Showing 1 - 10 results of 10 for search '"access control"', query time: 0.07s Refine Results
  1. 1
  2. 2
  3. 3
  4. 4

    Dynamicuser-defined accesscontrol policies via programming language / Suzana Ahmad by Ahmad, Suzana

    Published 2018
    “…Allowing data sharing activities to the right users can be determined by concerned access control through assisting every attempt made by a user, to access a resource in an application system. …”
    Get full text
    Book Section
  5. 5

    An enhanced energy efficient TDMA-based MAC protocol for wireless sensor network by Wan Embong, Wan Mohd. Ariff Ehsan, Rashid, Rozeha, Fisal, Norsheila

    Published 2008
    “…Although many approaches are being developed by the research community at all protocol layers, an energy-efficient Medium Access Control (MAC) layer remains a key design challenge.…”
    Book Section
  6. 6

    Channel assignment and MAC protocol for indoor wireless infrared ad hoc network by Abu Bakar, Zulkarmawan, J. Green, Roger

    Published 2007
    “…Five control handshake signals; two directional Request to Send (RTS), two directional Clear to Send (CTS) and a directional Acknowledgement (ACK), are used at Medium Access Control (MAC) protocol for resolving potential collisions among the transceivers. …”
    Book Section
  7. 7

    Hybrid MAC layer design for MPEG-4 video transmission in WSN by Ismail, N. S. N., Ariffin, S. H. S., Yusof, S. K. B. S., Yunus, F., Fisal, N.

    Published 2014
    “…In this chapter, a comprehensive study of Medium Access Control (MAC) and MPEG-4 video transmission is presented. …”
    Book Section
  8. 8

    Lightweight IoT based indoor positioning for Guard Touring System by Chai, Cho Khian, A. Rashid, Rozeha, Abdul Hamid, Siti Zaleha, Elvin, Calveen Jon, Kamaruzaman, Muhammad Afiq

    Published 2022
    “…Two methods are used to estimate the indoor positioning of the guards which are machine learning using Linear Regression model and BLE Media Access Control (MAC) Identifier. The findings show the BLE MAC Identifier method provides a high accuracy of 98% and the least delay in decision time, which can be as fast as 0.5 s. …”
    Book Section
  9. 9

    MPEG-4 video transmission using distributed TDMA MAC protocol over IEEE 802.15.4 wireless technology by Ismail, N. S. N., Yunus, F., Syed Ariffin, Sharifah Hafizah, Abdullah, Ahmad Shahidan, A. Rashid, Rozeha, Embong, W. M. A. E. W., Fisal, Norsheila, Syed Yusof, Sharifah Kamilah

    Published 2011
    “…The issues of green technology nowadays give an inspiration to the researcher to make all the future design to be energy efficient. Medium Access Control (MAC) layer is the most effective layer to provide energy efficient due to its ability to control the physical radio directly. …”
    Book Section
  10. 10

    Parallelization strategy of speaker identification system for Hybrid Modeling by Ahmad, Abdul Manan, Loh, Mun Yee

    Published 2008
    “…To date, our technology has yet to provide speaker recognition system for many application include access control system, security control for confidential information, transaction authentication and telephone banking. …”
    Get full text
    Book Section