Search Results - (( java implementation path algorithm ) OR ( using sms based algorithm ))
Search alternatives:
- java implementation »
- implementation path »
- path algorithm »
- using sms »
-
1
Heavy Transportation Shortest Route using Dijkstra’s algorithm (HETRO) / Nurul Aqilah Ahmad Nezer
Published 2017“…The development tools used in developing this project is NetBeans by using Java for the implementation of the coding. The methodology that used for developing this system is the Dijkstra’s algorithm. …”
Get full text
Get full text
Thesis -
2
A new SMS spam detection method using both Content-Based and non Content-Based features
Published 2024Conference Paper -
3
Embedded system for indoor guidance parking with Dijkstra’s algorithm and ant colony optimization
Published 2019“…BST inserts the nodes in the way that the Dijkstra’s can find the empty parking in fastest way. Dijkstra’s algorithm initials the paths to finding the shortest path while ACO optimizes the paths. …”
Get full text
Get full text
Thesis -
4
Path planning for unmanned aerial vehicle (UAV) using rotated accelerated method in static outdoor environment
Published 2021“…In this study, a fast iterative method known as Rotated Successive Over-Relaxation (RSOR) is introduced. The algorithm is implemented in a self-developed 2D Java tool, UAV Planner. …”
Get full text
Get full text
Get full text
Get full text
Article -
5
Smart appointment organizer for mobile application / Mohd Syafiq Adam
Published 2009“…The main component of this prototype is the use of Dijkstra algorithm to compute the shortest path from source of appointment to the 6 points of destinations within UiTM Shah Alam. …”
Get full text
Get full text
Thesis -
6
A simultaneous spam and phishing attack detection framework for short message service based on text mining approach
Published 2017“…The Phishing Rule-Based algorithm is used to extract SMS Phishing. …”
Get full text
Get full text
Get full text
Thesis -
7
Developing Bus Tracking System that predicts the arrival times of public buses at Universiti Teknologi PETRONAS (UTP) bus stops.
Published 2004“…The scope of the project includes developing an algorithm, the research and analysis of GPS and the use of SMS. …”
Get full text
Get full text
Final Year Project -
8
-
9
Fuzzy modelling using firefly algorithm for phishing detection
Published 2019“…One of the suitable methods provides the Firefly Algorithm (FA). FA is a nature-inspired algorithm that uses fireflies’ behavior to interpret data. …”
Get full text
Get full text
Get full text
Article -
10
A new mobile malware classification for SMS exploitation
Published 2024“…This paper explores how mobile malware exploit the system calls via SMS. As a solution, we proposed a system calls classification based on surveillance exploitation system calls for SMS. …”
Conference Paper -
11
Performance monitoring algorithm for optimizing electrical power generated by using photovoltaic system
Published 2016Get full text
Get full text
Conference or Workshop Item -
12
Mobile Travel Guide For Tourism
Published 2007“…To overcome this problem, Mobile Travel Guide for Tourism project was initiated. This system is using SMS as the user interface and it understands users' input with predetermined format as queries to access the database. …”
Get full text
Get full text
Final Year Project -
13
-
14
Comprehensive power restoration approach using rule-based method for 11kV distribution network
Published 2023Conference Paper -
15
-
16
A smart metering for energy management system via GSM-SMS based protocol
Published 2011“…The system design consists of a cellular based power monitoring system using SMS protocol for data transmission. …”
Get full text
Get full text
Undergraduates Project Papers -
17
-
18
Depression prediction using machine learning: a review
Published 2022“…Fifteen articles were found relevant. We based our review on the Systematic Mapping Study (SMS) method. …”
Get full text
Get full text
Get full text
Article -
19
Spear- phishing attack detection using artificial intelligence
Published 2024“…The goal is to mitigate phishing and spam threats by using advanced algorithms to detect malicious URLs and classify messages effectively. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
20
Phishing attack detection using machine learning method
Published 2019“…The Naïve Bayes algorithm, Decision Tree algorithm and Support Vector Machine algorithm has been used to prevent the spam attack, as well as the phishing attack. …”
Get full text
Get full text
Get full text
Undergraduates Project Papers
