Java - based Sony Ericsson phone book manager using bluetooth / Farahani Che Khosni
Bluetooth is a new wireless technology with high speed of connection for exchanging data between devices, such as mobile phone with personal computer. As people who live in the development country, mobile phone also becomes one of the important things, which they must have in their life. Unfortu...
| Main Author: | Che Khosni, Farahani |
|---|---|
| Format: | Student Project |
| Language: | English |
| Published: |
Faculty of Computer and Mathematical Sciences
2005
|
| Subjects: | |
| Online Access: | https://ir.uitm.edu.my/id/eprint/1437/ |
Similar Items
Announcement system using wap over bluetooth / Azhan Ezra Abdul Aziz
by: Abdul Aziz, Azhan Ezra
Published: (2006)
by: Abdul Aziz, Azhan Ezra
Published: (2006)
Movie ticket payment via bluetooth / Mohd Shahrin Samian
by: Samian, Mohd Shahrin
Published: (2006)
by: Samian, Mohd Shahrin
Published: (2006)
Smart gate mobile application in residential area Putra Perdana using geofencing / Maisarah Mahazil
by: Mahazil, Maisarah
Published: (2020)
by: Mahazil, Maisarah
Published: (2020)
Enhannced sampling algorithm in bluetooth low energy for indoor localization
by: Mat Daud, Mohd Faiz
Published: (2018)
by: Mat Daud, Mohd Faiz
Published: (2018)
Is Perth a secure place: a Western Australian field study of Bluetooth security
by: Ghori, Khwaja Shan-ul-Hasan Dell, Peter
Published: (2007)
by: Ghori, Khwaja Shan-ul-Hasan Dell, Peter
Published: (2007)
Design of a Smart phone Based Body Sensor for Long-term Healthcare Monitoring
by: Wong, Kiing Ing
Published: (2013)
by: Wong, Kiing Ing
Published: (2013)
Locating bluetooth devices through an android application by creating an ad hoc network
by: Pamboukas, Savvas
Published: (2014)
by: Pamboukas, Savvas
Published: (2014)
A study of interference between bluetooth and 802.11b (WIFI) / Mazani Manaf, Md Jamil Abu Sari and Jamaludin Md Yusof
by: Manaf, Mazani, et al.
Published: (2005)
by: Manaf, Mazani, et al.
Published: (2005)
On the impact of intra-system interference for ranging and positioning with Bluetooth low energy
by: Figueiredo e Silva, Pedro, et al.
Published: (2015)
by: Figueiredo e Silva, Pedro, et al.
Published: (2015)
Electronic Book of Network Security: Introduction to Network Security
by: Hoo, Cheong Yee
Published: (2003)
by: Hoo, Cheong Yee
Published: (2003)
Developing fire detection system for chemical laboratories / Saeed Barzabadi Farahani
by: Saeed, Barzabadi Farahani
Published: (2014)
by: Saeed, Barzabadi Farahani
Published: (2014)
A smart phone based multi-floor indoor positioning system for occupancy detection
by: Mashuk, Md. Shadab, et al.
Published: (2018)
by: Mashuk, Md. Shadab, et al.
Published: (2018)
Ghosts! A location-based Bluetooth LE mobile game for museum exploration
by: Nilsson, Tommy, et al.
Published: (2016)
by: Nilsson, Tommy, et al.
Published: (2016)
Socio-cultural impacts of tourism in Iran : a study of Masooleh and Sare'in / Hamira Zamani-Farahani
by: Zamani-Farahani, Hamira
Published: (2011)
by: Zamani-Farahani, Hamira
Published: (2011)
Design of a lightweight virtual honeynet based on linux container virtualization
by: Memari, Nogol
Published: (2014)
by: Memari, Nogol
Published: (2014)
Fake review annotation model and classification through reviewers' writing style
by: Shojaee, Somayeh
Published: (2019)
by: Shojaee, Somayeh
Published: (2019)
Energy trust system for detecting sybil attacks in clustered wireless sensor network
by: Hussein, Noor Sabeeh
Published: (2016)
by: Hussein, Noor Sabeeh
Published: (2016)
Security Improvement of Unicast Management Frames In Ieee 802.11 Mac Layer
by: Malekzadeh, Mina
Published: (2007)
by: Malekzadeh, Mina
Published: (2007)
Scientific forensic framework for smartphones
by: Shahpasand, Maryam
Published: (2015)
by: Shahpasand, Maryam
Published: (2015)
Hyper-heuristic approaches for data stream-based iIntrusion detection in the Internet of Things
by: Hadi, Ahmed Adnan
Published: (2022)
by: Hadi, Ahmed Adnan
Published: (2022)
Proof-Carrying Code for Verifying Confidentiality of Mobile Code through Secure Information Flow Analysis
by: Abdu Muthana, Abdulrahman Ahmad
Published: (2008)
by: Abdu Muthana, Abdulrahman Ahmad
Published: (2008)
Adaptive artificial neural network for power system security assessment and control action
by: Al-Masri, Ahmed Naufal A.
Published: (2012)
by: Al-Masri, Ahmed Naufal A.
Published: (2012)
Detecting coordinated distributed attacks using mobile agents with associated managers architecture
by: Javan, Ali
Published: (2011)
by: Javan, Ali
Published: (2011)
Network security situation awareness based on indicators extracted
by: Xie, Zeqiang
Published: (2016)
by: Xie, Zeqiang
Published: (2016)
An improved user authentication model for mobile application systems
by: Mohamed, Kartini
Published: (2017)
by: Mohamed, Kartini
Published: (2017)
Steganography in webpages using CSS color attributes enhanced by rule-based system
by: Nehzati, Seyedeh Sheida
Published: (2016)
by: Nehzati, Seyedeh Sheida
Published: (2016)
Ericsson's MIV model empowers community
by: The Borneo Post
Published: (2012)
by: The Borneo Post
Published: (2012)
Implementation and Evaluation of Large Rsa Encryption and Decryption Keys For Internet Security
by: H. Belgassem, Seddeq
Published: (2004)
by: H. Belgassem, Seddeq
Published: (2004)
Modeling of post-incident root cause analysis for cross site request forgery (CSRF) attack
by: Mustafa, Mohd Nawawi
Published: (2015)
by: Mustafa, Mohd Nawawi
Published: (2015)
Information security policy compliance model for government agency
by: Ramli, Muhamad Amirnazmi
Published: (2018)
by: Ramli, Muhamad Amirnazmi
Published: (2018)
Security framework based multi agent system architecture to facilitate data fetching from cloud data storage
by: Mohamed, Amir Mohamed Talib
Published: (2012)
by: Mohamed, Amir Mohamed Talib
Published: (2012)
Modelling and simulation of improved scarani-acin-ribordy-GISIN-04 preprocessing technique
by: Mohd Nasir, Rinie Narinie
Published: (2015)
by: Mohd Nasir, Rinie Narinie
Published: (2015)
Enhancing XSS vulnerability detection and removal in web applications using genetic algorithms
by: Hydara, Isatou
Published: (2024)
by: Hydara, Isatou
Published: (2024)
An experimental evaluation of DoS attack and its impact on throughput of IEEE 802.11 wireless networks
by: Malekzadeh, Mina, et al.
Published: (2008)
by: Malekzadeh, Mina, et al.
Published: (2008)
A Case Study Of Sony Corporation
by: See, Yih Yan
Published: (2008)
by: See, Yih Yan
Published: (2008)
Kesedaran dan amalan keselamatan siber dalam kalangan pengguna internet di Malaysia
by: Pitchan, Muhammad Adnan
Published: (2017)
by: Pitchan, Muhammad Adnan
Published: (2017)
A multi-factor authentication scheme using attack recognition and key generator technique
by: Mohd Ariffin, Noor Afiza
Published: (2017)
by: Mohd Ariffin, Noor Afiza
Published: (2017)
Predicting online safety behavior based on health belief model with internet literacy and gender as moderators
by: Abkooh, Elaheh Taheri
Published: (2016)
by: Abkooh, Elaheh Taheri
Published: (2016)
Secure lightweight client for cloud-based E-Health Model
by: Zhang, Xiaowei
Published: (2023)
by: Zhang, Xiaowei
Published: (2023)
Dasar Keselamatan ICT Universiti Teknologi MARA / Pejabat Infrastruktur dan Infostruktur, UiTM
by: UiTM, Pejabat Infrastruktur dan Infostruktur
Published: (2018)
by: UiTM, Pejabat Infrastruktur dan Infostruktur
Published: (2018)
Similar Items
-
Announcement system using wap over bluetooth / Azhan Ezra Abdul Aziz
by: Abdul Aziz, Azhan Ezra
Published: (2006) -
Movie ticket payment via bluetooth / Mohd Shahrin Samian
by: Samian, Mohd Shahrin
Published: (2006) -
Smart gate mobile application in residential area Putra Perdana using geofencing / Maisarah Mahazil
by: Mahazil, Maisarah
Published: (2020) -
Enhannced sampling algorithm in bluetooth low energy for indoor localization
by: Mat Daud, Mohd Faiz
Published: (2018) -
Is Perth a secure place: a Western Australian field study of Bluetooth security
by: Ghori, Khwaja Shan-ul-Hasan Dell, Peter
Published: (2007)