Search Results - "Chuah, Chai"
-
1
Omega Network Pseudorandom Key Generation Based on DNA Cryptography
Published in Applied sciences (01-08-2022)“…Eliminating the risk of bugs and external decryption in cryptographic keys has always been a challenge for researchers. The current research is based on a new…”
Get full text
Journal Article -
2
GMean—a semi-supervised GRU and K-mean model for predicting the TF binding site
Published in Scientific reports (30-01-2024)“…The transcription factor binding site is a deoxyribonucleic acid sequence that binds to transcription factors. Transcription factors are proteins that regulate…”
Get full text
Journal Article -
3
Secure Login Mechanism for Online Banking
Published in JOIV : international journal on informatics visualization Online (06-06-2018)“…Login is one of the important security features in online banking. This research investigates the mechanism for an existing online banking in Malaysia…”
Get full text
Journal Article -
4
Smart Indoor Home Surveillance Monitoring System Using Raspberry Pi
Published in JOIV : international journal on informatics visualization Online (10-09-2018)“…Internet of Things (IoTs) are internet computing devices which are connected to everyday objects that can receive and transmit data intelligently. IoTs allow…”
Get full text
Journal Article -
5
SHEARS INC. Salon Management System
Published in JOIV : international journal on informatics visualization Online (16-11-2017)“…Management system is the framework of processes and procedures used to ensure that an organization can fulfil all task required to achieve its objectives. In…”
Get full text
Journal Article -
6
Blockchain-Based Electronic Voting Protocol
Published in JOIV : international journal on informatics visualization Online (10-09-2018)“…Current electronic voting protocol require a centralized system to control the whole procedure from ballot inputs to result outputs and election monitoring…”
Get full text
Journal Article -
7
Secret Channel using Video Steganography
Published in JOIV : international journal on informatics visualization Online (16-11-2017)“…Video steganography is about hiding the secret message into the video as the cover media. Steganography is a technique use to secure the transmission of secret…”
Get full text
Journal Article -
8
Fighting Cancer around the World: A Framework for Action
Published in Healthcare (Basel) (25-10-2022)“…Tackling cancer is a major challenge right on the global level. Europe is only the tip of an iceberg of cancer around the world. Prosperous developed countries…”
Get full text
Journal Article -
9
Key derivation function: key-hash based computational extractor and stream based pseudorandom expander
Published in PeerJ. Computer science (23-08-2024)“…The key derivation function is a specific cryptographic algorithm that transforms private string and public strings into one or more cryptographic keys. The…”
Get full text
Journal Article -
10
Staff Attendance System using RFID
Published in JOIV : international journal on informatics visualization Online (16-11-2017)“…Attendance system University Tun Hussien Onn Malaysia is the system to record, and monitor the staff attendance to the daily work. This project is to design…”
Get full text
Journal Article -
11
Delivery Route Management based on Dijkstra Algorithm
Published in Majallat Baghdād lil-ʻulūm (30-03-2021)“…For businesses that provide delivery services, the efficiency of the delivery process in terms of punctuality is very important. In addition to increasing…”
Get full text
Journal Article -
12
An Automated Machine Learning Workflow to Classify Soil Texture for Crop Yield
Published in 2024 7th International Conference on Computer Information Science and Application Technology (CISAT) (12-07-2024)“…Soil classification is used for crop selection to determine the type of activity that can be done on a particular piece of land. This is especially important…”
Get full text
Conference Proceeding