-
公开(公告)号:MY170997A
公开(公告)日:2019-09-23
申请号:MYPI2014002165
申请日:2014-07-23
Applicant: MIMOS BERHAD
Inventor: MUHAMAD AMRI BIN ISMAIL , NURAFIZAH BINTI SAIDIN
IPC: H01L21/82 , H01L21/00 , H01L21/336 , H01L29/00 , H01L29/78
Abstract: Model parameter extraction for transistor modeling relies on experimental data provided and any discrepancy therein, if undetected at the outset, results in inaccurate models and delay in device/technology development. The method and apparatus of the present disclosure addresses this problem by introducing a consistency check prior to the model extraction stage. The method requires a set of experimental data, such as measured drain currents from the actual fabricated wafer for consistency check. The experimental data is formatted into readable ASCII or text file data for identification of unique points. A set of computer instructions which form the apparatus that evaluates the data consistency then provides the result of the consistency check to permit or restrain the model parameter extraction stage.
-
公开(公告)号:MY170849A
公开(公告)日:2019-09-10
申请号:MYPI2014701321
申请日:2014-05-21
Applicant: MIMOS BERHAD
Inventor: SRIDHAR SIVANAND , SHARIQ HASEEB , MUHAMMAD FAHEEM BIN MOHD EZANI , MOHD ARIFF BIN ABDULLAH
Abstract: The present invention generally relates to a system and method for distributing connectivity in a network, more particularly the present invention relates to a system and method for distributing connectivity in a wireless network. The system comprising at least a backhaul module (11) for connecting and transmitting packets from at least a connection module to at least a backhaul network (101), at least a wireless module (22) for providing network access to at least a user device connecting to at least an access point, at least a management module (25) in association with said at least a backhaul module (11) and said at least a connection module for measuring and determining network connectivity of said at least an access point, at least resource module (26) for measuring resources of said at least an access point and determining utilization of the resources, and at least an access list storage module (27) for storing at least a list of at least a user device media access control addresses. Most illustrative drawing: Figure 1
-
公开(公告)号:MY170817A
公开(公告)日:2019-08-30
申请号:MYPI2014701101
申请日:2014-04-30
Applicant: MIMOS BERHAD
Abstract: The present invention relates to a method for upgrading firmware in a wireless mesh network. The method is characterised by the steps of preparing mesh topology for firmware upgrade root node; identifying the best firmware upgrade root node; and upgrading firmware based on the mesh topology prepared. FIG. 1
-
公开(公告)号:MY169621A
公开(公告)日:2019-04-23
申请号:MYPI2012701084
申请日:2012-12-05
Applicant: MIMOS BERHAD
Inventor: ISKANDAR BIN BAHARI , MOESFA SOEHEILA BINTI MOHAMAD
Abstract: A method for information reconciliation in quantum key distribution is introduced herein. In general, a first binary sequence belonging to a sender is being divided and fitted into a first blocks system having a specific number of blocks (103). At the same time, a second binary sequence belonging to a recipient is being divided and fitted into a second blocks system having the same specific number of blocks as the first blocks system (103). The first blocks system and the second blocks system correspond to each other. Parity bit comparison is then carried out between the blocks within the first blocks system and their corresponding blocks within the second blocks system to detect an error that is defined as parity bit discrepancy (107). Once detected, a matrix system within the error block of each first and second blocks systems is extracted, and parity bits of each row and each column of the matrix system within the error block of the first blocks system are compared to the parity bit of its corresponding row and column of the matrix system within the error block of the second blocks system to identify and correct the entry contributing the error (108). Best illustrative figure: Figure 1
-
公开(公告)号:MY169605A
公开(公告)日:2019-04-22
申请号:MYPI2010002929
申请日:2010-06-21
Applicant: MIMOS BERHAD
Inventor: MASURI OTHMAN , AYMEN M KARIM , WAN ADIL BIN WAN JAMIL , AIRUL AZHA BIN ABD RAHMAN
Abstract: The present invention relates generally to a method and apparatus for predicting steady state response of a slow sensor reaction by utilising at least one batch of initial measured data for efficient data acquisition thereby saving time, energy and cost.
-
公开(公告)号:MY169586A
公开(公告)日:2019-04-22
申请号:MYPI2010000266
申请日:2010-01-19
Applicant: MIMOS BERHAD
Inventor: HON HOCK WOON
Abstract: The present invention provides for an imaging apparatus, which is used in a novel visual processing device. which provides assistance in parking or obstacle avoidance to the vehicle user. wherein the vehicle assist system comprising at least one imaging device for capturing video signals of an area surrounding a vehicle; an visual processing device for receiving the captured video signals from the imaging device; and a visual display device for displaying the processed video signal from the visual processing device, wherein the visual signal captured by the imaging device are mirror reflected video, signal captured by a single panoramic camera.
-
157.
公开(公告)号:MY169542A
公开(公告)日:2019-04-22
申请号:MYPI20071562
申请日:2007-09-18
Applicant: MIMOS BERHAD
Inventor: AHMAD HELMI BIN ABDUL HALIM
Abstract: The present invention relates to an apparatus and methodology of location based air interface/wireless protocol selector characterized in that wherein the apparatus comprises of at least one receiver (10), at least one transmitter (12), an antenna switch (14), a decoder or controller (16), a base station or SSID station (18) for storing ID database, a means power supply (20), a processing unit (22) and a master antenna (24) and wherein optionally, the above set of devices could be provided in duplicate and wherein all processing is done intelligently via the processing unit (22).
-
公开(公告)号:MY169097A
公开(公告)日:2019-02-18
申请号:MYPI2014702902
申请日:2014-10-01
Applicant: MIMOS BERHAD
Inventor: ALWYN GOH , POH GEONG SEN , MOESFA SOEHEILA MOHAMAD , CHOONG KHONG NENG
Abstract: The present invention provides a method for secure network establishment, via authentication of single-use passwords, or equivalent credentials, between a plurality of nodes (602, 702) undertaking a basic embodiment (602), a hardened embodiment (702) and a mixture of both basic and hardened embodiments. In the basic embodiment, particular node is designated a trusted party (601) with the method comprising previous provision, by the trusted party (501), of a single-use public key (612, 613) for use by any node in plurality thereof to confirm present use of a single-use password or credential (621) as subject to acknowledgment (624) by the trusted party in present instance of secure connectivity; verification (631) by any node in plurality thereof of such acknowledgement; and then independent computation of a session-key (632) also by any node in plurality thereof, with which to establish present instance of secure connectivity by means of Zero-Knowledge (ZK) integration of presently applicable password; previously received single-use public-key; and further provision, by the trusted party, of a subsequent single-use public-key for use by any node in the plurality thereof to confirm use of a subsequent single-use password or credential (523), as presently unknown, for a subsequent instance of secure connectivity. In the hardened embodiment, the method further comprises reciprocal previous provision, by particular node in plurality thereof, of a single-use public-key (717, 718) for use to undertake commitment (740) prior to establishment of present instance of secure connectivity by means of Zero-Knowledge (ZK) integration of presently applicable password or credential; previously transmitted single-use public-key; fine-grained context of commitment; and further provision, by particular node undertaking commitment, of a subsequent single-use public-key to undertake commitment in relation to subsequent instance of secure connectivity. Trusted party is able, by means of undertaking verification (750) of such commitments as received from plurality of nodes, to detect replay of passwords or credentials, or alternatively misuse of node-associated private-keys, by an unauthorized node seeking to participate in present instance of secure connectivity; and thereafter to undertake sanction, on such node that had attempted replay of password or credential, or misuse of private-key.
-
159.
公开(公告)号:MY168892A
公开(公告)日:2018-12-04
申请号:MYPI2012003072
申请日:2012-07-05
Applicant: MIMOS BERHAD
Inventor: DR ETTIKAN KANDASAMY A/L KARU
Abstract: The present invention provides a system for preemptive address conflict resolution in heterogeneous network environment, comprising a user device (12) and a conflict resolver (11) communicating with the user device. The conflict resolver comprises of a network address conflict verification and detection unit (14) for detecting address conflicts between network address of newly joined network device and existing addresses, wherein during verification, the network address of newly joined network device is verified against a network database (17) storing all existing network addresses, including both active and non-active network address. The conflict resolver (11) further comprises a conflict analysis list (18) that stores all detected conflict information. The system is operationally adapted to preemptively resolve any potential conflict address. Method for preemptive address conflict resolution is also provided herewith. (FIG. 1)
-
公开(公告)号:MY168819A
公开(公告)日:2018-12-04
申请号:MYPI2013702273
申请日:2013-11-27
Applicant: MIMOS BERHAD
Abstract: THE PRESENT INVENTION RELATES TO A METHOD FOR COORDINATING MULTIPLE ATTACKING DEVICES IN A WIRELESS COMMUNICATION NETWORK TO ATTACK A TARGET ACCESS POINT (AP), ONE AT A TIME WITHOUT JAMMING ANY FREQUENCY. THE METHOD IS CHARACTERIZED BY THE STEPS OF: SELECTING AN ATTACKING DEVICE FROM A LIST OF ATTACKING DEVICES (101); CONNECTING THE ATTACKING DEVICE TO THE TARGET AP (102); ALTERING TRANSMISSION PROTOCOL IN THE TARGET AP TO IDLE MODE (103), THEREAFTER DISENGAGING THE ATTACKING DEVICE FROM THE TARGET AP (104); NOTIFYING THE NEXT ATTACKING DEVICE SELECTED FROM THE LIST OF ATTACKING DEVICES TO CONNECT TO THE TARGET AP WHILE THE TARGET AP IS STILL IN THE IDLE MODE (105); AND REPEATING THE STEPS UNTIL EACH OF THE ATTACKING DEVICES IN THE LIST HAS ITS TURN ATTACKING THE TARGET AP (106). BEST ILLUSTRATIVE FIGURE: FIGURE 1
-
-
-
-
-
-
-
-
-