Unattended sensors in marine environments: oxybuoy for hypoxia study
This chapter discusses the use of unattended sensors and its use in marine environment. The authors present challenges of designing a marine sensor in harsh environments and a case study in implementing a marine sensor to study hypoxia. Hypoxia is a world-wide anthropogenic phenomenon related to pol...
| Main Authors: | Mohd. Nor, Rizal, Nesterenko, Mikhail |
|---|---|
| Format: | Book Chapter |
| Language: | English |
| Published: |
IGI Global
2019
|
| Subjects: | |
| Online Access: | http://irep.iium.edu.my/81773/ http://irep.iium.edu.my/81773/7/81773Unattended%20Sensors.pdf |
Similar Items
Unattended sensors in marine environments: oxybuoy for hypoxia study
by: Mohd Nor, Rizal, et al.
Published: (2016)
by: Mohd Nor, Rizal, et al.
Published: (2016)
Gateway sink placement for sensor node grid distribution in LoRa smart city networks
by: Zainal, Nur Aishah, et al.
Published: (2018)
by: Zainal, Nur Aishah, et al.
Published: (2018)
Ethical perspective of students in Global Learning Environment
by: Muhammad, AbdulHafeez, et al.
Published: (2013)
by: Muhammad, AbdulHafeez, et al.
Published: (2013)
Service redundancy and cluster-based routing protocols for wireless sensor and mobile ad hoc networks: a survey
by: Yagoub, Mudathir F.S., et al.
Published: (2020)
by: Yagoub, Mudathir F.S., et al.
Published: (2020)
MARKCLOUD - Software for data confidentiality and security in cloud computing environments
by: Olanrewaju, Rashidah Funke, et al.
Published: (2014)
by: Olanrewaju, Rashidah Funke, et al.
Published: (2014)
Transaction Management techniques and practices in current cloud computing environment: a survey
by: Waqas, Ahmad, et al.
Published: (2015)
by: Waqas, Ahmad, et al.
Published: (2015)
Artifact evaluation in information systems design science research: social constructivism environment
by: Ataie, Farib, et al.
Published: (2017)
by: Ataie, Farib, et al.
Published: (2017)
An enhanced macro mobility management scheme in NEMO environment to achieve seamless handoff
by: Hassan Abdalla Hashim, Aisha, et al.
Published: (2013)
by: Hassan Abdalla Hashim, Aisha, et al.
Published: (2013)
A Review on energy consumption optimization techniques in IoT based smart building environments
by: Shah, Abdul Salam, et al.
Published: (2019)
by: Shah, Abdul Salam, et al.
Published: (2019)
Improving the quality of user experience by deploying an open access network framework in a Fiber-To-The Home environment in Malaysia
by: Ismail, Zahid, et al.
Published: (2011)
by: Ismail, Zahid, et al.
Published: (2011)
Performance study of intra-domain mobility management
by: Rusli, Nazreen, et al.
Published: (2005)
by: Rusli, Nazreen, et al.
Published: (2005)
Design of an intelligent robotic donationbox a case study
by: Salami, Momoh Jimoh Emiyoka, et al.
Published: (2011)
by: Salami, Momoh Jimoh Emiyoka, et al.
Published: (2011)
Oxybuoy: constructing a real-time inexpensive hypoxia monitoring platform
by: Mohd. Nor, Rizal, et al.
Published: (2010)
by: Mohd. Nor, Rizal, et al.
Published: (2010)
Visualization: a tool to study nodes in multi-dimensional networks
by: Noor, Fozia, et al.
Published: (2019)
by: Noor, Fozia, et al.
Published: (2019)
Mobile online services and measuring user satisfaction: study of Kuwait
by: Shah, Asadullah, et al.
Published: (2015)
by: Shah, Asadullah, et al.
Published: (2015)
Near field communication enabled mobile payments: preliminary study
by: Brohi, Imtiaz Ali, et al.
Published: (2018)
by: Brohi, Imtiaz Ali, et al.
Published: (2018)
A study to investigate state of ethical Development in E-learning
by: Muhammad, AbdulHafeez, et al.
Published: (2016)
by: Muhammad, AbdulHafeez, et al.
Published: (2016)
Preliminary study for customer’s online shopping satisfaction from security perspective
by: Imtiaz Ali, Najma, et al.
Published: (2018)
by: Imtiaz Ali, Najma, et al.
Published: (2018)
Using biometric techniques to secure online student assessment: Comparative study
by: Ibrahim, Jamaludin, et al.
Published: (2011)
by: Ibrahim, Jamaludin, et al.
Published: (2011)
Privacy models for protecting personal medical information: a preliminary study
by: Samsuri, Suhaila, et al.
Published: (2011)
by: Samsuri, Suhaila, et al.
Published: (2011)
Perception analysis of social networks’ privacy policy: Instagram as a case study
by: Talib, Shuhaili, et al.
Published: (2014)
by: Talib, Shuhaili, et al.
Published: (2014)
Important attributes of customer satisfaction in telecom industry: a survey based study
by: Khan, Nusratullah, et al.
Published: (2017)
by: Khan, Nusratullah, et al.
Published: (2017)
WSN based sensing model for smart crowed movement with identification: an extended study
by: Nawaz, Naeem A., et al.
Published: (2017)
by: Nawaz, Naeem A., et al.
Published: (2017)
A comprehensive comparative study of MOM for adaptive interoperability communications in service oriented architecture
by: Muhamad Ibrahim, Najhan, et al.
Published: (2019)
by: Muhamad Ibrahim, Najhan, et al.
Published: (2019)
Factors effecting fixed-line telecom services customer retention: A study of Pakistan
by: Rind, M. Malook, et al.
Published: (2016)
by: Rind, M. Malook, et al.
Published: (2016)
Empirical investigation of the factors influencing the usage mobile government services: case study of Saudi Arabia
by: Zamzami, Ikhlas, et al.
Published: (2016)
by: Zamzami, Ikhlas, et al.
Published: (2016)
An empirical investigation of factors influencing user satisfaction with online services of mobile communication providers: study of Kuwait
by: Alzabi, Tami, et al.
Published: (2015)
by: Alzabi, Tami, et al.
Published: (2015)
Prevalence of mobile usage among university students: a case study of International Islamic University Malaysia
by: Qadri, Mehran, et al.
Published: (2015)
by: Qadri, Mehran, et al.
Published: (2015)
Innovative Web2.0 based collaborative learning and study circle model: integrating Islamic Revealed Knowledge and Human Science
by: Shah, Asadullah
Published: (2014)
by: Shah, Asadullah
Published: (2014)
Netnography approach for UX research
by: Hussein, Idyawati, et al.
Published: (2016)
by: Hussein, Idyawati, et al.
Published: (2016)
ICT in telemedicine: conquering privacy and security issues in health care services
by: Olanrewaju, Rashidah Funke, et al.
Published: (2012)
by: Olanrewaju, Rashidah Funke, et al.
Published: (2012)
EloPSO: energy aware elephant swarm optimization for mobile adhoc networks
by: Khan , Burhan ul Islam, et al.
Published: (2014)
by: Khan , Burhan ul Islam, et al.
Published: (2014)
Log visualization of intrusion and prevention reverse proxy server against web attacks
by: Mantoro, Teddy, et al.
Published: (2013)
by: Mantoro, Teddy, et al.
Published: (2013)
Library online database system for undergraduate students
by: Azlan, Nor Athira, et al.
Published: (2016)
by: Azlan, Nor Athira, et al.
Published: (2016)
Modelling of intelligent intrusion detection system: making a case for snort
by: Olanrewaju, Rashidah Funke, et al.
Published: (2018)
by: Olanrewaju, Rashidah Funke, et al.
Published: (2018)
Empirical study on AGV guiding in indoor manufacturing system using color sensor
by: Al Hazza, Muataz Hazza Faizi, et al.
Published: (2017)
by: Al Hazza, Muataz Hazza Faizi, et al.
Published: (2017)
Disparity between theory & practice beyond the worst-case competitive analysis
by: Iqbal, Javeria, et al.
Published: (2019)
by: Iqbal, Javeria, et al.
Published: (2019)
A Web 2.0-based collaborative learning to promote the practices of Islam as a way of life
by: Ataie, Fariba, et al.
Published: (2019)
by: Ataie, Fariba, et al.
Published: (2019)
The effect of web-based social networking on consultancy
by: Shaikh, Humaiz, et al.
Published: (2019)
by: Shaikh, Humaiz, et al.
Published: (2019)
Factors affecting secure software development practices among developers- an investigation
by: Ahmed Maher, Zulfikar, et al.
Published: (2019)
by: Ahmed Maher, Zulfikar, et al.
Published: (2019)
Similar Items
-
Unattended sensors in marine environments: oxybuoy for hypoxia study
by: Mohd Nor, Rizal, et al.
Published: (2016) -
Gateway sink placement for sensor node grid distribution in LoRa smart city networks
by: Zainal, Nur Aishah, et al.
Published: (2018) -
Ethical perspective of students in Global Learning Environment
by: Muhammad, AbdulHafeez, et al.
Published: (2013) -
Service redundancy and cluster-based routing protocols for wireless sensor and mobile ad hoc networks: a survey
by: Yagoub, Mudathir F.S., et al.
Published: (2020) -
MARKCLOUD - Software for data confidentiality and security in cloud computing environments
by: Olanrewaju, Rashidah Funke, et al.
Published: (2014)