Showing
1 - 5
results of
5
for search '
Kamarudin, Nur Khairani
'
Skip to content
Home
High Impact Articles
Search Options
UiTM Open Access
Search by UiTM Scopus
Advanced Search
Search by Category
Discovery Service
Sources
Jawi Collection
UiTM Journals
List UiTM Journal in IR
Statistic
About
Open Access
Creative Commons Licenses
COKI | Malaysia Open Access
Report Technical
User Guide
Contact Us
Search Tips
FAQs
All Fields
Title
Author
Subject
Call Number
ISBN/ISSN
Tag
Find
Advanced
Author
Kamarudin, Nur Khairani
Showing
1 - 5
results of
5
for search '
Kamarudin, Nur Khairani
'
, query time: 0.06s
Refine Results
Sort
Relevance
Date Descending
Date Ascending
Call Number
Author
Title
1
Students activities notification system / Nur Khairani Kamarudin, Mohd Faris Mohd Fuzi and Ahmad Haziq Abu Bakar
by
Kamarudin
,
Nur
Khairani
,
Mohd Fuzi, Mohd Faris
,
Abu Bakar, Ahmad Haziq
Published 2017
Call Number:
Loading...
Located:
Loading...
Get fulltext
View Fulltext in UiTM IR
Article
2
Audio steganography using least significant bit and AES cryptographic algorithm / Nurul Hidayah Ahmad Zukri
by
Ahmad Zukri, Nurul Hidayah
,
Kamarudin
,
Nur
Khairani
,
Izraf Ishak, Mohd Enif
,
Md Rashid, Nor Aimuni
Published 2018
Call Number:
Loading...
Located:
Loading...
Get fulltext
View Fulltext in UiTM IR
Article
3
Network security performance analysis of Mobile Voice Over Ip Application (mVoIP): Kakao Talk, WhatsApp, Telegram and Facebook Messenger / Nur Khairani Kamarudin ... [et al.]
by
Kamarudin
,
Nur
Khairani
,
Bismi, Nur Syafiqa
,
Ahmad Zukri, Nurul Hidayah
,
Mohd Fuzi, Mohd Faris
,
Ramle, Rashidah
Published 2020
Call Number:
Loading...
Located:
Loading...
Get fulltext
View Fulltext in UiTM IR
Article
4
Design and development of groceries ordering system with QR code / Mahfudzah Othman ... [et al.]
by
Othman, Mahfudzah
,
Mohamad Sakri, Illi Najwa
,
Muhd Zain, Nurzaid
,
Paidi, Zulfikri
,
Che Jan, Nora Yanti
,
Kamarudin
,
Nur
Khairani
Published 2021
Call Number:
Loading...
Located:
Loading...
Get fulltext
View Fulltext in UiTM IR
Article
5
The performance analysis of malware attack / Nur Khairani Kamarudin ... [et al.]
by
Kamarudin
,
Nur
Khairani
,
Md Hasani, Nur Nazifa
,
Ruslan, Rafiza
,
Ramle, Rashidah
,
Ahmad Zukri, Nurul Hidayah
,
Abd Halim, Iman Hazwam
Published 2018
Call Number:
Loading...
Located:
Loading...
Get fulltext
View Fulltext in UiTM IR
Article
Search Tools:
Get RSS Feed
—
Email this Search
Related Subjects
Intrusion detection systems (Computer security). Computer network security. Hackers
Mobile computing
Application software
Computer networks. General works. Traffic monitoring
Computers and civilization. Social aspects of computers. Hackers
Electronic commerce
Mobile commerce
QA Mathematics
Scanning systems
Loading...