Search Results - (node OR (code OR some)) replacement

Refine Results
  1. 1

    A context-aware authentication method using blockchain for pervasive computing by Ng, Miao Xuan

    Published 2021
    “…Replacing WPA keys with QR codes introduces additional security loopholes like QR code sharing to unauthorized users. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  2. 2

    Wearable obstacle sensor for blind people with mobile application / Siti Sarah Hashim by Hashim, Siti Sarah

    Published 2020
    “…Therefore, the first objective was to develop Wearable Obstacle Sensor (WOS) to replace cane and My Sensor Detector (MSD) mobile application to replace the traditional method of finding things. …”
    Get full text
    Get full text
    Entrepreneurship Project
  3. 3

    LOCALIZED MOVEMENT CONTROL CONNECTIVITY RESTORATION ALGORITHMS FOR WIRELESS SENSOR AND ACTOR NETWORKS by MUHAMMAD IMRAN, MUHAMMAD IMRAN

    Published 2011
    “…The second approach identifies critical actors in advance, designates them preferably as noncritical backup nodes that replace the failed primary if such contingency arises in the future. …”
    Get full text
    Get full text
    Thesis
  4. 4

    A legal review on the Malaysian judges' code or ethic / Muhammad Yazid Mohamad Salim…[et al.] by Mohamad Salim, Muhammad Yazid, Abdul Aziz, Ahmad Lokman, Yusof, Nor Azhari, Othman, Haziq

    Published 2010
    “…Secondly, to look through the new Judges' Code of Ethic 2009 which had replaced the 1994 code, whether or not this new code had solved all the problems faced by the Judges' Code of Ethic 1994. …”
    Get full text
    Get full text
    Student Project
  5. 5

    Enhancing the stability of the improved-LEACH routing protocol for WSNs by Al-Zubaidi, Ammar S., Ariffin, Ahmad Alauddin, Al-Qadhi, Abdulrahman K.

    Published 2018
    “…SILEACH balances the load between the nodes by utilizing an optimized method that considers the nodes’ distance to the base station and their residual energy to select the cluster-head nodes and considers the nodes’ distance to the cluster head and the base station to form clusters. …”
    Get full text
    Get full text
    Get full text
    Article
  6. 6

    Environmental taxonomy of power scavenging techniques for autonomous self powered wireless sensors by Farizani, Seyed Reza Kamel Tabbakh, Maarefdoust, Reyhaneh, Ng, Chee Kyun, Mohd Ali, Borhanuddin

    Published 2010
    “…Power is a critical issue in wireless sensor node, because in most of the applications it is difficult or in some cases impossible to replace or replenish the battery. …”
    Get full text
    Get full text
    Conference or Workshop Item
  7. 7

    Providing optimal percentage reduction in coverage for mobile sensor networks by Amir Khan, M., Hasbullah, H., Nazir, B.

    Published 2014
    “…Just about every next door neighbor quickly relocates to replacement the actual failed node, one at a time, then returns time for its authentic location. …”
    Get full text
    Get full text
    Article
  8. 8

    Living plant energy harvesting for WSN & IoT devices by Mohd Taam, Ahmad Zun Najhi, Habaebi, Mohamed Hadi, Islam, Md. Rafiqul

    Published 2024
    “…Currently, most sensor nodes are operated using batteries which means that they need to be replaced once the batteries die out. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Proceeding Paper
  9. 9

    Lifetime and coverage maximization technique for mobile sensor networks by Khan, M.A., Hasbullah, H., Nazir, B., Khan, M.A.

    Published 2014
    “…Just about every next door neighbor quickly relocates to replacement the actual failed node, one at a time, then returns time for its authentic location. …”
    Get full text
    Get full text
    Conference or Workshop Item
  10. 10

    Survey on caching approaches in information centric networking by Abdullahi, Ibrahim, Che Mohamed Arif, Ahmad Suki, Hassan, Suhaidi

    Published 2015
    “…This survey also highlighted the top sensitive issues that influence the active deployment of caches in ICN through recency, frequency, content size, cost of retrieval and coordination, update in caches and replacements. Several cache characteristics were further presented in ways that would improve cache techniques, deployments as research suggestions for content placement, replacement and quick scan on nodes on and off-path of the network.…”
    Get full text
    Get full text
    Article
  11. 11

    A study of CGA- (cryptographically generated address) signature based authentication of binding update messages in low-end MIPv6 node by Qadir , Sana, Siddiqi, Mohammad Umar, Anwar, Farhat

    Published 2012
    “…It is also known that public-key cryptographic operations (like digital signatures) are computationally expensive for low-end nodes. This study presents the initial effort in investigating the feasibility of using CGA signature based authentication on low-end nodes. …”
    Get full text
    Get full text
    Get full text
    Proceeding Paper
  12. 12

    Biologically inspired mobile agent-based sensor network (BIMAS) by Ponnusamy, V., Low, T.J., Amin, A.H.M.

    Published 2014
    “…Sensor nodes deployed in a large topology require autonomous capabilities and scalability since frequent replacement of the nodes is almost impossible. …”
    Get full text
    Get full text
    Article
  13. 13

    QR code scanning for auto-generate location based information for facility management / Nurhidayah Zulkarnain by Zulkarnain, Nurhidayah

    Published 2020
    “…This project aimed to design and upgrade the current system of facility management "e-Aduan Fasiliti" by replacing some of the manual entries for a more precise location in UiTM Shah Alam. …”
    Get full text
    Get full text
    Thesis
  14. 14

    A Performance Investigation on IoT Enabled Intra-Vehicular Wireless Sensor Networks by Rahman, Md. Arafatur, Ali, Jahan, M. Nomani, Kabir, Azad, Saiful

    Published 2017
    “…This result demonstrates that the existing MAC protocol works well for a small network (i.e., a network with a maximum number of 50 nodes) but is not suitable for a large network (i.e., a network with more than 50 nodes). …”
    Get full text
    Get full text
    Get full text
    Article
  15. 15

    IEEE 802.15.4 in an Unattended Scenario with Periodic Setup Phase for Wireless Sensor Networks by Munajed, Bashar, Drieberg , Micheal, Hamid, Nor Hisham

    Published 2011
    “…However, it assumes that the sensor nodes operate in an attended scenario. In this research, we seek to implement IEEE 802.15.4 in an unattended scenario. …”
    Get full text
    Get full text
    Conference or Workshop Item
  16. 16

    Sensor Node for Medical Application by Ahmad, Mohd Asri

    Published 2008
    “…The sensor node system will connect patients to the PC through wireless connection mode. …”
    Get full text
    Get full text
    Final Year Project
  17. 17

    EVALUATION OF AVAILABLE CODES FOR CAPACITY ASSESSMENT OF CORRODED PIPELINES by Belachew , Chanyalew Taye, Che Ismail, Mokhtar, Karuppanan , Saravanan

    Published 2009
    “…This means when pipeline operators use these codes for their fitness for service assessment; they are subjected to either unnecessary maintenance or premature replacement of pipelines. …”
    Get full text
    Get full text
    Conference or Workshop Item
  18. 18

    The occurred error in microdosimetry calculations while using water instead of the body organs in proton therapy and a new formula for an estimate of the statistical uncertainty of... by Jahanfar, Somayeh, Anbaran, Hossein Tavakoli

    Published 2022
    “…Therefore, in this study, we replaced the water phantom instead of some organs to calculate its effect on the proton stopping-power, and range and the consequence of deposited energy and microdosimetric spectra in small sites. …”
    Get full text
    Get full text
    Get full text
    Article
  19. 19

    Towards efficient wireless body area network using two-way relay cooperation by Waheed, M., Ahmad, R., Ahmed, W., Drieberg, M., Alam, M.M.

    Published 2018
    “…Furthermore, link length extension and diversity is achieved by joint network-channel (JNC) coding the cooperative link. © 2018 by the authors. …”
    Get full text
    Get full text
    Article
  20. 20

    An Ensemble Filter for Indoor Positioning Technology of Mobile Home Service with Agile iBeacon Deployment by Abu-AlSondos, Ibrahim A, Salameh, Anas A., Mohd Nawi, Mohd Nasrun, Deraman, Rafikullah

    Published 2023
    “…Based on this, a system for mobile home service robots was developed, and simulation tests were performed to assess the accuracy of node locating, node reception and arrival times, the best level of route planning, and navigation and path estimation errors in both absolute and comparative terms. …”
    Get full text
    Get full text
    Get full text
    Article