Search Results

Results (468)

Search Parameters:

Keyword: BER
Order results
Results per page
Open AccessArticle
7 Pages, 646 KB Download PDF

Multi-attribute Reverse Auction Design Based on Fuzzy Data Envelopment Analysis Approach

Advances in Science, Technology and Engineering Systems Journal, Volume 2, Issue 3, Page # 1323–1329, 2017; DOI: 10.25046/aj0203167
Abstract:

Multi-attribute reverse auction is widely used for the procurements of enterprises or governments. To overcome the difficulty of identifying bidding attribute weight and score function of the buyer, the multi-round auction and bidding models with multiple winners are established based on fuzzy data envelopment analysis. The winner determination model of the buyer considers the integrated…

Read More
(This article belongs to the SP3 (Special issue on Recent Advances in Engineering Systems 2017) & Section Multidisciplinary Sciences (MUS))
Open AccessArticle
9 Pages, 1,735 KB Download PDF

Public transportation network design: a geospatial data-driven method

Advances in Science, Technology and Engineering Systems Journal, Volume 2, Issue 3, Page # 1298–1306, 2017; DOI: 10.25046/aj0203164
Abstract:

The paper explores an issue of efficient public transportation network design as a part of the urban developing process. Having data about everyday residents travelling inside of an urban area, we can consider this data as people’s requirements for the public transport system. We propose a novel method for initial public transportation network design based…

Read More
(This article belongs to the SP3 (Special issue on Recent Advances in Engineering Systems 2017) & Section Interdisciplinary Applications of Computer Science (CSI))
Open AccessArticle
8 Pages, 445 KB Download PDF

Towards Deployment Strategies for Deception Systems

Advances in Science, Technology and Engineering Systems Journal, Volume 2, Issue 3, Page # 1272–1279, 2017; DOI: 10.25046/aj0203161
Abstract:

Network security is often built on perimeter defense. Sophisticated attacks are able to penetrate the perimeter and access valuable resources in the network. A more complete defense strategy also contains mechanisms to detect and mitigate perimeter breaches. Deceptive systems are a promising technology to detect, deceive and counter infiltration. In this work we provide an…

Read More
(This article belongs to the SP3 (Special issue on Recent Advances in Engineering Systems 2017) & Section Information Systems in Computer Science (CIS))
Open AccessArticle
7 Pages, 720 KB Download PDF

IoT: Their Conveniences, Security Challenges and Possible Solutions

Advances in Science, Technology and Engineering Systems Journal, Volume 2, Issue 3, Page # 1211–1217, 2017; DOI: 10.25046/aj0203153
Abstract:

The build-in internet-controlled functions of smart devices such as smart phone, smart television, home healthcare gadget, etc., have made them quite attractive to many segments of consumers. In recent years mankind has witnessed an upsurge usage of such devices for numerous purposes. In this paper, the author is going to show how previously forecasted security…

Read More
(This article belongs to the SP3 (Special issue on Recent Advances in Engineering Systems 2017) & Section Information Systems in Computer Science (CIS))
Open AccessArticle
6 Pages, 13,274 KB Download PDF

Precision Statistical Analysis of Images Based on Brightness Distribution

Advances in Science, Technology and Engineering Systems Journal, Volume 2, Issue 4, Page # 99–104, 2017; DOI: 10.25046/aj020413
Abstract:

Study the content of images is considered an important topic in which reasonable and accurate analysis of images are generated. Recently image analysis becomes a vital field because of huge number of images transferred via transmission media in our daily life. These crowded media with images lead to highlight in research area of image analysis.…

Read More
(This article belongs to Section Information Systems in Computer Science (CIS))
Open AccessArticle
8 Pages, 2,463 KB Download PDF

A Novel Ultra High Speed and Configurable Discrete Wavelet Packet Transform Architecture

Advances in Science, Technology and Engineering Systems Journal, Volume 2, Issue 3, Page # 1129–1136, 2017; DOI: 10.25046/aj0203142
Abstract:

This work is dedicated to present a new pipeline-parallel architecture of Discrete Wavelet Packet Transform (DWPT) for all wavelet family implemented in FPGA technology. The main target of our architecture is to provide an effective performance trade-off, where it significantly increases the throughput with a restricted amount of hardware. In this article, we propose two…

Read More
(This article belongs to the SP3 (Special issue on Recent Advances in Engineering Systems 2017) & Section Electronic Engineering (EEE))
Open AccessArticle
7 Pages, 2,135 KB Download PDF

Rotary Cutting of Electrical Steel Laminations – A Contrast to Traditional Stamping

Advances in Science, Technology and Engineering Systems Journal, Volume 2, Issue 3, Page # 1107–1113, 2017; DOI: 10.25046/aj0203140
Abstract:

Rotary cutting of electrical steel laminations is a novel, promising alternative in the processing of electrical steel strip with enormous economical and technical potentials. This paper is an extension of work originally presented on the 6th International Electric Drives Production Conference (E|DPC) in Nuremberg, Germany 2016. The scope of this paper includes a theoretical description…

Read More
(This article belongs to the SP3 (Special issue on Recent Advances in Engineering Systems 2017) & Section Mechanical Engineering (EMH))
Open AccessArticle
15 Pages, 2,682 KB Download PDF

A Microwave Reflectometer Prototype for Detection of Body Through the Rubble of Collapsed Buildings

Advances in Science, Technology and Engineering Systems Journal, Volume 2, Issue 3, Page # 1092–1106, 2017; DOI: 10.25046/aj0203139
Abstract:

There is a growing interest in using radio frequency in imaging for problem solving in situational awareness, surveillance, search and rescue operations, and screening for security. This has been fetched from recent development in addition to innovative technologies in microwave radar imaging applications. Despite the fact that no new phenomenology is exposed in this field,…

Read More
(This article belongs to the SP3 (Special issue on Recent Advances in Engineering Systems 2017) & Section Telecommunications (TEL))
Open AccessArticle
6 Pages, 1,131 KB Download PDF

Applied Horizontal and Vertical Geothermal Heat Exchanger with Heat Pump System to Provide Air Conditioning for an Academic Facility in Mexico

Advances in Science, Technology and Engineering Systems Journal, Volume 2, Issue 3, Page # 1064–1069, 2017; DOI: 10.25046/aj0203135
Abstract:

At present in Mexico, the renewable energy has become more important due to the great dependence of the country for fossil fuels. Within the several applications of renewable energy, there are the geothermal applications for the air conditioning of spaces. This technology employs heat pumps that interexchange heat with the ground. This technology is relatively…

Read More
(This article belongs to the SP3 (Special issue on Recent Advances in Engineering Systems 2017) & Section Thermodynamics (THD))
Open AccessArticle
8 Pages, 897 KB Download PDF

Predictive Technology Management for the Identification of Future Development Trends and the Maximum Achievable Potential Based on a Quantitative Analysis

Advances in Science, Technology and Engineering Systems Journal, Volume 2, Issue 3, Page # 1042–1049, 2017; DOI: 10.25046/aj0203132
Abstract:

A company’s ability to find the most profitable technology is based on a precise forecast of achievement potential. Technology Management (TM) uses forecasting models to analyse future potentials, e.g. the Gartner Hype Cycle, Arthur D. Little’s technology lifecycle or McKinsey’s S-curve model. All these methods are useful for qualitative analysis in the planning of strategic…

Read More
(This article belongs to the SP3 (Special issue on Recent Advances in Engineering Systems 2017) & Section Interdisciplinary Applications of Computer Science (CSI))
Open AccessArticle
8 Pages, 731 KB Download PDF

Group of UAVs Moving on Smooth Control Law with Fixed Obstacles

Advances in Science, Technology and Engineering Systems Journal, Volume 2, Issue 3, Page # 1034–1041, 2017; DOI: 10.25046/aj0203131
Abstract:

In this paper considered the movement of multi-agent system that consists of several UAVs that carry out monitoring ground surface. The multi-agent system includes a lead agent and several agents-members of the group. The motion of this system occurs along a trajectory, which is determined by the initial conditions, its mathematical model and obstacles on…

Read More
(This article belongs to the SP3 (Special issue on Recent Advances in Engineering Systems 2017) & Section Aerospace Engineering (EAR))
Open AccessArticle
6 Pages, 583 KB Download PDF

Spatial Modulation Technique For Filtered-OFDM Based Wireless Transmission

Advances in Science, Technology and Engineering Systems Journal, Volume 2, Issue 3, Page # 981–986, 2017; DOI: 10.25046/aj0203124
Abstract:

In this paper, a spatial modulation (SM) which provides no synchronization between the transmitting antennas and avoids inter-channel interference (ICI) at the receiver input while maintaining high spectral efficiency is applied to filtered-orthogonal frequency division multiplexing (F-OFDM) transmission. The SM technique maps a block of information bits into two information carrying units, namely, a symbol…

Read More
(This article belongs to the SP3 (Special issue on Recent Advances in Engineering Systems 2017) & Section Telecommunications (TEL))
Open AccessArticle
6 Pages, 672 KB Download PDF

An efficient model to improve the performance of platelet inventory of the blood banks

Advances in Science, Technology and Engineering Systems Journal, Volume 2, Issue 3, Page # 839–844, 2017; DOI: 10.25046/aj0203104
Abstract:

Platelet transfusions are vital for the prevention of fatal hemorrhage. Therefore, a stable inventory of platelets is required for an efficient and effective delivery of services in all the hospitals and medical centers. However, over the past decades, the requirement for platelets seems to be continuously increasing, while the number of potential donors is decreasing.…

Read More
(This article belongs to the SP3 (Special issue on Recent Advances in Engineering Systems 2017) & Section Biomedical Engineering (EBI))
Open AccessArticle
5 Pages, 965 KB Download PDF

Analysis of Learning Development With Sugeno Fuzzy Logic And Clustering

Advances in Science, Technology and Engineering Systems Journal, Volume 2, Issue 5, Page # 26–30, 2017; DOI: 10.25046/aj020505
Abstract:

In the first journal, I made this attempt to analyze things that affect the achievement of students in each school of course vary. Because students are one of the goals of achieving the goals of successful educational organizations. The mental influence of students’ emotions and behaviors themselves in relation to learning performance. Fuzzy logic can…

Read More
(This article belongs to Section Automation & Control Systems (ACS))
Open AccessArticle
9 Pages, 1,303 KB Download PDF

Collaborative Encryption Algorithm Between Vigenere Cipher, Rotation of Matrix (ROM), and One Time Pad (OTP) Algoritma

Advances in Science, Technology and Engineering Systems Journal, Volume 2, Issue 5, Page # 13–21, 2017; DOI: 10.25046/aj020503
Abstract:

Cryptography is still developing today. Classical cryptography is still in great demand for research and development. Some of them are Vigenere Cipher and One Time Pad (OTP) Algorithm. Vigenere Cipher is known as the alphabet table used to encrypt messages. While OTP is often used because it is still difficult to solve. Currently there are…

Read More
(This article belongs to Section Interdisciplinary Applications of Computer Science (CSI))
Open AccessArticle
11 Pages, 1,545 KB Download PDF

Multi Level Integrity Management in LTE/LTE-A Networks

Advances in Science, Technology and Engineering Systems Journal, Volume 2, Issue 3, Page # 658–668, 2017; DOI: 10.25046/aj020384
Abstract:

The sector of telecommunications is experiencing a large growth and rapid change in developing applications due to the variety of technologies, to increase the number of users and to arrival services varied from the high demand of the service quality such as streaming, web navigation. In this regard, the 3rd Generation Partnership Project (3GPP) organization…

Read More
(This article belongs to the SP3 (Special issue on Recent Advances in Engineering Systems 2017) & Section Telecommunications (TEL))
Open AccessArticle
11 Pages, 913 KB Download PDF

Data Error Detection and Recovery in Embedded Systems: a Literature Review

Advances in Science, Technology and Engineering Systems Journal, Volume 2, Issue 3, Page # 623–633, 2017; DOI: 10.25046/aj020380
Abstract:

This paper presents a literature review on data flow error detection and recovery techniques in embedded systems. In recent years, embedded systems are being used more and more in an enormous number of applications from small mobile device to big medical devices. At the same time, it is becoming important for embedded developers to make…

Read More
(This article belongs to the SP3 (Special issue on Recent Advances in Engineering Systems 2017) & Section Information Systems in Computer Science (CIS))
Open AccessArticle
9 Pages, 5,165 KB Download PDF

Semantic-less Breach Detection of Polymorphic Malware in Federated Cloud

Advances in Science, Technology and Engineering Systems Journal, Volume 2, Issue 3, Page # 553–561, 2017; DOI: 10.25046/aj020371
Abstract:

Cloud computing is one of the largest emerging utility services that is expected to grow enormously over the next decade. Many organizations are moving into hybrid cloud/hosted computing models. Single cloud service provider introduces cost and environmental challenges. Also, multi-cloud solution implemented by the Cloud tenant is suboptimal as it requires expensive adaptation costs. Cloud…

Read More
(This article belongs to the SP3 (Special issue on Recent Advances in Engineering Systems 2017) & Section Interdisciplinary Applications of Computer Science (CSI))
Open AccessArticle
7 Pages, 1,047 KB Download PDF

Optimal Sizing and Control Strategy of renewable hybrid systems PV-Diesel Generator-Battery: application to the case of Djanet city of Algeria

Advances in Science, Technology and Engineering Systems Journal, Volume 2, Issue 3, Page # 485–491, 2017; DOI: 10.25046/aj020362
Abstract:

A method for optimal sizing of hybrid system consisting of a Photovoltaic (PV) panel, diesel generator, Battery banks and load is considered in this paper. To this end a novel approach is proposed. More precisely a methodology for the design and simulation of the behavior of Hybrid system PV-Diesel-Battery banks to electrify an isolated rural…

Read More
(This article belongs to the SP3 (Special issue on Recent Advances in Engineering Systems 2017) & Section Electrical Engineering (ELE))
Open AccessArticle
6 Pages, 700 KB Download PDF

Intrusion detection in cloud computing based attack patterns and risk assessment

Advances in Science, Technology and Engineering Systems Journal, Volume 2, Issue 3, Page # 479–484, 2017; DOI: 10.25046/aj020361
Abstract:

This paper is an extension of work originally presented in SYSCO CONF.We extend our previous work by presenting the initial results of the implementation of intrusion detection based on risk assessment on cloud computing. The idea focuses on a novel approach for detecting cyber-attacks on the cloud environment by analyzing attacks pattern using risk assessment…

Read More
(This article belongs to the SP3 (Special issue on Recent Advances in Engineering Systems 2017) & Section Information Systems in Computer Science (CIS))
Open AccessArticle
9 Pages, 1,289 KB Download PDF

Image Segmentation Using Fuzzy Inference System on YCbCr Color Model

Advances in Science, Technology and Engineering Systems Journal, Volume 2, Issue 3, Page # 460–468, 2017; DOI: 10.25046/aj020359
Abstract:

This paper This paper presents a reliable method for image segmentation using a fuzzy inference system. The Fuzzy Membership function is applied on the YCbCr color space. Triangular membership functions are used in the input of the fuzzy system, Mamdani type fuzzy inference system is applied and for the output universe, singleton-type functions are used;…

Read More
(This article belongs to the SP3 (Special issue on Recent Advances in Engineering Systems 2017) & Section Interdisciplinary Applications of Computer Science (CSI))
Open AccessArticle
11 Pages, 1,022 KB Download PDF

Verifying the Detection Results of Impersonation Attacks in Service Clouds

Advances in Science, Technology and Engineering Systems Journal, Volume 2, Issue 3, Page # 449–459, 2017; DOI: 10.25046/aj020358
Abstract:

A web service impersonation is a class of attacks in which an attacker poses as or assumes the identity of a legitimate service to maliciously utilize that service’s privileges. Providing security for interacting cloud services requires more than user authentication with passwords or digital certificates and confidentiality in data transmission. In this paper, we focus…

Read More
(This article belongs to the SP3 (Special issue on Recent Advances in Engineering Systems 2017) & Section Interdisciplinary Applications of Computer Science (CSI))
Open AccessArticle
6 Pages, 959 KB Download PDF

Principal Component Analysis Application on Flavonoids Characterization

Advances in Science, Technology and Engineering Systems Journal, Volume 2, Issue 3, Page # 435–440, 2017; DOI: 10.25046/aj020356
Abstract:

Flavonoid is one of the bioactive compounds that are currently used in pharmaceutical and medicinal industries due to their health benefit. The focus of current research is mainly on the extraction and isolation of bioactive compounds; however non to date has explored on the identification of flavonoids classes under the Fourier Transform Infrared spectroscopy (FTIR).…

Read More
(This article belongs to the SP3 (Special issue on Recent Advances in Engineering Systems 2017) & Section Pharmacology & Pharmacy (PHR))
Open AccessArticle
7 Pages, 1,776 KB Download PDF

A Highly-Secured Arithmetic Hiding cum Look-Up Table (AHLUT) based S-Box for AES-128 Implementation

Advances in Science, Technology and Engineering Systems Journal, Volume 2, Issue 3, Page # 420–426, 2017; DOI: 10.25046/aj020354
Abstract:

Side-Channel Attack (SCA) is an effective method in extracting the secret key of cryptographic algorithms by correlating the physical leakage information with the processed data. In this paper, we propose an arithmetic hiding cum Look-up Table (AHLUT) based Substitution-Box (S-Box) in AES-128 cryptographic algorithm implementation to countermeasure against SCA. There are three key features in…

Read More
(This article belongs to the SP3 (Special issue on Recent Advances in Engineering Systems 2017) & Section Cybernetics in Computer Science (CCY))
Open AccessArticle
8 Pages, 1,047 KB Download PDF

Computational Intelligence Methods for Identifying Voltage Sag in Smart Grid

Advances in Science, Technology and Engineering Systems Journal, Volume 2, Issue 3, Page # 412–419, 2017; DOI: 10.25046/aj020353
Abstract:

In recent years pattern recognition of power quality (PQ) disturbances in smart grids has developed into crucial topic for system equipments and end-users. Undoubtedly analyzing the PQ disturbances develop and maintain smart grids effectiveness. Voltage sags are the most common events that affect power quality. These faults are also the most costly. This paper represents…

Read More
(This article belongs to the SP3 (Special issue on Recent Advances in Engineering Systems 2017) & Section Electrical Engineering (ELE))

Journal Menu

Journal Browser


Special Issues

Special Issue on Digital Frontiers of Entrepreneurship: Integrating AI, Gender Equity, and Sustainable Futures
Guest Editors: Dr. Muhammad Nawaz Tunio, Dr. Aamir Rashid, Dr. Imamuddin Khoso
Deadline: 30 May 2026

Special Issue on Sustainable Technologies for a Resilient Future
Guest Editors: Dr. Debasis Mitra, Dr. Sourav Chattaraj, Dr. Addisu Assefa
Deadline: 30 April 2026