Search

Your search keyword '"Chuah Chai Wen"' showing total 88 results

Search Constraints

Start Over You searched for: Author "Chuah Chai Wen" Remove constraint Author: "Chuah Chai Wen"
88 results on '"Chuah Chai Wen"'

Search Results

1. Delivery Route Management based on Dijkstra Algorithm

2. Omega Network Pseudorandom Key Generation Based on DNA Cryptography

3. Blockchain-Based Electronic Voting Protocol

4. Smart Indoor Home Surveillance Monitoring System Using Raspberry Pi

5. Secure Login Mechanism for Online Banking

6. SHEARS INC. Salon Management System

7. Secret Channel using Video Steganography

8. Staff Attendance System using RFID

11. Utilizing Machine Learning for Gene Expression Data: Incorporating Gene Sequencing, K-Mer Counting and Asymmetric N-Grams Features

15. Estimating Probability Values Based on Naïve Bayes for Fuzzy Random Regression Model

18. Key derivation function: key-hash based computational extractor and stream based pseudorandom expander.

31. Blockchain-Based Electronic Voting Protocol

32. Secure Login Mechanism for Online Banking

35. Minimizing Information Asymmetry Interference using Optimal Channel Assignment Strategy in Wireless Mesh Networks

36. Analysis of Four Historical Ciphers Against Known Plaintext Frequency Statistical Attack

37. Information Structure Framework for ISMS Planning and Certification: Malaysian Data

38. Forecasting ASEAN countries exchange rates using auto regression model based on triangular fuzzy number

41. Implementing a secure key exchange protocol for openSSL

42. Blockchain-based electronic voting protocol

43. A study of caesar cipher and transposition cipher in jawi messages

44. Smart indoor home surveillance monitoring system using raspberry pi

45. Email authentication using symmetric and asymmetric key algorithm encryption

46. A CCTV system with SMS alert (CMDSA): An implementation of pixel processing algorithm for motion detection

47. Face recognition for criminal identification: An implementation of principal component analysis for face recognition

48. Preserving anonymity in e-voting system using voter non-repudiation oriented scheme

49. On Power Analysis Attacks against Hardware Stream Ciphers

Catalog

Books, media, physical & digital resources