Search Results - (( intelligence based blend algorithm ) OR ( intelligence sms based algorithm ))

  • Showing 1 - 20 results of 20
Refine Results
  1. 1
  2. 2

    Developing Bus Tracking System that predicts the arrival times of public buses at Universiti Teknologi PETRONAS (UTP) bus stops. by Mohd Akhir, Norhasiah

    Published 2004
    “…The usage will allowthem to access the system that manipulates this algorithm. The scope of the project includes developing an algorithm, the research and analysis of GPS and the use of SMS. …”
    Get full text
    Get full text
    Final Year Project
  3. 3
  4. 4

    Computational intelligence based power tracing for nondiscriminatory losses charge allocation and voltage stability improvement. / Zulkifli Abdul Hamid by Abdul Hamid, Zulkifli

    Published 2013
    “…The hybrid algorithm is termed as the Blended Crossover Continuous Ant Colony Optimization (BX-CACO). …”
    Get full text
    Get full text
    Book Section
  5. 5
  6. 6

    A smart metering for energy management system via GSM-SMS based protocol by Fakharuddin, Azhar

    Published 2011
    “…The proposed monitoring system consist of a new energy calculation algorithm, offering electricity packages with a intelligent monitoring for daily power consumption connected to base-station via GSM network. …”
    Get full text
    Get full text
    Undergraduates Project Papers
  7. 7
  8. 8

    Advancements and challenges in mobile robot navigation: a comprehensive review of algorithms and potential for self-learning approaches by Al Mahmud, Suaib, Kamarulariffin, Abdurrahman, Mohd Ibrahim, Azhar, Haja Mohideen, Ahmad Jazlan

    Published 2024
    “…With the goal of enhancing the autonomy in mobile robot navigation, numerous algorithms (traditional AI-based, swarm intelligence-based, self-learning-based) have been built and implemented independently, and also in blended manners. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  9. 9
  10. 10

    User authentication in public cloud computing through adoption of electronic personal synthesis behavior by Mohanaad Talal Shakir

    Published 2023
    “…The problem is in multi-factor authentication with public cloud computing, the performance of user authentication in password-based authentication needs to move from traditional security processes to intelligent security processes. …”
    text::Thesis
  11. 11
  12. 12
  13. 13
  14. 14
  15. 15

    SMSAD: a framework for spam message and spam account detection by Adewole, Kayode Sakariyah, Anuar, Nor Badrul, Kamsin, Amirrudin, Sangaiah, Arun Kumar

    Published 2019
    “…However, the traditional content-based methods for spam detection degraded in performance due to many factors. …”
    Get full text
    Get full text
    Article
  16. 16
  17. 17

    Development of electronic nose for classification of aromatic herbs using Artificial Intelligent techniques by Che Soh, Azura, Mohamad Radzi, Nur Fadzilah, Mohamad Yusof, Umi Kalsom, Ishak, Asnor Juraiza, Hassan, Mohd Khair

    Published 2018
    “…The herb leaves were blended as a mechanism in sample preparation was found as a preeminent procedure to overcome the drawback of the existing system. …”
    Get full text
    Get full text
    Get full text
    Article
  18. 18

    Development of a New Modeling Circuit for the Remote Terminal Unit (RTU) with GSM Communication by Ab Ghani, Mohd Ruddin, Wan Hassan, Wan Ahmas Redhauddin, Mat Hanafiah, Mohd Ariff, Raman, Siti Hajar

    Published 2013
    “…The design proposed based on Global System for Mobile (GSM) communication and this paper also presents as efficient design for distribution automation system and its implementation in remote/automatic monitoring and controlling of the relays (circuit breaker) by means of GSM Short Message Service (SMS) services, automatic decision making and continuous monitoring of distribution system components in real time. …”
    Get full text
    Get full text
    Conference or Workshop Item
  19. 19

    Internet of Things-based Home Automation with Network Mapper and MQTT Protocol by Alam T., Rokonuzzaman M., Sarker S., Abadin A.F.M.Z., Debnath T., Hossain M.I.

    Published 2025
    “…Standard cloud-based IoT systems can't fully function in areas with unstable internet. …”
    Article
  20. 20

    Unified framework for spam detection and risk assessment in short message communication media / Adewole Kayode Sakariyah by Adewole Kayode, Sakariyah

    Published 2018
    “…The performance of ten (10) machine learning algorithms were evaluated to select the best classifier for both SADM and SMDM. …”
    Get full text
    Get full text
    Get full text
    Thesis