과제정보
This project was funded by the Deanship of Scientific Research (DSR) at king Abdulaziz University, Jeddah under grant no. G- 827-830-1441. The authors, therefore, acknowledge with thanks to DSR's technical and financial support.
참고문헌
- E. A. Khan and M. K. Y. Shambour, "An analytical study of mobile applications for Hajj and Umrah services," Appl. Comput. Informatics, vol. 14, no. 1, pp. 37-47, 2018, doi: 10.1016/j.aci.2017.05.004.
- S. Nagaraj, G. S. V. P. Raju, and K. Koteswara Rao, "Image encryption using elliptic curve cryptograhy and matrix," in Procedia Computer Science, 2015, vol. 48, no. C, doi: 10.1016/j.procs.2015.04.182.
- M. Yamin, A. M. Basahel, and A. A. Abi Sen, "Managing Crowds with Wireless and Mobile Technologies," Wirel. Commun. Mob. Comput., vol. 2018, 2018, doi: 10.1155/2018/7361597.
- M. Rodrigues, L. Moitinho De Almeida, J. Von Schreeb, and P. Arcos Gonzalez, "Human Stampedes: A Scoping Review," 2016, [Online]. Available: https://digibuo.uniovi.es/dspace/handle/10651/39115.
- Lee Soomaroo and Virginia Murray, "Disasters at Mass Gatherings: Lessons from History," PLoS Curr., vol. 4, 2012, [Online]. Available: https://www.ncbi.nlm.nih.gov/pmc/articles/PMC3 271949/.
- A. Owaidah, D. Olaru, M. Bennamoun, F. Sohel, and N. Khan, "Reviewof modelling and simulating crowds at mass gathering events: Hajj as a case study," JASSS, vol. 22, no. 2, Mar. 2019, doi: 10.18564/jasss.3997.
- A. A. M. Ahmed Sheikh A. Al-Aidaroos, "Multiple input modality mobile application for pilgrims," in Knowledge Management International Conference (KMICe), Langkawi, Malaysia, pp. 512-517.
- J. J. P. C. R. Orlando R.E. Pereira, "Survey and analysis of current mobile learning applications and technologies," ACM Comput. Surv, vol. 46, no. 2, 2013, [Online]. Available: http://dx.doi.org/10.1145/2543581.2543594, .
- S. H. Chang and Z. R. Chen, "Protecting Mobile Crowd Sensing against Sybil Attacks Using Cloud Based Trust Management System," Mob. Inf. Syst., 2016, doi: 10.1155/2016/6506341.
- Catharine Reese Bomhold, "Educational use of smart phone technology: a survey of mobile phone application use by undergraduate university students, Program 47 (4) (2013) ," vol. 47, no. 4, pp. 424-436, 2013, [Online]. Available: http://dx.doi.org/10.1108/PROG-01-2013-%0A0003.
- A. Chanal, "Expansion defending a development idea, https://www.youtube.com/watch?v=LIi2mDSPHCg&list=PLWCDz8gCDCyPgxg-rTfgJMqxQBwOM40Z&index=5," Saudi, 2017.
- N. Nguyen, Q. C. Nguyen, and M. T. Le, "A novel autonomous wireless sensor node for IoT applications," Telkomnika (Telecommunication Comput. Electron. Control., vol. 17, no. 5, 2019, doi: 10.12928/TELKOMNIKA.v17i5.12811.
- Y. Fan, Q. Zhu, and Y. Liu, "Cloud/fog computing system architecture and key technologies for southnorth water transfer project safety," Wirel. Commun. Mob. Comput., vol. 2018, 2018, doi: 10.1155/2018/7172045.
- P. Mach and Z. Becvar, "Mobile Edge Computing: A Survey on Architecture and Computation Offloading," IEEE Communications Surveys and Tutorials. 2017, doi: 10.1109/COMST.2017.2682318.