Theft prevention using wireless security system (WSS)
This paper presents a developed RFID based theft prevention system such that luxurious belongings, such as laptops which are monitored from being stolen. Global systems mobile (GSM) module is added to provide a complementary system to feedback to the users. The laptop tag ID and its timer sensed fro...
| Main Authors: | Ng, Chee Kyun, Wee, Kong Seng, Noordin, Nor Kamariah, Saripan, M. Iqbal, Raja Abdullah, Raja Syamsul Azmir |
|---|---|
| Format: | Conference or Workshop Item |
| Language: | English |
| Published: |
IEEE
2008
|
| Online Access: | http://psasir.upm.edu.my/id/eprint/47794/ http://psasir.upm.edu.my/id/eprint/47794/1/Theft%20prevention%20using%20wireless%20security%20system%20%28WSS%29.pdf |
Similar Items
Theft prevention in brothers Mahallahs
by: Mohd. Israil, Khaliq Ahmad, et al.
Published: (2011)
by: Mohd. Israil, Khaliq Ahmad, et al.
Published: (2011)
Secure group communication scheme in wireless IPv6 networks: an experimental test-bed
by: Mehdizadeh, Abbas, et al.
Published: (2012)
by: Mehdizadeh, Abbas, et al.
Published: (2012)
Wireless Control of Anti-Theft Solar Photovoltaic Module
by: Tan, Yin Shen
Published: (2017)
by: Tan, Yin Shen
Published: (2017)
Secured route optimization in mobile IPv6 wireless networks in terms of data integrity
by: Mehdizadeh, Abbas, et al.
Published: (2008)
by: Mehdizadeh, Abbas, et al.
Published: (2008)
Secure multicast group communication scheme in wireless IPv6 networks
by: Mehdizadeh, Abbas, et al.
Published: (2014)
by: Mehdizadeh, Abbas, et al.
Published: (2014)
Route optimization security in mobile IPv6 wireless networks: a test-bed experience
by: Mehdizadeh, Abbas, et al.
Published: (2008)
by: Mehdizadeh, Abbas, et al.
Published: (2008)
Online identity theft, security issues, and reputational damage
by: Ahmad Zukarnain, Zuriati, et al.
Published: (2021)
by: Ahmad Zukarnain, Zuriati, et al.
Published: (2021)
Anti-theft security system using face recognition
by: Chong, Guang Yu
Published: (2018)
by: Chong, Guang Yu
Published: (2018)
Energy- and spectral-efficient wireless cellular networks.
by: Salman, Mustafa Ismael, et al.
Published: (2012)
by: Salman, Mustafa Ismael, et al.
Published: (2012)
Bandwidth enhancement for microstrip antenna in wireless applications
by: Raja Abdullah, Raja Syamsul Azmir, et al.
Published: (2008)
by: Raja Abdullah, Raja Syamsul Azmir, et al.
Published: (2008)
Smart theft alarm with image
by: Ab Ghani, Mohammad Azuan, et al.
Published: (2021)
by: Ab Ghani, Mohammad Azuan, et al.
Published: (2021)
Medical identity theft in telemedicine: solving the privacy and security issues
by: Olanrewaju, Rashidah Funke, et al.
Published: (2015)
by: Olanrewaju, Rashidah Funke, et al.
Published: (2015)
Neural network based for automatic vehicle classification in forward scattering radar
by: Raja Abdullah, Raja Syamsul Azmir, et al.
Published: (2007)
by: Raja Abdullah, Raja Syamsul Azmir, et al.
Published: (2007)
Low side lobe level multilayer antenna for wireless applications
by: Nafea, Safa Nassr, et al.
Published: (2016)
by: Nafea, Safa Nassr, et al.
Published: (2016)
Secure routing using frequency hopping in wireless sensor network
by: Raja Mohd. Radzi, Raja Zahilah
Published: (2007)
by: Raja Mohd. Radzi, Raja Zahilah
Published: (2007)
Cyber Identity Theft
by: Roberts, Lynne
Published: (2009)
by: Roberts, Lynne
Published: (2009)
Artificial neural network approach in radar target classification
by: Ibrahim, N. K., et al.
Published: (2009)
by: Ibrahim, N. K., et al.
Published: (2009)
Illumination compensation for document images using local-global block analysis
by: Azmi, Mohd Hafrizal, et al.
Published: (2009)
by: Azmi, Mohd Hafrizal, et al.
Published: (2009)
Business under threat: the criminal liability of trade secret theft in Malaysia?
by: Abd. Jalil, Juriah, et al.
Published: (2020)
by: Abd. Jalil, Juriah, et al.
Published: (2020)
Performance evaluation of wireless controller area network (WCAN) using token frame scheme
by: Ng, Wei Lun, et al.
Published: (2013)
by: Ng, Wei Lun, et al.
Published: (2013)
Dynamic transmit antenna shuffling scheme for MIMO wireless communication systems
by: Chong, Jin Hui, et al.
Published: (2012)
by: Chong, Jin Hui, et al.
Published: (2012)
A review on hierarchical routing protocols for wireless sensor networks
by: Manap, Zahariah, et al.
Published: (2013)
by: Manap, Zahariah, et al.
Published: (2013)
İnternet hırsızlığı=Internet theft
by: Kayadibi, Saim
Published: (2017)
by: Kayadibi, Saim
Published: (2017)
GRID anti-theft system
by: Neer Pandi, Rhuban
Published: (2012)
by: Neer Pandi, Rhuban
Published: (2012)
Portable anti-theft device
by: Johari Halim Shah, Nadira, et al.
Published: (2020)
by: Johari Halim Shah, Nadira, et al.
Published: (2020)
Adaptive data collection algorithm for wireless sensor networks
by: Vahabi, Maryam, et al.
Published: (2008)
by: Vahabi, Maryam, et al.
Published: (2008)
Cluster based routing protocol for mobile nodes in wireless sensor network
by: Awwad, Samer A. B., et al.
Published: (2011)
by: Awwad, Samer A. B., et al.
Published: (2011)
Cluster based routing protocol for mobile nodes in wireless sensor network
by: Awwad, Samer A. B., et al.
Published: (2009)
by: Awwad, Samer A. B., et al.
Published: (2009)
The state of e-government security in Malaysia : reassessing the legal and regulatory framework on the threat of information theft
by: Zulhuda, Sonny
Published: (2012)
by: Zulhuda, Sonny
Published: (2012)
Home appliances controller using wireless controller area network (WCAN) system
by: Ng, Wei Lun, et al.
Published: (2010)
by: Ng, Wei Lun, et al.
Published: (2010)
Segmentation of extrapulmonary tuberculosis infection using modified automatic seeded region growing
by: Avazpour, Iman, et al.
Published: (2009)
by: Avazpour, Iman, et al.
Published: (2009)
Transmission of visual data over wireless fading channel in real-time systems based on superposition coding scheme
by: Tahir, Yaseen Hasan, et al.
Published: (2013)
by: Tahir, Yaseen Hasan, et al.
Published: (2013)
Risk management in construction – preventive measure to reduce theft and vandalism problem / Che Amirah Che Awang
by: Che Awang, Che Amirah
Published: (2015)
by: Che Awang, Che Amirah
Published: (2015)
SP-AMC scheme for visual data transmisson over wireless fading channel
by: Al-Hasan, Yaseen Hasan Tahir, et al.
Published: (2011)
by: Al-Hasan, Yaseen Hasan Tahir, et al.
Published: (2011)
QoS based fair load-balancing: paradigm to IANRA routing algorithm for wireless networks (WNs)
by: Moghanjoughi, Ayyoub Akbari, et al.
Published: (2008)
by: Moghanjoughi, Ayyoub Akbari, et al.
Published: (2008)
Review of minimizing a vertical handover in a heterogeneous wireless network.
by: Hamza, Bashar J., et al.
Published: (2010)
by: Hamza, Bashar J., et al.
Published: (2010)
Traffic aware data collection MAC protocol for wireless sensor networks
by: Vahabi, Maryam, et al.
Published: (2008)
by: Vahabi, Maryam, et al.
Published: (2008)
Energy efficiency in MAC 802.15.4 for wireless sensor networks
by: Ghazvini, Mohammad Hossein Fotouhi, et al.
Published: (2008)
by: Ghazvini, Mohammad Hossein Fotouhi, et al.
Published: (2008)
The Shariah approach to criminalise identity theft
by: Mohamed, Sidi Mohamed Ould, et al.
Published: (2014)
by: Mohamed, Sidi Mohamed Ould, et al.
Published: (2014)
Security enhancement of route optimization in mobile IPv6 networks
by: Mehdizadeh, Abbas, et al.
Published: (2008)
by: Mehdizadeh, Abbas, et al.
Published: (2008)
Similar Items
-
Theft prevention in brothers Mahallahs
by: Mohd. Israil, Khaliq Ahmad, et al.
Published: (2011) -
Secure group communication scheme in wireless IPv6 networks: an experimental test-bed
by: Mehdizadeh, Abbas, et al.
Published: (2012) -
Wireless Control of Anti-Theft Solar Photovoltaic Module
by: Tan, Yin Shen
Published: (2017) -
Secured route optimization in mobile IPv6 wireless networks in terms of data integrity
by: Mehdizadeh, Abbas, et al.
Published: (2008) -
Secure multicast group communication scheme in wireless IPv6 networks
by: Mehdizadeh, Abbas, et al.
Published: (2014)