Search Results - (( developing sms based algorithm ) OR ( java optimization path algorithm ))

Refine Results
  1. 1

    Embedded system for indoor guidance parking with Dijkstra’s algorithm and ant colony optimization by Mohammad Ata, Karimeh Ibrahim

    Published 2019
    “…BST inserts the nodes in the way that the Dijkstra’s can find the empty parking in fastest way. Dijkstra’s algorithm initials the paths to finding the shortest path while ACO optimizes the paths. …”
    Get full text
    Get full text
    Thesis
  2. 2

    SecPath: Energy efficient path reconstruction in wireless sensor network using iterative smoothing by Abd, Wamidh Jwdat

    Published 2019
    “…This work uses iterative smoothing algorithm to find an alternative path with less distance and energy consumption. …”
    Get full text
    Get full text
    Thesis
  3. 3

    Energy efficient path reconstruction in wireless sensor network using iPath by Hasan, Sazlinah, Abd, Wamidh Jwdat, Ariffin, Ahmad Alauddin

    Published 2019
    “…This work uses iterative boosting algorithm to find an alternative path with less distance and energy consumption. …”
    Get full text
    Get full text
    Get full text
    Article
  4. 4

    Visdom: Smart guide robot for visually impaired people by Lee, Zhen Ting

    Published 2025
    “…Core functionalities such as path planning, autonomous movement, voice feedback, and app-to-robot communication have been thoroughly tested and optimized. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  5. 5

    Developing Bus Tracking System that predicts the arrival times of public buses at Universiti Teknologi PETRONAS (UTP) bus stops. by Mohd Akhir, Norhasiah

    Published 2004
    “…The usage will allowthem to access the system that manipulates this algorithm. The scope of the project includes developing an algorithm, the research and analysis of GPS and the use of SMS. …”
    Get full text
    Get full text
    Final Year Project
  6. 6

    A simultaneous spam and phishing attack detection framework for short message service based on text mining approach by Mohd Foozy, Cik Feresa

    Published 2017
    “…For Module 1, the data sets used in this research are from the UCI Machine Learning Repository, the Dublin Institute of Technology (DIT), British English SMS and Malay SMS. The Phishing Rule-Based algorithm is used to extract SMS Phishing. …”
    Get full text
    Get full text
    Get full text
    Thesis
  7. 7
  8. 8

    A new mobile malware classification for SMS exploitation by Zaizi N.J.M., Khailani A., Madihah Mohd Saudi

    Published 2024
    “…This paper explores how mobile malware exploit the system calls via SMS. As a solution, we proposed a system calls classification based on surveillance exploitation system calls for SMS. …”
    Conference Paper
  9. 9

    Mobile Travel Guide For Tourism by HUSEIN, Sukainah

    Published 2007
    “…Methodology that is practically adequate to be implemented in this system is Phased Development-based methodology. To compute directions to a place, the system is implementing Dijkstra algorithm which is efficient to find the shortest path. …”
    Get full text
    Get full text
    Final Year Project
  10. 10
  11. 11
  12. 12
  13. 13
  14. 14

    A smart metering for energy management system via GSM-SMS based protocol by Fakharuddin, Azhar

    Published 2011
    “…The system design consists of a cellular based power monitoring system using SMS protocol for data transmission. …”
    Get full text
    Get full text
    Undergraduates Project Papers
  15. 15
  16. 16

    Spear- phishing attack detection using artificial intelligence by Rajkumaradevan, Sanglidevan

    Published 2024
    “…This project focuses on developing machine learning-based applications to enhance cybersecurity, specifically the Spear Phishing Attack Detection (S.P.A.D) system and the Email/SMS Classifier. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  17. 17

    Microcontroller-based face recognition system with web-based application for car security by Arumugam P., Ker P.J., Tan J.Y., Mani D.

    Published 2023
    “…Hardware and software designs were carried out to develop a car security system using microcontroller-based face recognition system. …”
    Article
  18. 18

    Phishing attack detection using machine learning method by Jupin, John Arthur

    Published 2019
    “…This spam message includes the email and the SMS message that received by the user. There are several algorithms that can be used in the machine learning method to prevent the both attacks. …”
    Get full text
    Get full text
    Get full text
    Undergraduates Project Papers
  19. 19

    Evolutionary cost-cognizant regression test case prioritization for object-oriented programs by Bello, AbdulKarim

    Published 2019
    “…Therefore, this study proposed a cost-cognizant TCP approach for object-oriented software that uses path-based integration testing to identify the possible execution path extracted from the Java System Dependence Graph (JSDG) model of the source code using forward slicing technique. …”
    Get full text
    Get full text
    Thesis
  20. 20

    Development of a fall detection system based on neural network featuring IoT-Technology by Nik Anwar, Nik Syahrim, Ng, Yong Jie, Ng, Wei Yu, Law, Cheng Quan

    Published 2021
    “…A backpropagation neural network algorithm has been developed to accurately distinguish falls from different postural transitions during activities of daily living (ADL). …”
    Get full text
    Get full text
    Get full text
    Article