Search Results - (node OR (code OR come)) replacement
Search alternatives:
-
1
Wearable obstacle sensor for blind people with mobile application / Siti Sarah Hashim
Published 2020“…Therefore, the first objective was to develop Wearable Obstacle Sensor (WOS) to replace cane and My Sensor Detector (MSD) mobile application to replace the traditional method of finding things. …”
Get full text
Get full text
Entrepreneurship Project -
2
A context-aware authentication method using blockchain for pervasive computing
Published 2021“…Replacing WPA keys with QR codes introduces additional security loopholes like QR code sharing to unauthorized users. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
3
A study of CGA- (cryptographically generated address) signature based authentication of binding update messages in low-end MIPv6 node
Published 2012“…It is also known that public-key cryptographic operations (like digital signatures) are computationally expensive for low-end nodes. This study presents the initial effort in investigating the feasibility of using CGA signature based authentication on low-end nodes. …”
Get full text
Get full text
Get full text
Proceeding Paper -
4
Biologically inspired mobile agent-based sensor network (BIMAS)
Published 2014“…Sensor nodes deployed in a large topology require autonomous capabilities and scalability since frequent replacement of the nodes is almost impossible. …”
Get full text
Get full text
Article -
5
Sensor Node for Medical Application
Published 2008“…The sensor node system will connect patients to the PC through wireless connection mode. …”
Get full text
Get full text
Final Year Project -
6
The regulation of takeovers and mergers in Malaysia
Published 2015“…Due to the tremendous development on takeovers and mergers exercise, the 1998 Code was revised and later replaced by the Malaysian Code on Take-overs and Mergers 2010, deriving its power from section 217 of the Capital Market and Services Act 2007 (CMSA). …”
Get full text
Get full text
Get full text
Proceeding Paper -
7
Hybrid subcarrier multiplexing SAC-OCDMA deploying MS-code over free space optical link for Malaysia weather condition
Published 2018“…Nevertheless, the available codes used suffered from many limitations such as dependency solely on prime numbers (as in the MQC code), code weight being limited to even numbers (as in the KS code) and rigid code construction as the number of users increases (as in the MD code). …”
Get full text
Get full text
Get full text
Thesis -
8
Towards efficient wireless body area network using two-way relay cooperation
Published 2018“…Furthermore, link length extension and diversity is achieved by joint network-channel (JNC) coding the cooperative link. © 2018 by the authors. …”
Get full text
Get full text
Article -
9
LOCALIZED MOVEMENT CONTROL CONNECTIVITY RESTORATION ALGORITHMS FOR WIRELESS SENSOR AND ACTOR NETWORKS
Published 2011“…The second approach identifies critical actors in advance, designates them preferably as noncritical backup nodes that replace the failed primary if such contingency arises in the future. …”
Get full text
Get full text
Thesis -
10
PCW-01 WALLET: post COVID wallet / Muhammad Fuad Abdul Rahman
Published 2022“…One of the activities is money transaction, even with the rise of digital payment it still comes with its drawbacks. Physical money transaction also comes with drawbacks such as the risk of being infected being higher. …”
Get full text
Get full text
Book Section -
11
Automated Face Recognition Attendance System for Students in Universiti Teknologi PETRONAS (UTP)
Published 2019“…The current system that Universiti Teknologi PETRONAS(UTP) is using QR code attendance system where the students need to scan QR code that lecturer provides and put their attendance in the form and their attendance will be recorded. …”
Get full text
Get full text
Final Year Project -
12
Performance evaluation of an energy-efficient medium access control protocol for wireless sensor network / Farah Diyana Zolkafli
Published 2007“…WSN use battery-operated computing and sensing device. Usually these sensor nodes are deployed in environments where it is hard and impractical to charge or replace exhausted batteries of the nodes. …”
Get full text
Get full text
Student Project -
13
Efficient and secured compression and steganography technique in wireless sensor network
Published 2016“…The proposed solution comes with low complexity and is used to en- hance the security of the standard LSB algorithm by replacing an originally less secured sequential data hiding with a random pixel selection. …”
Get full text
Get full text
Get full text
Thesis -
14
Enhancing the stability of the improved-LEACH routing protocol for WSNs
Published 2018“…SILEACH balances the load between the nodes by utilizing an optimized method that considers the nodes’ distance to the base station and their residual energy to select the cluster-head nodes and considers the nodes’ distance to the cluster head and the base station to form clusters. …”
Get full text
Get full text
Get full text
Article -
15
A Survey Of Supervised Machine Learning In Wireless Sensor Network: A Power Management Perspective
Published 2013“…After the installation of wireless sensor nodes it is almost impossible to replace the power source in a device. …”
Get full text
Get full text
Conference or Workshop Item -
16
Managing online programming lab using CodeZinger
Published 2023“…This paper aims to implement CodeZinger, used as an initiative to replace physical laboratory classes, and is used in monitoring the students’ achievement. …”
Get full text
Get full text
Get full text
Article -
17
Framework of distributed controlling via smartphone for industrial automation application
Published 2014“…Machine running code is not compatible with computer running code, thus, different types of source code are needed for computer simulation and real time platform respectively. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
18
Providing optimal percentage reduction in coverage for mobile sensor networks
Published 2014“…Just about every next door neighbor quickly relocates to replacement the actual failed node, one at a time, then returns time for its authentic location. …”
Get full text
Get full text
Article -
19
An Integrated RRT*SMART-A* Algorithm for solving the Global Path Planning Problem in a Static Environment
Published 2023“…This combination is intended to switch method-by-method for the exploration process when the new node reaches the region around the goal node. However, before RRT*-Smart is combined with A*, it is improved by replacing the random sampling method with Fast Sampling. …”
Get full text
Get full text
Get full text
Article -
20
AN INTEGRATED RRT*SMART-A* ALGORITHM FOR SOLVING THE GLOBAL PATH PLANNING PROBLEM IN A STATIC ENVIRONMENT
Published 2023“…This combination is intended to s v1/4 itch method-by -method for the exploration process vyhen the new node reaches the region around the goal node. However, before RRT*-Srnart is combined •...ith A*, it is improved by replacing the random sampling method with Fast Sampling. …”
Get full text
Get full text
Get full text
Article
