Search Results - "Chuah, Chai"

  • Showing 1 - 12 results of 12
Refine Results
  1. 1

    Omega Network Pseudorandom Key Generation Based on DNA Cryptography by Rahman, Gohar, Wen, Chuah Chai

    Published in Applied sciences (01-08-2022)
    “…Eliminating the risk of bugs and external decryption in cryptographic keys has always been a challenge for researchers. The current research is based on a new…”
    Get full text
    Journal Article
  2. 2

    GMean—a semi-supervised GRU and K-mean model for predicting the TF binding site by Chuah, Chai Wen, He, Wanxian, Huang, De-Shuang

    Published in Scientific reports (30-01-2024)
    “…The transcription factor binding site is a deoxyribonucleic acid sequence that binds to transcription factors. Transcription factors are proteins that regulate…”
    Get full text
    Journal Article
  3. 3

    Secure Login Mechanism for Online Banking by Syahir, Ahmad, Wen, Chuah Chai

    “…Login is one of the important security features in online banking. This research investigates the mechanism for an existing online banking in Malaysia…”
    Get full text
    Journal Article
  4. 4

    Smart Indoor Home Surveillance Monitoring System Using Raspberry Pi by Han Keat, Lee, Wen, Chuah Chai

    “…Internet of Things (IoTs) are internet computing devices which are connected to everyday objects that can receive and transmit data intelligently. IoTs allow…”
    Get full text
    Journal Article
  5. 5

    SHEARS INC. Salon Management System by Chai, Annie, Wen, Chuah Chai

    “…Management system is the framework of processes and procedures used to ensure that an organization can fulfil all task required to achieve its objectives. In…”
    Get full text
    Journal Article
  6. 6

    Blockchain-Based Electronic Voting Protocol by Zheng Wei, Clement Chan, Wen, Chuah Chai

    “…Current electronic voting protocol require a centralized system to control the whole procedure from ballot inputs to result outputs and election monitoring…”
    Get full text
    Journal Article
  7. 7

    Secret Channel using Video Steganography by Yee, Lee Kar, Wen, Chuah Chai

    “…Video steganography is about hiding the secret message into the video as the cover media. Steganography is a technique use to secure the transmission of secret…”
    Get full text
    Journal Article
  8. 8
  9. 9

    Key derivation function: key-hash based computational extractor and stream based pseudorandom expander by Chuah, Chai Wen, Harun, Nur Ziadah, Hamid, Isredza Rahmi A

    Published in PeerJ. Computer science (23-08-2024)
    “…The key derivation function is a specific cryptographic algorithm that transforms private string and public strings into one or more cryptographic keys. The…”
    Get full text
    Journal Article
  10. 10

    Staff Attendance System using RFID by Abdul Razak, Muhammad Thariq, Wen, Chuah Chai

    “…Attendance system University Tun Hussien Onn Malaysia is the system to record, and monitor the staff attendance to the daily work. This project is to design…”
    Get full text
    Journal Article
  11. 11

    Delivery Route Management based on Dijkstra Algorithm by Sheng, Ng Lih, Arbaiy, Nureize, Wen, Chuah Chai Wen, Lin, Pei-Chun

    Published in Majallat Baghdād lil-ʻulūm (30-03-2021)
    “…For businesses that provide delivery services, the efficiency of the delivery process in terms of punctuality is very important. In addition to increasing…”
    Get full text
    Journal Article
  12. 12

    An Automated Machine Learning Workflow to Classify Soil Texture for Crop Yield by Chuah, Chai Wen, Arbaiy, Nureize Binti, Li, Siqiao

    “…Soil classification is used for crop selection to determine the type of activity that can be done on a particular piece of land. This is especially important…”
    Get full text
    Conference Proceeding