Zobrazeno 1 - 10
of 18
pro vyhledávání: '"Ahmad, Zukri"'
Autor:
Nur Khairani Kamarudin, Nur Syafiqa Bismi, Nurul Hidayah Ahmad Zukri, Mohd Faris Mohd Fuzi, Rashidah Ramle
Publikováno v:
Journal of Computing Research and Innovation, Vol 5, Iss 2, Pp 21-27 (2020)
VoIP application usage has increased from time to time and makes our daily life more convenient. VoIP application has features to make a phone call, send a text message and share the file through the apps for free. However, most of the users did not
Externí odkaz:
https://doaj.org/article/aa53d1eb54c649248c0361b48e3056ee
Publikováno v:
Journal of Computing Research and Innovation, Vol 5, Iss 2, Pp 41-53 (2020)
Final Year Project (FYP) is a compulsory requirement for graduation of every bachelor programme in Universiti Teknologi MARA (UiTM). Finding a topic for the final year project is quite challenging. However, being able to access previous FYP thesis he
Externí odkaz:
https://doaj.org/article/e3781bdfa85846bfb99075f67b241521
Autor:
Nur Khairani Kamarudin, Mahfudzah Othman, Farah Shazwani Ismail, Nurul Hidayah Ahmad Zukri, Mohd Faris Mohd Fuzi
Publikováno v:
Journal of Computing Research and Innovation, Vol 4, Iss 2, Pp 15-20 (2019)
Photography business become more popular and trending among the most of people who likes photography. Photography Service System was developed to help photography companies to deliver photos and videos to their customers. The use of the system have i
Externí odkaz:
https://doaj.org/article/8e7745d6965b4a53b55beaeefb4a5784
Autor:
Nur Khairani Kamarudin, Nur Nazifa Md Hasani, Rafiza Ruslan, Rashidah Ramle, Nurul Hidayah Ahmad Zukri
Publikováno v:
Journal of Computing Research and Innovation, Vol 3, Iss 4, Pp 19-24 (2018)
People in this new era of modernization nowadays take Internet as one of the vital thing for daily activities. Internet is not only for adults, it is also a needs for people of all ages. However, network vulnerabilities exist in all network that are
Externí odkaz:
https://doaj.org/article/61c22c9858b84757b9fc9edd82c256f3
Autor:
Nur Khairani Kamarudin, Nur Nazifa Md Hasani, Rafiza Ruslan, Rashidah Ramle, Nurul Hidayah Ahmad Zukri, Iman Hazwam Abd Halim
Publikováno v:
Journal of Computing Research and Innovation, Vol 3, Iss 4 (2018)
People in this new era of modernization nowadays take Internet as one of the vital thing for daily activities. Internet is not only for adults, it is also a needs for people of all ages. However, network vulnerabilities exist in all network that are
Externí odkaz:
https://doaj.org/article/df86104bcb2e4288b4fd40150e4a45c0
Autor:
Mohd Faris Mohd Fuzi, Nur Syafiqa Bismi, Rashidah Ramle, Nurul Hidayah Ahmad Zukri, Nur Khairani Kamarudin
Publikováno v:
Journal of Computing Research and Innovation, Vol 5, Iss 2, Pp 21-27 (2020)
VoIP application usage has increased from time to time and makes our daily life more convenient. VoIP application has features to make a phone call, send a text message and share the file through the apps for free. However, most of the users did not
Publikováno v:
Journal of Computing Research and Innovation, Vol 5, Iss 2, Pp 41-53 (2020)
Final Year Project (FYP) is a compulsory requirement for graduation of every bachelor programme in Universiti Teknologi MARA (UiTM). Finding a topic for the final year project is quite challenging. However, being able to access previous FYP thesis he
Autor:
Mohd Faris Mohd Fuzi, Farah Shazwani Ismail, Nurul Hidayah Ahmad Zukri, Nur Khairani Kamarudin, Mahfudzah Othman
Publikováno v:
Journal of Computing Research and Innovation, Vol 4, Iss 2, Pp 15-20 (2019)
Photography business become more popular and trending among the most of people who likes photography. Photography Service System was developed to help photography companies to deliver photos and videos to their customers. The use of the system have i
Autor:
Nor Aimuni Md Rashid, Zuhri Arafah Zulkifli, Alya Geogiana Buja, Nurul Hidayah Ahmad Zukri, Norkhushaini Awang
Publikováno v:
2020 10th IEEE International Conference on Control System, Computing and Engineering (ICCSCE).
Password-based authentication is the most common authentication method for either online or offline system. Password composition policies become too burdensome and put the user in a state of struggle to remember their password. Thus, most of the user
Autor:
Rafiza Ruslan, Nurul Hidayah Ahmad Zukri, Nur Khairani Kamarudin, Rashidah Ramle, Iman Hazwam Abd Halim, Nur Nazifa Md Hasani
Publikováno v:
Journal of Computing Research and Innovation. 3:19-24
People in this new era of modernization nowadays take Internet as one of the vital thing for daily activities. Internet is not only for adults, it is also a needs for people of all ages. However, network vulnerabilities exist in all network that are