Search Results

Results (440)

Search Parameters:

Keyword: Problem
Order results
Results per page
Open AccessArticle
13 Pages, 1,647 KB Download PDF

Distributed Microphone Arrays, Emerging Speech and Audio Signal Processing Platforms: A Review

Advances in Science, Technology and Engineering Systems Journal, Volume 5, Issue 4, Page # 331–343, 2020; DOI: 10.25046/aj050439
Abstract:

Given ubiquitous digital devices with recording capability, distributed microphone arrays are emerging recording tools for hands-free communications and spontaneous tele-conferencings. However, the analysis of signals recorded with diverse sampling rates, time delays, and qualities by distributed microphone arrays is not straightforward and entails important considerations. The crucial challenges include the unknown/changeable geometry of distributed arrays,…

Read More
(This article belongs to the SP9 (Special Issue on Multidisciplinary Innovation in Engineering Science & Technology 2020) & Section Telecommunications (TEL))
Open AccessArticle
8 Pages, 1,233 KB Download PDF

Logistics Solutions in the Preparation Phase for the Appearance of Disasters

Advances in Science, Technology and Engineering Systems Journal, Volume 5, Issue 4, Page # 323–330, 2020; DOI: 10.25046/aj050438
Abstract:

Natural disasters have caused not only economic but also human losses. These events bring with them, among other things, deficiencies in the supply of food, clothing, health and cleaning products, to name a few. This situation makes it imperative to locate facilities that can supply the needs, as mentioned earlier, to the victims in the…

Read More
(This article belongs to the SP9 (Special Issue on Multidisciplinary Innovation in Engineering Science & Technology 2020) & Section Operations Research & Management Science (ORM))
Open AccessArticle
11 Pages, 2,063 KB Download PDF

Dynamic Decision-Making Process in the Opportunistic Spectrum Access

Advances in Science, Technology and Engineering Systems Journal, Volume 5, Issue 4, Page # 223–233, 2020; DOI: 10.25046/aj050428
Abstract:

We investigate in this paper many problems related to the decision-making process in the Cognitive Radio (CR), where a Secondary User (SU) tries to maximize its opportunities by finding the most vacant channel. Recently, Multi-Armed Bandit (MAB) problems attracted the attention to help a single SU, in the context of CR, makes an optimal decision…

Read More
(This article belongs to the SP9 (Special Issue on Multidisciplinary Innovation in Engineering Science & Technology 2020) & Section Interdisciplinary Applications of Computer Science (CSI))
Open AccessArticle
16 Pages, 1,504 KB Download PDF

A Survey on 3D Hand Skeleton and Pose Estimation by Convolutional Neural Network

Advances in Science, Technology and Engineering Systems Journal, Volume 5, Issue 4, Page # 144–159, 2020; DOI: 10.25046/aj050418
Abstract:

Restoring, estimating the fully 3D hand skeleton and pose from the image data of the captured sensors/cameras applied in many applications of computer vision and robotics: human-computer interaction; gesture recognition, interactive games, Computer-Aided Design (CAD), sign languages, action recognition, etc. These are applications that flourish in Virtual Reality and Augmented Reality (VR/AR) technologies. Previous survey…

Read More
(This article belongs to Section Artificial Intelligence in Computer Science (CAI))
Open AccessArticle
4 Pages, 535 KB Download PDF

Contribution in Private Cloud Computing Development based on Study and KPI Analysis

Advances in Science, Technology and Engineering Systems Journal, Volume 5, Issue 4, Page # 105–108, 2020; DOI: 10.25046/aj050414
Abstract:

The preset paper describes a contributes in the implementation of private Cloud Computing. Exhaustive study made validates Cloud environment creation and successful deployed Solution Configuration choice. Related solution ensures a good investment that reduces energy costs of the data center, minimizes network traffic cost proven as an NP-hard problem. In addition, each virtual machine (VsM)…

Read More
(This article belongs to Section Information Systems in Computer Science (CIS))
Open AccessArticle
5 Pages, 1,031 KB Download PDF

Multi-Agent Data Recognition System Based on Received Signal in Antenna on Board Telecom System

Advances in Science, Technology and Engineering Systems Journal, Volume 5, Issue 4, Page # 94–98, 2020; DOI: 10.25046/aj050412
Abstract:

Information data recognition during traditional operating step in telecommunication system, as their interpretation, presents an important active research field. In this context, we propose as a solution multi-agent data identification system starting with received signal parameters in antenna network connected on board telecom system. Due to the Information Identification Data (IID) response variability that differ…

Read More
(This article belongs to Section Telecommunications (TEL))
Open AccessArticle
11 Pages, 485 KB Download PDF

Robust Static Output-Feedback Fault Tolerant Control for a Class of T-S Fuzzy Systems using Adaptive Sliding Mode Observer Approach

Advances in Science, Technology and Engineering Systems Journal, Volume 5, Issue 4, Page # 70–80, 2020; DOI: 10.25046/aj050410
Abstract:

In this paper, the problems of actuator and sensor fault estimation (FE) and fault-tolerant control (FTC) for uncertain nonlinear systems represented by Takagi-Sugeno (T-S) fuzzy models are investigated. First, a robust fuzzy adaptive sliding mode observer (SMO) is designed to simultaneously estimate system states and both actuator and sensor faults. Then, using the obtained on-line…

Read More
(This article belongs to Section Automation & Control Systems (ACS))
Open AccessArticle
6 Pages, 631 KB Download PDF

Citizen Behavior: The Evaluation of Complaint Application that Connected to Smart City

Advances in Science, Technology and Engineering Systems Journal, Volume 5, Issue 4, Page # 24–29, 2020; DOI: 10.25046/aj050403
Abstract:

SIARAN is application which is created by Government of South Tangerang City, Indonesia. The application is e-government services social media based. It is designed for citizens to be able to report problems that occur around South Tangerang City. The research was conducted to find out the factors that affect the intention of SIARAN’s users. The…

Read More
(This article belongs to Section Information Systems in Computer Science (CIS))
Open AccessArticle
7 Pages, 1,424 KB Download PDF

Offline Signature Recognition and Verification Using ORB Key Point Matching Techniques

Advances in Science, Technology and Engineering Systems Journal, Volume 5, Issue 4, Page # 01–07, 2020; DOI: 10.25046/aj050401
Abstract:

An extensive work has been carried out in the field of human transcribe-verification and transcribe-recognition by extensive scholars across the globe from past decades. In order to demeanour immense experiments for considering the performance of the newly intended models and to substantiate the efficacy of the proposed model which is moderately required. This paper monologue…

Read More
(This article belongs to the SP9 (Special Issue on Multidisciplinary Innovation in Engineering Science & Technology 2020) & Section Information Systems in Computer Science (CIS))
Open AccessArticle
6 Pages, 691 KB Download PDF

Dynamics Model and Design of SMC-type-PID Control for 4DOF Car Motion Simulator

Advances in Science, Technology and Engineering Systems Journal, Volume 5, Issue 3, Page # 557–562, 2020; DOI: 10.25046/aj050369
Abstract:

4-DOF car motion simulator helps to simulate real-life experiences that drivers do not have the opportunity to access the real environment. The dynamics equation of 4-DOF car motion simulator is a very complex problem with many uncertain parameters, so it requires intelligent control algorithms. Sliding mode controller (SMC) can achieve good tracking performance and robustness…

Read More
(This article belongs to Section Robotics (ROB))
Open AccessArticle
7 Pages, 750 KB Download PDF

Risk Management: The Case of Intrusion Detection using Data Mining Techniques

Advances in Science, Technology and Engineering Systems Journal, Volume 5, Issue 3, Page # 529–535, 2020; DOI: 10.25046/aj050365
Abstract:

Every institution nowadays relies on their online system and framework to do businesses. Such procedures need more attention due to the massive amount of attacks that occurs. These procedures have to go first through the management team of the institution, in order to prevent exploits of the attackers. Thus, the risk management can easily control…

Read More
(This article belongs to Section Information Systems in Computer Science (CIS))
Open AccessArticle
11 Pages, 2,283 KB Download PDF

A Survey and an IoT Cybersecurity Recommendation for Public and Private Hospitals in Ecuador

Advances in Science, Technology and Engineering Systems Journal, Volume 5, Issue 3, Page # 518–528, 2020; DOI: 10.25046/aj050364
Abstract:

It was analyzed the reference information on Cybersecurity architectures, models, standards, evaluations, mechanisms, and procedures applied to IoT domains, and public and private health area. The problem is the lack of proposals for IoT Cybersecurity in public and private hospitals to minimize random failures, ensure the privacy of personal data of patients, avoid the paralysis…

Read More
(This article belongs to Section Interdisciplinary Applications of Computer Science (CSI))
Open AccessArticle
8 Pages, 858 KB Download PDF

The Application of Mobile Learning Technologies at Malaysian Universities Through Mind Mapping Apps for Augmenting Writing Performance

Advances in Science, Technology and Engineering Systems Journal, Volume 5, Issue 3, Page # 510–517, 2020; DOI: 10.25046/aj050363
Abstract:

21st century learning focuses on the flow of information, media, and technology. In Malaysia, many university students face problems in English writing. Thus, students should be exposed to the technology training in innovative ways to produce students with a dynamic in this ever-changing world. Recently, the transformation and the evolution of mobile have created a…

Read More
(This article belongs to Section Interdisciplinary Applications of Computer Science (CSI))
Open AccessArticle
7 Pages, 500 KB Download PDF

A Solution Applying the Law on Road Traffic into A Set of Constraints to Establish A Motion Trajectory for Autonomous Vehicle

Advances in Science, Technology and Engineering Systems Journal, Volume 5, Issue 3, Page # 450–456, 2020; DOI: 10.25046/aj050356
Abstract:

With a model predictive control approach and to set the motion trajectory for an autonomous vehicle in situations where emergency braking cannot be performed, in this paper, we propose a solution to apply the law on road traffic into a set of constraints and thereby build an objective function to create motion trajectory for autonomous…

Read More
(This article belongs to the SP9 (Special Issue on Multidisciplinary Innovation in Engineering Science & Technology 2020) & Section Automation & Control Systems (ACS))
Open AccessArticle
13 Pages, 2,006 KB Download PDF

The Design of an Experimental Model for Deploying Home Area Network in Smart Grid

Advances in Science, Technology and Engineering Systems Journal, Volume 5, Issue 3, Page # 419–431, 2020; DOI: 10.25046/aj050353
Abstract:

In the smart power grid, designing an efficient and reliable communication architecture has an important role in improving efficiency, and maintaining the connectivity of different network components. The home area network (HAN) provides an energy management system in houses since it enables home energy control and monitoring. So, it is imperative to determine a HAN…

Read More
(This article belongs to Section Information Systems in Computer Science (CIS))
Open AccessArticle
7 Pages, 930 KB Download PDF

A Hybrid Approach for Intrusion Detection using Integrated K-Means based ANN with PSO Optimization

Advances in Science, Technology and Engineering Systems Journal, Volume 5, Issue 3, Page # 317–323, 2020; DOI: 10.25046/aj050341
Abstract:

Many advances in computer systems and IT infrastructures increases the risks associated with the use of these technologies. Specifically, intrusion into computer systems by unauthorized users is a growing problem and it is very challenging to detect. Intrusion detection technologies are therefore becoming extremely important to improve the overall security of computer systems. In the…

Read More
(This article belongs to the SP9 (Special Issue on Multidisciplinary Innovation in Engineering Science & Technology 2020) & Section Interdisciplinary Applications of Computer Science (CSI))
Open AccessArticle
7 Pages, 1,204 KB Download PDF

Controller Design Using Backstepping Algorithm for Fixed-Wing UAV with Thrust Vectoring System

Advances in Science, Technology and Engineering Systems Journal, Volume 5, Issue 3, Page # 284–290, 2020; DOI: 10.25046/aj050337
Abstract:

This paper describes the design method of a nonlinear flight controller for a fixed-wing UAV with a thrust vectoring system (TVS) using the backstepping method. The flight dynamics of the UAV exhibits strong nonlinear coupling behavior between its translational and rotational motion. The backstepping algorithm has been successfully applied to controller design for such a…

Read More
(This article belongs to the SP8 (Special Issue on Multidisciplinary Sciences and Engineering 2019-20) & Section Aerospace Engineering (EAR))
Open AccessArticle
6 Pages, 183 KB Download PDF

Trajectory Tracking Control of a DC Motor Exposed to a Replay-Attack

Advances in Science, Technology and Engineering Systems Journal, Volume 5, Issue 3, Page # 264–269, 2020; DOI: 10.25046/aj050334
Abstract:

This paper investigates the trajectory tracking control (TTC) problem of a networked control system (NCS) against a replay-attack. The impact of data packet dropout and communication delay on the wireless network are taken into account. A new mathematical representation of the NCS under network issues (packet dropout, delay, and replay-attack) is proposed, the resulting closed-loop…

Read More
(This article belongs to the SP9 (Special Issue on Multidisciplinary Innovation in Engineering Science & Technology 2020) & Section Automation & Control Systems (ACS))
Open AccessArticle
5 Pages, 984 KB Download PDF

Enhanced Collaborative Constellation for Visible Light Communication System

Advances in Science, Technology and Engineering Systems Journal, Volume 5, Issue 3, Page # 259–263, 2020; DOI: 10.25046/aj050333
Abstract:

Visible light communication (VLC) that simultaneously gives illumination and information transmission abilities, is recognized as a hopeful competitor for prospective wireless net- works. Furthermore, a channel adaptive collaborative constellation (CASCC) with the capacity of adapting according to the channel condition to enhance the bit error rate (BER) while concurrently improving the versatility of the receiver…

Read More
(This article belongs to the SP9 (Special Issue on Multidisciplinary Innovation in Engineering Science & Technology 2020) & Section Optics (OPT))
Open AccessArticle
5 Pages, 650 KB Download PDF

A Review on Autonomous Mobile Robot Path Planning Algorithms

Advances in Science, Technology and Engineering Systems Journal, Volume 5, Issue 3, Page # 236–240, 2020; DOI: 10.25046/aj050330
Abstract:

The emerging trend of modern industry automation requires intelligence to be embedded into mobile robot for ensuring optimal or near-optimal solutions to execute certain task. This yield to a lot of improvement and suggestions in many areas related to mobile robot such as path planning. The purpose of this paper is to review the mobile…

Read More
(This article belongs to Section Applied Mathematics (MAP))
Open AccessArticle
7 Pages, 768 KB Download PDF

Generating a Blockchain Smart Contract Application Framework

Advances in Science, Technology and Engineering Systems Journal, Volume 5, Issue 3, Page # 191–197, 2020; DOI: 10.25046/aj050325
Abstract:

Blockchain is a new generation technology that allows the central control mechanism or trusted authority to be removed, spreading the encrypted data across all participants in the network in a distributed database structure instead of central trust. The Smart Contract structure, which defines the rules and flow that allow the things we value to operate…

Read More
(This article belongs to Section Interdisciplinary Applications of Computer Science (CSI))
Open AccessArticle
5 Pages, 1,698 KB Download PDF

A Perturbation Finite Element Approach for Correcting Inaccuracies on Thin Shell Models with the Magnetic Field Formulation

Advances in Science, Technology and Engineering Systems Journal, Volume 5, Issue 3, Page # 166–170, 2020; DOI: 10.25046/aj050322
Abstract:

This research makes the improvement of the errors surrounding edges and corners of thin electromagnetic regions by means of the magnetic field finite element formulation. Classical thin shell electromagnetic models are usually replaced by impedance-type interface conditions throughout surfaces that ignore errors in the calculation of the local fields (magnetic vector potentials, magnetic fields, eddy…

Read More
(This article belongs to Section Electrical Engineering (ELE))
Open AccessArticle
8 Pages, 1,241 KB Download PDF

Non Parallelism and Cayley-Menger Determinant in Submerged Localization

Advances in Science, Technology and Engineering Systems Journal, Volume 5, Issue 3, Page # 150–157, 2020; DOI: 10.25046/aj050320
Abstract:

This research paper portraits the technique to determine location of submerged nodes with Cayley-Menger determinant and associated problems with non-parallel states. Cayley-Menger determinant is considered to be the usual means to determine the coordinates of the nodes with a single node where the plane of beacon i.e. beacon’s surfing plane and the plane created by…

Read More
(This article belongs to the SP8 (Special Issue on Multidisciplinary Sciences and Engineering 2019-20) & Section Network Engineering (ENW))
Open AccessArticle
10 Pages, 703 KB Download PDF

Intrusion Detection in Cyber Security: Role of Machine Learning and Data Mining in Cyber Security

Advances in Science, Technology and Engineering Systems Journal, Volume 5, Issue 3, Page # 72–81, 2020; DOI: 10.25046/aj050310
Abstract:

In recent years, cyber security has been received interest from several research communities with respect to Intrusion Detection System (IDS). Cyber security is “a fast-growing field demanding a great deal of attention because of remarkable progresses in social networks, cloud and web technologies, online banking, mobile environment, smart grid, etc.” An IDS is a software…

Read More
(This article belongs to Section Hardware & Architecture in Computer Science (CHA))
Open AccessArticle
6 Pages, 788 KB Download PDF

Centralized System of Universities Learning Materials

Advances in Science, Technology and Engineering Systems Journal, Volume 5, Issue 3, Page # 28–33, 2020; DOI: 10.25046/aj050304
Abstract:

This article considers the creation of a program / website as an example of a centralized system for all universities in order to more easily familiarize an applicant and / or student with the internal politics and capabilities of the university. Existing problems in the training system are examined, why distance learning is relevant, what…

Read More
(This article belongs to the SP8 (Special Issue on Multidisciplinary Sciences and Engineering 2019-20) & Section Interdisciplinary Applications of Computer Science (CSI))
1 8 9 10 11 12 18

Journal Menu

Journal Browser


Special Issues

Special Issue on Digital Frontiers of Entrepreneurship: Integrating AI, Gender Equity, and Sustainable Futures
Guest Editors: Dr. Muhammad Nawaz Tunio, Dr. Aamir Rashid, Dr. Imamuddin Khoso
Deadline: 30 May 2026

Special Issue on Sustainable Technologies for a Resilient Future
Guest Editors: Dr. Debasis Mitra, Dr. Sourav Chattaraj, Dr. Addisu Assefa
Deadline: 30 April 2026