Search Results - (( developing card technology algorithm ) OR ( java implication based algorithm ))

Refine Results
  1. 1
  2. 2
  3. 3

    Developing a prototype e-commerce application with credit card validation and secure transaction by M. A., Ameedeen

    Published 2005
    “…The application also includes an online credit card validation module that validates credit cards against the Luhn Algorithm and predefined credit card prefixes.The application will accept three types of credit cards which are Mastercard,Visa and American Express.The application is developed on the NET platform using ASP.NET and Visual Basic NET scripting.Therefore,the application could run on all kinds of platform.The application requires a Microsoft Server based operating system and Microsoft SQL Server in order for it to run.The application has been tested and runs successfully both on a server and on a workstation with server settings.In short,this system is the solution to the problems of current e-commerce technology.…”
    Get full text
    Get full text
    Undergraduates Project Papers
  4. 4

    Fingerprint recognition system by Rohani, Abu Bakar

    Published 2005
    “…Fingerprint recognition is the oldest method which has been used in numerous applications for identification purpose in many social conditions such as access control and crime investigation.Now a day,in the era of technology the system is still using the password or smart card as an identity character for identification purpose.The problems happen when user forgot their password or lost their smart card. …”
    Get full text
    Get full text
    Undergraduates Project Papers
  5. 5
  6. 6
  7. 7

    Design and development of automatic parking system and electronic parking fee collection based on number plate recognition by Rashid, Muhammad Mahbubur, Musa, A., Rahman, Mohammed Ataur, Farahana, Ainul F.

    Published 2011
    “…This paper presents algorithm technology based method for license plate extraction from car images followed by the segmentation of characters and reorganization and also develop electronics parking fee collection system based on number plate information.…”
    Get full text
    Get full text
    Get full text
    Proceeding Paper
  8. 8

    Detection of Counterfeit Telecommunication Products using Luhn Checksum Algorithm and an Adapted IMEI Authentication Method by Amusa, Morufu, Bamidele, Oluwade

    Published 2020
    “…This algorithm is generally used to validate identification numbers such as IMEI, debit/credit card numbers, social security numbers, national identification numbers etc. …”
    Get full text
    Get full text
    Journal
  9. 9
  10. 10
  11. 11

    Face recognition door lock system / Danial Haziq Hakimi Salahuddin by Salahuddin, Danial Haziq Hakimi

    Published 2023
    “…The project aims to develop a secure and convenient door lock system that utilizes face recognition technology. …”
    Get full text
    Get full text
    Student Project
  12. 12
  13. 13

    Automatic parking management system and parking fee collection based on number plate recognition by Rashid, Muhammad Mahbubur, A., Musa, M, Ataur Rahman, A, Farahana, A., Farhana

    Published 2012
    “…This paper presents algorithm technology based method for license plate extraction from car images followed by the segmentation of characters and reorganization and also develop electronics parking fee collection system based on number plate information.…”
    Get full text
    Get full text
    Get full text
    Article
  14. 14

    Embedded vision system development using 32-bit Single Board Computer and GNU/Linux by Nur Farhan, Kahar

    Published 2011
    “…This research explores the usage of embedded system technology in developing a vision system to aid the process of monitoring traffic surveillance video. …”
    Get full text
    Thesis
  15. 15

    Smart biosecurity door locking system / Nur Nadia Syahirah ‘Asri by ‘Asri, Nur Nadia Syahirah

    Published 2017
    “…This system does not require the use of smart card or even password to remember. Furthermore, the system was developed using Fingerprint Matching Algorithm (FMA), Image Processing technique and embedded programming technique. …”
    Get full text
    Get full text
    Thesis
  16. 16

    Secured mobile transaction using NFC Technology: Top-Up printing system by Ayu, Media Anugerah, Mantoro, Teddy, Brotosaputro, Gunawan, Ain, Nur F., Ghazali, Noorzalina

    Published 2011
    “…This study proposes a secure mobile transaction model for any transaction using NFC Technology. As proof of concept, a Top-up printing system is developed and for interaction with the web interface, an ACR 100 Reader with ACOS3 SIM card is used. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Proceeding Paper
  17. 17

    NFC secured online transaction in mobile computing business by Mantoro, Teddy, Ayu, Media Anugerah, Brotosaputro, Gunawan, Ain, Nur F., Ghazali, Noorzalina

    Published 2012
    “…This study proposes a secure mobile transaction model for any transaction using NFC Technology. As proof of concept, a Top-up printing system is developed and for interaction with contactless interface, an ACR 100 Reader with ACOS3 SIM card is used. …”
    Get full text
    Get full text
    Get full text
    Article
  18. 18
  19. 19
  20. 20

    Evaluation of Security Metric for Artificial Internet of Things Smart Locking System by Siti Nur Hanani, Mohd Rizal

    Published 2023
    “…This thesis outlines the architectural model of the smart locking system, the design of the face recognition algorithm, and the development of face recognition reader using the Raspberry Pi 3 model B microcontroller. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis