Search Results

Results (318)

Search Parameters:

Keyword: MAC
Order results
Results per page
Open AccessArticle
5 Pages, 725 KB Download PDF

TPMTM: Topic Modeling over Papers’ Abstract

Advances in Science, Technology and Engineering Systems Journal, Volume 3, Issue 2, Page # 69–73, 2018; DOI: 10.25046/aj030208
Abstract:

Probabilities topic models are active research area in text mining, machine learning, information retrieval, etc. Most of the current statistical topic modeling methods, such as Probabilistic Latent Semantic Analysis (pLSA) and Latent Dirichlet Allocation (LDA). They are used to build models from unstructured text and produce a term-based representation to describe a topic by choosing…

Read More
(This article belongs to the SP4 (Special issue on Advancement in Engineering Technology 2017-18) & Section Interdisciplinary Applications of Computer Science (CSI))
Open AccessArticle
9 Pages, 1,662 KB Download PDF

An Advanced Algorithm Combining SVM and ANN Classifiers to Categorize Tumor with Position from Brain MRI Images

Advances in Science, Technology and Engineering Systems Journal, Volume 3, Issue 2, Page # 40–48, 2018; DOI: 10.25046/aj030205
Abstract:

Brain tumor is such an abnormality of brain tissue that causes brain hemorrhage. Therefore, apposite detections of brain tumor, its size, and position are the foremost condition for the remedy. To obtain better performance in brain tumor and its stages detection as well as its position in MRI images, this research work proposes an advanced…

Read More
(This article belongs to the SP4 (Special issue on Advancement in Engineering Technology 2017-18) & Section Artificial Intelligence in Computer Science (CAI))
Open AccessArticle
12 Pages, 931 KB Download PDF

Software and Hardware Enhancement of Convolutional Neural Networks on GPGPUs

Advances in Science, Technology and Engineering Systems Journal, Volume 3, Issue 2, Page # 28–39, 2018; DOI: 10.25046/aj030204
Abstract:

Convolutional Neural Networks (CNNs) have gained attention in recent years for their ability to perform complex machine learning tasks with high accuracy and resilient to noise of inputs. The time-consuming convolution operations of CNNs pose great challenges to both software as well as hardware designers. To achieve superior performance, a design involves careful concerns between…

Read More
(This article belongs to the SP4 (Special issue on Advancement in Engineering Technology 2017-18) & Section Software Engineering in Computer Science (CSE))
Open AccessArticle
13 Pages, 1,719 KB Download PDF

Cancer Mediating Genes Recognition using Multilayer Perceptron Model- An Application on Human Leukemia

Advances in Science, Technology and Engineering Systems Journal, Volume 3, Issue 2, Page # 8–20, 2018; DOI: 10.25046/aj030202
Abstract:

In the present article, we develop multilayer perceptron model for identification of some possible genes mediating different leukemia. The procedure involves grouping of gene based correlation coefficient and finally select of some possible genes. The procedure has been successfully applied three human leukemia gene expression data sets. The superiority of the procedure has been demonstrated…

Read More
(This article belongs to the SP4 (Special issue on Advancement in Engineering Technology 2017-18) & Section Artificial Intelligence in Computer Science (CAI))
Open AccessArticle
16 Pages, 3,319 KB Download PDF

Two-Stage Performance Engineering of Container-based Virtualization

Advances in Science, Technology and Engineering Systems Journal, Volume 3, Issue 1, Page # 521–536, 2018; DOI: 10.25046/aj030163
Abstract:

Cloud computing has become a compelling paradigm built on compute and storage virtualization technologies. The current virtualization solution in the Cloud widely relies on hypervisor-based technologies. Given the recent booming of the container ecosystem, the container-based virtualization starts receiving more attention for being a promising alternative. Although the container technologies are generally considered to be…

Read More
(This article belongs to the SP4 (Special issue on Advancement in Engineering Technology 2017-18) & Section Information Systems in Computer Science (CIS))
Open AccessArticle
6 Pages, 621 KB Download PDF

An Analysis of K-means Algorithm Based Network Intrusion Detection System

Advances in Science, Technology and Engineering Systems Journal, Volume 3, Issue 1, Page # 496–501, 2018; DOI: 10.25046/aj030160
Abstract:

In this modern age, information technology (IT) plays a role in a number of different fields. And therefore, the role of security is very important to control and assist the flow of activities over the network. Intrusion detection (ID) is a kind of security management system for computers and networks. There are many approaches and…

Read More
(This article belongs to the SP4 (Special issue on Advancement in Engineering Technology 2017-18) & Section Interdisciplinary Applications of Computer Science (CSI))
Open AccessArticle
6 Pages, 2,704 KB Download PDF

Signal-Based Metamodels for Predictive Reliability Analysis and Virtual Testing

Advances in Science, Technology and Engineering Systems Journal, Volume 3, Issue 1, Page # 342–347, 2018; DOI: 10.25046/aj030141
Abstract:

In the current industrial development, an increasing number of sensors is applied for monitoring of any kind of appliances and machines. A predictive mathematical model allows for realistic assessment of the health state of the appliance, indication of service requirements, as well as control of the appliance, serving as so-called digital twin on a control…

Read More
(This article belongs to the SP4 (Special issue on Advancement in Engineering Technology 2017-18) & Section Aerospace Engineering (EAR))
Open AccessArticle
7 Pages, 712 KB Download PDF

A Dynamic Reallocation Based Window Access Scheme for Enhancing QoS of Vehicular Ad-hoc Networks (VANETs)

Advances in Science, Technology and Engineering Systems Journal, Volume 3, Issue 1, Page # 322–328, 2018; DOI: 10.25046/aj030139
Abstract:

This article proposes a new MAC scheme for Vehicle-to-Infrastructure (V2I) communications that dynamically reallocates unused TDMA slots. By maintaining a balanced waiting time, the proposed TDMA based scheduling scheme allocates TDMA slots in a rational way to minimize merging and one-hop neighboring collision. The proposed scheme ensures dynamic reallocation of unused slots by using “time…

Read More
(This article belongs to the SP4 (Special issue on Advancement in Engineering Technology 2017-18) & Section Telecommunications (TEL))
Open AccessArticle
7 Pages, 712 KB Download PDF

Estimation of digital protection devices applicability on basis of multiple characterizing parameters

Advances in Science, Technology and Engineering Systems Journal, Volume 3, Issue 1, Page # 198–204, 2018; DOI: 10.25046/aj030123
Abstract:

The contemporary electrical power systems (EPS) impose increased requirements for the functionality of the protection systems. The necessity of improved EPS stability is in some extent resulting of the increased integration of renewable sources of electrical energy. The future grid development gives perspective for connection of more converter based generations. The power electronic schemes and…

Read More
(This article belongs to Section Electrical Engineering (ELE))
Open AccessArticle
9 Pages, 959 KB Download PDF

Auto-Encoder based Deep Learning for Surface Electromyography Signal Processing

Advances in Science, Technology and Engineering Systems Journal, Volume 3, Issue 1, Page # 94–102, 2018; DOI: 10.25046/aj030111
Abstract:

Feature extraction is taking a very vital and essential part of bio-signal processing. We need to choose one of two paths to identify and select features in any system. The most popular track is engineering handcrafted, which mainly depends on the user experience and the field of application. While the other path is feature learning,…

Read More
(This article belongs to the SP4 (Special issue on Advancement in Engineering Technology 2017-18) & Section Artificial Intelligence in Computer Science (CAI))
Open AccessArticle
5 Pages, 744 KB Download PDF

Virtual Memory Introspection Framework for Cyber Threat Detection in Virtual Environment

Advances in Science, Technology and Engineering Systems Journal, Volume 3, Issue 1, Page # 25–29, 2018; DOI: 10.25046/aj030104
Abstract:

In today’s information based world, it is increasingly important to safeguard the data owned by any organization, be it intellectual property or personal information. With ever increasing sophistication of malware, it is imperative to come up with an automated and advanced methods of attack vector recognition and isolation. Existing methods are not dynamic enough to…

Read More
(This article belongs to the SP4 (Special issue on Advancement in Engineering Technology 2017-18) & Section Interdisciplinary Applications of Computer Science (CSI))
Open AccessArticle
14 Pages, 2,481 KB Download PDF

Novel Analysis of Synchronous and Induction Generators in Parallel Operation Mode in an Isolated Electric System

Advances in Science, Technology and Engineering Systems Journal, Volume 2, Issue 6, Page # 203–216, 2017; DOI: 10.25046/aj020625
Abstract:

This paper presents an analysis of a parallel connection of one synchronous generator and one self-excited induction generator that feeds a resistive load and an Induction Motor. The system voltage and frequency are controlled by a voltage control loop and a speed control loop connected to synchronous generator. The induction generator speed is controlled by…

Read More
(This article belongs to the SP4 (Special issue on Advancement in Engineering Technology 2017-18) & Section Electrical Engineering (ELE))
Open AccessArticle
13 Pages, 383 KB Download PDF

Mealy-to-Moore Transformation – A state stable design of automata

Advances in Science, Technology and Engineering Systems Journal, Volume 2, Issue 6, Page # 162–174, 2017; DOI: 10.25046/aj020621
Abstract:

The paper shows a method of transforming an asynchronously feedbacked Mealy machine into a Moore machine. The transformation is done in dual-rail logic under the use of the RS-buffer. The transformed machine stabilizes itself and is safe to use. The transformation is visualized via KV-diagrams and calculated with formulas. We will present three use-cases for…

Read More
(This article belongs to the SP4 (Special issue on Advancement in Engineering Technology 2017-18) & Section Electronic Engineering (EEE))
Open AccessArticle
5 Pages, 1,186 KB Download PDF

Numerical evaluation of ABS parts fabricated by fused deposition modeling and vapor smoothing

Advances in Science, Technology and Engineering Systems Journal, Volume 2, Issue 6, Page # 157–161, 2017; DOI: 10.25046/aj020620
Abstract:

The automotive industry has focused to use polymer materials in order to increase energy efficiency. So, the industry pays attention to use 3D printing technologies using several polymers. Among several 3D printer technologies, fused deposition modeling (FDM) is one of the popular 3D printing technologies due to an inexpensive extrusion machine and multi-material printing. FDM…

Read More
(This article belongs to the SP4 (Special issue on Advancement in Engineering Technology 2017-18) & Section Manufacturing Engineering (EMF))
Open AccessArticle
6 Pages, 745 KB Download PDF

Modelling and Analysis of Radial Flux Surface Mounted Direct-Driven PMSG in Small Scale Wind Turbine

Advances in Science, Technology and Engineering Systems Journal, Volume 2, Issue 6, Page # 94–99, 2017; DOI: 10.25046/aj020612
Abstract:

This paper presents the modelling and analysis of permanent magnet synchronous generator (PMSG) which are used in direct driven small scale wind turbines. The 3 kW PM generator which is driven directly without gear system is analyzed by Ansoft Maxwell 2D RMxprt. The performance analysis of generator includes the cogging torque in two teeth, induced…

Read More
(This article belongs to the SP4 (Special issue on Advancement in Engineering Technology 2017-18) & Section Electrical Engineering (ELE))
Open AccessArticle
16 Pages, 988 KB Download PDF

Pluggable Controllers and Nano-Patterns in Java with Lola

Advances in Science, Technology and Engineering Systems Journal, Volume 2, Issue 3, Page # 1711–1726, 2017; DOI: 10.25046/aj0203211
Abstract:

Pluggable controllers are a different way to design control constructors such as if, while, do, switch, and operators such as short circuit con-junction (&&) and the “?.” operator of the Swift programming language. Adoption of pluggable controllers enables the final user to modify and extend the control flow constructs (if, while, etc.) of an underlying…

Read More
(This article belongs to the SP3 (Special issue on Recent Advances in Engineering Systems 2017) & Section Information Systems in Computer Science (CIS))
Open AccessArticle
16 Pages, 2,101 KB Download PDF

Modeling Double Subjectivity for Gaining Programmable Insights: Framing the Case of Uber

Advances in Science, Technology and Engineering Systems Journal, Volume 2, Issue 3, Page # 1677–1692, 2017; DOI: 10.25046/aj0203209
Abstract:

The Internet is the premier platform that enable the emergence of new technologies. Online news is unstructured narrative text that embeds facts, frames, and amplification that can influence society attitudes about technology adoption. Online news sources are carriers of voluminous amounts of news for reaching significantly large audience and have no geographical or time boundaries.…

Read More
(This article belongs to the SP3 (Special issue on Recent Advances in Engineering Systems 2017) & Section Interdisciplinary Applications of Computer Science (CSI))
Open AccessArticle
7 Pages, 354 KB Download PDF

Theoretical developments for interpreting kernel spectral clustering from alternative viewpoints

Advances in Science, Technology and Engineering Systems Journal, Volume 2, Issue 3, Page # 1670–1676, 2017; DOI: 10.25046/aj0203208
Abstract:

To perform an exploration process over complex structured data within unsupervised settings, the so-called kernel spectral clustering (KSC) is one of the most recommended and appealing approaches, given its versatility and elegant formulation. In this work, we explore the relationship between (KSC) and other well-known approaches, namely normalized cut clustering and kernel k-means. To do…

Read More
(This article belongs to the SP3 (Special issue on Recent Advances in Engineering Systems 2017) & Section Artificial Intelligence in Computer Science (CAI))
Open AccessArticle
10 Pages, 5,355 KB Download PDF

Soft Handoff Evaluation and Efficient Access Network Selection in Next Generation Cellular Systems

Advances in Science, Technology and Engineering Systems Journal, Volume 2, Issue 3, Page # 1616–1625, 2017; DOI: 10.25046/aj0203201
Abstract:

The increased motivation (by service providers) to offer user-centric and seamless communication services – that satisfies users’ quality of experience (QoE), has manifested a myriad of challenges in the field of wireless communication; and given the increased traffic capacity and sudden explosion of cellular devices, communication systems are constantly threatened by performance related issues –…

Read More
(This article belongs to the SP3 (Special issue on Recent Advances in Engineering Systems 2017) & Section Telecommunications (TEL))
Open AccessArticle
7 Pages, 1,603 KB Download PDF

Modeling and Control of Collaborative Robot System using Haptic Feedback

Advances in Science, Technology and Engineering Systems Journal, Volume 2, Issue 3, Page # 1549–1555, 2017; DOI: 10.25046/aj0203193
Abstract:

When two robot systems can share understanding using any agreed knowledge, within the constraints of the system’s communication protocol, the approach may lead to a common improvement. This has persuaded numerous new research inquiries in human-robot collaboration. We have built up a framework prepared to do independent following and performing table-best protest object manipulation with…

Read More
(This article belongs to the SP3 (Special issue on Recent Advances in Engineering Systems 2017) & Section Automation & Control Systems (ACS))
Open AccessArticle
6 Pages, 917 KB Download PDF

A comparative study for using the LBC format for compressing static medical images

Advances in Science, Technology and Engineering Systems Journal, Volume 2, Issue 3, Page # 1472–1477, 2017; DOI: 10.25046/aj0203184
Abstract:

This paper is an extension of work originally presented at conference Applied Machine Intelligence and Informatics (SAMI), 2017 IEEE 13th International Symposium. The article performs a comparative study between the image compression technique Local Binary Compressed format (LBC) proposed by the authors and the standard image compression techniques used today (BMP, JPEG, PNG and GIF).…

Read More
(This article belongs to the SP3 (Special issue on Recent Advances in Engineering Systems 2017) & Section Artificial Intelligence in Computer Science (CAI))
Open AccessArticle
9 Pages, 761 KB Download PDF

Evaluating the Effect of Mozart Music and White Noise on Electroencephalography Pattern toward Visual Memory

Advances in Science, Technology and Engineering Systems Journal, Volume 2, Issue 3, Page # 1372–1380, 2017; DOI: 10.25046/aj0203173
Abstract:

Listening to auditory stimuli during study can give positive and negative influence on human cognitive processing. Thus, it has attracted researchers to conduct studies using various types of auditory stimuli. Some researchers believe that Mozart music and white noise are able to give positive influence on cognitive performance. However, most of the past studies gave…

Read More
(This article belongs to the SP3 (Special issue on Recent Advances in Engineering Systems 2017) & Section Artificial Intelligence in Computer Science (CAI))
Open AccessArticle
8 Pages, 445 KB Download PDF

Towards Deployment Strategies for Deception Systems

Advances in Science, Technology and Engineering Systems Journal, Volume 2, Issue 3, Page # 1272–1279, 2017; DOI: 10.25046/aj0203161
Abstract:

Network security is often built on perimeter defense. Sophisticated attacks are able to penetrate the perimeter and access valuable resources in the network. A more complete defense strategy also contains mechanisms to detect and mitigate perimeter breaches. Deceptive systems are a promising technology to detect, deceive and counter infiltration. In this work we provide an…

Read More
(This article belongs to the SP3 (Special issue on Recent Advances in Engineering Systems 2017) & Section Information Systems in Computer Science (CIS))
Open AccessArticle
7 Pages, 2,135 KB Download PDF

Rotary Cutting of Electrical Steel Laminations – A Contrast to Traditional Stamping

Advances in Science, Technology and Engineering Systems Journal, Volume 2, Issue 3, Page # 1107–1113, 2017; DOI: 10.25046/aj0203140
Abstract:

Rotary cutting of electrical steel laminations is a novel, promising alternative in the processing of electrical steel strip with enormous economical and technical potentials. This paper is an extension of work originally presented on the 6th International Electric Drives Production Conference (E|DPC) in Nuremberg, Germany 2016. The scope of this paper includes a theoretical description…

Read More
(This article belongs to the SP3 (Special issue on Recent Advances in Engineering Systems 2017) & Section Mechanical Engineering (EMH))
Open AccessArticle
10 Pages, 677 KB Download PDF

Ensemble of Neural Network Conditional Random Fields for Self-Paced Brain Computer Interfaces

Advances in Science, Technology and Engineering Systems Journal, Volume 2, Issue 3, Page # 996–1005, 2017; DOI: 10.25046/aj0203126
Abstract:

Classification of EEG signals in self-paced Brain Computer Interfaces (BCI) is an extremely challenging task. The main difficulty stems from the fact that start time of a control task is not defined. Therefore it is imperative to exploit the characteristics of the EEG data to the extent possible. In sensory motor self-paced BCIs, while performing…

Read More
(This article belongs to the SP3 (Special issue on Recent Advances in Engineering Systems 2017) & Section Artificial Intelligence in Computer Science (CAI))

Journal Menu

Journal Browser


Special Issues

Special Issue on Digital Frontiers of Entrepreneurship: Integrating AI, Gender Equity, and Sustainable Futures
Guest Editors: Dr. Muhammad Nawaz Tunio, Dr. Aamir Rashid, Dr. Imamuddin Khoso
Deadline: 30 May 2026

Special Issue on Indigenous Knowledge Systems of the Tribal Communities of the Asia Pacific
Guest Editors: Dr. Anurag Hazarika
Deadline: 31 October 2026

Special Issue on Sustainable Technologies for a Resilient Future
Guest Editors: Dr. Debasis Mitra, Dr. Sourav Chattaraj, Dr. Addisu Assefa
Deadline: 30 April 2026