Introducing autonomy in internet of things
Internet of Things (IoT) is playing a major role in extending the reach of the existing communication systems to include resource constrained devices. Many exciting research works for IoT have been proposed for management of such devices such that human intervention is minimized. This is a challen...
| Main Authors: | Ashraf , Qazi Mamoon, Habaebi, Mohamed Hadi |
|---|---|
| Format: | Proceeding Paper |
| Language: | English |
| Published: |
2015
|
| Subjects: | |
| Online Access: | http://irep.iium.edu.my/43334/ http://irep.iium.edu.my/43334/1/COMP-27.pdf |
Similar Items
The future of data privacy and security concerns in
Internet of things
by: Solangi, Zulfiqar Ali, et al.
Published: (2018)
by: Solangi, Zulfiqar Ali, et al.
Published: (2018)
A conceptual framework for determining acceptance of Internet of Things (IoT) in higher education institutions of Pakistan
by: Shaikh, Humaiz, et al.
Published: (2019)
by: Shaikh, Humaiz, et al.
Published: (2019)
Predicting the fraud volume in the advent of internet enabled handheld devices
by: Zammarah, Nuha Abdullah, et al.
Published: (2015)
by: Zammarah, Nuha Abdullah, et al.
Published: (2015)
Offline OTP based solution for secure internet banking access
by: Khan, Burhan ul Islam, et al.
Published: (2019)
by: Khan, Burhan ul Islam, et al.
Published: (2019)
Data protection challenges in the internet of things era: an assessment of protection offered by PDPA 2010
by: Sidi Ahmed, Sidi Mohamed, et al.
Published: (2019)
by: Sidi Ahmed, Sidi Mohamed, et al.
Published: (2019)
Malaysian communications and multimedia commission's powers in regulating online publication: the case of publication in public internet
by: Shuaib, Farid Sufian
Published: (2012)
by: Shuaib, Farid Sufian
Published: (2012)
Gateway sink placement for sensor node grid distribution in LoRa smart city networks
by: Zainal, Nur Aishah, et al.
Published: (2018)
by: Zainal, Nur Aishah, et al.
Published: (2018)
New estimates of single photon parameters for satellite-based QKD
by: Ali, Sellami, et al.
Published: (2009)
by: Ali, Sellami, et al.
Published: (2009)
Fiber and free-space practical decoy state QKD for both BB84
and SARG04 protocols
by: Ali, Sellami, et al.
Published: (2010)
by: Ali, Sellami, et al.
Published: (2010)
A novel scheme of binding update no sense drop BCE in LMA
by: Geaiger, Mohamed, et al.
Published: (2014)
by: Geaiger, Mohamed, et al.
Published: (2014)
Mobile security and privacy in smartphone technology
by: Ibrahim, Mohamed, et al.
Published: (2015)
by: Ibrahim, Mohamed, et al.
Published: (2015)
Wireless energy harvesting for portable devices using split ring resonator
by: Zainal ‘Abidin, Balqis Mohamed, et al.
Published: (2015)
by: Zainal ‘Abidin, Balqis Mohamed, et al.
Published: (2015)
Space Debris Low Earth Orbit (LEO)
by: Ahmed Mohamed, Fatima, et al.
Published: (2015)
by: Ahmed Mohamed, Fatima, et al.
Published: (2015)
Video viewing and streaming enhancement
by: Khalifa, Othman Omran, et al.
Published: (2014)
by: Khalifa, Othman Omran, et al.
Published: (2014)
Information security for professional counseling in organization
by: Mohamed, Abdikadir Yusuf, et al.
Published: (2016)
by: Mohamed, Abdikadir Yusuf, et al.
Published: (2016)
Edward Snowden disclosures turn the fears of surveillance into reality: the impact and transformation in information security
by: Mohamed Mahmoud, Fatimetou Zahra, et al.
Published: (2016)
by: Mohamed Mahmoud, Fatimetou Zahra, et al.
Published: (2016)
Ethical communication in IT project from an Islamic perspective
by: Nizam, Mohamed, et al.
Published: (2012)
by: Nizam, Mohamed, et al.
Published: (2012)
System and Method for Quantum Key Distribution
by: Sellami , Ali, et al.
Published: (2012)
by: Sellami , Ali, et al.
Published: (2012)
Improvement of secure communication with continuous variable entanglement of squeezed coherent states via heterodyne detection
by: Becir, A, et al.
Published: (2010)
by: Becir, A, et al.
Published: (2010)
A linear atomic quantum coupler
by: El-Orany, Faisal A.A, et al.
Published: (2010)
by: El-Orany, Faisal A.A, et al.
Published: (2010)
Critical socio-technical issues surrounding mobile computing
by: Mohamed, Norshidah, et al.
Published: (2016)
by: Mohamed, Norshidah, et al.
Published: (2016)
Big data and its impact on IT consultancy
by: Mohamed, Habab, et al.
Published: (2016)
by: Mohamed, Habab, et al.
Published: (2016)
Node status detection and information diffusion in router network using scale-free network
by: Mahesar, Abdul Waheed, et al.
Published: (2014)
by: Mahesar, Abdul Waheed, et al.
Published: (2014)
The intention to cyberbully and cyberbullying behaviour among undergraduate students
by: Abdul Rashid, Muhammad Shawal, et al.
Published: (2017)
by: Abdul Rashid, Muhammad Shawal, et al.
Published: (2017)
Selecting respondents for survey questionnaire in Islamic way
by: Shah, Asadullah, et al.
Published: (2017)
by: Shah, Asadullah, et al.
Published: (2017)
Fixed wings UAV direction control “Hardware Design”
by: Khalil Abdallah, Mohamed, et al.
Published: (2015)
by: Khalil Abdallah, Mohamed, et al.
Published: (2015)
Implementation of direction control algorithms for fixed wings UAV
by: Abdalla, Mohamed K., et al.
Published: (2015)
by: Abdalla, Mohamed K., et al.
Published: (2015)
Barriers effecting successful implementation of E-learning in Saudi Arabian universities
by: Naveed, Quadri Noorulhasan, et al.
Published: (2017)
by: Naveed, Quadri Noorulhasan, et al.
Published: (2017)
A review on multimedia communications cryptography
by: Salem, Yasser, et al.
Published: (2011)
by: Salem, Yasser, et al.
Published: (2011)
Calculus and its applications in scale-free networks
by: Mahesar, Abdul Waheed, et al.
Published: (2014)
by: Mahesar, Abdul Waheed, et al.
Published: (2014)
Fishing community wireless network concept in Kuala Rompin, Pahang, Malaysia
by: Hashim, Wahidah, et al.
Published: (2019)
by: Hashim, Wahidah, et al.
Published: (2019)
Quantum properties of the three-mode squeezed operator: triply concurrent parametric amplifiers
by: El-Orany, Faisal A.A, et al.
Published: (2010)
by: El-Orany, Faisal A.A, et al.
Published: (2010)
Assimilating e-learning barriers using an interpretive structural modelling (ISM)
by: Naveed, Quadri Noorulhasan, et al.
Published: (2017)
by: Naveed, Quadri Noorulhasan, et al.
Published: (2017)
Prioritizing barriers of e-learning for effective teaching-learning using Fuzzy Analytic Hierarchy Process (FAHP)
by: Naveed, Quadri Noorulhasan, et al.
Published: (2018)
by: Naveed, Quadri Noorulhasan, et al.
Published: (2018)
Information security awareness through the use of social media
by: Abdul Molok, Nurul Nuha, et al.
Published: (2015)
by: Abdul Molok, Nurul Nuha, et al.
Published: (2015)
Analysis of design principles and requirements for procedural rigging of bipeds and quadrupeds characters with custom manipulators for animation
by: Bhati, Zeeshan, et al.
Published: (2015)
by: Bhati, Zeeshan, et al.
Published: (2015)
Real-Time personalized stress detection from physiological signals
by: Syazani, Muhammad, et al.
Published: (2015)
by: Syazani, Muhammad, et al.
Published: (2015)
Performance evaluation of human identification based on ECG signal
by: Amiruddin, Ainunjariah, et al.
Published: (2015)
by: Amiruddin, Ainunjariah, et al.
Published: (2015)
Performance analysis of MAC layer scheduling schemes for IMM applications over high speed wireless campus network in IEEE802.11e
by: Alam, Md Korshed, et al.
Published: (2015)
by: Alam, Md Korshed, et al.
Published: (2015)
Evaluation of an enhanced scheme for high-level nested network mobility
by: Ali Mohammed, Mohammed Babiker, et al.
Published: (2015)
by: Ali Mohammed, Mohammed Babiker, et al.
Published: (2015)
Similar Items
-
The future of data privacy and security concerns in
Internet of things
by: Solangi, Zulfiqar Ali, et al.
Published: (2018) -
A conceptual framework for determining acceptance of Internet of Things (IoT) in higher education institutions of Pakistan
by: Shaikh, Humaiz, et al.
Published: (2019) -
Predicting the fraud volume in the advent of internet enabled handheld devices
by: Zammarah, Nuha Abdullah, et al.
Published: (2015) -
Offline OTP based solution for secure internet banking access
by: Khan, Burhan ul Islam, et al.
Published: (2019) -
Data protection challenges in the internet of things era: an assessment of protection offered by PDPA 2010
by: Sidi Ahmed, Sidi Mohamed, et al.
Published: (2019)