Search Results

Results (502)

Search Parameters:

Keyword: Network
Order results
Results per page
Open AccessArticle
6 Pages, 183 KB Download PDF

Trajectory Tracking Control of a DC Motor Exposed to a Replay-Attack

Advances in Science, Technology and Engineering Systems Journal, Volume 5, Issue 3, Page # 264–269, 2020; DOI: 10.25046/aj050334
Abstract:

This paper investigates the trajectory tracking control (TTC) problem of a networked control system (NCS) against a replay-attack. The impact of data packet dropout and communication delay on the wireless network are taken into account. A new mathematical representation of the NCS under network issues (packet dropout, delay, and replay-attack) is proposed, the resulting closed-loop…

Read More
(This article belongs to the SP9 (Special Issue on Multidisciplinary Innovation in Engineering Science & Technology 2020) & Section Automation & Control Systems (ACS))
Open AccessArticle
10 Pages, 1,578 KB Download PDF

Improved Nonlinear Fuzzy Robust PCA for Anomaly-based Intrusion Detection

Advances in Science, Technology and Engineering Systems Journal, Volume 5, Issue 3, Page # 249–258, 2020; DOI: 10.25046/aj050332
Abstract:

Among the most popular tools in security field is the anomaly based Intrusion Detection System (IDS), it detects intrusions by learning to classify the normal activities of the network. Thus if any abnormal activity or behaviour is recognized it raises an alarm to inform the users of a given network. Nevertheless, IDS is generally susceptible…

Read More
(This article belongs to the SP9 (Special Issue on Multidisciplinary Innovation in Engineering Science & Technology 2020) & Section Interdisciplinary Applications of Computer Science (CSI))
Open AccessArticle
7 Pages, 768 KB Download PDF

Generating a Blockchain Smart Contract Application Framework

Advances in Science, Technology and Engineering Systems Journal, Volume 5, Issue 3, Page # 191–197, 2020; DOI: 10.25046/aj050325
Abstract:

Blockchain is a new generation technology that allows the central control mechanism or trusted authority to be removed, spreading the encrypted data across all participants in the network in a distributed database structure instead of central trust. The Smart Contract structure, which defines the rules and flow that allow the things we value to operate…

Read More
(This article belongs to Section Interdisciplinary Applications of Computer Science (CSI))
Open AccessArticle
8 Pages, 1,241 KB Download PDF

Non Parallelism and Cayley-Menger Determinant in Submerged Localization

Advances in Science, Technology and Engineering Systems Journal, Volume 5, Issue 3, Page # 150–157, 2020; DOI: 10.25046/aj050320
Abstract:

This research paper portraits the technique to determine location of submerged nodes with Cayley-Menger determinant and associated problems with non-parallel states. Cayley-Menger determinant is considered to be the usual means to determine the coordinates of the nodes with a single node where the plane of beacon i.e. beacon’s surfing plane and the plane created by…

Read More
(This article belongs to the SP8 (Special Issue on Multidisciplinary Sciences and Engineering 2019-20) & Section Network Engineering (ENW))
Open AccessArticle
11 Pages, 1,074 KB Download PDF

Evolution of Privacy Preservation Models in Location-Based Services

Advances in Science, Technology and Engineering Systems Journal, Volume 5, Issue 3, Page # 82–92, 2020; DOI: 10.25046/aj050311
Abstract:

Location-based services have become increasingly prevalent with the advancement in the positioning capabilities of smart devices and their emergence in social networking. In order to acquire a service, users must submit their identity, query interest and location details to service providers. Such information shared by users are accumulated continuously, stored and analyzed in order to…

Read More
(This article belongs to Section Software Engineering in Computer Science (CSE))
Open AccessArticle
10 Pages, 703 KB Download PDF

Intrusion Detection in Cyber Security: Role of Machine Learning and Data Mining in Cyber Security

Advances in Science, Technology and Engineering Systems Journal, Volume 5, Issue 3, Page # 72–81, 2020; DOI: 10.25046/aj050310
Abstract:

In recent years, cyber security has been received interest from several research communities with respect to Intrusion Detection System (IDS). Cyber security is “a fast-growing field demanding a great deal of attention because of remarkable progresses in social networks, cloud and web technologies, online banking, mobile environment, smart grid, etc.” An IDS is a software…

Read More
(This article belongs to Section Hardware & Architecture in Computer Science (CHA))
Open AccessArticle
10 Pages, 913 KB Download PDF

Performance Effects of Algorithmic Elements in Selected MANETs Routing Protocols

Advances in Science, Technology and Engineering Systems Journal, Volume 5, Issue 3, Page # 62–71, 2020; DOI: 10.25046/aj050309
Abstract:

Over time, several routing protocols have been suggested for use in Mobile Ad Hoc Networks (MANETs). Because of availability of so many MANETs routing protocols, network engineers and administrators face difficulties in identifying an appropriate routing protocol for a particular scenario. This challenge results from the unavailability of adequate technical analytic studies designed to examine…

Read More
(This article belongs to Section Information Systems in Computer Science (CIS))
Open AccessArticle
9 Pages, 792 KB Download PDF

Review on Smart Electronic Nose Coupled with Artificial Intelligence for Air Quality Monitoring

Advances in Science, Technology and Engineering Systems Journal, Volume 5, Issue 2, Page # 739–747, 2020; DOI: 10.25046/aj050292
Abstract:

With the advent of the Internet of Things Technologies (IOT), smart homes, and smart city applications, E-Nose was created. Almost of gas sensors consisting the electronic nose system suffer from cross sensitivity and lack of selectivity. Coupling smart gas sensors with artificial intelligence algorithms can thus empower conventional gas sensing technologies and increase accuracy in…

Read More
(This article belongs to Section Artificial Intelligence in Computer Science (CAI))
Open AccessArticle
9 Pages, 1,157 KB Download PDF

Face Recognition on Low Resolution Face Image With TBE-CNN Architecture

Advances in Science, Technology and Engineering Systems Journal, Volume 5, Issue 2, Page # 730–738, 2020; DOI: 10.25046/aj050291
Abstract:

Face recognition in low resolution images has challenges in active research because face recognition is usually implemented in high resolution images (HR). In general, research leads to a combination of pre-processing and training models. Therefore, this study aims to classify low-resolution face images using a combination of pre-processing and deep learning. In addition, this study…

Read More
(This article belongs to Section Information Systems in Computer Science (CIS))
Open AccessArticle
9 Pages, 1,350 KB Download PDF

ROS Based Multimode Control of Wheeled Robot

Advances in Science, Technology and Engineering Systems Journal, Volume 5, Issue 2, Page # 688–696, 2020; DOI: 10.25046/aj050285
Abstract:

This research work mainly presents the design and development of a small-scaled wheeled robot, which can be controlled using multiple controlling interfaces using some new technological trends. Raspberry Pi 3 as the main controller, Python as the programming language integrated with the Robot Operating System (ROS) and Virtual Network Computing (VNC) for screen sharing are…

Read More
(This article belongs to the SP8 (Special Issue on Multidisciplinary Sciences and Engineering 2019-20) & Section Interdisciplinary Applications of Computer Science (CSI))
Open AccessArticle
5 Pages, 1,329 KB Download PDF

Classification of Timber Load on Trucks

Advances in Science, Technology and Engineering Systems Journal, Volume 5, Issue 2, Page # 683–687, 2020; DOI: 10.25046/aj050284
Abstract:

All trucks heading into the paper mill MONDI, Slovakia, have to pass an automatic security check. It controls if storage of its wood load meets all standards of safety. Each truck is scanned by a group of 2D scanners. After that the inspection of timber load is done by a software with use of the…

Read More
(This article belongs to the SP8 (Special Issue on Multidisciplinary Sciences and Engineering 2019-20) & Section Artificial Intelligence in Computer Science (CAI))
Open AccessArticle
11 Pages, 1,290 KB Download PDF

Activerest: Design of A Graphical Interface for the Remote use of Continuous and Holistic Care Providers

Advances in Science, Technology and Engineering Systems Journal, Volume 5, Issue 2, Page # 635–645, 2020; DOI: 10.25046/aj050279
Abstract:

One of the most prevalent physical limitations of both aging and accidents is immobility. Being bedridden requires great care to avoid the formation of pressure ulcers. Thus, the ‘ActiveRest’ project aimed to develop a textile mattress guard that will contribute to the prevention of pressure ulcers. This textile mattress guard integrates a monitoring system, based…

Read More
(This article belongs to the SP8 (Special Issue on Multidisciplinary Sciences and Engineering 2019-20) & Section Bioinformatics (BIF))
Open AccessArticle
14 Pages, 867 KB Download PDF

Commercialization Process of Disruptive Innovations in Corporate Ventures and Spinoff Companies: A Comparison

Advances in Science, Technology and Engineering Systems Journal, Volume 5, Issue 2, Page # 621–634, 2020; DOI: 10.25046/aj050278
Abstract:

One of the most critical challenges that large companies, small enterprises and research institutes face, when commercializing their innovations, is the transfer process at the moment of scaling up. These organizations often transfer their innovation to either existing business units or create a new business entirely. The process of transferring innovations to an existing unit…

Read More
(This article belongs to the SP8 (Special Issue on Multidisciplinary Sciences and Engineering 2019-20) & Section Engineering Management (EMM))
Open AccessArticle
11 Pages, 959 KB Download PDF

Securing Hybrid SDN-based Geographic Routing Protocol using a Distributed Trust Model

Advances in Science, Technology and Engineering Systems Journal, Volume 5, Issue 2, Page # 567–577, 2020; DOI: 10.25046/aj050271
Abstract:

In this paper, the vulnerabilities and the security attacks against vehicular networks, SDN architecture and some security solutions for SDVN are studied. Secondly, a complete and improved version of the secure HSDN-GRA routing protocol based on a distributed trust model is proposed where public keys of the vehicles are managed in a distributed way. Besides,…

Read More
(This article belongs to the SP8 (Special Issue on Multidisciplinary Sciences and Engineering 2019-20) & Section Information Systems in Computer Science (CIS))
Open AccessArticle
11 Pages, 2,074 KB Download PDF

A Sustainable Multi-layered Open Data Processing Model for Agriculture: IoT Based Case Study Using Semantic Web for Hazelnut Fields

Advances in Science, Technology and Engineering Systems Journal, Volume 5, Issue 2, Page # 309–319, 2020; DOI: 10.25046/aj050241
Abstract:

In recent years, several projects which are supported by information and communications technologies (ICT) have been developed in the agricultural domain to promote more precise agricultural activities. These projects account for different kinds of key ICT terms such as internet of things (IoT), wireless sensors networks (WSN), cloud computing (CC). These projects are used for…

Read More
(This article belongs to the SP8 (Special Issue on Multidisciplinary Sciences and Engineering 2019-20) & Section Interdisciplinary Applications of Computer Science (CSI))
Open AccessArticle
10 Pages, 435 KB Download PDF

Enhancing an SDN Architecture with DoS Attack Detection Mechanisms

Advances in Science, Technology and Engineering Systems Journal, Volume 5, Issue 2, Page # 215–224, 2020; DOI: 10.25046/aj050228
Abstract:

A Software Defined Network (SDN) architecture is characterized by decoupling the data plane and control plane. This feature enables the establishment of a programmable environ- ment in which the control plane acts under the data plane, managing and configuring the network over a standard protocol, such as OpenFlow. Although there are numerous benefits to the…

Read More
(This article belongs to the SP8 (Special Issue on Multidisciplinary Sciences and Engineering 2019-20) & Section Interdisciplinary Applications of Computer Science (CSI))
Open AccessArticle
7 Pages, 3,593 KB Download PDF

A Study on the Effects of Combining Different Features for the Recognition of Handwritten Bangla Characters

Advances in Science, Technology and Engineering Systems Journal, Volume 5, Issue 2, Page # 197–203, 2020; DOI: 10.25046/aj050225
Abstract:

This paper studies and compares the effectiveness of four different features and their combinations on the recognition accuracy of handwritten Bangla characters. The longest run, chain code histogram, shadow, and Gabor filter-based features and their eleven (11) combinations were tested on a standard Bangla database of 15; 000 basic handwritten characters to compare their recognition…

Read More
(This article belongs to Section Artificial Intelligence in Computer Science (CAI))
Open AccessArticle
12 Pages, 658 KB Download PDF

Transfer Learning and Fine Tuning in Breast Mammogram Abnormalities Classification on CBIS-DDSM Database

Advances in Science, Technology and Engineering Systems Journal, Volume 5, Issue 2, Page # 154–165, 2020; DOI: 10.25046/aj050220
Abstract:

Breast cancer has an important incidence in women mortality worldwide. Currently, mam- mography is considered the gold standard for breast abnormalities screening examinations, since it aids in the early detection and diagnosis of the illness. However, both identification of mass lesions and its malignancy classification is a challenging problem for artificial intelligence. In this work,…

Read More
(This article belongs to the SP8 (Special Issue on Multidisciplinary Sciences and Engineering 2019-20) & Section Neuroimaging (NUM))
Open AccessArticle
10 Pages, 831 KB Download PDF

Analysis of Cyberattacks in Public Organizations in Latin America

Advances in Science, Technology and Engineering Systems Journal, Volume 5, Issue 2, Page # 116–125, 2020; DOI: 10.25046/aj050215
Abstract:

It was analyzed certain information about cyberattacks in Latin America and methods to counteract the aggressions that affect services, data and infrastructure. The problem is the cyberattack on information networks where there is interdependence between processes, people and devices within public organizations with the negative consequence of denial of services. The objective is to propose…

Read More
(This article belongs to Section Information Systems in Computer Science (CIS))
Open AccessArticle
7 Pages, 390 KB Download PDF

Attacks Classification and a Novel IDS for Detecting Jamming Attack in WBAN

Advances in Science, Technology and Engineering Systems Journal, Volume 5, Issue 2, Page # 80–86, 2020; DOI: 10.25046/aj050210
Abstract:

Wireless Body Area Network (WBAN) aims to monitor patient’s health remotely, by using mini medical sensors that are attached on the human body to collect important data via the wireless network. However, this type of communication is very vulnerable to various types of attacks, poses serious problems to the individual’s life who wears the nodes.…

Read More
(This article belongs to the SP8 (Special Issue on Multidisciplinary Sciences and Engineering 2019-20) & Section Network Engineering (ENW))
Open AccessArticle
7 Pages, 495 KB Download PDF

Performance Evaluation and Examination of Data Transfer: A Review of Parallel Migration in Cloud Storage

Advances in Science, Technology and Engineering Systems Journal, Volume 5, Issue 2, Page # 57–63, 2020; DOI: 10.25046/aj050207
Abstract:

Recent years have seen a continued pattern of development in the cloud computing field. Numerous approaches to maximize file transfer capacity are still completely standing for use on cloud computing storage; however, they do not maximize the advantage of data migration scalability and elasticity in cloud storage. One potential problem is that elasticity takes time;…

Read More
(This article belongs to the SP8 (Special Issue on Multidisciplinary Sciences and Engineering 2019-20) & Section Information Systems in Computer Science (CIS))
Open AccessArticle
9 Pages, 1,127 KB Download PDF

Design and Validation of a Meter Band Rate in OpenFlow and OpenDaylight for Optimizing QoS

Advances in Science, Technology and Engineering Systems Journal, Volume 5, Issue 2, Page # 35–43, 2020; DOI: 10.25046/aj050205
Abstract:

Technological developments in the Internet and communications have created a vastly complex and dynamic context with diverse heterogeneous networks and fast growth of mobile devices and multimedia. As the Internet becomes the primary mode of communication for many organisations there is requirement to enhance quality of service (QoS) from heterogeneous systems and networks. Traditional networks…

Read More
(This article belongs to the SP8 (Special Issue on Multidisciplinary Sciences and Engineering 2019-20) & Section Interdisciplinary Applications of Computer Science (CSI))
Open AccessArticle
6 Pages, 795 KB Download PDF

Design of Efficient Convolutional Neural Module Based on An Improved Module

Advances in Science, Technology and Engineering Systems Journal, Volume 5, Issue 1, Page # 340–345, 2020; DOI: 10.25046/aj050143
Abstract:

In order to further improve the feature extraction performance of the convolutional neural networks, we focus on the selection and reorganization of key features and suspect that simple changes in the pooling layers can cause changes in the performance of neural networks. According to the conjecture, we design a funnel convolution module, which can filter…

Read More
(This article belongs to the SP8 (Special Issue on Multidisciplinary Sciences and Engineering 2019-20) & Section Artificial Intelligence in Computer Science (CAI))
Open AccessArticle
6 Pages, 2,430 KB Download PDF

Skin Tissue Oxygen Saturation Prediction: A Comparison Study of Artificial Intelligence Techniques

Advances in Science, Technology and Engineering Systems Journal, Volume 5, Issue 1, Page # 334–339, 2020; DOI: 10.25046/aj050142
Abstract:

Noninvasive measurement of skin tissue oxygen saturation, StO2, is of interest especially in the studies of wound healing and detection of vascular diseases. This work aims to compare Partial Least Square (PLS) regression, K-Nearest Neighbor (KNN) and Artificial Neural Network (ANN) technique in the prediction of StO2 using spectral data obtained from Monte Carlo simulations.…

Read More
(This article belongs to the SP8 (Special Issue on Multidisciplinary Sciences and Engineering 2019-20) & Section Artificial Intelligence in Computer Science (CAI))
Open AccessArticle
6 Pages, 1,123 KB Download PDF

Implement Wireless and Distributed Vibrator for Enhancing Physical Activity of Visually Impaired Children

Advances in Science, Technology and Engineering Systems Journal, Volume 5, Issue 1, Page # 100–105, 2020; DOI: 10.25046/aj050113
Abstract:

Learning and mental and physical counselling for visually impaired children are important. However, due to the lack of visual sense assistance, Physical Activity will gradually degenerate without proper enhancement, which may require the care of others for life. Inner fear and sensitive psychological factors hinder the development of living ability. Strengthening physical activity of visually…

Read More
(This article belongs to the SP8 (Special Issue on Multidisciplinary Sciences and Engineering 2019-20) & Section Interdisciplinary Applications of Computer Science (CSI))
1 14 15 16 17 18 21

Journal Menu

Journal Browser


Special Issues

Special Issue on Digital Frontiers of Entrepreneurship: Integrating AI, Gender Equity, and Sustainable Futures
Guest Editors: Dr. Muhammad Nawaz Tunio, Dr. Aamir Rashid, Dr. Imamuddin Khoso
Deadline: 30 May 2026

Special Issue on Sustainable Technologies for a Resilient Future
Guest Editors: Dr. Debasis Mitra, Dr. Sourav Chattaraj, Dr. Addisu Assefa
Deadline: 30 April 2026