Movie ticket payment via bluetooth / Mohd Shahrin Samian
Movie ticket payment via Bluetooth is a new development that uses transaction of money using hand phone. This development builds to compare the efficiency while paying movie ticket at ticket counter area. Customers can perform transactions of without having to queue up to the ticket counter. W...
| Main Author: | Samian, Mohd Shahrin |
|---|---|
| Format: | Student Project |
| Language: | English |
| Published: |
Faculty of Information Technology and Quantitative Sciences
2006
|
| Subjects: | |
| Online Access: | https://ir.uitm.edu.my/id/eprint/680/ |
Similar Items
Announcement system using wap over bluetooth / Azhan Ezra Abdul Aziz
by: Abdul Aziz, Azhan Ezra
Published: (2006)
by: Abdul Aziz, Azhan Ezra
Published: (2006)
Java - based Sony Ericsson phone book manager using bluetooth / Farahani Che Khosni
by: Che Khosni, Farahani
Published: (2005)
by: Che Khosni, Farahani
Published: (2005)
Smart gate mobile application in residential area Putra Perdana using geofencing / Maisarah Mahazil
by: Mahazil, Maisarah
Published: (2020)
by: Mahazil, Maisarah
Published: (2020)
Enhannced sampling algorithm in bluetooth low energy for indoor localization
by: Mat Daud, Mohd Faiz
Published: (2018)
by: Mat Daud, Mohd Faiz
Published: (2018)
Is Perth a secure place: a Western Australian field study of Bluetooth security
by: Ghori, Khwaja Shan-ul-Hasan Dell, Peter
Published: (2007)
by: Ghori, Khwaja Shan-ul-Hasan Dell, Peter
Published: (2007)
Locating bluetooth devices through an android application by creating an ad hoc network
by: Pamboukas, Savvas
Published: (2014)
by: Pamboukas, Savvas
Published: (2014)
A study of interference between bluetooth and 802.11b (WIFI) / Mazani Manaf, Md Jamil Abu Sari and Jamaludin Md Yusof
by: Manaf, Mazani, et al.
Published: (2005)
by: Manaf, Mazani, et al.
Published: (2005)
Development of mobile application cinema e-ticket and payment system.
by: Liew, Mabellyn Linzhen
Published: (2021)
by: Liew, Mabellyn Linzhen
Published: (2021)
Design of a lightweight virtual honeynet based on linux container virtualization
by: Memari, Nogol
Published: (2014)
by: Memari, Nogol
Published: (2014)
On the impact of intra-system interference for ranging and positioning with Bluetooth low energy
by: Figueiredo e Silva, Pedro, et al.
Published: (2015)
by: Figueiredo e Silva, Pedro, et al.
Published: (2015)
Bus Tracking and Ticket Payment System for UTAR
by: Lee, Eu Jin
Published: (2015)
by: Lee, Eu Jin
Published: (2015)
Steganography in webpages using CSS color attributes enhanced by rule-based system
by: Nehzati, Seyedeh Sheida
Published: (2016)
by: Nehzati, Seyedeh Sheida
Published: (2016)
Modelling and simulation of improved scarani-acin-ribordy-GISIN-04 preprocessing technique
by: Mohd Nasir, Rinie Narinie
Published: (2015)
by: Mohd Nasir, Rinie Narinie
Published: (2015)
Scientific forensic framework for smartphones
by: Shahpasand, Maryam
Published: (2015)
by: Shahpasand, Maryam
Published: (2015)
Fake review annotation model and classification through reviewers' writing style
by: Shojaee, Somayeh
Published: (2019)
by: Shojaee, Somayeh
Published: (2019)
Proof-Carrying Code for Verifying Confidentiality of Mobile Code through Secure Information Flow Analysis
by: Abdu Muthana, Abdulrahman Ahmad
Published: (2008)
by: Abdu Muthana, Abdulrahman Ahmad
Published: (2008)
Detecting coordinated distributed attacks using mobile agents with associated managers architecture
by: Javan, Ali
Published: (2011)
by: Javan, Ali
Published: (2011)
Network security situation awareness based on indicators extracted
by: Xie, Zeqiang
Published: (2016)
by: Xie, Zeqiang
Published: (2016)
Ghosts! A location-based Bluetooth LE mobile game for museum exploration
by: Nilsson, Tommy, et al.
Published: (2016)
by: Nilsson, Tommy, et al.
Published: (2016)
Mobile car alarm via bluetooth application
by: Norsyafiqah, Jamaluddin
Published: (2015)
by: Norsyafiqah, Jamaluddin
Published: (2015)
Hyper-heuristic approaches for data stream-based iIntrusion detection in the Internet of Things
by: Hadi, Ahmed Adnan
Published: (2022)
by: Hadi, Ahmed Adnan
Published: (2022)
Design of a Smart phone Based Body Sensor for Long-term Healthcare Monitoring
by: Wong, Kiing Ing
Published: (2013)
by: Wong, Kiing Ing
Published: (2013)
Security framework based multi agent system architecture to facilitate data fetching from cloud data storage
by: Mohamed, Amir Mohamed Talib
Published: (2012)
by: Mohamed, Amir Mohamed Talib
Published: (2012)
Factors influencing organizational performance in Perak
Tengah administrative complex / Azzaim Shahrin Baharim
by: Baharim, Azzaim Shahrin
Published: (2020)
by: Baharim, Azzaim Shahrin
Published: (2020)
An integrated anomaly intrusion detection scheme using statistical, hybridized classifiers and signature approach
by: Mohamed Yassin, Warusia
Published: (2015)
by: Mohamed Yassin, Warusia
Published: (2015)
Electronic Book of Network Security: Introduction to Network Security
by: Hoo, Cheong Yee
Published: (2003)
by: Hoo, Cheong Yee
Published: (2003)
An efficient crime group of secured data sharing scheme in cloud
by: Rashid, Mustafa Noori
Published: (2018)
by: Rashid, Mustafa Noori
Published: (2018)
Kesedaran dan amalan keselamatan siber dalam kalangan pengguna internet di Malaysia
by: Pitchan, Muhammad Adnan
Published: (2017)
by: Pitchan, Muhammad Adnan
Published: (2017)
A multi-factor authentication scheme using attack recognition and key generator technique
by: Mohd Ariffin, Noor Afiza
Published: (2017)
by: Mohd Ariffin, Noor Afiza
Published: (2017)
Efficient kerberos authentication scheme for cross-domain systems in industrial internet of things using ECC
by: Ismail, Haqi Khalid
Published: (2021)
by: Ismail, Haqi Khalid
Published: (2021)
Implementation and Evaluation of Large Rsa Encryption and Decryption Keys For Internet Security
by: H. Belgassem, Seddeq
Published: (2004)
by: H. Belgassem, Seddeq
Published: (2004)
Modeling of post-incident root cause analysis for cross site request forgery (CSRF) attack
by: Mustafa, Mohd Nawawi
Published: (2015)
by: Mustafa, Mohd Nawawi
Published: (2015)
Information security policy compliance model for government agency
by: Ramli, Muhamad Amirnazmi
Published: (2018)
by: Ramli, Muhamad Amirnazmi
Published: (2018)
Enhancing XSS vulnerability detection and removal in web applications using genetic algorithms
by: Hydara, Isatou
Published: (2024)
by: Hydara, Isatou
Published: (2024)
Secure lightweight client for cloud-based E-Health Model
by: Zhang, Xiaowei
Published: (2023)
by: Zhang, Xiaowei
Published: (2023)
An approach to improve detecting and removing cross- site scripting vulnerabilities in web applications
by: Hydara, Isatou
Published: (2015)
by: Hydara, Isatou
Published: (2015)
Security testing of web applications for detecting and removing second-order SQL injection vulnerabilities
by: Draib, Najla'a Ateeq Mohammed
Published: (2022)
by: Draib, Najla'a Ateeq Mohammed
Published: (2022)
FFB detector mobile apps assist in routes planning of FFB collection in oil palm / Saiful Shahrin Khamis
by: Khamis, Saiful Shahrin
Published: (2019)
by: Khamis, Saiful Shahrin
Published: (2019)
Hybrid cryptography algorithm to improve security cloud storage
by: Abd Almohsen, Inam Razzaq
Published: (2017)
by: Abd Almohsen, Inam Razzaq
Published: (2017)
Protecting network with Cisco solution
Published: (2008)
Published: (2008)
Similar Items
-
Announcement system using wap over bluetooth / Azhan Ezra Abdul Aziz
by: Abdul Aziz, Azhan Ezra
Published: (2006) -
Java - based Sony Ericsson phone book manager using bluetooth / Farahani Che Khosni
by: Che Khosni, Farahani
Published: (2005) -
Smart gate mobile application in residential area Putra Perdana using geofencing / Maisarah Mahazil
by: Mahazil, Maisarah
Published: (2020) -
Enhannced sampling algorithm in bluetooth low energy for indoor localization
by: Mat Daud, Mohd Faiz
Published: (2018) -
Is Perth a secure place: a Western Australian field study of Bluetooth security
by: Ghori, Khwaja Shan-ul-Hasan Dell, Peter
Published: (2007)