Search Results

Results (398)

Search Parameters:

Keyword: Learning
Order results
Results per page
Open AccessArticle
5 Pages, 725 KB Download PDF

TPMTM: Topic Modeling over Papers’ Abstract

Advances in Science, Technology and Engineering Systems Journal, Volume 3, Issue 2, Page # 69–73, 2018; DOI: 10.25046/aj030208
Abstract:

Probabilities topic models are active research area in text mining, machine learning, information retrieval, etc. Most of the current statistical topic modeling methods, such as Probabilistic Latent Semantic Analysis (pLSA) and Latent Dirichlet Allocation (LDA). They are used to build models from unstructured text and produce a term-based representation to describe a topic by choosing…

Read More
(This article belongs to the SP4 (Special issue on Advancement in Engineering Technology 2017-18) & Section Interdisciplinary Applications of Computer Science (CSI))
Open AccessArticle
9 Pages, 1,662 KB Download PDF

An Advanced Algorithm Combining SVM and ANN Classifiers to Categorize Tumor with Position from Brain MRI Images

Advances in Science, Technology and Engineering Systems Journal, Volume 3, Issue 2, Page # 40–48, 2018; DOI: 10.25046/aj030205
Abstract:

Brain tumor is such an abnormality of brain tissue that causes brain hemorrhage. Therefore, apposite detections of brain tumor, its size, and position are the foremost condition for the remedy. To obtain better performance in brain tumor and its stages detection as well as its position in MRI images, this research work proposes an advanced…

Read More
(This article belongs to the SP4 (Special issue on Advancement in Engineering Technology 2017-18) & Section Artificial Intelligence in Computer Science (CAI))
Open AccessArticle
12 Pages, 931 KB Download PDF

Software and Hardware Enhancement of Convolutional Neural Networks on GPGPUs

Advances in Science, Technology and Engineering Systems Journal, Volume 3, Issue 2, Page # 28–39, 2018; DOI: 10.25046/aj030204
Abstract:

Convolutional Neural Networks (CNNs) have gained attention in recent years for their ability to perform complex machine learning tasks with high accuracy and resilient to noise of inputs. The time-consuming convolution operations of CNNs pose great challenges to both software as well as hardware designers. To achieve superior performance, a design involves careful concerns between…

Read More
(This article belongs to the SP4 (Special issue on Advancement in Engineering Technology 2017-18) & Section Software Engineering in Computer Science (CSE))
Open AccessArticle
6 Pages, 621 KB Download PDF

An Analysis of K-means Algorithm Based Network Intrusion Detection System

Advances in Science, Technology and Engineering Systems Journal, Volume 3, Issue 1, Page # 496–501, 2018; DOI: 10.25046/aj030160
Abstract:

In this modern age, information technology (IT) plays a role in a number of different fields. And therefore, the role of security is very important to control and assist the flow of activities over the network. Intrusion detection (ID) is a kind of security management system for computers and networks. There are many approaches and…

Read More
(This article belongs to the SP4 (Special issue on Advancement in Engineering Technology 2017-18) & Section Interdisciplinary Applications of Computer Science (CSI))
Open AccessArticle
9 Pages, 1,359 KB Download PDF

Innovative Research on the Development of Game-based Tourism Information Services Using Component-based Software Engineering

Advances in Science, Technology and Engineering Systems Journal, Volume 3, Issue 1, Page # 451–459, 2018; DOI: 10.25046/aj030155
Abstract:

In recent years, a number of studies have been conducted exploring the potential of digital tour guides, that is, multimedia components (e.g., 2D graphic, 3D models, and sound effects) that can be integrated into digital storytelling with location-based services. This study uses component-based software engineering to develop the content of game-based tourism information services. The…

Read More
(This article belongs to the SP4 (Special issue on Advancement in Engineering Technology 2017-18) & Section Interdisciplinary Applications of Computer Science (CSI))
Open AccessArticle
5 Pages, 744 KB Download PDF

Virtual Memory Introspection Framework for Cyber Threat Detection in Virtual Environment

Advances in Science, Technology and Engineering Systems Journal, Volume 3, Issue 1, Page # 25–29, 2018; DOI: 10.25046/aj030104
Abstract:

In today’s information based world, it is increasingly important to safeguard the data owned by any organization, be it intellectual property or personal information. With ever increasing sophistication of malware, it is imperative to come up with an automated and advanced methods of attack vector recognition and isolation. Existing methods are not dynamic enough to…

Read More
(This article belongs to the SP4 (Special issue on Advancement in Engineering Technology 2017-18) & Section Interdisciplinary Applications of Computer Science (CSI))
Open AccessArticle
12 Pages, 1,921 KB Download PDF

Cognitive Cybernetics vs. Captology

Advances in Science, Technology and Engineering Systems Journal, Volume 2, Issue 6, Page # 107–118, 2017; DOI: 10.25046/aj020614
Abstract:

In acronym Captology – Computers as Persuasive Technology, a persuasive component (lat. persuasibilibus – enticing) refers to the persuasive stimulation by intelligent technologies. Latter being transitive and interactive as intelligent systems, they have imposed, by their persuasivity, a ‘cult of information’, after which information has become a type of goods that as a utilitarian resource…

Read More
(This article belongs to the SP4 (Special issue on Advancement in Engineering Technology 2017-18) & Section Information Systems in Computer Science (CIS))
Open AccessArticle
16 Pages, 2,101 KB Download PDF

Modeling Double Subjectivity for Gaining Programmable Insights: Framing the Case of Uber

Advances in Science, Technology and Engineering Systems Journal, Volume 2, Issue 3, Page # 1677–1692, 2017; DOI: 10.25046/aj0203209
Abstract:

The Internet is the premier platform that enable the emergence of new technologies. Online news is unstructured narrative text that embeds facts, frames, and amplification that can influence society attitudes about technology adoption. Online news sources are carriers of voluminous amounts of news for reaching significantly large audience and have no geographical or time boundaries.…

Read More
(This article belongs to the SP3 (Special issue on Recent Advances in Engineering Systems 2017) & Section Interdisciplinary Applications of Computer Science (CSI))
Open AccessArticle
10 Pages, 5,355 KB Download PDF

Soft Handoff Evaluation and Efficient Access Network Selection in Next Generation Cellular Systems

Advances in Science, Technology and Engineering Systems Journal, Volume 2, Issue 3, Page # 1616–1625, 2017; DOI: 10.25046/aj0203201
Abstract:

The increased motivation (by service providers) to offer user-centric and seamless communication services – that satisfies users’ quality of experience (QoE), has manifested a myriad of challenges in the field of wireless communication; and given the increased traffic capacity and sudden explosion of cellular devices, communication systems are constantly threatened by performance related issues –…

Read More
(This article belongs to the SP3 (Special issue on Recent Advances in Engineering Systems 2017) & Section Telecommunications (TEL))
Open AccessArticle
8 Pages, 445 KB Download PDF

Towards Deployment Strategies for Deception Systems

Advances in Science, Technology and Engineering Systems Journal, Volume 2, Issue 3, Page # 1272–1279, 2017; DOI: 10.25046/aj0203161
Abstract:

Network security is often built on perimeter defense. Sophisticated attacks are able to penetrate the perimeter and access valuable resources in the network. A more complete defense strategy also contains mechanisms to detect and mitigate perimeter breaches. Deceptive systems are a promising technology to detect, deceive and counter infiltration. In this work we provide an…

Read More
(This article belongs to the SP3 (Special issue on Recent Advances in Engineering Systems 2017) & Section Information Systems in Computer Science (CIS))
Open AccessArticle
4 Pages, 673 KB Download PDF

Efficient Tensor Strategy for Recommendation

Advances in Science, Technology and Engineering Systems Journal, Volume 2, Issue 4, Page # 111–114, 2017; DOI: 10.25046/aj020415
Abstract:

The era of big data has witnessed the explosion of tensor datasets, and large scale Probabilistic Tensor Factorization (PTF) analysis is important to accommodate such increasing trend of data. Sparsity, and Cold-Start are some of the inherent problems of recommender systems in the era of big data. This paper proposes a novel Sentiment-Based Probabilistic Tensor…

Read More
(This article belongs to Section Information Systems in Computer Science (CIS))
Open AccessArticle
10 Pages, 677 KB Download PDF

Ensemble of Neural Network Conditional Random Fields for Self-Paced Brain Computer Interfaces

Advances in Science, Technology and Engineering Systems Journal, Volume 2, Issue 3, Page # 996–1005, 2017; DOI: 10.25046/aj0203126
Abstract:

Classification of EEG signals in self-paced Brain Computer Interfaces (BCI) is an extremely challenging task. The main difficulty stems from the fact that start time of a control task is not defined. Therefore it is imperative to exploit the characteristics of the EEG data to the extent possible. In sensory motor self-paced BCIs, while performing…

Read More
(This article belongs to the SP3 (Special issue on Recent Advances in Engineering Systems 2017) & Section Artificial Intelligence in Computer Science (CAI))
Open AccessArticle
7 Pages, 391 KB Download PDF

Deterministic Approach to Detect Heart Sound Irregularities

Advances in Science, Technology and Engineering Systems Journal, Volume 2, Issue 3, Page # 974–980, 2017; DOI: 10.25046/aj0203123
Abstract:

A new method to detect heart sound that does not require machine learning is proposed. The heart sound is a time series event which is generated by the heart mechanical system. From the analysis of heart sound S-transform and the understanding of how heart works, it can be deducted that each heart sound component has…

Read More
(This article belongs to the SP3 (Special issue on Recent Advances in Engineering Systems 2017) & Section Biomedical Engineering (EBI))
Open AccessArticle
6 Pages, 931 KB Download PDF

Human Sit Down Position Detection Using Data Classification and Dimensionality Reduction

Advances in Science, Technology and Engineering Systems Journal, Volume 2, Issue 3, Page # 749–754, 2017; DOI: 10.25046/aj020395
Abstract:

The analysis of human sit down position is a research area allows for preventing health physical problems in the back. Many works have proposed systems that detect the sitting position, some open issues are still to be dealt with, such as: Cost, computational load, accuracy, portability, and among others. In this work, we present an…

Read More
(This article belongs to the SP3 (Special issue on Recent Advances in Engineering Systems 2017) & Section Biomedical Engineering (EBI))
Open AccessArticle
9 Pages, 1,946 KB Download PDF

Spatiotemporal Traffic State Prediction Based on Discriminatively Pre-trained Deep Neural Networks

Advances in Science, Technology and Engineering Systems Journal, Volume 2, Issue 3, Page # 678–686, 2017; DOI: 10.25046/aj020387
Abstract:

The availability of traffic data and computational advances now make it possible to build data-driven models that capture the evolution of the state of traffic along modeled stretches of road. These models are used for short-time prediction so that transportation facilities can be operated in an efficient way that guarantees a high level of service.…

Read More
(This article belongs to the SP3 (Special issue on Recent Advances in Engineering Systems 2017) & Section Artificial Intelligence in Computer Science (CAI))
Open AccessArticle
9 Pages, 5,165 KB Download PDF

Semantic-less Breach Detection of Polymorphic Malware in Federated Cloud

Advances in Science, Technology and Engineering Systems Journal, Volume 2, Issue 3, Page # 553–561, 2017; DOI: 10.25046/aj020371
Abstract:

Cloud computing is one of the largest emerging utility services that is expected to grow enormously over the next decade. Many organizations are moving into hybrid cloud/hosted computing models. Single cloud service provider introduces cost and environmental challenges. Also, multi-cloud solution implemented by the Cloud tenant is suboptimal as it requires expensive adaptation costs. Cloud…

Read More
(This article belongs to the SP3 (Special issue on Recent Advances in Engineering Systems 2017) & Section Interdisciplinary Applications of Computer Science (CSI))
Open AccessArticle
19 Pages, 1,686 KB Download PDF

A Computationally Intelligent Approach to the Detection of Wormhole Attacks in Wireless Sensor Networks

Advances in Science, Technology and Engineering Systems Journal, Volume 2, Issue 3, Page # 302–320, 2017; DOI: 10.25046/aj020340
Abstract:

A wormhole attack is one of the most critical and challenging security threats for wireless sensor networks because of its nature and ability to perform concealed malicious activities. This paper proposes an innovative wormhole detection scheme to detect wormhole attacks using computational intelligence and an artificial neural network (ANN). Most wormhole detection schemes reported in…

Read More
(This article belongs to the SP3 (Special issue on Recent Advances in Engineering Systems 2017) & Section Information Systems in Computer Science (CIS))
Open AccessArticle
12 Pages, 1,778 KB Download PDF

ADOxx Modelling Method Conceptualization Environment

Advances in Science, Technology and Engineering Systems Journal, Volume 2, Issue 3, Page # 125–136, 2017; DOI: 10.25046/aj020317
Abstract:

The importance of Modelling Methods Engineering is equally rising with the importance of domain specific languages (DSL) and individual modelling approaches. In order to capture the relevant semantic primitives for a particular domain, it is necessary to involve both, (a) domain experts, who identify relevant concepts as well as (b) method engineers who compose a…

Read More
(This article belongs to the SP3 (Special issue on Recent Advances in Engineering Systems 2017) & Section Interdisciplinary Applications of Computer Science (CSI))
Open AccessArticle
9 Pages, 827 KB Download PDF

Medical imbalanced data classification

Advances in Science, Technology and Engineering Systems Journal, Volume 2, Issue 3, Page # 116–124, 2017; DOI: 10.25046/aj020316
Abstract:

In general, the imbalanced dataset is a problem often found in health applications. In medical data classification, we often face the imbalanced number of data samples where at least one of the classes constitutes only a very small minority of the data. In the same time, it represent a difficult problem in most of machine…

Read More
(This article belongs to the SP3 (Special issue on Recent Advances in Engineering Systems 2017) & Section Artificial Intelligence in Computer Science (CAI))
Open AccessArticle
11 Pages, 847 KB Download PDF

Dependence-Based Segmentation Approach for Detecting Morpheme Boundaries

Advances in Science, Technology and Engineering Systems Journal, Volume 2, Issue 3, Page # 100–110, 2017; DOI: 10.25046/aj020314
Abstract:

The unsupervised morphology processing in the emerging mutant languages has the advantage over the human/supervised processing of being more agiler. The main drawback is, however, their accuracy. This article describes an unsupervised morphemes identification approach based on an intuitive and formal definition of event dependence. The input is no more than a plain text of…

Read More
(This article belongs to the SP3 (Special issue on Recent Advances in Engineering Systems 2017) & Section Interdisciplinary Applications of Computer Science (CSI))
Open AccessArticle
7 Pages, 877 KB Download PDF

Detection of Vandalism in Wikipedia using Metadata Features – Implementation in Simple English and Albanian sections

Advances in Science, Technology and Engineering Systems Journal, Volume 2, Issue 4, Page # 1–7, 2017; DOI: 10.25046/aj020401
Abstract:

In this paper, we evaluate a list of classifiers in order to use them in the detection of vandalism by focusing on metadata features. Our work is focused on two low resource data sets (Simple English and Albanian) from Wikipedia. The aim of this research is to prove that this form of vandalism detection applied…

Read More
(This article belongs to Section Artificial Intelligence in Computer Science (CAI))
Open AccessArticle
7 Pages, 729 KB Download PDF

Recent Trends in ELM and MLELM: A review

Advances in Science, Technology and Engineering Systems Journal, Volume 2, Issue 1, Page # 69–75, 2017; DOI: 10.25046/aj020108
Abstract:

Extreme Learning Machine (ELM) is a high effective learning algorithm for the single hidden layer feed forward neural networks. Compared with the existing neural network learning algorithm it solves the slow training speed and over-fitting problems. It has been used in different fields and applications such as biomedical engineering, computer vision, remote sensing, chemical process…

Read More
(This article belongs to the SP2 (Special Issue on Computer Systems, Information Technology, Electrical and Electronics Engineering 2017) & Section Artificial Intelligence in Computer Science (CAI))
Open AccessArticle
9 Pages, 1,697 KB Download PDF

A Web-Based Decision Support System for Evaluating Soil Suitability for Cassava Cultivation

Advances in Science, Technology and Engineering Systems Journal, Volume 2, Issue 1, Page # 42–50, 2017; DOI: 10.25046/aj020105
Abstract:

Precision agriculture in recent times had assumed a different dimension in order to improve on the poor standard of agriculture. Similarly, the upsurge in technological advancement, most especially in the aspect of machine learning and artificial intelligence, is a promising trend towards a positive solution to this problem. Therefore, this research work presents a decision…

Read More
(This article belongs to the SP2 (Special Issue on Computer Systems, Information Technology, Electrical and Electronics Engineering 2017) & Section Metallurgy & Metallurgical Engineering (MME))
1 14 15 16

Journal Menu

Journal Browser


Special Issues

Special Issue on Digital Frontiers of Entrepreneurship: Integrating AI, Gender Equity, and Sustainable Futures
Guest Editors: Dr. Muhammad Nawaz Tunio, Dr. Aamir Rashid, Dr. Imamuddin Khoso
Deadline: 30 May 2026

Special Issue on Sustainable Technologies for a Resilient Future
Guest Editors: Dr. Debasis Mitra, Dr. Sourav Chattaraj, Dr. Addisu Assefa
Deadline: 30 April 2026