Search Results - (node OR (code OR (some OR com))) replacement

Refine Results
  1. 1

    A context-aware authentication method using blockchain for pervasive computing by Ng, Miao Xuan

    Published 2021
    “…Replacing WPA keys with QR codes introduces additional security loopholes like QR code sharing to unauthorized users. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  2. 2

    Providing optimal percentage reduction in coverage for mobile sensor networks by Amir Khan, M., Hasbullah, H., Nazir, B.

    Published 2014
    “…Just about every next door neighbor quickly relocates to replacement the actual failed node, one at a time, then returns time for its authentic location. …”
    Get full text
    Get full text
    Article
  3. 3

    Wearable obstacle sensor for blind people with mobile application / Siti Sarah Hashim by Hashim, Siti Sarah

    Published 2020
    “…Therefore, the first objective was to develop Wearable Obstacle Sensor (WOS) to replace cane and My Sensor Detector (MSD) mobile application to replace the traditional method of finding things. …”
    Get full text
    Get full text
    Entrepreneurship Project
  4. 4

    Lifetime and coverage maximization technique for mobile sensor networks by Khan, M.A., Hasbullah, H., Nazir, B., Khan, M.A.

    Published 2014
    “…Just about every next door neighbor quickly relocates to replacement the actual failed node, one at a time, then returns time for its authentic location. …”
    Get full text
    Get full text
    Conference or Workshop Item
  5. 5

    LOCALIZED MOVEMENT CONTROL CONNECTIVITY RESTORATION ALGORITHMS FOR WIRELESS SENSOR AND ACTOR NETWORKS by MUHAMMAD IMRAN, MUHAMMAD IMRAN

    Published 2011
    “…The second approach identifies critical actors in advance, designates them preferably as noncritical backup nodes that replace the failed primary if such contingency arises in the future. …”
    Get full text
    Get full text
    Thesis
  6. 6

    Biologically inspired mobile agent-based sensor network (BIMAS) by Ponnusamy, V., Low, T.J., Amin, A.H.M.

    Published 2014
    “…Sensor nodes deployed in a large topology require autonomous capabilities and scalability since frequent replacement of the nodes is almost impossible. …”
    Get full text
    Get full text
    Article
  7. 7

    A legal review on the Malaysian judges' code or ethic / Muhammad Yazid Mohamad Salim…[et al.] by Mohamad Salim, Muhammad Yazid, Abdul Aziz, Ahmad Lokman, Yusof, Nor Azhari, Othman, Haziq

    Published 2010
    “…Secondly, to look through the new Judges' Code of Ethic 2009 which had replaced the 1994 code, whether or not this new code had solved all the problems faced by the Judges' Code of Ethic 1994. …”
    Get full text
    Get full text
    Student Project
  8. 8

    Towards efficient wireless body area network using two-way relay cooperation by Waheed, M., Ahmad, R., Ahmed, W., Drieberg, M., Alam, M.M.

    Published 2018
    “…Furthermore, link length extension and diversity is achieved by joint network-channel (JNC) coding the cooperative link. © 2018 by the authors. …”
    Get full text
    Get full text
    Article
  9. 9

    Enhancing the stability of the improved-LEACH routing protocol for WSNs by Al-Zubaidi, Ammar S., Ariffin, Ahmad Alauddin, Al-Qadhi, Abdulrahman K.

    Published 2018
    “…SILEACH balances the load between the nodes by utilizing an optimized method that considers the nodes’ distance to the base station and their residual energy to select the cluster-head nodes and considers the nodes’ distance to the cluster head and the base station to form clusters. …”
    Get full text
    Get full text
    Get full text
    Article
  10. 10

    Environmental taxonomy of power scavenging techniques for autonomous self powered wireless sensors by Farizani, Seyed Reza Kamel Tabbakh, Maarefdoust, Reyhaneh, Ng, Chee Kyun, Mohd Ali, Borhanuddin

    Published 2010
    “…Power is a critical issue in wireless sensor node, because in most of the applications it is difficult or in some cases impossible to replace or replenish the battery. …”
    Get full text
    Get full text
    Conference or Workshop Item
  11. 11

    An innovative approach of blending security features in energy-efficient routing for a crowded network of wireless sensors by Pathan, Al-Sakib Khan, Ahmed, Tarem

    Published 2014
    “…Energy efficiency is often very crucial in these sorts of networks as the power sources of the inexpensive sensors are (in most of the cases) not replaceable after deployment. If any intermediate node between any two communicating nodes runs out of battery power, the link between the end nodes is eventually broken. …”
    Get full text
    Get full text
    Get full text
    Book Chapter
  12. 12

    Living plant energy harvesting for WSN & IoT devices by Mohd Taam, Ahmad Zun Najhi, Habaebi, Mohamed Hadi, Islam, Md. Rafiqul

    Published 2024
    “…Currently, most sensor nodes are operated using batteries which means that they need to be replaced once the batteries die out. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Proceeding Paper
  13. 13

    Survey on caching approaches in information centric networking by Abdullahi, Ibrahim, Che Mohamed Arif, Ahmad Suki, Hassan, Suhaidi

    Published 2015
    “…This survey also highlighted the top sensitive issues that influence the active deployment of caches in ICN through recency, frequency, content size, cost of retrieval and coordination, update in caches and replacements. Several cache characteristics were further presented in ways that would improve cache techniques, deployments as research suggestions for content placement, replacement and quick scan on nodes on and off-path of the network.…”
    Get full text
    Get full text
    Article
  14. 14

    A study of CGA- (cryptographically generated address) signature based authentication of binding update messages in low-end MIPv6 node by Qadir , Sana, Siddiqi, Mohammad Umar, Anwar, Farhat

    Published 2012
    “…It is also known that public-key cryptographic operations (like digital signatures) are computationally expensive for low-end nodes. This study presents the initial effort in investigating the feasibility of using CGA signature based authentication on low-end nodes. …”
    Get full text
    Get full text
    Get full text
    Proceeding Paper
  15. 15

    QR code scanning for auto-generate location based information for facility management / Nurhidayah Zulkarnain by Zulkarnain, Nurhidayah

    Published 2020
    “…This project aimed to design and upgrade the current system of facility management "e-Aduan Fasiliti" by replacing some of the manual entries for a more precise location in UiTM Shah Alam. …”
    Get full text
    Get full text
    Thesis
  16. 16

    A Performance Investigation on IoT Enabled Intra-Vehicular Wireless Sensor Networks by Rahman, Md. Arafatur, Ali, Jahan, M. Nomani, Kabir, Azad, Saiful

    Published 2017
    “…This result demonstrates that the existing MAC protocol works well for a small network (i.e., a network with a maximum number of 50 nodes) but is not suitable for a large network (i.e., a network with more than 50 nodes). …”
    Get full text
    Get full text
    Get full text
    Article
  17. 17

    IEEE 802.15.4 in an Unattended Scenario with Periodic Setup Phase for Wireless Sensor Networks by Munajed, Bashar, Drieberg , Micheal, Hamid, Nor Hisham

    Published 2011
    “…However, it assumes that the sensor nodes operate in an attended scenario. In this research, we seek to implement IEEE 802.15.4 in an unattended scenario. …”
    Get full text
    Get full text
    Conference or Workshop Item
  18. 18

    Sensor Node for Medical Application by Ahmad, Mohd Asri

    Published 2008
    “…The sensor node system will connect patients to the PC through wireless connection mode. …”
    Get full text
    Get full text
    Final Year Project
  19. 19

    EVALUATION OF AVAILABLE CODES FOR CAPACITY ASSESSMENT OF CORRODED PIPELINES by Belachew , Chanyalew Taye, Che Ismail, Mokhtar, Karuppanan , Saravanan

    Published 2009
    “…This means when pipeline operators use these codes for their fitness for service assessment; they are subjected to either unnecessary maintenance or premature replacement of pipelines. …”
    Get full text
    Get full text
    Conference or Workshop Item
  20. 20

    The occurred error in microdosimetry calculations while using water instead of the body organs in proton therapy and a new formula for an estimate of the statistical uncertainty of... by Jahanfar, Somayeh, Anbaran, Hossein Tavakoli

    Published 2022
    “…Therefore, in this study, we replaced the water phantom instead of some organs to calculate its effect on the proton stopping-power, and range and the consequence of deposited energy and microdosimetric spectra in small sites. …”
    Get full text
    Get full text
    Get full text
    Article