Search Results - (( java application sensor algorithm ) OR ( using sms based algorithm ))
Search alternatives:
- application sensor »
- java application »
- sensor algorithm »
- using sms »
-
1
A new SMS spam detection method using both Content-Based and non Content-Based features
Published 2024Conference Paper -
2
A simultaneous spam and phishing attack detection framework for short message service based on text mining approach
Published 2017“…The Phishing Rule-Based algorithm is used to extract SMS Phishing. …”
Get full text
Get full text
Get full text
Thesis -
3
Developing Bus Tracking System that predicts the arrival times of public buses at Universiti Teknologi PETRONAS (UTP) bus stops.
Published 2004“…The scope of the project includes developing an algorithm, the research and analysis of GPS and the use of SMS. …”
Get full text
Get full text
Final Year Project -
4
Study and Implementation of Data Mining in Urban Gardening
Published 2019“…The process begins through the monitoring of plants using sensors connected to the Arduino device. Attached sensors generate data and send these data to the Java Servlet application through a WIFI module. …”
Get full text
Get full text
Get full text
Article -
5
-
6
Fuzzy modelling using firefly algorithm for phishing detection
Published 2019“…One of the suitable methods provides the Firefly Algorithm (FA). FA is a nature-inspired algorithm that uses fireflies’ behavior to interpret data. …”
Get full text
Get full text
Get full text
Article -
7
A new mobile malware classification for SMS exploitation
Published 2024“…This paper explores how mobile malware exploit the system calls via SMS. As a solution, we proposed a system calls classification based on surveillance exploitation system calls for SMS. …”
Conference Paper -
8
Design Of Robot Motion Planning Algorithm For Wall Following Robot
Published 2006Get full text
Get full text
Monograph -
9
Performance monitoring algorithm for optimizing electrical power generated by using photovoltaic system
Published 2016Get full text
Get full text
Conference or Workshop Item -
10
Mobile Travel Guide For Tourism
Published 2007“…To overcome this problem, Mobile Travel Guide for Tourism project was initiated. This system is using SMS as the user interface and it understands users' input with predetermined format as queries to access the database. …”
Get full text
Get full text
Final Year Project -
11
Human activity recognition via accelerometer and gyro sensors
Published 2023“…To implement the data engineering system proposed, two mobile applications, SensorData and SensorDataLogger with user-friendly interfaces and intuitive functionalities are developed using Java programming language and Android Studio. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
12
-
13
Comprehensive power restoration approach using rule-based method for 11kV distribution network
Published 2023Conference Paper -
14
-
15
A smart metering for energy management system via GSM-SMS based protocol
Published 2011“…The system design consists of a cellular based power monitoring system using SMS protocol for data transmission. …”
Get full text
Get full text
Undergraduates Project Papers -
16
-
17
Depression prediction using machine learning: a review
Published 2022“…Fifteen articles were found relevant. We based our review on the Systematic Mapping Study (SMS) method. …”
Get full text
Get full text
Get full text
Article -
18
Spear- phishing attack detection using artificial intelligence
Published 2024“…The goal is to mitigate phishing and spam threats by using advanced algorithms to detect malicious URLs and classify messages effectively. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
19
Phishing attack detection using machine learning method
Published 2019“…The Naïve Bayes algorithm, Decision Tree algorithm and Support Vector Machine algorithm has been used to prevent the spam attack, as well as the phishing attack. …”
Get full text
Get full text
Get full text
Undergraduates Project Papers -
20
User authentication in public cloud computing through adoption of electronic personal synthesis behavior
Published 2023“…Secondly, a questionnaire prepared to examine the acceptance and use of EPSB. Finally, the implemented algorithm tested by comparing the accuracy of the current authentication framework with and without an EPSB algorithm. …”
text::Thesis
