Search Results - ((node OR one) OR code) replacement

Refine Results
  1. 1

    Wearable obstacle sensor for blind people with mobile application / Siti Sarah Hashim by Hashim, Siti Sarah

    Published 2020
    “…In order to develop WOS, there were two process involved which were Development 1 and Development 2. Development 1 consists of two NodeMCU, one was for obstacle sensor that attached with Ultrasonic Sensor HC-SR04 to detect obstacle and buzzer to give alert. …”
    Get full text
    Get full text
    Entrepreneurship Project
  2. 2

    A context-aware authentication method using blockchain for pervasive computing by Ng, Miao Xuan

    Published 2021
    “…Replacing WPA keys with QR codes introduces additional security loopholes like QR code sharing to unauthorized users. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  3. 3

    A study of CGA- (cryptographically generated address) signature based authentication of binding update messages in low-end MIPv6 node by Qadir , Sana, Siddiqi, Mohammad Umar, Anwar, Farhat

    Published 2012
    “…It is also known that public-key cryptographic operations (like digital signatures) are computationally expensive for low-end nodes. This study presents the initial effort in investigating the feasibility of using CGA signature based authentication on low-end nodes. …”
    Get full text
    Get full text
    Get full text
    Proceeding Paper
  4. 4

    Biologically inspired mobile agent-based sensor network (BIMAS) by Ponnusamy, V., Low, T.J., Amin, A.H.M.

    Published 2014
    “…Sensor nodes deployed in a large topology require autonomous capabilities and scalability since frequent replacement of the nodes is almost impossible. …”
    Get full text
    Get full text
    Article
  5. 5

    Sensor Node for Medical Application by Ahmad, Mohd Asri

    Published 2008
    “…The sensor node system will connect patients to the PC through wireless connection mode. …”
    Get full text
    Get full text
    Final Year Project
  6. 6

    Towards efficient wireless body area network using two-way relay cooperation by Waheed, M., Ahmad, R., Ahmed, W., Drieberg, M., Alam, M.M.

    Published 2018
    “…Furthermore, link length extension and diversity is achieved by joint network-channel (JNC) coding the cooperative link. © 2018 by the authors. …”
    Get full text
    Get full text
    Article
  7. 7

    LOCALIZED MOVEMENT CONTROL CONNECTIVITY RESTORATION ALGORITHMS FOR WIRELESS SENSOR AND ACTOR NETWORKS by MUHAMMAD IMRAN, MUHAMMAD IMRAN

    Published 2011
    “…The second approach identifies critical actors in advance, designates them preferably as noncritical backup nodes that replace the failed primary if such contingency arises in the future. …”
    Get full text
    Get full text
    Thesis
  8. 8

    Performance evaluation of an energy-efficient medium access control protocol for wireless sensor network / Farah Diyana Zolkafli by Zolkafli, Farah Diyana

    Published 2007
    “…Each node has one or more sensors, embedded processors and low-power radios, and is normally battery operated. …”
    Get full text
    Get full text
    Student Project
  9. 9

    Enhancing the stability of the improved-LEACH routing protocol for WSNs by Al-Zubaidi, Ammar S., Ariffin, Ahmad Alauddin, Al-Qadhi, Abdulrahman K.

    Published 2018
    “…The sensor nodes in wireless sensor networks use a battery as their power source, which is hard to replace during deployment. …”
    Get full text
    Get full text
    Get full text
    Article
  10. 10

    Managing online programming lab using CodeZinger by Noor Faridatul Ainun Zainal, Zarina Shukur, Kauthar Mohd Daud, Shahrina Shahrani, Masura Rahmat, Azura Ishak, Rohizah Abd Rahman

    Published 2023
    “…In this study, the application of CodeZinger was made on two programming courses involving 266 students of Year 1, namely students taking the Computer Programming course (semester 1), and Data Structure course (semester 2). …”
    Get full text
    Get full text
    Get full text
    Article
  11. 11

    A Survey Of Supervised Machine Learning In Wireless Sensor Network: A Power Management Perspective by Ul haq, Riaz, Norrozila, Sulaiman, Muhammad, Alam

    Published 2013
    “…In this approach one node become the leader node which is responsible to collect data from all nodes and send the data to base station. …”
    Get full text
    Get full text
    Conference or Workshop Item
  12. 12

    AN INTEGRATED RRT*SMART-A* ALGORITHM FOR SOLVING THE GLOBAL PATH PLANNING PROBLEM IN A STATIC ENVIRONMENT by Suwayo, Heri, Adrishah, Andi, Andika, Juleri, Shamdudin, Abu Ubaidah, Zakaria, Mohamad Fauzi

    Published 2023
    “…This combination is intended to s v1/4 itch method-by -method for the exploration process vyhen the new node reaches the region around the goal node. …”
    Get full text
    Get full text
    Get full text
    Article
  13. 13

    An Integrated RRT*SMART-A* Algorithm for solving the Global Path Planning Problem in a Static Environment by Suwoyo, Heru, Adriansyah, Andi, Andika, Julpri, Ubaidillah, Abu

    Published 2023
    “…This combination is intended to switch method-by-method for the exploration process when the new node reaches the region around the goal node. However, before RRT*-Smart is combined with A*, it is improved by replacing the random sampling method with Fast Sampling. …”
    Get full text
    Get full text
    Get full text
    Article
  14. 14

    AN INTEGRATED RRT*SMART-A* ALGORITHM FOR SOLVING THE GLOBAL PATH PLANNING PROBLEM IN A STATIC ENVIRONMENT by SUWOYO, HERU, ADRIANSYAH, ANDI, ANDIKA, JULFRI, SHAMSUDIN, ABU UBAIDAH, ZAKARIA, MOHAMAD FAUZI

    Published 2023
    “…This combination is intended to s v1/4 itch method-by -method for the exploration process vyhen the new node reaches the region around the goal node. …”
    Get full text
    Get full text
    Get full text
    Article
  15. 15

    AN INTEGRATED RRT*SMART-A* ALGORITHM FOR SOLVING THE GLOBAL PATH PLANNING PROBLEM IN A STATIC ENVIRONMENT by SUWOYO, HERU, ADRIANSHAH, ANDI, ANDIKA, JULPRI, SHAMSUDIN, ABU UBAIDAH, ZAKARIA, MOHAMAD FAUZI

    Published 2023
    “…This combination is intended to s v1/4 itch method-by -method for the exploration process vyhen the new node reaches the region around the goal node. …”
    Get full text
    Get full text
    Get full text
    Article
  16. 16

    Providing optimal percentage reduction in coverage for mobile sensor networks by Amir Khan, M., Hasbullah, H., Nazir, B.

    Published 2014
    “…Just about every next door neighbor quickly relocates to replacement the actual failed node, one at a time, then returns time for its authentic location. …”
    Get full text
    Get full text
    Article
  17. 17
  18. 18

    Lifetime and coverage maximization technique for mobile sensor networks by Khan, M.A., Hasbullah, H., Nazir, B., Khan, M.A.

    Published 2014
    “…Just about every next door neighbor quickly relocates to replacement the actual failed node, one at a time, then returns time for its authentic location. …”
    Get full text
    Get full text
    Conference or Workshop Item
  19. 19

    Environmental taxonomy of power scavenging techniques for autonomous self powered wireless sensors by Farizani, Seyed Reza Kamel Tabbakh, Maarefdoust, Reyhaneh, Ng, Chee Kyun, Mohd Ali, Borhanuddin

    Published 2010
    “…Power is a critical issue in wireless sensor node, because in most of the applications it is difficult or in some cases impossible to replace or replenish the battery. …”
    Get full text
    Get full text
    Conference or Workshop Item
  20. 20

    AN INTEGRATED RRT*SMART-A* ALGORITHM FOR SOLVING THE GLOBAL PATH PLANNING PROBLEM IN A STATIC ENVIRONMENT by SUWOYO, HERU, ADRIANSYAH, ANDI, JULI RI ANDIKA, JULI RI ANDIKA, SHAMSUDIN, ABU UBAIDAH, ZAKARIA, MOHAMAD FAUZI

    Published 2023
    “…This combination is intended to s v1/4 itch method-by -method for the exploration process vyhen the new node reaches the region around the goal node. …”
    Get full text
    Get full text
    Get full text
    Article