Search Results - ((node OR none) OR (code OR com)) replacement

Refine Results
  1. 1

    Wearable obstacle sensor for blind people with mobile application / Siti Sarah Hashim by Hashim, Siti Sarah

    Published 2020
    “…Therefore, the first objective was to develop Wearable Obstacle Sensor (WOS) to replace cane and My Sensor Detector (MSD) mobile application to replace the traditional method of finding things. …”
    Get full text
    Get full text
    Entrepreneurship Project
  2. 2

    Biologically inspired mobile agent-based sensor network (BIMAS) by Ponnusamy, V., Low, T.J., Amin, A.H.M.

    Published 2014
    “…Sensor nodes deployed in a large topology require autonomous capabilities and scalability since frequent replacement of the nodes is almost impossible. …”
    Get full text
    Get full text
    Article
  3. 3

    Towards efficient wireless body area network using two-way relay cooperation by Waheed, M., Ahmad, R., Ahmed, W., Drieberg, M., Alam, M.M.

    Published 2018
    “…Furthermore, link length extension and diversity is achieved by joint network-channel (JNC) coding the cooperative link. © 2018 by the authors. …”
    Get full text
    Get full text
    Article
  4. 4

    A context-aware authentication method using blockchain for pervasive computing by Ng, Miao Xuan

    Published 2021
    “…Replacing WPA keys with QR codes introduces additional security loopholes like QR code sharing to unauthorized users. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  5. 5

    Providing optimal percentage reduction in coverage for mobile sensor networks by Amir Khan, M., Hasbullah, H., Nazir, B.

    Published 2014
    “…Just about every next door neighbor quickly relocates to replacement the actual failed node, one at a time, then returns time for its authentic location. …”
    Get full text
    Get full text
    Article
  6. 6

    A study of CGA- (cryptographically generated address) signature based authentication of binding update messages in low-end MIPv6 node by Qadir , Sana, Siddiqi, Mohammad Umar, Anwar, Farhat

    Published 2012
    “…It is also known that public-key cryptographic operations (like digital signatures) are computationally expensive for low-end nodes. This study presents the initial effort in investigating the feasibility of using CGA signature based authentication on low-end nodes. …”
    Get full text
    Get full text
    Get full text
    Proceeding Paper
  7. 7

    Lifetime and coverage maximization technique for mobile sensor networks by Khan, M.A., Hasbullah, H., Nazir, B., Khan, M.A.

    Published 2014
    “…Just about every next door neighbor quickly relocates to replacement the actual failed node, one at a time, then returns time for its authentic location. …”
    Get full text
    Get full text
    Conference or Workshop Item
  8. 8

    Sensor Node for Medical Application by Ahmad, Mohd Asri

    Published 2008
    “…The sensor node system will connect patients to the PC through wireless connection mode. …”
    Get full text
    Get full text
    Final Year Project
  9. 9

    RWP-NSGA II: reinforcement weighted probabilistic NSGA II for workload allocation in fog and internet of things environment by Ariffin, Ahmad Alauddin, Belhaouari, Samir Brahim, Raissouli, Hafsa

    Published 2024
    “…This study investigates workload allocation in the IoT node and the fog nodes by optimizing delay and energy consumption. …”
    Get full text
    Get full text
    Get full text
    Article
  10. 10

    The effect of replacement strategies of genetic algorithm in regression test case prioritization of selected test cases by Musa, Samaila, Md Sultan, Abu Bakar, Abd Ghani, Abdul Azim, Baharom, Salmi

    Published 2015
    “…It was observed from the results that replacement of worst individual and replacing the parent increased the effectiveness of regression testing compared with two other replacement strategies in term of rate of fault detection.…”
    Get full text
    Get full text
    Get full text
    Article
  11. 11

    Feasibility analysis of standalone PV powered battery using SEN for Smart Grid by Islam, Syed Zahurul, Othman, Mohammad Lutfi, Mariun, Norman, Hizam, Hashim, Jalaluddin, Nur Ayuni

    Published 2020
    “…Therefore, to provide seamless power to the nodes is a challenge when the nodes are meant for integrating distributed renewable generations for years. …”
    Get full text
    Get full text
    Get full text
    Article
  12. 12

    LOCALIZED MOVEMENT CONTROL CONNECTIVITY RESTORATION ALGORITHMS FOR WIRELESS SENSOR AND ACTOR NETWORKS by MUHAMMAD IMRAN, MUHAMMAD IMRAN

    Published 2011
    “…The second approach identifies critical actors in advance, designates them preferably as noncritical backup nodes that replace the failed primary if such contingency arises in the future. …”
    Get full text
    Get full text
    Thesis
  13. 13

    Relevance of intra operative bacteriology culture in primary total knee replacement by Yaakub, Yuzaimi

    Published 2016
    “…Prosthetic joint infection following joint replacement is uncommon but can be a devastating complication. …”
    Get full text
    Get full text
    Thesis
  14. 14

    Performance evaluation of an energy-efficient medium access control protocol for wireless sensor network / Farah Diyana Zolkafli by Zolkafli, Farah Diyana

    Published 2007
    “…WSN use battery-operated computing and sensing device. Usually these sensor nodes are deployed in environments where it is hard and impractical to charge or replace exhausted batteries of the nodes. …”
    Get full text
    Get full text
    Student Project
  15. 15

    An innovative approach of blending security features in energy-efficient routing for a crowded network of wireless sensors by Pathan, Al-Sakib Khan, Ahmed, Tarem

    Published 2014
    “…Energy efficiency is often very crucial in these sorts of networks as the power sources of the inexpensive sensors are (in most of the cases) not replaceable after deployment. If any intermediate node between any two communicating nodes runs out of battery power, the link between the end nodes is eventually broken. …”
    Get full text
    Get full text
    Get full text
    Book Chapter
  16. 16

    Enhancing the stability of the improved-LEACH routing protocol for WSNs by Al-Zubaidi, Ammar S., Ariffin, Ahmad Alauddin, Al-Qadhi, Abdulrahman K.

    Published 2018
    “…SILEACH balances the load between the nodes by utilizing an optimized method that considers the nodes’ distance to the base station and their residual energy to select the cluster-head nodes and considers the nodes’ distance to the cluster head and the base station to form clusters. …”
    Get full text
    Get full text
    Get full text
    Article
  17. 17

    A Survey Of Supervised Machine Learning In Wireless Sensor Network: A Power Management Perspective by Ul haq, Riaz, Norrozila, Sulaiman, Muhammad, Alam

    Published 2013
    “…After the installation of wireless sensor nodes it is almost impossible to replace the power source in a device. …”
    Get full text
    Get full text
    Conference or Workshop Item
  18. 18

    Managing online programming lab using CodeZinger by Noor Faridatul Ainun Zainal, Zarina Shukur, Kauthar Mohd Daud, Shahrina Shahrani, Masura Rahmat, Azura Ishak, Rohizah Abd Rahman

    Published 2023
    “…This paper aims to implement CodeZinger, used as an initiative to replace physical laboratory classes, and is used in monitoring the students’ achievement. …”
    Get full text
    Get full text
    Get full text
    Article
  19. 19

    Error correction for CDMA code in mobile communication by Tiong S.K., Tan C.H., Ding J., Ismail M.

    Published 2023
    “…Error correction coding is one of the topics that obtained a lot of studies lately to improve the reliability of communication on digital channels. …”
    Conference paper
  20. 20

    Congestion-aware and traffic load balancing scheme for routing in WSNs by Chughtai, O., Badruddin, N., Awang, A., Rehan, M.

    Published 2016
    “…Solutions in WSNs try to avoid and overcome congestion by selecting sensor nodes with sufficient buffer space and adjusting the traffic rate at the source node over the shortest discovered route that usually decreases the End-to-End (ETE) throughput. …”
    Get full text
    Get full text
    Article