Search Results - (( user evaluation step algorithm ) OR ( remote communication system algorithm ))

Refine Results
  1. 1

    Securing electrical substation's wireless messaging with a lightweight crypto-algorithm IP core by Abbas Y.A., Jidin R., Jami N., Z'aba M.R.

    Published 2023
    “…We have tested the system with a simplified version of the crypto-algorithm on a VIRTEX evaluation board, using GSM modems communicate over a cellular network. © 2014 IEEE.…”
    Conference Paper
  2. 2

    An augmented reality real-time cloud-based remote monitoring algorithm for a manufacturing system / Siti Aisyah Jaafar by Jaafar, Siti Aisyah

    Published 2021
    “…Therefore, in this research, the first objective is to develop an algorithm for a remote AR-IoT monitoring system. The algorithm was designed by utilizing C++ and C# coding language. …”
    Get full text
    Get full text
    Thesis
  3. 3

    Implementation and integration of HF messaging system with cryptographic features by Mat Sidek, Abd. Rahim

    Published 2006
    “…However, the infrastructures of communication still become an issue especially in the remote places. …”
    Get full text
    Get full text
    Get full text
    Thesis
  4. 4

    Development of a New Modeling Circuit for the Remote Terminal Unit (RTU) with GSM Communication by Ab Ghani, Mohd Ruddin, Wan Hassan, Wan Ahmas Redhauddin, Mat Hanafiah, Mohd Ariff, Raman, Siti Hajar

    Published 2013
    “…The design proposed based on Global System for Mobile (GSM) communication and this paper also presents as efficient design for distribution automation system and its implementation in remote/automatic monitoring and controlling of the relays (circuit breaker) by means of GSM Short Message Service (SMS) services, automatic decision making and continuous monitoring of distribution system components in real time. …”
    Get full text
    Get full text
    Conference or Workshop Item
  5. 5

    CONTEXT AWARE TRAFFIC SCHEDULING ALGORITHM FOR COMMUNICATION SYSTEM IN POWER DISTRIBUTION NETWORK by NURSHAZLINA SUHAIMY

    Published 2023
    “…Smart grid is an evolution from conventional power grid in which power communication system has migrated from one-way to bi-directional communication network. …”
    text::Thesis
  6. 6
  7. 7

    Lightweight PRINCE algorithm IP core for securing GSM messaging using FPGA by Abbas Y.A., Jidin R., Jamil N., Z'aba M.R.

    Published 2023
    “…The system can cipher the data using PRINCE algorithm on a VIRTEX-403 FPGA evaluation board and using GSM modems to communicate over a cellular network. …”
    Article
  8. 8

    A Model for Evaluation of Cryptography Algorithm on UUM Portal by Norliana, Abdul Majid

    Published 2004
    “…The development of the simulation model consists of seven steps. The steps are problem definition, construct the simulation model, test and validate the model, design the simulation experiments, conduct the simulation experiments, evaluate the result and implement the result. …”
    Get full text
    Get full text
    Get full text
    Thesis
  9. 9

    Development of water surface robot system for lake sanitation and sampling / Ahmed Abdullah Omar by Ahmed Abdullah , Omar

    Published 2022
    “…The software design features a mobile app for remote access, live video streaming, mapping system and communication APIs. …”
    Get full text
    Get full text
    Get full text
    Thesis
  10. 10

    Remote monitoring system for electricity meter using ESP32CAM and OCR analysis using MATLAB by Mochammad Shaleh, Mochammad Safii, Chia, Kim Seng

    Published 2024
    “…Key elements of the proposed system encompass an ESP32CAM module equipped with a camera for image capture, integrated wireless connectivity for remote communication, and OCR algorithms for efficient data extraction. …”
    Get full text
    Get full text
    Conference or Workshop Item
  11. 11

    Evaluation of intonation features on emphasized Malay words / Syazwani Nasaruddin by Nasaruddin, Syazwani

    Published 2017
    “…In this step, user hear the speech and used the hand labelling method discuss in chapter 2. …”
    Get full text
    Get full text
    Thesis
  12. 12
  13. 13

    Effects of Different Superpixel Algorithms on Interactive Segmentations by Soo See, Chai, Luong Goh, Kok, Weng Ng, Giap, Muzaffar, Hamzah

    Published 2022
    “…Though employed as pre-processing step in many interactive segmentation algorithms, to date, no study has been conducted to assess the effects of such incorporations on the segmentation algorithms. …”
    Get full text
    Get full text
    Get full text
    Article
  14. 14
  15. 15
  16. 16

    A lightweight and secure online/offline cross-domain authentication scheme for VANET systems in Industrial IoT by Khalid, Haqi, Hashim, Shaiful Jahari, Syed Ahmad, Sharifah Mumtazah, Hashim, Fazirulhisyam, Chaudhary, Muhammad Akmal

    Published 2021
    “…Hence, it is vulnerable to specific attacks (e.g., replay attacks, modification attacks, man-in-the-middle attacks, and insider attacks), making the system inefficient. Also, high processing data increases the computation and communication cost, leading to an increased workload in the system. …”
    Get full text
    Get full text
    Article
  17. 17

    Effects of Different Superpixel Algorithms on Interactive Segmentations by Goh, Kok Luong, Ng, Giap Weng, Muzaffar Hamzah, Chai, Soo See

    Published 2022
    “…Though employed as pre-processing step in many interactive segmentation algorithms, to date, no study has been conducted to assess the effects of such incorporations on the segmentation algorithms. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  18. 18
  19. 19
  20. 20