Learning Environment For PDA Security
An intensive literature research is made on various models of available PDAs for their security features. In practice, none provides the required security features. Further, the research is extended to available security software solutions for PDAs.
| Main Author: | Velu , Vengadeshwaran |
|---|---|
| Format: | Thesis |
| Published: |
2002
|
| Subjects: | |
| Online Access: | http://shdl.mmu.edu.my/953/ |
Similar Items
Enhancement of network security by use machine learning
by: Hasan, Ahmed Raheem
Published: (2019)
by: Hasan, Ahmed Raheem
Published: (2019)
Internet Security In China
by: Jia, Xu
Published: (2005)
by: Jia, Xu
Published: (2005)
Non-Speech Audio To Sustain Attention In A Multimedia E-Learning Environment
by: Yuen, May Chan
Published: (2007)
by: Yuen, May Chan
Published: (2007)
Key Management For Multicast Security
by: Daw, Win Aye
Published: (2005)
by: Daw, Win Aye
Published: (2005)
Smart security system for home (IOT)
by: Abd Oun, Muhamed Obed
Published: (2020)
by: Abd Oun, Muhamed Obed
Published: (2020)
Design Of An E-Learning Environment Using VSAT Technology For ComputerMan University (CMU - Sudan)
by: Ahmed Hassan, Faris Izzeldin
Published: (2007)
by: Ahmed Hassan, Faris Izzeldin
Published: (2007)
Solving security staff scheduling by using genetic algorithm
by: Ang, Shin Yin
Published: (2021)
by: Ang, Shin Yin
Published: (2021)
Web Link Classification And Aceessibillity Modelling For Web Security Enhancement
by: Chong, Chee Way
Published: (1999)
by: Chong, Chee Way
Published: (1999)
Web Link Classification And Aceessibillity Modelling For Web Security Enhancement
by: Chong, Chee Way
Published: (1999)
by: Chong, Chee Way
Published: (1999)
Web transcript verification using check digit as secure number
by: Abd Halim, Muhamad Rais, et al.
Published: (2017)
by: Abd Halim, Muhamad Rais, et al.
Published: (2017)
Internet of things security implementation using blockchain for wireless technology
by: Karim, Karim Jabur
Published: (2019)
by: Karim, Karim Jabur
Published: (2019)
Smart home security access system using field programmable gate arrays
by: Saleh, Shukur, et al.
Published: (2018)
by: Saleh, Shukur, et al.
Published: (2018)
E-store management using bell-lapadula access control security model
by: Roslan, Saidah Nafisah, et al.
Published: (2018)
by: Roslan, Saidah Nafisah, et al.
Published: (2018)
JXME Security: Encryption Overhead In End-To-End J2ME-JXTA Systems
by: Mazlan, Rima
Published: (2008)
by: Mazlan, Rima
Published: (2008)
A QoS Aware Cluster Head Selection and Hybrid Cryptography Routing Protocol for Enhancingm Efficiency and Security of VANET
by: JUBAIR, MOHAMMED AHMED, et al.
Published: (2022)
by: JUBAIR, MOHAMMED AHMED, et al.
Published: (2022)
A study on edutainment framework for M-learning
by: Suki, , Norbayah Mohd, et al.
Published: (2006)
by: Suki, , Norbayah Mohd, et al.
Published: (2006)
Performance evaluation for different intrusion detection system algorithms using machine learning
by: Zarir, Mustafa Nadhim
Published: (2018)
by: Zarir, Mustafa Nadhim
Published: (2018)
In Search Of Effectiveness Factors: A Case Study Of The UNIKL IIM E-Learning Portal
by: Tan, Wee Hoe
Published: (2006)
by: Tan, Wee Hoe
Published: (2006)
Machine learning techniques to detect bleeding frame and area in wireless capsule endoscopy video
by: Vajravelua, Ashok, et al.
Published: (2023)
by: Vajravelua, Ashok, et al.
Published: (2023)
Descriptive Study Of Internet Based Learning And Diabetic Care Management Among Patients At Putrajaya Hospital
by: Mohammed, Azman
Published: (2007)
by: Mohammed, Azman
Published: (2007)
Propose a new Firefly-Fast Learning Network
model based Intrusion-Detection System
by: Badran, Mohammed Falih, et al.
Published: (2019)
by: Badran, Mohammed Falih, et al.
Published: (2019)
Reinforcement learning-based target tracking for unmanned aerial vehicle with achievement rewarding and multistage traning
by: Ahmed Abo Mosali, Najm Addin Mohammed
Published: (2022)
by: Ahmed Abo Mosali, Najm Addin Mohammed
Published: (2022)
An intrusion detection system for DDoS flooding attacks on IPv6 networks using deep learning techniques
by: Ahmed Marwan, Idrees Aleesa
Published: (2021)
by: Ahmed Marwan, Idrees Aleesa
Published: (2021)
Cloud Computing based Learning Management System (CC-LMS) implementation model in Malaysia Higher Education Institutions
by: Kassim, Rahimah
Published: (2021)
by: Kassim, Rahimah
Published: (2021)
Improving students’ higher order thinking skills in learning health systems using mobile-based instructional approach
by: S., Suharno, et al.
Published: (2022)
by: S., Suharno, et al.
Published: (2022)
VHDL Modeling Of ATM To IP Conversion Chip
by: Chew, Beng Wah
Published: (2002)
by: Chew, Beng Wah
Published: (2002)
Adaptive MIMO-OFDM combining space-time block codes and spatial multiplexing in correlated frequency-selective channels
by: Halmi, Mohd Hairi
Published: (2005)
by: Halmi, Mohd Hairi
Published: (2005)
Providing Quality Of Service In IEEE 802.11 Wireless Local Area Network (WLAN)
by: Ng, Bryan Cheng Kuan
Published: (2005)
by: Ng, Bryan Cheng Kuan
Published: (2005)
A Case Study Of Redtone International Berhad
by: Mustafa, Muhamad Sabri
Published: (2005)
by: Mustafa, Muhamad Sabri
Published: (2005)
Wavelength Converters Placement In All Optical Networks Using Particle Swarm Optimization
by: Teo , Choon Fang
Published: (2005)
by: Teo , Choon Fang
Published: (2005)
A Case Study Of SOHU
by: Kui, Zhang Wen
Published: (2005)
by: Kui, Zhang Wen
Published: (2005)
Analysis Of Deflection Routing Multihop Lightwave Networks With Limited Number Of Wavelength Converters
by: Koa , Chong Gee
Published: (2005)
by: Koa , Chong Gee
Published: (2005)
Strategic Implications Of Multimedia Messaging Services (MMS) : Identifying The Opportunities
by: Wu, Chin Gang
Published: (2005)
by: Wu, Chin Gang
Published: (2005)
Usability Study Of Websites From The Perspective Of Student Internet Users
by: Jeyakuma, Robert
Published: (2005)
by: Jeyakuma, Robert
Published: (2005)
Analysis And Design Of Active Grating-Embedded Optical Filters
by: Lim , Kian Yong
Published: (2005)
by: Lim , Kian Yong
Published: (2005)
Evaluation Of Internet Protocal Version 6 (IPV6) Implementations And Comparative Performance Analysis On Different Platforms
by: Syed Mohamed, Sulaiman
Published: (2005)
by: Syed Mohamed, Sulaiman
Published: (2005)
Design Of A Multiwavelength Optical Light Source Using Optical Frequency Comb Generator (OFCG)
by: Thum , Ann
Published: (2005)
by: Thum , Ann
Published: (2005)
A Study On Service Convergence Within A Wireless Metropolitan Area Network (MAN) In Malaysia
by: Tan, Roy Yew Hoong
Published: (2005)
by: Tan, Roy Yew Hoong
Published: (2005)
The Preferences Of Mobile Contents Reguired By Consumers And Factory Influencing The Choice Of Mobile Contents By Different Types Of Consumers
by: Xin, Lim Ke
Published: (2004)
by: Xin, Lim Ke
Published: (2004)
Maxis Communications Berhad: Maintaining Dominance In The Malaysian Mobile Communications Industry
by: Abang Zainal Abidin, Dayang Nuryati
Published: (2004)
by: Abang Zainal Abidin, Dayang Nuryati
Published: (2004)
Similar Items
-
Enhancement of network security by use machine learning
by: Hasan, Ahmed Raheem
Published: (2019) -
Internet Security In China
by: Jia, Xu
Published: (2005) -
Non-Speech Audio To Sustain Attention In A Multimedia E-Learning Environment
by: Yuen, May Chan
Published: (2007) -
Key Management For Multicast Security
by: Daw, Win Aye
Published: (2005) -
Smart security system for home (IOT)
by: Abd Oun, Muhamed Obed
Published: (2020)