2019
DOI: 10.30534/ijatcse/2019/55852019
|View full text |Cite
|
Sign up to set email alerts
|

CROLIST: A Mobile App for Collaborative Grocery List Management

Abstract: As smartphones serve many purposes, and they are increasingly becoming an integral part of human lives; digital grocery lists created using mobile apps is the most relevant solution to overcome the limitations in paper-based grocery lists. Although the digital grocery lists align with the current human lifestyle and technological trend, they are unable to support collaborative environment in which they do not provide the facility to share a grocery list among household members. Therefore, the existing digital … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2020
2020
2023
2023

Publication Types

Select...
2

Relationship

0
2

Authors

Journals

citations
Cited by 2 publications
(2 citation statements)
references
References 20 publications
0
2
0
Order By: Relevance
“…Harshini et al, it is a recognition-based technique where a user must first register the images as password there are three options to setup the image by image with grids, randomized images and blurred images user can setup the password from the selected category which will have 9 cells which is to be selected and saved. The major drawback is that it has smaller grid which limits the resolution of the image [11]. Yuhua Yin et al, With the help of pass image we can generate a strong password.…”
Section: Literature Reviewmentioning
confidence: 99%
“…Harshini et al, it is a recognition-based technique where a user must first register the images as password there are three options to setup the image by image with grids, randomized images and blurred images user can setup the password from the selected category which will have 9 cells which is to be selected and saved. The major drawback is that it has smaller grid which limits the resolution of the image [11]. Yuhua Yin et al, With the help of pass image we can generate a strong password.…”
Section: Literature Reviewmentioning
confidence: 99%
“…The RAD cycle can be seen in Figure 3. The software development with RAD has a cyclical approach and occurs repeatedly [20]. The system is constructed in the early stage of development using the iterative method to determine user requirements.…”
Section: Rapid Application Development (Rad)mentioning
confidence: 99%