Search Results - (( intelligence system vs algorithm ) OR ( intelligence based sms algorithm ))*
Search alternatives:
- intelligence system »
- intelligence based »
- sms algorithm »
- vs algorithm »
- system vs »
- based sms »
-
1
A new SMS spam detection method using both Content-Based and non Content-Based features
Published 2024Conference Paper -
2
-
3
Developing Bus Tracking System that predicts the arrival times of public buses at Universiti Teknologi PETRONAS (UTP) bus stops.
Published 2004“…The usage will allowthem to access the system that manipulates this algorithm. The scope of the project includes developing an algorithm, the research and analysis of GPS and the use of SMS. …”
Get full text
Get full text
Final Year Project -
4
-
5
-
6
-
7
A smart metering for energy management system via GSM-SMS based protocol
Published 2011“…The proposed monitoring system consist of a new energy calculation algorithm, offering electricity packages with a intelligent monitoring for daily power consumption connected to base-station via GSM network. …”
Get full text
Get full text
Undergraduates Project Papers -
8
Classroom finder system with student availability, space and time constraint
Published 2024“…The primary focus of the system is on facilitating efficient and conflict-free room assignments while considering various constraints and requirements by exploring the suitable Artificial Intelligence approaches and scheduling algorithms. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
9
Spear- phishing attack detection using artificial intelligence
Published 2024Get full text
Get full text
Final Year Project / Dissertation / Thesis -
10
-
11
-
12
Evaluating Adan vs. Adam: an analysis of optimizer performance in deep learning
Published 2025Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
13
Computational intelligence based power tracing for non discriminatory losses charge allocation and voltage stability improvement / Zulkiffli Abdul Hamid
Published 2013“…Without treating the power system to be lossless, the tracing results are based on actual system condition; which means that they are consistent. …”
Get full text
Get full text
Thesis -
14
User authentication in public cloud computing through adoption of electronic personal synthesis behavior
Published 2023“…The problem is in multi-factor authentication with public cloud computing, the performance of user authentication in password-based authentication needs to move from traditional security processes to intelligent security processes. …”
text::Thesis -
15
-
16
Camera coverage prioritization to support security monitoring
Published 2017Get full text
Get full text
Article -
17
Depression prediction using machine learning: a review
Published 2022Get full text
Get full text
Get full text
Article -
18
-
19
SMSAD: a framework for spam message and spam account detection
Published 2019“…However, the traditional content-based methods for spam detection degraded in performance due to many factors. …”
Get full text
Get full text
Article -
20
