Announcement system using wap over bluetooth / Azhan Ezra Abdul Aziz
This paper concentrates on the study of using Bluetooth wireless technology as a physical link to WAP services. Currently, Bluetooth technology are use to connect several devices and peripherals together. WAP services are a service provider dependent service and there are cost associates to use it...
| Main Author: | Abdul Aziz, Azhan Ezra |
|---|---|
| Format: | Student Project |
| Language: | English |
| Published: |
Faculty of Information Technology and Quantitative Sciences
2006
|
| Subjects: | |
| Online Access: | https://ir.uitm.edu.my/id/eprint/664/ |
Similar Items
Java - based Sony Ericsson phone book manager using bluetooth / Farahani Che Khosni
by: Che Khosni, Farahani
Published: (2005)
by: Che Khosni, Farahani
Published: (2005)
Movie ticket payment via bluetooth / Mohd Shahrin Samian
by: Samian, Mohd Shahrin
Published: (2006)
by: Samian, Mohd Shahrin
Published: (2006)
Smart gate mobile application in residential area Putra Perdana using geofencing / Maisarah Mahazil
by: Mahazil, Maisarah
Published: (2020)
by: Mahazil, Maisarah
Published: (2020)
Enhannced sampling algorithm in bluetooth low energy for indoor localization
by: Mat Daud, Mohd Faiz
Published: (2018)
by: Mat Daud, Mohd Faiz
Published: (2018)
Is Perth a secure place: a Western Australian field study of Bluetooth security
by: Ghori, Khwaja Shan-ul-Hasan Dell, Peter
Published: (2007)
by: Ghori, Khwaja Shan-ul-Hasan Dell, Peter
Published: (2007)
Locating bluetooth devices through an android application by creating an ad hoc network
by: Pamboukas, Savvas
Published: (2014)
by: Pamboukas, Savvas
Published: (2014)
A study of interference between bluetooth and 802.11b (WIFI) / Mazani Manaf, Md Jamil Abu Sari and Jamaludin Md Yusof
by: Manaf, Mazani, et al.
Published: (2005)
by: Manaf, Mazani, et al.
Published: (2005)
On the impact of intra-system interference for ranging and positioning with Bluetooth low energy
by: Figueiredo e Silva, Pedro, et al.
Published: (2015)
by: Figueiredo e Silva, Pedro, et al.
Published: (2015)
Surfacing effects on thermal condition in urban open space / Liyana Ahmad Bazuli and Azhan Abdul Aziz
by: Ahmad Bazuli, Liyana, et al.
Published: (2015)
by: Ahmad Bazuli, Liyana, et al.
Published: (2015)
Design of a Smart phone Based Body Sensor for Long-term Healthcare Monitoring
by: Wong, Kiing Ing
Published: (2013)
by: Wong, Kiing Ing
Published: (2013)
Kaum Penan beruntung - Ezra Uda
by: Utusan Sarawak
Published: (2009)
by: Utusan Sarawak
Published: (2009)
An improved user authentication model for mobile application systems
by: Mohamed, Kartini
Published: (2017)
by: Mohamed, Kartini
Published: (2017)
Energy trust system for detecting sybil attacks in clustered wireless sensor network
by: Hussein, Noor Sabeeh
Published: (2016)
by: Hussein, Noor Sabeeh
Published: (2016)
Adaptive artificial neural network for power system security assessment and control action
by: Al-Masri, Ahmed Naufal A.
Published: (2012)
by: Al-Masri, Ahmed Naufal A.
Published: (2012)
Ghosts! A location-based Bluetooth LE mobile game for museum exploration
by: Nilsson, Tommy, et al.
Published: (2016)
by: Nilsson, Tommy, et al.
Published: (2016)
Steganography in webpages using CSS color attributes enhanced by rule-based system
by: Nehzati, Seyedeh Sheida
Published: (2016)
by: Nehzati, Seyedeh Sheida
Published: (2016)
The method of shariah-compliance gold investment : conceptual research / Muhammad Arif Azhan Abdul Malik
by: Abdul Malik, Muhammad Arif Azhan
Published: (2018)
by: Abdul Malik, Muhammad Arif Azhan
Published: (2018)
Design of a lightweight virtual honeynet based on linux container virtualization
by: Memari, Nogol
Published: (2014)
by: Memari, Nogol
Published: (2014)
Fake review annotation model and classification through reviewers' writing style
by: Shojaee, Somayeh
Published: (2019)
by: Shojaee, Somayeh
Published: (2019)
Security Improvement of Unicast Management Frames In Ieee 802.11 Mac Layer
by: Malekzadeh, Mina
Published: (2007)
by: Malekzadeh, Mina
Published: (2007)
Scientific forensic framework for smartphones
by: Shahpasand, Maryam
Published: (2015)
by: Shahpasand, Maryam
Published: (2015)
Security framework based multi agent system architecture to facilitate data fetching from cloud data storage
by: Mohamed, Amir Mohamed Talib
Published: (2012)
by: Mohamed, Amir Mohamed Talib
Published: (2012)
"Unboxing the sandbox": a new method of learning PHP advanced web programming / Mohamad Rahimi Mohamad Rosman, Mohammad Azhan Abdul Aziz
and Mohd Akmal Faiz Osman
by: Mohamad Rosman, Mohamad Rahimi, et al.
Published: (2018)
by: Mohamad Rosman, Mohamad Rahimi, et al.
Published: (2018)
Hyper-heuristic approaches for data stream-based iIntrusion detection in the Internet of Things
by: Hadi, Ahmed Adnan
Published: (2022)
by: Hadi, Ahmed Adnan
Published: (2022)
Proof-Carrying Code for Verifying Confidentiality of Mobile Code through Secure Information Flow Analysis
by: Abdu Muthana, Abdulrahman Ahmad
Published: (2008)
by: Abdu Muthana, Abdulrahman Ahmad
Published: (2008)
Detecting coordinated distributed attacks using mobile agents with associated managers architecture
by: Javan, Ali
Published: (2011)
by: Javan, Ali
Published: (2011)
Network security situation awareness based on indicators extracted
by: Xie, Zeqiang
Published: (2016)
by: Xie, Zeqiang
Published: (2016)
The Wealth Effect of the Securities Commission and the Central Bank Announcement
by: Yu, Kee Su
Published: (1997)
by: Yu, Kee Su
Published: (1997)
Implementation and Evaluation of Large Rsa Encryption and Decryption Keys For Internet Security
by: H. Belgassem, Seddeq
Published: (2004)
by: H. Belgassem, Seddeq
Published: (2004)
Modeling of post-incident root cause analysis for cross site request forgery (CSRF) attack
by: Mustafa, Mohd Nawawi
Published: (2015)
by: Mustafa, Mohd Nawawi
Published: (2015)
Wap video streaming system (WAP-VSS) / Michele Ooi Lay Sean
by: Michele , Ooi Lay Sean
Published: (2004)
by: Michele , Ooi Lay Sean
Published: (2004)
WAP alumni registration system
by: Ariff Safwan, Radzi
Published: (2007)
by: Ariff Safwan, Radzi
Published: (2007)
Performance of IPO during hot and cold market / Nur Shahirah Abdul Aziz
by: Abdul Aziz, Nur Shahirah
Published: (2008)
by: Abdul Aziz, Nur Shahirah
Published: (2008)
A perception assessment on security awareness in Malaysian government agencies by Rasch model / Mohd Ismail Ahmad, Azrilah Abdul Aziz and Mohd Saidfudin Masodi
by: Ahmad, Mohd Ismail, et al.
Published: (2008)
by: Ahmad, Mohd Ismail, et al.
Published: (2008)
Information security policy compliance model for government agency
by: Ramli, Muhamad Amirnazmi
Published: (2018)
by: Ramli, Muhamad Amirnazmi
Published: (2018)
Modelling and simulation of improved scarani-acin-ribordy-GISIN-04 preprocessing technique
by: Mohd Nasir, Rinie Narinie
Published: (2015)
by: Mohd Nasir, Rinie Narinie
Published: (2015)
Enhancing XSS vulnerability detection and removal in web applications using genetic algorithms
by: Hydara, Isatou
Published: (2024)
by: Hydara, Isatou
Published: (2024)
An experimental evaluation of DoS attack and its impact on throughput of IEEE 802.11 wireless networks
by: Malekzadeh, Mina, et al.
Published: (2008)
by: Malekzadeh, Mina, et al.
Published: (2008)
Efficient kerberos authentication scheme for cross-domain systems in industrial internet of things using ECC
by: Ismail, Haqi Khalid
Published: (2021)
by: Ismail, Haqi Khalid
Published: (2021)
Kesedaran dan amalan keselamatan siber dalam kalangan pengguna internet di Malaysia
by: Pitchan, Muhammad Adnan
Published: (2017)
by: Pitchan, Muhammad Adnan
Published: (2017)
Similar Items
-
Java - based Sony Ericsson phone book manager using bluetooth / Farahani Che Khosni
by: Che Khosni, Farahani
Published: (2005) -
Movie ticket payment via bluetooth / Mohd Shahrin Samian
by: Samian, Mohd Shahrin
Published: (2006) -
Smart gate mobile application in residential area Putra Perdana using geofencing / Maisarah Mahazil
by: Mahazil, Maisarah
Published: (2020) -
Enhannced sampling algorithm in bluetooth low energy for indoor localization
by: Mat Daud, Mohd Faiz
Published: (2018) -
Is Perth a secure place: a Western Australian field study of Bluetooth security
by: Ghori, Khwaja Shan-ul-Hasan Dell, Peter
Published: (2007)