
Published: (2016)
by: Lau, Wei Khang
Published: (2016)
A secure lightweight approach of node membership verification in Dense HDSN
by: Pathan, Al-Sakib Khan, et al.
Published: (2007)
by: Pathan, Al-Sakib Khan, et al.
Published: (2007)
Tamper localization for medical images using cyclic redundancy check (CRC)
by: Wan Nur Shakira Ain, Wan Ranizang
Published: (2013)
by: Wan Nur Shakira Ain, Wan Ranizang
Published: (2013)
Consistency check between XML schema and class diagram for document versioning
by: Ibrahim, Rosziati, et al.
Published: (2018)
by: Ibrahim, Rosziati, et al.
Published: (2018)
PSM / PTA evaluation web management system
by: Chong, Michael Ka Wai
Published: (2013)
by: Chong, Michael Ka Wai
Published: (2013)
A secure message handler using microsoft cryptoapi
by: Eh Kan, Chessda Uttraphan
Published: (2003)
by: Eh Kan, Chessda Uttraphan
Published: (2003)
A secure and efficient way of node membership verification in wireless sensor networks
by: Pathan, Al-Sakib Khan, et al.
Published: (2007)
by: Pathan, Al-Sakib Khan, et al.
Published: (2007)
Mobile Student Verification System for Major Examination (S-VEC)
by: Aziman, Abdullah, et al.
Published: (2008)
by: Aziman, Abdullah, et al.
Published: (2008)
Web usage mining for UUM learning care using association rules
by: Ramli, Azizul Azhar
Published: (2004)
by: Ramli, Azizul Azhar
Published: (2004)
Web usage mining for UUM learning care using association rules
by: Ramli, Azizul Azhar
Published: (2004)
by: Ramli, Azizul Azhar
Published: (2004)
Pre-Fetch Data Caching Strategy in Mobile Database System for Integrity Constraints Checking
by: Zarina, Dzolkhifli, et al.
Published: (2015)
by: Zarina, Dzolkhifli, et al.
Published: (2015)
Web-based internet security / Zuriani Karia
by: Zuriani, Karia
Published: (2003)
by: Zuriani, Karia
Published: (2003)
Mobile-Based Digital Car Plate Number for Future Automotive Industry
by: Malathy, Batumalay, et al.
Published: (2019)
by: Malathy, Batumalay, et al.
Published: (2019)
Stegano-image as a digital signature to improve security authentication system in mobile computing
by: Mantoro, Teddy, et al.
Published: (2016)
by: Mantoro, Teddy, et al.
Published: (2016)
A Study and Development of Web Based Social Interaction Platform with Assimilated Electronic Commerce and Weblog Functionalities
by: Rendy, Rendy
Published: (2010)
by: Rendy, Rendy
Published: (2010)
A Defensive Evidence Model: An Approach of Security Model for Storing Digital Evidence in Network Forensics
by: Mohd Izham, Ibrahim, et al.
Published: (2012)
by: Mohd Izham, Ibrahim, et al.
Published: (2012)
Improvement of the POLISAS e-request transcript system using query optimization
by: Mohd Hariz, Ibrahim, et al.
Published: (2020)
by: Mohd Hariz, Ibrahim, et al.
Published: (2020)
Performance optimization of Java virtual machine on Dual-Core Technology for web services - A Study.
by: Chong, K.M., et al.
Published: (2007)
by: Chong, K.M., et al.
Published: (2007)
A review of user authentication model for online banking system based on mobile IMEI number
by: Hammood, Waleed A., et al.
Published: (2020)
by: Hammood, Waleed A., et al.
Published: (2020)
Application of Intuitionistic Z-Numbers in Supplier Selection
by: Nik Muhammad Farhan Hakim, Nik Badrul Alam, et al.
Published: (2023)
by: Nik Muhammad Farhan Hakim, Nik Badrul Alam, et al.
Published: (2023)
Design and process metamodels for modelling and verification of safety-related software applications in smart building systems
by: Murni, Fatehah, et al.
Published: (2018)
by: Murni, Fatehah, et al.
Published: (2018)
Disaster recovery with minimum replica plan for reliability
checking in multi-cloud
by: Alshammari, Mohammad Matar, et al.
Published: (2018)
by: Alshammari, Mohammad Matar, et al.
Published: (2018)
Analysis of web worm attack on web application
by: Mohd. Ghazzali, Amalina
Published: (2008)
by: Mohd. Ghazzali, Amalina
Published: (2008)
Hybrid scheduling and dual queue scheduling
by: Mahmood, Ahmad Kamil
Published: (2009)
by: Mahmood, Ahmad Kamil
Published: (2009)
New formula to calculate the number of designs in RADG cryptosystem
by: Kadhum, Laith M., et al.
Published: (2021)
by: Kadhum, Laith M., et al.
Published: (2021)
Colour number coding scheme for time-varying visualisation in glassy ion trajectories
by: Mohamad Sharif, Johan, et al.
Published: (2006)
by: Mohamad Sharif, Johan, et al.
Published: (2006)
Web based agent for transaction of mercantile-security measures / Yan Wee Jing
by: Yan , Wee Jing
Published: (2001)
by: Yan , Wee Jing
Published: (2001)
WebOPAC golongan cacat penglihatan / Fazilah Muhamad Haul
by: Fazilah , Muhamad Haul
Published: (2003)
by: Fazilah , Muhamad Haul
Published: (2003)
A comparative analysis on artificial intelligence techniques for web phishing classification
by: Tengku Balqis, Tengku Abd Rashid, et al.
Published: (2020)
by: Tengku Balqis, Tengku Abd Rashid, et al.
Published: (2020)
Numbering with Spiral Pattern to Prove Authenticity and Integrity in Medical Images
by: Syifak Izhar, Hisham, et al.
Published: (2016)
by: Syifak Izhar, Hisham, et al.
Published: (2016)
Verification the performance of Microsoft SQL Server / Nageswary Gannapathy
by: Nageswary , Gannapathy
Published: (2002)
by: Nageswary , Gannapathy
Published: (2002)
An implementing of zigzag pattern in numbering watermarking bits for high detection accuracy of tampers in document
by: Usop, Nur Alya Afikah, et al.
Published: (2022)
by: Usop, Nur Alya Afikah, et al.
Published: (2022)
SMS applications: Short Messaging & Result Checking System (SMRCS) / Lau Sook Wai
by: Lau , Sook Wai
Published: (2003)
by: Lau , Sook Wai
Published: (2003)
Smart home security
by: Mohammad Syafi Azim, Mohd Razam
Published: (2019)
by: Mohammad Syafi Azim, Mohd Razam
Published: (2019)
Similar Items
-
Web transcript verification using check digit as secure number
by: Abd Halim, Muhamad Rais, et al.
Published: (2017) -
In-building facial recognition check-in system
by: Yong, Li Jonn
Published: (2023) -
Linked up web apps and web services
by: Nazar Syafiq, Nazri
Published: (2013) -
Online signature verification discriminators
by: Omar, Nazaruddin, et al.
Published: (2006) -
Rough clustering for web transactions
by: Yanto, Iwan Tri Riyadi
Published: (2011)