Search Results - (node OR (code OR model)) replacement
Search alternatives:
-
1
Wearable obstacle sensor for blind people with mobile application / Siti Sarah Hashim
Published 2020“…Therefore, the first objective was to develop Wearable Obstacle Sensor (WOS) to replace cane and My Sensor Detector (MSD) mobile application to replace the traditional method of finding things. …”
Get full text
Get full text
Entrepreneurship Project -
2
-
3
A context-aware authentication method using blockchain for pervasive computing
Published 2021“…Replacing WPA keys with QR codes introduces additional security loopholes like QR code sharing to unauthorized users. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
4
Energy management model for RFID sensor networks in internet of things (IoT) contexts / Shaik Shabana Anjum
Published 2018“…Secondly, this research focuses on mathematical modeling of the RF sensor nodes within the proposed Energy Harvesting RSN (EHRSN) and Energy Transfer RSN (ETRSN) framework where the nodes are characterized using Semi Markov Decision Process (SMDP) and optimal policies are computed for numerically evaluating and analyzing the issue of higher energy consumption. …”
Get full text
Get full text
Get full text
Thesis -
5
Self-organizing method for energy-efficient pulse coupled oscillator (EEPCO) in wireless networks
Published 2016“…For most scenarios, battery replacement is impossible upon the exhaustion of a node’s battery energy method (because of packet collision). …”
Get full text
Get full text
Get full text
Article -
6
A study of CGA- (cryptographically generated address) signature based authentication of binding update messages in low-end MIPv6 node
Published 2012“…It is also known that public-key cryptographic operations (like digital signatures) are computationally expensive for low-end nodes. This study presents the initial effort in investigating the feasibility of using CGA signature based authentication on low-end nodes. …”
Get full text
Get full text
Get full text
Proceeding Paper -
7
Biologically inspired mobile agent-based sensor network (BIMAS)
Published 2014“…Sensor nodes deployed in a large topology require autonomous capabilities and scalability since frequent replacement of the nodes is almost impossible. …”
Get full text
Get full text
Article -
8
Improved Distributed Wyner-Ziv Video Coding Based On Reed Solomon Error Correction Scheme And Frame Estimation For Wireless Transmission
Published 2015“…In this thesis, the LDPC is replaced with the Reed Solomon (RS) codes to encode the Wyner-Ziv frames. …”
Get full text
Get full text
Thesis -
9
Modeling of Energy Harvesting for Wireless Sensor Network
Published 2018“…However, the models of BP-WSNs cannot be applied to EH-WSNs due to their different energy characteristics. …”
Get full text
Get full text
Thesis -
10
Sensor Node for Medical Application
Published 2008“…The sensor node system will connect patients to the PC through wireless connection mode. …”
Get full text
Get full text
Final Year Project -
11
Experimental study of reinforced concrete columns with embedded pipe
Published 2010“…The installation of the strain gauges on the models was carried out before the testing of the models. …”
Get full text
Get full text
Thesis -
12
An improved plant identification system by Fuzzy c-means bag of visual words model and sparse coding
Published 2020“…Current work adopts the Fuzzy c-means Bag of Visual Words model and sparse coding for plant identification. …”
Get full text
Get full text
Get full text
Article -
13
Towards efficient wireless body area network using two-way relay cooperation
Published 2018“…Furthermore, link length extension and diversity is achieved by joint network-channel (JNC) coding the cooperative link. © 2018 by the authors. …”
Get full text
Get full text
Article -
14
Simulation study on wireless LAN performance using OPNET modeler / Siti Saufiah Suhaimi
Published 2005“…The simulation is conducted using OPNET Modeler. The study is focused on the effect of varying the Fragmentation threshold parameter and Request To Send or Clear To Send-(RTS/CTS) threshold parameter in ad hoc network and the functionality of access point nodes in switched network.…”
Get full text
Get full text
Thesis -
15
Feasibility analysis of standalone PV powered battery using SEN for Smart Grid
Published 2020“…Therefore, to provide seamless power to the nodes is a challenge when the nodes are meant for integrating distributed renewable generations for years. …”
Get full text
Get full text
Get full text
Article -
16
Enhanced extreme learning machine for general regression and classification tasks
Published 2020“…For instance, the training time of 1000 nodes ELM is 18.11 s, while FASTA-ELM completed in 1.671 s. …”
Get full text
Get full text
Thesis -
17
WIND LOAD ASSESSMENT ON LATTICE COMMUNICATION TOWERS
Published 2011“…The Eurocodes have become mandatory replacing the British codes in Europe. In Malaysia, the MS 1553:2002 have provisions for design of such structures but BS 8100:1986 is also used. …”
Get full text
Get full text
Conference or Workshop Item -
18
Robust backpropagation neural network using date palm seed growth algorithm for stock market prediction
Published 2025“…Results from simulated analysis shows that the new model performed well at all levels of data contamination with configuration moderate lags input and lowest hidden nodes. …”
Get full text
Get full text
Get full text
Thesis -
19
LOCALIZED MOVEMENT CONTROL CONNECTIVITY RESTORATION ALGORITHMS FOR WIRELESS SENSOR AND ACTOR NETWORKS
Published 2011“…The second approach identifies critical actors in advance, designates them preferably as noncritical backup nodes that replace the failed primary if such contingency arises in the future. …”
Get full text
Get full text
Thesis -
20
Design Of Protected Iris Recognition Systems With Improved Authentication Performance
Published 2022“…Thus, an iris template transformation method and a matching strategy are proposed to mitigate the alignment and inherent dependency issues of iris codes in this work. The proposed model has optimized the authentication performance of iris code by achieving EER as low as 0.46% on CASIA-v3interval iris database. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis
