CoDe Lab

CoDe Lab

Connected Devices Lab
Internships
Research Internship Signup Form Name (required) Your Email (required) Year (required) Select Programme (required) Biomedical EngineeringComputer Engineering Current CWA (required) 60 - 6465 - 6970 - 7475 - 80 Research Project (required) WSN001SIGP001WSN002SIGP002WSN003 Your Motivation...
Become A Teacher
Courses

Internships

Research Internship Signup Form


[recaptcha id:cap_signup]

Research Internship Opportunities @ CoDe Lab
Connected Devices (CoDe) Lab is inviting qualified applicants for summer internship opportunities in the lab. The major areas available this summer is wireless sensor network...
Read More "Research Internship Opportunities @ CoDe Lab"
IET Paper Publication [Tamper-aware Authentication Framework for WSN] from CODE Lab
Paper Abstract Sensor nodes once deployed onto the field are mostly provided with little or no attention making them prone to physical attacks by adversaries....
Read More "IET Paper Publication [Tamper-aware Authentication Framework for WSN] from CODE Lab"
The Human Errors that Defeated Enigma
Recently, when researchers at the University of Rochester (USA) finally succeeded in developing a totally secure encryption device based on quantum rules, they presented it...
Read More "The Human Errors that Defeated Enigma"
When Computer Bugs Were Actual Insects
On September 9, 1947, the Mark II computer at Harvard University (USA) broke down. Upon inspection, engineers diagnosed the cause – a moth had entered...
Read More "When Computer Bugs Were Actual Insects"
What is Affective Computing?
Affective computing is the study and development of systems and devices that can recognize, interpret, process, and simulate human affects. It is an interdisciplinary field...
Read More "What is Affective Computing?"
IoT Standardization and Implementation Challenges
The rapid evolution of the IoT market has caused an explosion in the number and variety of IoT solutions. Additionally, large amounts of funding are...
Read More "IoT Standardization and Implementation Challenges"

Become A Teacher

Research Internship Opportunities @ CoDe Lab
Connected Devices (CoDe) Lab is inviting qualified applicants for summer internship opportunities in the lab. The major areas available this summer is wireless sensor network...
Read More "Research Internship Opportunities @ CoDe Lab"
IET Paper Publication [Tamper-aware Authentication Framework for WSN] from CODE Lab
Paper Abstract Sensor nodes once deployed onto the field are mostly provided with little or no attention making them prone to physical attacks by adversaries....
Read More "IET Paper Publication [Tamper-aware Authentication Framework for WSN] from CODE Lab"
The Human Errors that Defeated Enigma
Recently, when researchers at the University of Rochester (USA) finally succeeded in developing a totally secure encryption device based on quantum rules, they presented it...
Read More "The Human Errors that Defeated Enigma"
When Computer Bugs Were Actual Insects
On September 9, 1947, the Mark II computer at Harvard University (USA) broke down. Upon inspection, engineers diagnosed the cause – a moth had entered...
Read More "When Computer Bugs Were Actual Insects"
What is Affective Computing?
Affective computing is the study and development of systems and devices that can recognize, interpret, process, and simulate human affects. It is an interdisciplinary field...
Read More "What is Affective Computing?"
IoT Standardization and Implementation Challenges
The rapid evolution of the IoT market has caused an explosion in the number and variety of IoT solutions. Additionally, large amounts of funding are...
Read More "IoT Standardization and Implementation Challenges"
Is the Self-Driving Car the New Big Brother?
The starting gun has already fired in the race for the development of the autonomous car. Running full speed down the track are the big...
Read More "Is the Self-Driving Car the New Big Brother?"
Securing the Internet of Things (IoT) with Blockchain
IoT is creating new opportunities and providing a competitive advantage for businesses in current and new markets. It touches everything—not just the data, but how,...
Read More "Securing the Internet of Things (IoT) with Blockchain"

Courses

IET Paper Publication [Tamper-aware Authentication Framework for WSN] from CODE Lab

Paper Abstract Sensor nodes once deployed onto the field are mostly provided with little or no attention making them prone to physical attacks by adversaries. Various security frameworks have been proposed to mitigate tampering; others also ensure authentication of sensor nodes. Energy is a limited resource and as such, the …

What is Affective Computing?

Affective computing is the study and development of systems and devices that can recognize, interpret, process, and simulate human affects. It is an interdisciplinary field spanning computer science, psychology, and cognitive science. While the origins of the field may be traced as far back as to early philosophical inquiries into …

Securing the Internet of Things (IoT) with Blockchain

IoT is creating new opportunities and providing a competitive advantage for businesses in current and new markets. It touches everything—not just the data, but how, when, where and why you collect it. The technologies that have created the Internet of Things aren’t changing the internet only, but rather change the …

7 Trends of IoT in 2017

IoT is one of the transformational trends that will shape the future of businesses in 2017 and beyond. Many firms see big opportunity in IoT uses and enterprises start to believe that IoT holds the promise to enhance customer relationships and drive business growth by improving quality, productivity, and reliability …

Profile