Bandwidth Performance Analysis of a Remote Monitoring Surveillance System
Conventional security surveillance systems require the constant attention of security personnel, to monitor several locations concurrently. With the declining cost of computing power and widespread acceptance of the Internet as a viable communication medium, a low-cost and effective web-based survei...
| Main Author: | Syed Nor Azlan, Syarifah Ezdiani |
|---|---|
| Format: | Thesis |
| Language: | English English |
| Published: |
2006
|
| Subjects: | |
| Online Access: | http://psasir.upm.edu.my/id/eprint/427/ http://psasir.upm.edu.my/id/eprint/427/1/1600465.pdf |
Similar Items
Development of Security Identification and Monitoring System for Web Application
by: Dani, Norizawati
Published: (1999)
by: Dani, Norizawati
Published: (1999)
Internet - Based Security and Monitoring System
by: Suliman, Isameldin Mohammed
Published: (1998)
by: Suliman, Isameldin Mohammed
Published: (1998)
Implementation and Evaluation of Large Rsa Encryption and Decryption Keys For Internet Security
by: H. Belgassem, Seddeq
Published: (2004)
by: H. Belgassem, Seddeq
Published: (2004)
Zero distortion-based steganography for handwritten signature
by: Iranmanesh, Vahab
Published: (2018)
by: Iranmanesh, Vahab
Published: (2018)
Minimising coverage holes for prediction-based mobile object target tracking in wireless sensor networks
by: Ali, Khalid Abdullahi
Published: (2017)
by: Ali, Khalid Abdullahi
Published: (2017)
Fake review annotation model and classification through reviewers' writing style
by: Shojaee, Somayeh
Published: (2019)
by: Shojaee, Somayeh
Published: (2019)
Performance analysis of network monitoring software in wireless network / Mohd Firdaus Mohd Mahdzir
by: Mohd Mahdzir, Mohd Firdaus
Published: (2019)
by: Mohd Mahdzir, Mohd Firdaus
Published: (2019)
Quality Of Service Provisioning Scheme For Real-Time Applications in IEEE 802.11 Wireless Local Area Network
by: Ng, Roger Cheng Yong
Published: (2006)
by: Ng, Roger Cheng Yong
Published: (2006)
Internet-based monitoring and controlling of real-time dynamic systems
by: Al Shoaili, Saoud Humaid Salim
Published: (2005)
by: Al Shoaili, Saoud Humaid Salim
Published: (2005)
Performance Evaluation of a Modified Carrier Sense Multiple Access with Collision Detection Protocol
by: Kabir, Shamima
Published: (2005)
by: Kabir, Shamima
Published: (2005)
Network Analysis in Tourism Distribution Channels
by: Jeeva, Ananda, et al.
Published: (2014)
by: Jeeva, Ananda, et al.
Published: (2014)
Robust position encoding and velocity deduction for real time water level monitoring
by: Alsayed, Abdallah S.Z.
Published: (2015)
by: Alsayed, Abdallah S.Z.
Published: (2015)
Time-Uncertainty Analysis by Using Simulation in Project Scheduling Networks
by: Mohammed Omer, Anwar
Published: (1999)
by: Mohammed Omer, Anwar
Published: (1999)
Analysis the performance of adaptive demodulator in terms of bit error rate for software defined radio
by: Bakhraiba, Ahmed Mohamed Salih, et al.
Published: (2009)
by: Bakhraiba, Ahmed Mohamed Salih, et al.
Published: (2009)
Towards a real-time Structural Health Monitoring of railway bridges
by: Vagnoli, Matteo, et al.
Published: (2017)
by: Vagnoli, Matteo, et al.
Published: (2017)
Energy trust system for detecting sybil attacks in clustered wireless sensor network
by: Hussein, Noor Sabeeh
Published: (2016)
by: Hussein, Noor Sabeeh
Published: (2016)
Performance analysis on detection and prevention of wormhole attack in wireless network
by: Apandi, Mohamad Aiman Hanif
Published: (2019)
by: Apandi, Mohamad Aiman Hanif
Published: (2019)
Development of Underground Mine Communication and Monitoring System by Using ZigBee Technology
by: Kawamura, Youhei, et al.
Published: (2014)
by: Kawamura, Youhei, et al.
Published: (2014)
Water security and sustainable tourism as antecedents of local community’s quality of life in Mabul Island, Malaysia
by: Khairuddin, Fatin Nornajla
Published: (2019)
by: Khairuddin, Fatin Nornajla
Published: (2019)
Evaluation of virtual private network employing secure on demand IP based connection (SeDIC) / Mohamed Sulaiman Sultan Suhaibuddeen
by: Sultan Suhaibuddeen, Mohamed Sulaiman
Published: (2010)
by: Sultan Suhaibuddeen, Mohamed Sulaiman
Published: (2010)
Monitoring and Controlling of Mobile Harvesting Robot Through Wireless LAN
by: Lim, Yu Jian
Published: (2004)
by: Lim, Yu Jian
Published: (2004)
A Matrix Usage for Load Balancing in Shortest Path Routing
by: Mustafa, Nor Musliza
Published: (2009)
by: Mustafa, Nor Musliza
Published: (2009)
Proof-Carrying Code for Verifying Confidentiality of Mobile Code through Secure Information Flow Analysis
by: Abdu Muthana, Abdulrahman Ahmad
Published: (2008)
by: Abdu Muthana, Abdulrahman Ahmad
Published: (2008)
Monitoring Sand Dune Movement using Remote Sensing
by: Mahmoud, Ahmed Mutasim Abdalla
Published: (2022)
by: Mahmoud, Ahmed Mutasim Abdalla
Published: (2022)
Case study : an effect of noise in character recognition system using neural network
by: Mohamad, Esmawaty
Published: (2003)
by: Mohamad, Esmawaty
Published: (2003)
Practical mobile ad hoc networks for large scale cattle monitoring
by: Wietrzyk, Bartosz
Published: (2008)
by: Wietrzyk, Bartosz
Published: (2008)
An efficient anomaly intrusion detection method with evolutionary neural network
by: Sarvari, Samira
Published: (2020)
by: Sarvari, Samira
Published: (2020)
Character property method with biometric multifactor authentication for arabic text steganography
by: Roslan, Nuur Alifah
Published: (2018)
by: Roslan, Nuur Alifah
Published: (2018)
Design of a lightweight virtual honeynet based on linux container virtualization
by: Memari, Nogol
Published: (2014)
by: Memari, Nogol
Published: (2014)
Efficient kerberos authentication scheme for cross-domain systems in industrial internet of things using ECC
by: Ismail, Haqi Khalid
Published: (2021)
by: Ismail, Haqi Khalid
Published: (2021)
Steganography in webpages using CSS color attributes enhanced by rule-based system
by: Nehzati, Seyedeh Sheida
Published: (2016)
by: Nehzati, Seyedeh Sheida
Published: (2016)
Hyper-heuristic approaches for data stream-based iIntrusion detection in the Internet of Things
by: Hadi, Ahmed Adnan
Published: (2022)
by: Hadi, Ahmed Adnan
Published: (2022)
A comparative on performance of voip using power line and wired (UTP CAT5) / Khainorizan Khalid
by: Khalid, Khainorizan
Published: (2006)
by: Khalid, Khainorizan
Published: (2006)
Utilization of the dynamic laser scanning technology for monitoring, locating and classification of the city trees.
by: Al-Hader, Mahmoud, et al.
Published: (2011)
by: Al-Hader, Mahmoud, et al.
Published: (2011)
The Use of Remote Sensing and Geographic Information System to Determine the Spatial Distribution of Melaleuca cajuputi as a Major Bee Plant in Marang, Terengganu
by: Saberioon, Mohammadmehdi
Published: (2009)
by: Saberioon, Mohammadmehdi
Published: (2009)
Micro-Mobility Enhancement in Multicast Mobile Ipv6 Wireless Networks
by: Yong, Chu Eu
Published: (2006)
by: Yong, Chu Eu
Published: (2006)
Integration Protocols for Voice and Data Traffic
by: Abdelrahman, Ali Mohamed
Published: (1997)
by: Abdelrahman, Ali Mohamed
Published: (1997)
Pengecaman Pertuturan Bahasa Melayu dengan Menggunakan Kaedah Rangkaian Neural
by: Mohamad Hussin, Ummu Salmah
Published: (1998)
by: Mohamad Hussin, Ummu Salmah
Published: (1998)
An Integrated Firewall System Model In A Multiclient-Server Environment
by: Al-Kazwini, Hussein A. Taqi
Published: (2005)
by: Al-Kazwini, Hussein A. Taqi
Published: (2005)
Features selection for intrusion detection system using hybridize PSO-SVM
by: Tabaan, Alaa Abdulrahman
Published: (2016)
by: Tabaan, Alaa Abdulrahman
Published: (2016)
Similar Items
-
Development of Security Identification and Monitoring System for Web Application
by: Dani, Norizawati
Published: (1999) -
Internet - Based Security and Monitoring System
by: Suliman, Isameldin Mohammed
Published: (1998) -
Implementation and Evaluation of Large Rsa Encryption and Decryption Keys For Internet Security
by: H. Belgassem, Seddeq
Published: (2004) -
Zero distortion-based steganography for handwritten signature
by: Iranmanesh, Vahab
Published: (2018) -
Minimising coverage holes for prediction-based mobile object target tracking in wireless sensor networks
by: Ali, Khalid Abdullahi
Published: (2017)