Search Results - (node OR (code OR made)) replacement

Refine Results
  1. 1

    Managing online programming lab using CodeZinger by Noor Faridatul Ainun Zainal, Zarina Shukur, Kauthar Mohd Daud, Shahrina Shahrani, Masura Rahmat, Azura Ishak, Rohizah Abd Rahman

    Published 2023
    “…This paper aims to implement CodeZinger, used as an initiative to replace physical laboratory classes, and is used in monitoring the students’ achievement. …”
    Get full text
    Get full text
    Get full text
    Article
  2. 2

    Wearable obstacle sensor for blind people with mobile application / Siti Sarah Hashim by Hashim, Siti Sarah

    Published 2020
    “…Therefore, the first objective was to develop Wearable Obstacle Sensor (WOS) to replace cane and My Sensor Detector (MSD) mobile application to replace the traditional method of finding things. …”
    Get full text
    Get full text
    Entrepreneurship Project
  3. 3

    QR code-based herb plant information system at Shah Alam Botanical Park / Nor Atikah Adanan by Adanan, Nor Atikah

    Published 2019
    “…This plant information is very limited in term of information richness and durability since it is made from an A4 paper. Therefore, a QR codes should be replaced the current laminated A4 plant information, as this technology is very flexible and can lead the users for richer information. …”
    Get full text
    Get full text
    Thesis
  4. 4

    A context-aware authentication method using blockchain for pervasive computing by Ng, Miao Xuan

    Published 2021
    “…Replacing WPA keys with QR codes introduces additional security loopholes like QR code sharing to unauthorized users. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  5. 5

    A study of CGA- (cryptographically generated address) signature based authentication of binding update messages in low-end MIPv6 node by Qadir , Sana, Siddiqi, Mohammad Umar, Anwar, Farhat

    Published 2012
    “…It is also known that public-key cryptographic operations (like digital signatures) are computationally expensive for low-end nodes. This study presents the initial effort in investigating the feasibility of using CGA signature based authentication on low-end nodes. …”
    Get full text
    Get full text
    Get full text
    Proceeding Paper
  6. 6

    Biologically inspired mobile agent-based sensor network (BIMAS) by Ponnusamy, V., Low, T.J., Amin, A.H.M.

    Published 2014
    “…Sensor nodes deployed in a large topology require autonomous capabilities and scalability since frequent replacement of the nodes is almost impossible. …”
    Get full text
    Get full text
    Article
  7. 7

    Pharmacy QR code / Siti Khairul Niza Sukri ... [et al.] by Sukri, Siti Khairul Niza, Elias, Shamsul Jamel, Che Sidik, Noreha, Yusni, Nurul Fatina, Mohd Zaim, Nur Farah Hanani

    Published 2019
    “…Material Safety Data Sheet (MSDS) that provide information on the potential hazards can be replaced by QR Code and this is a potential value for commercialization as the project can be introduce and implement to a pharmacy and medicine manufacturer. …”
    Get full text
    Get full text
    Book Section
  8. 8

    Sensor Node for Medical Application by Ahmad, Mohd Asri

    Published 2008
    “…The sensor node system will connect patients to the PC through wireless connection mode. …”
    Get full text
    Get full text
    Final Year Project
  9. 9

    Towards efficient wireless body area network using two-way relay cooperation by Waheed, M., Ahmad, R., Ahmed, W., Drieberg, M., Alam, M.M.

    Published 2018
    “…Furthermore, link length extension and diversity is achieved by joint network-channel (JNC) coding the cooperative link. © 2018 by the authors. …”
    Get full text
    Get full text
    Article
  10. 10

    LOCALIZED MOVEMENT CONTROL CONNECTIVITY RESTORATION ALGORITHMS FOR WIRELESS SENSOR AND ACTOR NETWORKS by MUHAMMAD IMRAN, MUHAMMAD IMRAN

    Published 2011
    “…The second approach identifies critical actors in advance, designates them preferably as noncritical backup nodes that replace the failed primary if such contingency arises in the future. …”
    Get full text
    Get full text
    Thesis
  11. 11

    RESIDUAL STRENGTH ASSESSMENT OF CORRODED PIPELINES by BELACHEW, CHANYALEW TAYE BELACHEW

    Published 2011
    “…Therefore, appropriate defect assessment method is necessary in order to decide whether to keep them into continual operation or to make a shutdown for necessary maintenance or replacement of sections of the pipeline. Methods for assessing metal loss defects have been available for many decades, as for instance the NG-18 equation and ANSI/ASME B31G code. …”
    Get full text
    Get full text
    Thesis
  12. 12

    Performance evaluation of an energy-efficient medium access control protocol for wireless sensor network / Farah Diyana Zolkafli by Zolkafli, Farah Diyana

    Published 2007
    “…WSN use battery-operated computing and sensing device. Usually these sensor nodes are deployed in environments where it is hard and impractical to charge or replace exhausted batteries of the nodes. …”
    Get full text
    Get full text
    Student Project
  13. 13

    Improvisation of Gabor filter design using verilog HDL by Mohamed, Shamsul Anuar

    Published 2009
    “…This paper details important enhancement made to the Digital Gabor filter to minimize the sizing problem and the coding style that synthesizable. …”
    Get full text
    Get full text
    Student Project
  14. 14

    Enhancing the stability of the improved-LEACH routing protocol for WSNs by Al-Zubaidi, Ammar S., Ariffin, Ahmad Alauddin, Al-Qadhi, Abdulrahman K.

    Published 2018
    “…SILEACH balances the load between the nodes by utilizing an optimized method that considers the nodes’ distance to the base station and their residual energy to select the cluster-head nodes and considers the nodes’ distance to the cluster head and the base station to form clusters. …”
    Get full text
    Get full text
    Get full text
    Article
  15. 15

    A Survey Of Supervised Machine Learning In Wireless Sensor Network: A Power Management Perspective by Ul haq, Riaz, Norrozila, Sulaiman, Muhammad, Alam

    Published 2013
    “…After the installation of wireless sensor nodes it is almost impossible to replace the power source in a device. …”
    Get full text
    Get full text
    Conference or Workshop Item
  16. 16

    Providing optimal percentage reduction in coverage for mobile sensor networks by Amir Khan, M., Hasbullah, H., Nazir, B.

    Published 2014
    “…Just about every next door neighbor quickly relocates to replacement the actual failed node, one at a time, then returns time for its authentic location. …”
    Get full text
    Get full text
    Article
  17. 17

    An Integrated RRT*SMART-A* Algorithm for solving the Global Path Planning Problem in a Static Environment by Suwoyo, Heru, Adriansyah, Andi, Andika, Julpri, Ubaidillah, Abu

    Published 2023
    “…This combination is intended to switch method-by-method for the exploration process when the new node reaches the region around the goal node. However, before RRT*-Smart is combined with A*, it is improved by replacing the random sampling method with Fast Sampling. …”
    Get full text
    Get full text
    Get full text
    Article
  18. 18

    AN INTEGRATED RRT*SMART-A* ALGORITHM FOR SOLVING THE GLOBAL PATH PLANNING PROBLEM IN A STATIC ENVIRONMENT by SUWOYO, HERU, ADRIANSYAH, ANDI, ANDIKA, JULFRI, SHAMSUDIN, ABU UBAIDAH, ZAKARIA, MOHAMAD FAUZI

    Published 2023
    “…This combination is intended to s v1/4 itch method-by -method for the exploration process vyhen the new node reaches the region around the goal node. However, before RRT*-Srnart is combined •...ith A*, it is improved by replacing the random sampling method with Fast Sampling. …”
    Get full text
    Get full text
    Get full text
    Article
  19. 19

    AN INTEGRATED RRT*SMART-A* ALGORITHM FOR SOLVING THE GLOBAL PATH PLANNING PROBLEM IN A STATIC ENVIRONMENT by Suwayo, Heri, Adrishah, Andi, Andika, Juleri, Shamdudin, Abu Ubaidah, Zakaria, Mohamad Fauzi

    Published 2023
    “…This combination is intended to s v1/4 itch method-by -method for the exploration process vyhen the new node reaches the region around the goal node. However, before RRT*-Srnart is combined •...ith A*, it is improved by replacing the random sampling method with Fast Sampling. …”
    Get full text
    Get full text
    Get full text
    Article
  20. 20

    AN INTEGRATED RRT*SMART-A* ALGORITHM FOR SOLVING THE GLOBAL PATH PLANNING PROBLEM IN A STATIC ENVIRONMENT by SUWOYO, HERU, ADRIANSHAH, ANDI, ANDIKA, JULPRI, SHAMSUDIN, ABU UBAIDAH, ZAKARIA, MOHAMAD FAUZI

    Published 2023
    “…This combination is intended to s v1/4 itch method-by -method for the exploration process vyhen the new node reaches the region around the goal node. However, before RRT*-Srnart is combined •...ith A*, it is improved by replacing the random sampling method with Fast Sampling. …”
    Get full text
    Get full text
    Get full text
    Article