Nazri Kama
Universiti Teknologi Malaysia
H-index: 19
Asia-Malaysia
Top articles of Nazri Kama
Title | Journal | Author(s) | Publication Date |
---|---|---|---|
A multivocal literature review on record management potential components in CRUD operation for web application development | Asyraf Wahi Anuar Nazri Kama Azri Azmi Hazlifah Mohd Rusli | 2023/4/18 | |
Project Assessment in Offshore Software Maintenance Outsourcing Using Deep Extreme Learning Machines. | Computers, Materials & Continua | Atif Ikram Masita Abdul Jalil Amir Bin Ngah Saqib Raza Ahmad Salman Khan | 2023/1/1 |
Integrating user experience assessment in Re-CRUD console framework development | Wireless Networks | Asyraf Wahi Anuar Azri Azmi Nazri Kama Hazlifah Mohd Rusli Nur Azaliah Abu Bakar | 2023/1 |
Methods for Application Development by Non-Programmers: A Systematic Literature Review | Imran Harith Azmy Azri Azmi Nazri Kama Hazlifah Mohd Rusli Suriayati Chuprat | 2023/9/22 | |
Data Exchange Interoperability Protocol for Electric Vehicle Charging Systems Infrastructure | Faizura Haneem Nazri Kama Roshaimieza Mat Adam Sufyan Basri Hazlifah Mohd Rusli | 2023/7/6 | |
K-Banhatti invariants empowered topological investigation of bridge networks | Comput. Mater. Contin | Khalid Hamid Muhammad Waseem Iqbal Erssa Arif Yasir Mahmood Ahmad Salman Khan | 2022/7 |
Re-CRUD Code Automation Framework Evaluation using DESMET Feature Analysis | International Journal of Advanced Computer Science and Applications | Asyraf Wahi Anuar Nazri Kama Azri Azmi Hazlifah Mohd Rusli Yazriwati Yahya | 2022 |
Encryption algorithm for securing non-disclosure agreements in outsourcing offshore software maintenance | Computers, Materials & Continua | Atif Ikram Masita Abdul Jalil Amir Bin Ngah Nadeem Iqbal Nazri Kama | 2022/1/1 |
Truth: Trust and authentication scheme in 5g-iiot | IEEE transactions on industrial informatics | Seyed Ahmad Soleymani Shidrokh Goudarzi Mohammad Hossein Anisi Haitham Cruickshank Anish Jindal | 2022/5/12 |
Software effort estimation accuracy prediction of machine learning techniques: A systematic performance evaluation | Yasir Mahmood Nazri Kama Azri Azmi Ahmad Salman Khan Mazlan Ali | 2022/1 | |
A privacy-preserving authentication scheme based on Elliptic Curve Cryptography and using Quotient Filter in fog-enabled VANET | Ad hoc networks | Shidrokh Goudarzi Seyed Ahmad Soleymani Mohammad Hossein Anisi Mohammad Abdollahi Azgomi Zeinab Movahedi | 2022/4/1 |
Monolith Application to Microservices Model Driven Analysis Migration: State-of-The-Art Techniques | Open International Journal of Informatics | Muhammad Imran Mohamad Sasudin Hazlifah Mohd Rusli Nazri Kama | 2022/12/15 |
A privacy-preserving authentication scheme for real-time medical monitoring systems | IEEE journal of biomedical and health informatics | Seyed Ahmad Soleymani Shidrokh Goudarzi Mohammad Hossein Anisi Anish Jindal Nazri Kama | 2022/1/14 |
Revisiting web application development with integrated records management important aspect using Re-CRUD | Journal of Information and Knowledge Management (JIKM) | Asyraf Wahi Anuar Nazri Kama Azri Azmi Hazlifah Mohd Rusli | 2022 |
Humidity sensor based on fibre bragg grating for predicting microbial induced corrosion | Sustainable Energy Technologies and Assessments | Bharathi Raju R Kumar M Senthilkumar Riza Sulaiman Nazri Kama | 2022/8/1 |
ANALYSIS AND PRACTICAL APPLICATION OF WEB FRAMEWORK AND CRUD OPERATION FOR WEB APPLICATION DEVELOPMENT | The 2nd International Professional Doctorate and Postgraduate Symposium Universiti Teknologi Malaysia, 25th September 2021 | Asyraf Wahi Anuar12 Nazri Kama Azri Azmi Hazlifah Mohd Rusli | 2021 |
An efficient and secure session key management scheme in wireless sensor network | Complexity | Gulzar Mehmood Muhammad Sohail Khan Abdul Waheed Mahdi Zareei Muhammad Fayaz | 2021/6/12 |
The Application of Medical and Health Informatics Among the Malaysian Medical Tourism Hospital: A Preliminary Study | Hazila Timan Nazri Kama Rasimah Che Mohd Yusoff Mazlan Ali | 2021 | |
A security and privacy scheme based on node and message authentication and trust in fog-enabled VANET | Vehicular Communications | Seyed Ahmad Soleymani Shidrokh Goudarzi Mohammad Hossein Anisi Mahdi Zareei Abdul Hanan Abdullah | 2021/6/1 |
ABKS-PBM: Attribute-based keyword search with partial bilinear map | IEEE Access | Shawal Khan Shahzad Khan Mahdi Zareei Faisal Alanazi Nazri Kama | 2021/3/23 |