Zobrazeno 1 - 10
of 14
pro vyhledávání: '"Noor Afiza Mohd Ariffin"'
Publikováno v:
Energies, Vol 15, Iss 21, p 8106 (2022)
Integration of information communication technology via the Internet of Things devices and sensors can enable an efficient power service for utility providers to consumers in advanced metering infrastructure. Authentication and cryptographic mechanis
Externí odkaz:
https://doaj.org/article/52f65fe3b3b043278247fdf5de12fce7
Publikováno v:
Journal of Intelligent Systems. 32
The continuous development of information communication technology facilitates the conventional grid in transforming into an automated modern system. Internet-of-Things solutions are used along with the evolving services of end-users to the electrici
Autor:
Faradiella Mohd Kusin, Nurfatin Izzati Ahmad Kamal, Zulfa Hanan Ash’aari, Ahmad Makmom Abdullah, Farrah Melissa Muharam, Amir Hamzah Sharaai, Ferdaus Mohamat Yusuff, Noor Afiza Mohd Ariffin
Publikováno v:
Climate and Development. 14:472-486
In the past decade, the inevitable increase in temperature has caused Malaysia to experience more extreme heat events, and yet very little research has been dedicated in exploring the heat-related ...
Autor:
Zul-Azri Ibrahim, Noor Afiza Mohd Ariffin, Hasventhran Baskaran, Fiza Abdul Rahim, Hairoladenan Kasim, Syazwani Arissa Shah Hairi, Abbas M. Al-Ghaili
Publikováno v:
Bulletin of Electrical Engineering and Informatics. 10:266-273
Advanced Metering Infrastructure (AMI) is a component of electrical networks that combines the energy and telecommunication infrastructure to collect, measure and analyze consumer energy consumptions. One of the main elements of AMI is a smart meter
Publikováno v:
2021 5th International Conference on Computing Methodologies and Communication (ICCMC).
Trusted Platform Modules (TPM) have grown to be crucial safeguards from the number of software-based strikes. By giving a restricted range of cryptographic providers by way of a well-defined user interface, divided as a result of the program itself,
Publikováno v:
ICSET
The advent of the digital age, globalization and automation has made life easier for people and businesses. However, the ubiquitous use of digital devices and the Internet also heightens the risk and incidents of cybercrimes. Under these circumstance
Publikováno v:
Journal of Physics: Conference Series. 1793:012047
Nowadays authentication considered the most vital field in term of security aspects because it represents the first line of defense in total process of our assets protection. In order to get access to any data especially when they are private, authen
Publikováno v:
TELKOMNIKA (Telecommunication Computing Electronics and Control). 18:1998
Authentication is one of the essentials components of information security. It has become one of the most basic security requirements for network communication. Today, there is a necessity for a strong level of authentication to guarantee a significa
Publikováno v:
2018 IEEE Conference on Application, Information and Network Security (AINS).
Security plays an important role in many authentication applications. Modern era information sharing is boundless and becoming much easier to access with the introduction of the Internet and the World Wide Web. Although this can be considered as a go
Autor:
Noor Afiza Mohd Ariffin, Qistina Suraya, Muhammad Sufyian Mohd, Fiza Abdul Rahim, Feninferina Azman
Publikováno v:
2018 IEEE Conference on Open Systems (ICOS).
Smartphones have become somewhat essential and most people have one on hand at all times. Smartphones have been considered a blessing as it has many capabilities and is not just limited to calling and text messaging unlike the regular mobile phone. I