Search Results - (( developing sms based algorithm ) OR ( java optimization path algorithm ))
Search alternatives:
- java optimization »
- optimization path »
- developing sms »
- path algorithm »
-
1
Embedded system for indoor guidance parking with Dijkstra’s algorithm and ant colony optimization
Published 2019“…BST inserts the nodes in the way that the Dijkstra’s can find the empty parking in fastest way. Dijkstra’s algorithm initials the paths to finding the shortest path while ACO optimizes the paths. …”
Get full text
Get full text
Thesis -
2
SecPath: Energy efficient path reconstruction in wireless sensor network using iterative smoothing
Published 2019“…This work uses iterative smoothing algorithm to find an alternative path with less distance and energy consumption. …”
Get full text
Get full text
Thesis -
3
Energy efficient path reconstruction in wireless sensor network using iPath
Published 2019“…This work uses iterative boosting algorithm to find an alternative path with less distance and energy consumption. …”
Get full text
Get full text
Get full text
Article -
4
Visdom: Smart guide robot for visually impaired people
Published 2025“…Core functionalities such as path planning, autonomous movement, voice feedback, and app-to-robot communication have been thoroughly tested and optimized. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
5
Developing Bus Tracking System that predicts the arrival times of public buses at Universiti Teknologi PETRONAS (UTP) bus stops.
Published 2004“…The usage will allowthem to access the system that manipulates this algorithm. The scope of the project includes developing an algorithm, the research and analysis of GPS and the use of SMS. …”
Get full text
Get full text
Final Year Project -
6
A simultaneous spam and phishing attack detection framework for short message service based on text mining approach
Published 2017“…For Module 1, the data sets used in this research are from the UCI Machine Learning Repository, the Dublin Institute of Technology (DIT), British English SMS and Malay SMS. The Phishing Rule-Based algorithm is used to extract SMS Phishing. …”
Get full text
Get full text
Get full text
Thesis -
7
-
8
A new mobile malware classification for SMS exploitation
Published 2024“…This paper explores how mobile malware exploit the system calls via SMS. As a solution, we proposed a system calls classification based on surveillance exploitation system calls for SMS. …”
Conference Paper -
9
Mobile Travel Guide For Tourism
Published 2007“…Methodology that is practically adequate to be implemented in this system is Phased Development-based methodology. To compute directions to a place, the system is implementing Dijkstra algorithm which is efficient to find the shortest path. …”
Get full text
Get full text
Final Year Project -
10
Performance monitoring algorithm for optimizing electrical power generated by using photovoltaic system
Published 2016Get full text
Get full text
Conference or Workshop Item -
11
An immunological-based simulation: A case study of risk concentration for mobile spam context assessment
Published 2024Get full text
Get full text
journal::journal article -
12
Comprehensive power restoration approach using rule-based method for 11kV distribution network
Published 2023Conference Paper -
13
-
14
A smart metering for energy management system via GSM-SMS based protocol
Published 2011“…The system design consists of a cellular based power monitoring system using SMS protocol for data transmission. …”
Get full text
Get full text
Undergraduates Project Papers -
15
-
16
Spear- phishing attack detection using artificial intelligence
Published 2024“…This project focuses on developing machine learning-based applications to enhance cybersecurity, specifically the Spear Phishing Attack Detection (S.P.A.D) system and the Email/SMS Classifier. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
17
Microcontroller-based face recognition system with web-based application for car security
Published 2023“…Hardware and software designs were carried out to develop a car security system using microcontroller-based face recognition system. …”
Article -
18
Phishing attack detection using machine learning method
Published 2019“…This spam message includes the email and the SMS message that received by the user. There are several algorithms that can be used in the machine learning method to prevent the both attacks. …”
Get full text
Get full text
Get full text
Undergraduates Project Papers -
19
Evolutionary cost-cognizant regression test case prioritization for object-oriented programs
Published 2019“…Therefore, this study proposed a cost-cognizant TCP approach for object-oriented software that uses path-based integration testing to identify the possible execution path extracted from the Java System Dependence Graph (JSDG) model of the source code using forward slicing technique. …”
Get full text
Get full text
Thesis -
20
Development of a fall detection system based on neural network featuring IoT-Technology
Published 2021“…A backpropagation neural network algorithm has been developed to accurately distinguish falls from different postural transitions during activities of daily living (ADL). …”
Get full text
Get full text
Get full text
Article
