Search Results - ((node OR models) OR code) replacement

Refine Results
  1. 1

    Wearable obstacle sensor for blind people with mobile application / Siti Sarah Hashim by Hashim, Siti Sarah

    Published 2020
    “…Therefore, the first objective was to develop Wearable Obstacle Sensor (WOS) to replace cane and My Sensor Detector (MSD) mobile application to replace the traditional method of finding things. …”
    Get full text
    Get full text
    Entrepreneurship Project
  2. 2
  3. 3

    A context-aware authentication method using blockchain for pervasive computing by Ng, Miao Xuan

    Published 2021
    “…Replacing WPA keys with QR codes introduces additional security loopholes like QR code sharing to unauthorized users. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  4. 4

    Energy management model for RFID sensor networks in internet of things (IoT) contexts / Shaik Shabana Anjum by Shaik Shabana, Anjum

    Published 2018
    “…Secondly, this research focuses on mathematical modeling of the RF sensor nodes within the proposed Energy Harvesting RSN (EHRSN) and Energy Transfer RSN (ETRSN) framework where the nodes are characterized using Semi Markov Decision Process (SMDP) and optimal policies are computed for numerically evaluating and analyzing the issue of higher energy consumption. …”
    Get full text
    Get full text
    Get full text
    Thesis
  5. 5

    Self-organizing method for energy-efficient pulse coupled oscillator (EEPCO) in wireless networks by Al-Mekhlafi, Zeyad Ghaleb, Mohd Hanapi, Zurina, Othman, Mohammed, Ahmad Zukarnain, Zuriati

    Published 2016
    “…For most scenarios, battery replacement is impossible upon the exhaustion of a node’s battery energy method (because of packet collision). …”
    Get full text
    Get full text
    Get full text
    Article
  6. 6

    A study of CGA- (cryptographically generated address) signature based authentication of binding update messages in low-end MIPv6 node by Qadir , Sana, Siddiqi, Mohammad Umar, Anwar, Farhat

    Published 2012
    “…It is also known that public-key cryptographic operations (like digital signatures) are computationally expensive for low-end nodes. This study presents the initial effort in investigating the feasibility of using CGA signature based authentication on low-end nodes. …”
    Get full text
    Get full text
    Get full text
    Proceeding Paper
  7. 7

    Biologically inspired mobile agent-based sensor network (BIMAS) by Ponnusamy, V., Low, T.J., Amin, A.H.M.

    Published 2014
    “…Sensor nodes deployed in a large topology require autonomous capabilities and scalability since frequent replacement of the nodes is almost impossible. …”
    Get full text
    Get full text
    Article
  8. 8

    Improved Distributed Wyner-Ziv Video Coding Based On Reed Solomon Error Correction Scheme And Frame Estimation For Wireless Transmission by Chiam, Kin Honn

    Published 2015
    “…In this thesis, the LDPC is replaced with the Reed Solomon (RS) codes to encode the Wyner-Ziv frames. …”
    Get full text
    Get full text
    Thesis
  9. 9

    Modeling of Energy Harvesting for Wireless Sensor Network by RASOOL, FAHAD

    Published 2018
    “…However, the models of BP-WSNs cannot be applied to EH-WSNs due to their different energy characteristics. …”
    Get full text
    Get full text
    Thesis
  10. 10

    Sensor Node for Medical Application by Ahmad, Mohd Asri

    Published 2008
    “…The sensor node system will connect patients to the PC through wireless connection mode. …”
    Get full text
    Get full text
    Final Year Project
  11. 11

    Experimental study of reinforced concrete columns with embedded pipe by Najafabadi, Sayed Hossein Mousavian

    Published 2010
    “…The installation of the strain gauges on the models was carried out before the testing of the models. …”
    Get full text
    Get full text
    Thesis
  12. 12

    An improved plant identification system by Fuzzy c-means bag of visual words model and sparse coding by Safa, Soodabeh, Khalid, Fatimah

    Published 2020
    “…Current work adopts the Fuzzy c-means Bag of Visual Words model and sparse coding for plant identification. …”
    Get full text
    Get full text
    Get full text
    Article
  13. 13

    Towards efficient wireless body area network using two-way relay cooperation by Waheed, M., Ahmad, R., Ahmed, W., Drieberg, M., Alam, M.M.

    Published 2018
    “…Furthermore, link length extension and diversity is achieved by joint network-channel (JNC) coding the cooperative link. © 2018 by the authors. …”
    Get full text
    Get full text
    Article
  14. 14

    Simulation study on wireless LAN performance using OPNET modeler / Siti Saufiah Suhaimi by Suhaimi, Siti Saufiah

    Published 2005
    “…The simulation is conducted using OPNET Modeler. The study is focused on the effect of varying the Fragmentation threshold parameter and Request To Send or Clear To Send-(RTS/CTS) threshold parameter in ad hoc network and the functionality of access point nodes in switched network.…”
    Get full text
    Get full text
    Thesis
  15. 15

    Feasibility analysis of standalone PV powered battery using SEN for Smart Grid by Islam, Syed Zahurul, Othman, Mohammad Lutfi, Mariun, Norman, Hizam, Hashim, Jalaluddin, Nur Ayuni

    Published 2020
    “…Therefore, to provide seamless power to the nodes is a challenge when the nodes are meant for integrating distributed renewable generations for years. …”
    Get full text
    Get full text
    Get full text
    Article
  16. 16

    Enhanced extreme learning machine for general regression and classification tasks by Mahmood, Saif F

    Published 2020
    “…For instance, the training time of 1000 nodes ELM is 18.11 s, while FASTA-ELM completed in 1.671 s. …”
    Get full text
    Get full text
    Thesis
  17. 17

    WIND LOAD ASSESSMENT ON LATTICE COMMUNICATION TOWERS by Sambu Potty, Narayanan

    Published 2011
    “…The Eurocodes have become mandatory replacing the British codes in Europe. In Malaysia, the MS 1553:2002 have provisions for design of such structures but BS 8100:1986 is also used. …”
    Get full text
    Get full text
    Conference or Workshop Item
  18. 18

    Robust backpropagation neural network using date palm seed growth algorithm for stock market prediction by Tengku Nurul Aimi Balqis, Tengku Malim Busu

    Published 2025
    “…Results from simulated analysis shows that the new model performed well at all levels of data contamination with configuration moderate lags input and lowest hidden nodes. …”
    Get full text
    Get full text
    Get full text
    Thesis
  19. 19

    LOCALIZED MOVEMENT CONTROL CONNECTIVITY RESTORATION ALGORITHMS FOR WIRELESS SENSOR AND ACTOR NETWORKS by MUHAMMAD IMRAN, MUHAMMAD IMRAN

    Published 2011
    “…The second approach identifies critical actors in advance, designates them preferably as noncritical backup nodes that replace the failed primary if such contingency arises in the future. …”
    Get full text
    Get full text
    Thesis
  20. 20

    Design Of Protected Iris Recognition Systems With Improved Authentication Performance by Chai, Tong Yuen

    Published 2022
    “…Thus, an iris template transformation method and a matching strategy are proposed to mitigate the alignment and inherent dependency issues of iris codes in this work. The proposed model has optimized the authentication performance of iris code by achieving EER as low as 0.46% on CASIA-v3interval iris database. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis