Search Results - (( java implementation path algorithm ) OR ( using sms based algorithm ))

Refine Results
  1. 1

    Heavy Transportation Shortest Route using Dijkstra’s algorithm (HETRO) / Nurul Aqilah Ahmad Nezer by Ahmad Nezer, Nurul Aqilah

    Published 2017
    “…The development tools used in developing this project is NetBeans by using Java for the implementation of the coding. The methodology that used for developing this system is the Dijkstra’s algorithm. …”
    Get full text
    Get full text
    Thesis
  2. 2
  3. 3

    Embedded system for indoor guidance parking with Dijkstra’s algorithm and ant colony optimization by Mohammad Ata, Karimeh Ibrahim

    Published 2019
    “…BST inserts the nodes in the way that the Dijkstra’s can find the empty parking in fastest way. Dijkstra’s algorithm initials the paths to finding the shortest path while ACO optimizes the paths. …”
    Get full text
    Get full text
    Thesis
  4. 4

    Path planning for unmanned aerial vehicle (UAV) using rotated accelerated method in static outdoor environment by Shaliza Hayati A. Wahab, Nordin Saad, Azali Saudi, Ali Chekima

    Published 2021
    “…In this study, a fast iterative method known as Rotated Successive Over-Relaxation (RSOR) is introduced. The algorithm is implemented in a self-developed 2D Java tool, UAV Planner. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  5. 5

    Smart appointment organizer for mobile application / Mohd Syafiq Adam by Adam, Mohd Syafiq

    Published 2009
    “…The main component of this prototype is the use of Dijkstra algorithm to compute the shortest path from source of appointment to the 6 points of destinations within UiTM Shah Alam. …”
    Get full text
    Get full text
    Thesis
  6. 6
  7. 7

    Developing Bus Tracking System that predicts the arrival times of public buses at Universiti Teknologi PETRONAS (UTP) bus stops. by Mohd Akhir, Norhasiah

    Published 2004
    “…The scope of the project includes developing an algorithm, the research and analysis of GPS and the use of SMS. …”
    Get full text
    Get full text
    Final Year Project
  8. 8
  9. 9

    Fuzzy modelling using firefly algorithm for phishing detection by Noor Syahirah, Nordin, Mohd Arfian, Ismail, Mezhuyev, Vitaliy, Shahreen, Kasim, Mohd Saberi, Mohamad, Ashraf Osman, Ibrahim

    Published 2019
    “…One of the suitable methods provides the Firefly Algorithm (FA). FA is a nature-inspired algorithm that uses fireflies’ behavior to interpret data. …”
    Get full text
    Get full text
    Get full text
    Article
  10. 10

    A new mobile malware classification for SMS exploitation by Zaizi N.J.M., Khailani A., Madihah Mohd Saudi

    Published 2024
    “…This paper explores how mobile malware exploit the system calls via SMS. As a solution, we proposed a system calls classification based on surveillance exploitation system calls for SMS. …”
    Conference Paper
  11. 11
  12. 12

    Mobile Travel Guide For Tourism by HUSEIN, Sukainah

    Published 2007
    “…To overcome this problem, Mobile Travel Guide for Tourism project was initiated. This system is using SMS as the user interface and it understands users' input with predetermined format as queries to access the database. …”
    Get full text
    Get full text
    Final Year Project
  13. 13
  14. 14
  15. 15
  16. 16

    A smart metering for energy management system via GSM-SMS based protocol by Fakharuddin, Azhar

    Published 2011
    “…The system design consists of a cellular based power monitoring system using SMS protocol for data transmission. …”
    Get full text
    Get full text
    Undergraduates Project Papers
  17. 17
  18. 18

    Depression prediction using machine learning: a review by Abdul Rahimapandi, Hanis Diyana, Maskat, Ruhaila, Musa, Ramli, Ardi, Norizah

    Published 2022
    “…Fifteen articles were found relevant. We based our review on the Systematic Mapping Study (SMS) method. …”
    Get full text
    Get full text
    Get full text
    Article
  19. 19

    Spear- phishing attack detection using artificial intelligence by Rajkumaradevan, Sanglidevan

    Published 2024
    “…The goal is to mitigate phishing and spam threats by using advanced algorithms to detect malicious URLs and classify messages effectively. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  20. 20

    Phishing attack detection using machine learning method by Jupin, John Arthur

    Published 2019
    “…The Naïve Bayes algorithm, Decision Tree algorithm and Support Vector Machine algorithm has been used to prevent the spam attack, as well as the phishing attack. …”
    Get full text
    Get full text
    Get full text
    Undergraduates Project Papers