Web transcript verification using dual check digit as secure number
An academic transcript is an official document that stated the record of the achievement of a student in every subject they took during the studies in their learning institution. It also covers other details such as the grade point average and cumulative grade point average for each semester. This d...
| Main Author: | Abd Halim, Muhamad Rais |
|---|---|
| Format: | Dissertation |
| Language: | English English English |
| Published: |
2016
|
| Subjects: | |
| Online Access: | http://eprints.uthm.edu.my/9964/ |
| Abstract | Abstract here |
Similar Items
Mobile and Web-Based Entry Requirement Checking Expert System For Postgraduate Studies in UUM. (ERCES).
by: Alkayyal, Tareq D. T.
Published: (2007)
by: Alkayyal, Tareq D. T.
Published: (2007)
A dual-watermarking with DR code against cropping and resizing attack
by: Lau, Wei Khang
Published: (2016)
by: Lau, Wei Khang
Published: (2016)
Rough clustering for web transactions
by: Yanto, Iwan Tri Riyadi
Published: (2011)
by: Yanto, Iwan Tri Riyadi
Published: (2011)
A secure message handler using microsoft cryptoapi
by: Eh Kan, Chessda Uttraphan
Published: (2003)
by: Eh Kan, Chessda Uttraphan
Published: (2003)
Developing secure android application with encrypted database file using sqlcipher
by: Rachmawan, Ardiansa
Published: (2014)
by: Rachmawan, Ardiansa
Published: (2014)
Web usage mining for UUM learning care using association rules
by: Ramli, Azizul Azhar
Published: (2004)
by: Ramli, Azizul Azhar
Published: (2004)
Web usage mining for UUM learning care using association rules
by: Ramli, Azizul Azhar
Published: (2004)
by: Ramli, Azizul Azhar
Published: (2004)
Developing Cost And Risk Assessment Tool For Hybrid Approach In Information Security Risk Analysis
by: Mohd Zabawi, Ahmed Yaser
Published: (2019)
by: Mohd Zabawi, Ahmed Yaser
Published: (2019)
The Implementation of Securing Plaintext File Using Cryptography Method in Web Based Environment
by: Hasnira, Md. Lazim
Published: (2004)
by: Hasnira, Md. Lazim
Published: (2004)
Information security risk management framework for Social Engineering attack and digital prevention techniques
by: Shekh Abdullah -Al-Musa Ahmed
Published: (2020)
by: Shekh Abdullah -Al-Musa Ahmed
Published: (2020)
The Challenges Of Understanding Security In Web Browser Case Study: Internet Explorer And Mozilla Firefox
by: Saleh, Ashraf Mousa
Published: (2008)
by: Saleh, Ashraf Mousa
Published: (2008)
Measuring Business Process Complexity Using Cyclomatic Number
by: Sharifah Intan Eriyatty, Syed Mansor
Published: (2004)
by: Sharifah Intan Eriyatty, Syed Mansor
Published: (2004)
Development of SecureMet: A Tool for Aligning Security Metrics and Organizations Security Objectives
by: Noraini, Mohd Noor
Published: (2011)
by: Noraini, Mohd Noor
Published: (2011)
Comparative analysis for performance measurements of software testing between mobile applications and web applications
by: Hassan Muhamad, Zainab
Published: (2015)
by: Hassan Muhamad, Zainab
Published: (2015)
A feature-based dual-layer ensemble classification method for emotional state recognition / Mehdi Malekzadeh
by: Mehdi , Malekzadeh
Published: (2017)
by: Mehdi , Malekzadeh
Published: (2017)
Pemodelan Sistem Legasi Kepada Sistem Berasaskan Web Menggunakan UML
by: Abd. Rasid, Mamat
Published: (2002)
by: Abd. Rasid, Mamat
Published: (2002)
Ontology Driven Web Data Extraction
by: Hazlinda, Ghazali
Published: (2004)
by: Hazlinda, Ghazali
Published: (2004)
Development of implementation models for Hospital information system (HIS) in Malaysian Public Hospitals
by: Ismail, Nurul Izzatty
Published: (2016)
by: Ismail, Nurul Izzatty
Published: (2016)
An improved bat algorithm with artificial neural networks for classification problems
by: Rehman Gillani, Syed Muhammad Zubair
Published: (2016)
by: Rehman Gillani, Syed Muhammad Zubair
Published: (2016)
Functional link neural network with modified bee-firefly learning algorithm for classification task
by: Mohmad Hassim, Yana Mazwin
Published: (2016)
by: Mohmad Hassim, Yana Mazwin
Published: (2016)
An efficient multi join query optimization for relational database management system using swarm intelligence approaches
by: Alsaedi, Ahmed Khalaf Zager
Published: (2016)
by: Alsaedi, Ahmed Khalaf Zager
Published: (2016)
An efficient multi join query optimization for relational database management system using swarm intelligence approaches
by: Alsaedi, Ahmed Khalaf Zager
Published: (2016)
by: Alsaedi, Ahmed Khalaf Zager
Published: (2016)
Test suite reduction in android application using refactoring
by: Ahmed, Maryam Temitayo
Published: (2016)
by: Ahmed, Maryam Temitayo
Published: (2016)
Comparison study on sorting techniques in static data structure
by: Naser Frak, Anwar
Published: (2016)
by: Naser Frak, Anwar
Published: (2016)
Design and simulation of variants of koch models for fractal antenna
by: Riaz, Ul Haq
Published: (2011)
by: Riaz, Ul Haq
Published: (2011)
Tamper localization and recovery watermarking schemes for medical images in PACS
by: Liew, Siew Chuin
Published: (2011)
by: Liew, Siew Chuin
Published: (2011)
An adaptive QOS scheduling algorithm in service oriented grid and cloud environment / Ang Tan Fong
by: Ang, Tan Fong
Published: (2011)
by: Ang, Tan Fong
Published: (2011)
A model for federated data grid systems based on network core area
by: Mohamad, Zarina
Published: (2013)
by: Mohamad, Zarina
Published: (2013)
Small Dataset Learning In Prediction Model Using Box-Whisker Data Transformation
by: Lateh, Masitah bdul
Published: (2020)
by: Lateh, Masitah bdul
Published: (2020)
Development Of The Readability Index Model For Young Adults With Reading Difficulties In Malay Language
by: Mohamad Hazawawi, Nur Amalina
Published: (2019)
by: Mohamad Hazawawi, Nur Amalina
Published: (2019)
User Acceptance Of Mobile Augmented Reality For Tourism By Adopting The UTAUT Model
by: Low, Wei Shang
Published: (2019)
by: Low, Wei Shang
Published: (2019)
The enhancement of gamification leader board model based on player type to increase learning engagement
by: Daud, Rafizah
Published: (2019)
by: Daud, Rafizah
Published: (2019)
Production quantity estimation using an improved artificial neural network
by: Dzakiyullah, Raden Nur Rachman
Published: (2015)
by: Dzakiyullah, Raden Nur Rachman
Published: (2015)
Discovering student learning styles in engineering mathematic at Politeknik Merlimau using neural network techniques
by: Mat Esa, Asmarizan
Published: (2015)
by: Mat Esa, Asmarizan
Published: (2015)
Online reservation system for Al-Kindi General Hospital
by: Bdair Hashim, Hasan
Published: (2015)
by: Bdair Hashim, Hasan
Published: (2015)
Tool-assisted model for software requirement negotiation
by: Lau, Hong Sheng
Published: (2015)
by: Lau, Hong Sheng
Published: (2015)
Dyscreen : cross-platform dyslexia screening test for Malaysian children through hybrid applications
by: Leong, Pui Huang
Published: (2015)
by: Leong, Pui Huang
Published: (2015)
Logical approach : consistency rules between activity diagram and class diagram
by: Sulaiman, Noraini
Published: (2015)
by: Sulaiman, Noraini
Published: (2015)
Real estate recommender systems using case-base reasoning approach
by: Alrawhani, Ebrahim Mohammed Abdo
Published: (2014)
by: Alrawhani, Ebrahim Mohammed Abdo
Published: (2014)
Cancer patient's record queries using answer on-demand data sharing architecture
by: Aiza Syahida, Zakaria
Published: (2014)
by: Aiza Syahida, Zakaria
Published: (2014)
Similar Items
-
Mobile and Web-Based Entry Requirement Checking Expert System For Postgraduate Studies in UUM. (ERCES).
by: Alkayyal, Tareq D. T.
Published: (2007) -
A dual-watermarking with DR code against cropping and resizing attack
by: Lau, Wei Khang
Published: (2016) -
Rough clustering for web transactions
by: Yanto, Iwan Tri Riyadi
Published: (2011) -
A secure message handler using microsoft cryptoapi
by: Eh Kan, Chessda Uttraphan
Published: (2003) -
Developing secure android application with encrypted database file using sqlcipher
by: Rachmawan, Ardiansa
Published: (2014)
