Search Results

Results (1507)

Search Parameters:

Keyword: Cat
Order results
Results per page
Open AccessArticle
12 Pages, 2,619 KB Download PDF

Deep venous thrombus characterization: ultrasonography, elastography and scattering operator

Advances in Science, Technology and Engineering Systems Journal, Volume 2, Issue 3, Page # 48–59, 2017; DOI: 10.25046/aj020308
Abstract:

A thrombus or a blood clot is the result of blood coagulation which is a natural process to prevent bleeding. An inappropriate formation of a thrombus in a deep vein is known as Deep Venous Thrombosis (DVT). The main complication of a DVT is a Pulmonary Embolism (PE) which occurs when a thrombus breaks loose…

Read More
(This article belongs to the SP3 (Special issue on Recent Advances in Engineering Systems 2017) & Section Radiology (RIO))
Open AccessArticle
12 Pages, 1,124 KB Download PDF

Applications of Case Based Organizational Memory Supported by the PAbMM Architecture

Advances in Science, Technology and Engineering Systems Journal, Volume 2, Issue 3, Page # 12–23, 2017; DOI: 10.25046/aj020303
Abstract:

In the aim to manage and retrieve the organizational knowledge, in the last years numerous proposals of models and tools for knowledge management and knowledge representation have arisen. However, most of them store knowledge in a non-structured or semi-structured way, hindering the semantic and automatic processing of this knowledge. In this paper we present a…

Read More
(This article belongs to the SP3 (Special issue on Recent Advances in Engineering Systems 2017) & Section Artificial Intelligence in Computer Science (CAI))
Open AccessArticle
15 Pages, 1,137 KB Download PDF

Privacy-by-Design (PbD) IoT Framework : A Case of Location Privacy Mitigation Strategies for Near Field Communication (NFC) Tag Sensor

Advances in Science, Technology and Engineering Systems Journal, Volume 2, Issue 1, Page # 134–148, 2017; DOI: 10.25046/aj020116
Abstract:

Near Field Communication (NFC) technology is a short range (range about 10cm) standard extended from the core standard Radio Frequency Identifier (RFID). These technologies are a portion of wireless communication technology. Even though NFC technologies benefit in various field, but it’s still exposed to multiple type of privacy attacks and threat as well since the…

Read More
(This article belongs to the SP2 (Special Issue on Computer Systems, Information Technology, Electrical and Electronics Engineering 2017) & Section Telecommunications (TEL))
Open AccessArticle
11 Pages, 872 KB Download PDF

Cross layers security approach via an implementation of data privacy and by authentication mechanism for mobile WSNs

Advances in Science, Technology and Engineering Systems Journal, Volume 2, Issue 1, Page # 97–107, 2017; DOI: 10.25046/aj020112
Abstract:

To implement a new secure network with high mobility and low energy consumption, we use smart sensors. These sensors are powered by micro batteries generally non rechargeable. So, to extend their lifetime, it is necessary to implement new energy conservation techniques. Existing works separate the two features (security, energy conservation) and are interested specifically in…

Read More
(This article belongs to the SP2 (Special Issue on Computer Systems, Information Technology, Electrical and Electronics Engineering 2017) & Section Network Engineering (ENW))
Open AccessArticle
6 Pages, 1,127 KB Download PDF

Design and Fabrication of a Dielectrophoretic Cell Trap Array

Advances in Science, Technology and Engineering Systems Journal, Volume 2, Issue 1, Page # 84–89, 2017; DOI: 10.25046/aj020110
Abstract:

We present a design and fabrication of an integrated micro-fabricated dielectrophoretic (DEP) cell trap array in a microfluidic channel. The cell trap array is capable of isolating target cells in high-throughput manner and producing cell clusters of tunable cell numbers. In this work, we have used commercially available polystyrene beads to show the concept. Bead…

Read More
(This article belongs to the SP2 (Special Issue on Computer Systems, Information Technology, Electrical and Electronics Engineering 2017) & Section Biomedical Engineering (EBI))
Open AccessArticle
7 Pages, 1,288 KB Download PDF

FenceBook a Geofencing based Advertisements Application Using Android

Advances in Science, Technology and Engineering Systems Journal, Volume 1, Issue 5, Page # 27–33, 2016; DOI: 10.25046/aj010506
Abstract:

Geo-fencing (geofencing) is a great feature in a software program that uses Global Positioning System (GPS) or radio frequency identification (RFID) to define the geographical boundaries feature. Actually geofence is a virtual barrier. Geofencing is an innovative technology, an online marketplace for proactive contextual services that allows users to easily find interesting services, can easily…

Read More
(This article belongs to the Special issue on Recent Advances in Electrical and Electronics Engineering 2016 & Section Information Systems in Computer Science (CIS))
Open AccessArticle
6 Pages, 734 KB Download PDF

Strong Authentication Protocol based on Java Crypto Chip as a Secure Element

Advances in Science, Technology and Engineering Systems Journal, Volume 1, Issue 5, Page # 21–26, 2016; DOI: 10.25046/aj010505
Abstract:

Smart electronic devices and gadgets and their applications are becoming more and more popular. Most of those devices and their applications handle personal, financial, medical and other sensitive data that require security and privacy protection. In this paper we describe one aspect of such protection – user authentication protocol based on the use of X.509…

Read More
(This article belongs to the Special issue on Recent Advances in Electrical and Electronics Engineering 2016 & Section Cybernetics in Computer Science (CCY))
Open AccessArticle
5 Pages, 824 KB Download PDF

An Application of ANN Model with Bayesian Regularization Learning Algorithm for Computing the Operating Frequency of C-Shaped Patch Antennas

Advances in Science, Technology and Engineering Systems Journal, Volume 1, Issue 5, Page # 1–5, 2016; DOI: 10.25046/aj010501
Abstract:

In this paper, an application of artificial neural network (ANN) using bayesian regularization (BR) learning algorithm  based on multilayer perceptron (MLP) model is presented for computing the operating frequency of C-shaped patch antennas (CPAs) in UHF band.  Firstly, the operating frequencies of 144 CPAs having varied dimensions and electrical parameters were simulated by the XFDTD…

Read More
(This article belongs to the Special issue on Recent Advances in Electrical and Electronics Engineering 2016 & Section Telecommunications (TEL))
Open AccessArticle
4 Pages, 552 KB Download PDF

Effect of Foliar Application of Zinc on Growth and Yield of Guava (Psidium Guajava L.)

Advances in Science, Technology and Engineering Systems Journal, Volume 1, Issue 1, Page # 19–22, 2016; DOI: 10.25046/aj010103
Abstract:

In depth study focusing to ascertain the effect of different rates of Zinc (Zn) fertilization in improving the quality and yield of Guava fruit was carried out at Gharo, Sindh – Pakistan during year 2014-15. The outcome of the research revealed that there was no significant effect on the yield as well as quality, without…

Read More
(This article belongs to Section Horticulture (HOR))
Open AccessArticle
13 Pages, 1,914 KB Download PDF

TL-SOC: A Hybrid Decision-Centric Intrusion Detection Framework for Security Operations Centers

Advances in Science, Technology and Engineering Systems Journal, Volume 11, Issue 2, Page # 30–42, 2026; DOI: 10.25046/aj110204
Abstract:

Security Operations Centers (SOCs) require intrusion detection systems that achieve high detection accuracy while maintaining a low false-positive rate and robustness to evolving attack patterns. However, most existing machine learning-based approaches primarily focus on detecting known threats and often overlook distribution shifts and the reliability of generated alerts. In this paper, we propose TL-SOC, a…

Read More
(This article belongs to the SP20 (Special Issue on Multidisciplinary Frontiers in Engineering, Computing and Applied Sciences 2026) & Section Information Systems in Computer Science (CIS))
Open AccessArticle
13 Pages, 1,345 KB Download PDF

Hybrid Feature Selection for Anomaly Detection in IoT Network Intrusion Detection Systems

Advances in Science, Technology and Engineering Systems Journal, Volume 11, Issue 2, Page # 17–29, 2026; DOI: 10.25046/aj110203
Abstract:

The rapid growth of Internet of things (IoT) devices have heightened the need for effective Intrusion Detection System (IDS) to combat evolving cyber threats. The IoT networks has the security challenges due to the heterogeneous and high-dimensional nature of network traffic data, redundant features, and class imbalance which hinder detection accuracy and efficiency. Effective IDS…

Read More
(This article belongs to Section Artificial Intelligence in Computer Science (CAI))
Open AccessArticle
5 Pages, 242 KB Download PDF

HLLSet Theory: A Unified Framework for Probabilistic Knowledge Representation

Advances in Science, Technology and Engineering Systems Journal, Volume 11, Issue 2, Page # 12–16, 2026; DOI: 10.25046/aj110202
Abstract:

This paper introduces HLLSet (HyperLogLog Set), a probabilistic data structure that behaves like a set under all standard operations while containing no explicit elements. Unlike traditional HyperLogLog, which only estimates cardinality, HLLSets support full set operations (union, intersection, difference) through enhanced register structures and provide a principled framework for representing semantic relationships. We establish a…

Read More
(This article belongs to Section Artificial Intelligence in Computer Science (CAI))
Open AccessArticle
6 Pages, 1,529 KB Download PDF

GC4miRNA - a Pipeline for Examining Impact of GC Content in miRNA Seed Sequences on Expression in Tumor Samples

Advances in Science, Technology and Engineering Systems Journal, Volume 11, Issue 1, Page # 78–83, 2026; DOI: 10.25046/aj110108
Abstract:

MicroRNAs (miRNAs) are small RNA molecules that play a crucial role in regulating gene expression by binding to and degrading targeted mRNAs. miRNAs targeting a specific mRNA have a region known as the “seed sequence”, which typically has a high affinity for its complementary sequence in the targeted mRNA. Single Nucleotide Polymorphisms (SNPs) are mutations…

Read More
(This article belongs to Section Bioinformatics (BIF))
Open AccessArticle
9 Pages, 4,180 KB Download PDF

Investigating the Influence Biomass Additive on the Thermal Performance of a Fired-Clay for Producing the Inner Liner of a Biomass Cook-Stove

Advances in Science, Technology and Engineering Systems Journal, Volume 11, Issue 1, Page # 69–77, 2026; DOI: 10.25046/aj110107
Abstract:

This study investigated the influence of a biomass additive on the thermal performance of the inner liner of fired-clay cook-stoves. Fired-clay cook-stoves are essential cooking devices, particularly in areas with limited access to modern energy resources. The study aimed to enhance the thermal efficiency of the cook-stoves by incorporating rice husk into the inner liner…

Read More
(This article belongs to Section Mechanical Engineering (EMH))
Open AccessArticle
18 Pages, 2,322 KB Download PDF

Multi Attribute Stratified Sampling: An Automated Framework for Privacy-Preserving Healthcare Data Publishing with Multiple Sensitive Attributes

Advances in Science, Technology and Engineering Systems Journal, Volume 11, Issue 1, Page # 51–68, 2026; DOI: 10.25046/aj110106
Abstract:

The accumulation and analysis of large-scale patient data have led to breakthrough discoveries in potential flags for diseases based on pattern recognition, highlight medication efficacy, and local population health trends that would be impossible with traditional paper-based records. However, these benefits come with unique challenges posed by the application of data sharing for research and…

Read More
(This article belongs to the SP20 (Special Issue on Multidisciplinary Frontiers in Engineering, Computing and Applied Sciences 2026) & Section Theory & Methods in Computer Science (CTM))
Open AccessArticle
7 Pages, 745 KB Download PDF

Efficient Pattern Recognition Resource Utilization Neural Network

Advances in Science, Technology and Engineering Systems Journal, Volume 11, Issue 1, Page # 44–50, 2026; DOI: 10.25046/aj110105
Abstract:

Neural Networks derives intelligent systems and modern autonomous applications. With the complexity introduced in today’s systems, designing architectures remains open research problem in all fields. Despite many efforts to generalize, the resources required by neural architectures remain challenge. Robots design, Smart cities, IoTs …etc. become the leading industry and driving the fourth industrial revolutions. All…

Read More
(This article belongs to the SP19 (Special Issue on Innovation in Computing, Engineering Science & Technology 2025-26) & Section Artificial Intelligence in Computer Science (CAI))
Open AccessArticle
11 Pages, 817 KB Download PDF

Beyond Fitness: Revolutionary Exercise Tracker Combining Pose Recognition with Heart Rate Monitoring using Remote Photoplethysmography (rPPG)

Advances in Science, Technology and Engineering Systems Journal, Volume 11, Issue 1, Page # 33–43, 2026; DOI: 10.25046/aj110104
Abstract:

Heart rate (HR) is a critical indicator in fitness monitoring, athletic performance evaluation, and injury prevention. However, traditional motion-sensitive wearable devices are highly susceptible to movement artifacts, which degrade measurement accuracy during physical activity. Remote photoplethysmography (rPPG) offers a non-contact alternative for HR measurement, though it too remains sensitive to motion. This study proposes a…

Read More
(This article belongs to Section Biomedical Engineering (EBI))
Open AccessArticle
8 Pages, 668 KB Download PDF

Detection Method and Mitigation of Server-Spoofing Attacks on SOME/IP at the Service Discovery Phase

Advances in Science, Technology and Engineering Systems Journal, Volume 11, Issue 1, Page # 25–32, 2026; DOI: 10.25046/aj110103
Abstract:

Service-oriented architecture has attracted attention in automotive development. The Automotive Open System Architecture (AUTOSAR) specifies Scalable Service-Oriented Middleware over IP (SOME/IP) as a key middleware for service-oriented communication in-vehicles. However, SOME/IP-based networks are vulnerable to server spoofing during the service discovery phase, enabling attackers to cause man-in-the-middle attacks by impersonating legitimate services. This paper proposes…

Read More
(This article belongs to the SP19 (Special Issue on Innovation in Computing, Engineering Science & Technology 2025-26) & Section Information Systems in Computer Science (CIS))
Open AccessArticle
10 Pages, 4,035 KB Download PDF

Design and Electronic Interfacing of FR4 and Polyimide PCB-based Electromagnetic Resonating Micro-mirrors

Advances in Science, Technology and Engineering Systems Journal, Volume 11, Issue 1, Page # 1–10, 2026; DOI: 10.25046/aj110101
Abstract:

This paper presents the design and fabrication of an electromagnetically actuated PCB-based resonating scanning micro-mirror for LiDAR applications, with optimization targeted towards low-cost fabrication and a high scanning angle. Traditional silicon MEMS-based micro-mirrors, while offering high precision and compatibility with CMOS processing, are limited by fragility at low scanning frequencies and costly fabrication processes. To…

Read More
(This article belongs to Section Optics (OPT))
Open AccessArticle
9 Pages, 1,700 KB Download PDF

A Multi-class Acoustic Dataset and Interactive Tool for Analyzing Drone Signatures in Real-World Environments

Advances in Science, Technology and Engineering Systems Journal, Volume 10, Issue 6, Page # 88–96, 2025; DOI: 10.25046/aj100608
Abstract:

The rapid proliferation of drones across various industries has introduced significant challenges related to privacy, security, and noise pollution. Current drone detection systems, primarily based on visual and radar technologies, face limitations under certain conditions, highlighting the need for effective acoustic-based detection methods. This paper presents a unique and comprehensive dataset of drone acoustic signatures,…

Read More
(This article belongs to the SP19 (Special Issue on Innovation in Computing, Engineering Science & Technology 2025-26) & Section Acoustics (ACO))
Open AccessArticle
10 Pages, 967 KB Download PDF

System-Level Test Case Design for Field Reliability Alignment in Complex Products

Advances in Science, Technology and Engineering Systems Journal, Volume 10, Issue 6, Page # 55–64, 2025; DOI: 10.25046/aj100605
Abstract:

Achieving targeted reliability for complex products in real-world field environments remains a persistent challenge, even when laboratory validation suggests high performance. A significant reliability gap often emerges during the initial deployment phase, typically within the first one to five years where field failure rates can be up to twice those predicted in controlled settings. Compounding…

Read More
(This article belongs to the SP19 (Special Issue on Innovation in Computing, Engineering Science & Technology 2025-26) & Section Industrial Engineering (EID))
Open AccessArticle
13 Pages, 1,299 KB Download PDF

Identifying Comprehension Faults Through Word Embedding and Multimodal Analysis

Advances in Science, Technology and Engineering Systems Journal, Volume 10, Issue 6, Page # 42–54, 2025; DOI: 10.25046/aj100604
Abstract:

This study establishes a method for determining whether learners have an understanding of data science. Data science requires knowledge in various fields, which makes many learners give up. To prevent learners from being discouraged, it is necessary to judge the comprehension of the principles in each specified skill. It is important to assess not only…

Read More
(This article belongs to the SP19 (Special Issue on Innovation in Computing, Engineering Science & Technology 2025-26) & Section Education (EDU))
Open AccessArticle
13 Pages, 1,578 KB Download PDF

StradNet: Automated Structural Adaptation for Efficient Deep Neural Network Design

Advances in Science, Technology and Engineering Systems Journal, Volume 10, Issue 6, Page # 29–41, 2025; DOI: 10.25046/aj100603
Abstract:

Deep neural networks (DNNs) have demonstrated remarkable success across a wide range of machine learning tasks. However, determining an effective network architecture, particularly the sizes of the hidden layers, remains a significant challenge and often relies on inefficient trial-and-error experimentation. In this paper, we propose an automated architecture design approach based on structurally adaptive DNNs,…

Read More
(This article belongs to the SP19 (Special Issue on Innovation in Computing, Engineering Science & Technology 2025-26) & Section Artificial Intelligence in Computer Science (CAI))
Open AccessArticle
6 Pages, 1,802 KB Download PDF

Private 5G MIMO for Cable TV IP Broadcasting

Advances in Science, Technology and Engineering Systems Journal, Volume 10, Issue 6, Page # 23–28, 2025; DOI: 10.25046/aj100602
Abstract:

Private 5G utilization by cable TV is expected to be an alternative to wired services, especially for multi-dwelling units and rural communal TV receiving areas. On the other hand, the 100 MHz of the sub-6 frequency band for private 5G is not sufficient for cable TV services consisting of multi-channel broadcasting and Internet, and some…

Read More
(This article belongs to the SP19 (Special Issue on Innovation in Computing, Engineering Science & Technology 2025-26) & Section Telecommunications (TEL))
Open AccessArticle
22 Pages, 15,097 KB Download PDF

TIMeFoRCE: An Identity and Access Management Framework for IoT Devices in A Zero Trust Architecture

Advances in Science, Technology and Engineering Systems Journal, Volume 10, Issue 6, Page # 1–22, 2025; DOI: 10.25046/aj100601
Abstract:

Zero Trust Architecture offers a transformative approach to network security by emphasizing ”never trust, always verify.” IoT devices, while increasingly integral to modern ecosystems, pose unique challenges for identity management and access control due to their constrained processing power, memory, and energy capabilities. In a Zero Trust framework, every IoT device is treated as a…

Read More
(This article belongs to the SP19 (Special Issue on Innovation in Computing, Engineering Science & Technology 2025-26) & Section Telecommunications (TEL))
1 15 16 17 18 19 61

Journal Menu

Journal Browser


Special Issues

Special Issue on Digital Frontiers of Entrepreneurship: Integrating AI, Gender Equity, and Sustainable Futures
Guest Editors: Dr. Muhammad Nawaz Tunio, Dr. Aamir Rashid, Dr. Imamuddin Khoso
Deadline: 30 May 2026

Special Issue on Indigenous Knowledge Systems of the Tribal Communities of the Asia Pacific
Guest Editors: Dr. Anurag Hazarika
Deadline: 31 October 2026

Special Issue on Sustainable Technologies for a Resilient Future
Guest Editors: Dr. Debasis Mitra, Dr. Sourav Chattaraj, Dr. Addisu Assefa
Deadline: 30 April 2026