Search Results

Results (468)

Search Parameters:

Keyword: BER
Order results
Results per page
Open AccessArticle
7 Pages, 897 KB Download PDF

Effect of Cover Number on Distilled Water Production of Distillers with a Novel Water Feeding

Advances in Science, Technology and Engineering Systems Journal, Volume 5, Issue 5, Page # 913–919, 2020; DOI: 10.25046/aj0505111
Abstract:

An experimental study on the effect of a cover number of solar distillers with a continuous seawater feeding system was conducted. The seawater feeding in this study was a continuous feeding, which was not utilized yet in the previous studies. Three identical distillers i.e. single caver distiller, double cover distiller, and triple cover distiller were…

Read More
(This article belongs to the SP9 (Special Issue on Multidisciplinary Innovation in Engineering Science & Technology 2020) & Section Water Resources (WRS))
Open AccessArticle
9 Pages, 996 KB Download PDF

Review of Pedagogical Principles of Cyber Security Exercises

Advances in Science, Technology and Engineering Systems Journal, Volume 5, Issue 5, Page # 592–600, 2020; DOI: 10.25046/aj050572
Abstract:

Modern digitalized cyber domains are extremely complex ensemble. Cyber attacks or incidents against system may affect capricious effects for another system or even for physical devices. For understanding and training to encounter those effects requires an effective and complex simulation capability. Cyber Security Exercises are an effective expedient for training and learning measures and operations…

Read More
(This article belongs to the SP9 (Special Issue on Multidisciplinary Innovation in Engineering Science & Technology 2020) & Section Interdisciplinary Applications of Computer Science (CSI))
Open AccessArticle
8 Pages, 706 KB Download PDF

An Explanatory Review on Cybersecurity Capability Maturity Models

Advances in Science, Technology and Engineering Systems Journal, Volume 5, Issue 4, Page # 762–769, 2020; DOI: 10.25046/aj050490
Abstract:

Cybersecurity is growing exponentially day by day in both the public and private sectors. This growth also comes with a new and dynamic cyber-threats risk that causes both sectors’ performance to halt. These sectors must update their cybersecurity measures and must understand the capability and maturity of their organization’s cybersecurity preparedness. Cybersecurity maturity models are…

Read More
(This article belongs to the SP10 (Special Issue on Multidisciplinary Sciences and Engineering 2020-21) & Section Interdisciplinary Applications of Computer Science (CSI))
Open AccessArticle
11 Pages, 2,283 KB Download PDF

A Survey and an IoT Cybersecurity Recommendation for Public and Private Hospitals in Ecuador

Advances in Science, Technology and Engineering Systems Journal, Volume 5, Issue 3, Page # 518–528, 2020; DOI: 10.25046/aj050364
Abstract:

It was analyzed the reference information on Cybersecurity architectures, models, standards, evaluations, mechanisms, and procedures applied to IoT domains, and public and private health area. The problem is the lack of proposals for IoT Cybersecurity in public and private hospitals to minimize random failures, ensure the privacy of personal data of patients, avoid the paralysis…

Read More
(This article belongs to Section Interdisciplinary Applications of Computer Science (CSI))
Open AccessArticle
8 Pages, 901 KB Download PDF

Applications of Causal Modeling in Cybersecurity: An Exploratory Approach

Advances in Science, Technology and Engineering Systems Journal, Volume 5, Issue 3, Page # 380–387, 2020; DOI: 10.25046/aj050349
Abstract:

Our research investigates the use of causal modeling and its application towards mapping out cybersecurity threat patterns. We test the strength of various methods of data breaches over its impact on the breach’s discovery time as well as the number of records lost. Utilizing a Causal Modeling framework, we simulate the isolation of confounding variables…

Read More
(This article belongs to the SP8 (Special Issue on Multidisciplinary Sciences and Engineering 2019-20) & Section Interdisciplinary Applications of Computer Science (CSI))
Open AccessArticle
7 Pages, 1,402 KB Download PDF

Automated Abaca Fiber Grade Classification Using Convolution Neural Network (CNN)

Advances in Science, Technology and Engineering Systems Journal, Volume 5, Issue 3, Page # 207–213, 2020; DOI: 10.25046/aj050327
Abstract:

This paper presents a solution that automates Abaca fiber grading which would help the time-consuming baling of Abaca fiber produce. The study introduces an objective instrument paired with a system to automate the grade classification of Abaca fiber using Convolutional Neural Network (CNN). In this study, 140 sample images of abaca fibers were used, which…

Read More
(This article belongs to Section Software Engineering in Computer Science (CSE))
Open AccessArticle
10 Pages, 703 KB Download PDF

Intrusion Detection in Cyber Security: Role of Machine Learning and Data Mining in Cyber Security

Advances in Science, Technology and Engineering Systems Journal, Volume 5, Issue 3, Page # 72–81, 2020; DOI: 10.25046/aj050310
Abstract:

In recent years, cyber security has been received interest from several research communities with respect to Intrusion Detection System (IDS). Cyber security is “a fast-growing field demanding a great deal of attention because of remarkable progresses in social networks, cloud and web technologies, online banking, mobile environment, smart grid, etc.” An IDS is a software…

Read More
(This article belongs to Section Hardware & Architecture in Computer Science (CHA))
Open AccessArticle
5 Pages, 1,329 KB Download PDF

Classification of Timber Load on Trucks

Advances in Science, Technology and Engineering Systems Journal, Volume 5, Issue 2, Page # 683–687, 2020; DOI: 10.25046/aj050284
Abstract:

All trucks heading into the paper mill MONDI, Slovakia, have to pass an automatic security check. It controls if storage of its wood load meets all standards of safety. Each truck is scanned by a group of 2D scanners. After that the inspection of timber load is done by a software with use of the…

Read More
(This article belongs to the SP8 (Special Issue on Multidisciplinary Sciences and Engineering 2019-20) & Section Artificial Intelligence in Computer Science (CAI))
Open AccessArticle
8 Pages, 1,703 KB Download PDF

In-Plane Shear Behavior of Unreinforced Masonry Walls Strengthened with Fiber Reinforced Polymer Composites

Advances in Science, Technology and Engineering Systems Journal, Volume 5, Issue 2, Page # 360–367, 2020; DOI: 10.25046/aj050247
Abstract:

Unreinforced masonry (URM) wall is one of the oldest types of walls used around the world. During earthquakes, URM walls present a real danger to life safety due to their behavior characterized by a brittle failure caused by their feeble shear resistance to in-plane loads, which make their strengthening necessary. Numerous studies had been used…

Read More
(This article belongs to Section Civil Engineering (ECV))
Open AccessArticle
10 Pages, 831 KB Download PDF

Analysis of Cyberattacks in Public Organizations in Latin America

Advances in Science, Technology and Engineering Systems Journal, Volume 5, Issue 2, Page # 116–125, 2020; DOI: 10.25046/aj050215
Abstract:

It was analyzed certain information about cyberattacks in Latin America and methods to counteract the aggressions that affect services, data and infrastructure. The problem is the cyberattack on information networks where there is interdependence between processes, people and devices within public organizations with the negative consequence of denial of services. The objective is to propose…

Read More
(This article belongs to Section Information Systems in Computer Science (CIS))
Open AccessArticle
6 Pages, 1,390 KB Download PDF

Analysis of Reducing Defect Waste in Rubber Product for Magnetic Disk Drive Industry

Advances in Science, Technology and Engineering Systems Journal, Volume 5, Issue 1, Page # 355–360, 2020; DOI: 10.25046/aj050145
Abstract:

Productivity is increasing when less input was used in getting the same outcomes. Thus, the effectiveness of productive effort, especially in industry, as measured in terms of the rate of output per unit of input. As in derivative rubber industry which is producing the seal product for final assembly of Disc Drive. The function of…

Read More
(This article belongs to Section Electronic Engineering (EEE))
Open AccessArticle
5 Pages, 2,229 KB Download PDF

Intelligent Wireless System for PV Supervision Based on The Raspberry Pi

Advances in Science, Technology and Engineering Systems Journal, Volume 4, Issue 6, Page # 94–98, 2019; DOI: 10.25046/aj040611
Abstract:

Photovoltaic systems and monitoring go hand in hand. There is no better way to check the health of your photovoltaic system than to utilize a remote monitoring system. Monitoring and tracking of photovoltaic systems are crucial for reliable functioning and optimal yield of any solar electric system. This paper aims to introduce a remote electronic…

Read More
(This article belongs to the isaect-18 (Special Issue on Advanced Electrical and Communication Technologies 2019) & Section Green & Sustainable Science & Technology (GSS))
Open AccessArticle
3 Pages, 842 KB Download PDF

The Influence of Adhesive on Roof Tiles Product from Water Hyacinth Fiber Residues

Advances in Science, Technology and Engineering Systems Journal, Volume 4, Issue 6, Page # 91–93, 2019; DOI: 10.25046/aj040610
Abstract:

Problem statement: In general, the water hyacinth is a biennial aquatic plant for many seasons with propagated quickly to become serious weeds in general water sources. The water hyacinth is caused carbon dioxide in the atmosphere as a greenhouse effect, which leads to climate change, the environmental concerns of the world today. The agricultural residue…

Read More
(This article belongs to Section Ecology (ECO))
Open AccessArticle
9 Pages, 5,642 KB Download PDF

A Proposal of TCP Fairness Control Method for Two-Host Concurrent Communications in Elastic WLAN System Using Raspberry Pi Access-Point

Advances in Science, Technology and Engineering Systems Journal, Volume 4, Issue 6, Page # 10–18, 2019; DOI: 10.25046/aj040602
Abstract:

The IEEE802.11n based Wireless Local Area Networks (WLANs) have been extensively deployed due to the flexible coverage, the easy installation, and the lower cost. To reduce the energy consumption while increasing the performance, the elastic WLAN system has been studied, such that it can dynamically change the network configuration according to traffic demands. As well,…

Read More
(This article belongs to the SP8 (Special Issue on Multidisciplinary Sciences and Engineering 2019-20) & Section Network Engineering (ENW))
Open AccessArticle
9 Pages, 575 KB Download PDF

Fully Homomorphic Encryption Scheme Based On Complex Numbers

Advances in Science, Technology and Engineering Systems Journal, Volume 4, Issue 5, Page # 30–38, 2019; DOI: 10.25046/aj040504
Abstract:

In this paper, we present a new Somewhat Homomorphic Encryption (SHE) scheme using computation over complex numbers. We then use Bootstrapping technique to make the scheme Fully Homomorphic (FH) and supports unbounded number of circuit depth. In addition to its homomorphic properties and security level, a main characteristic of the proposed new scheme is its…

Read More
(This article belongs to the SP7 (Special Issue on Advancement in Engineering and Computer Science 2019) & Section Interdisciplinary Applications of Computer Science (CSI))
Open AccessArticle
5 Pages, 1,183 KB Download PDF

Experimental Evaluation of Transmission between Two XBee Modules Using Radio-over-Fiber Technique

Advances in Science, Technology and Engineering Systems Journal, Volume 4, Issue 4, Page # 128–132, 2019; DOI: 10.25046/aj040415
Abstract:

An experimental transmission between two XBee modules using Radio over Fiber technique is demonstrated. Data issued from an XBee module coded on a wireless microwave carrier at 2.44GHz is transmitted through an optical link of 25.24 km. The optical transmission is based on an external modulation scheme over a dispersive channel. Frequency response of the…

Read More
(This article belongs to the SP7 (Special Issue on Advancement in Engineering and Computer Science 2019) & Section Optics (OPT))
Open AccessArticle
8 Pages, 1,396 KB Download PDF

Linearity Improvement of VCSELs based Radio over Fiber Systems utilizing Digital Predistortion

Advances in Science, Technology and Engineering Systems Journal, Volume 4, Issue 3, Page # 156–163, 2019; DOI: 10.25046/aj040321
Abstract:

The article proposes a Digital Predistortion (DPD) methodology that substantially meliorates the linearity of limited range Mobile Front Haul links for the extant Long-Term Evolution (LTE) and future (5G) networks. Specifically, the DPD is employed to Radio over Fiber links that contrive of Vertical Cavity Surface Emitting Lasers (VCSELs) working at 850 nm. Both, Memory…

Read More
(This article belongs to the SP7 (Special Issue on Advancement in Engineering and Computer Science 2019) & Section Optics (OPT))
Open AccessArticle
6 Pages, 409 KB Download PDF

PAPR and BER Performances of OFDM System with Novel Tone Reservation Technique Over Frequency Non-Selective Fading Channel

Advances in Science, Technology and Engineering Systems Journal, Volume 4, Issue 1, Page # 225–230, 2019; DOI: 10.25046/aj040122
Abstract:

An Orthogonal Frequency Division Multiplexing (OFDM) system with Quadrature Phase Shift Keying (QPSK) mapper is considered. A novel low-complexity Tone Reservation (TR) technique is proposed for reduction of Peak-to-Average Power Ratio (PAPR) of the system. The technique is easy-to-implement and minimizes the search space of phases of reserved tones in the system. The ability of…

Read More
(This article belongs to the SP6 (Special Issue on Recent Advances in Engineering Systems 2018-19) & Section Telecommunications (TEL))
Open AccessArticle
8 Pages, 910 KB Download PDF

Probabilistic Method for Anomalies Detection Based on the Analysis of Cyber Parameters in a Group of Mobile Robots

Advances in Science, Technology and Engineering Systems Journal, Volume 3, Issue 6, Page # 281–288, 2018; DOI: 10.25046/aj030636
Abstract:

This article is devoted to the issues of ensuring the security of a group of mobile robots in the implementation of attacks aimed at the property of accessibility of information and the availability of network nodes. The article presents a method for detecting an abnormal behavior of a network node based on the analysis by…

Read More
(This article belongs to the SP5 (Special Issue on Multidisciplinary Sciences and Engineering 2018) & Section Interdisciplinary Applications of Computer Science (CSI))
Open AccessArticle
4 Pages, 759 KB Download PDF

Elliptical Printed Dipole Antenna Design using ANN Based on Levenberg–Marquardt Algorithm

Advances in Science, Technology and Engineering Systems Journal, Volume 3, Issue 5, Page # 394–397, 2018; DOI: 10.25046/aj030545
Abstract:

A design of elliptical printed dipole antenna based on neural network approach is presented in this paper for recent WiMAX, Bluetooth, WLAN, LTE, and future 5G applications. The dipole patch is printed on top of substrate which has relative permittivity of 2.2 and 0.787mm of thickness. The elliptical dipole antenna is single band and the…

Read More
(This article belongs to the SP5 (Special Issue on Multidisciplinary Sciences and Engineering 2018) & Section Telecommunications (TEL))
Open AccessArticle
7 Pages, 896 KB Download PDF

Performance Enhancement of MIMO-OFDM Using Redundant Residue Number System

Advances in Science, Technology and Engineering Systems Journal, Volume 3, Issue 4, Page # 1–7, 2018; DOI: 10.25046/aj030401
Abstract:

The data transmitted over wireless communication systems are affected by various elements as noise, interference or distortion, and to be able to combat these factors the paper propose the utilization of Redundant Residue Number System (RR NS) coding as a Forward Error Correction (FEC) technique to enhance the performance of MIMO-OFDM communication system compared to…

Read More
(This article belongs to Section Telecommunications (TEL))
Open AccessArticle
8 Pages, 892 KB Download PDF

A Cyber-Vigilance System for Anti-Terrorist Drives Based on an Unmanned Aerial Vehicular Networking Signal Jammer for Specific Territorial Security

Advances in Science, Technology and Engineering Systems Journal, Volume 3, Issue 3, Page # 43–50, 2018; DOI: 10.25046/aj030306
Abstract:

During sudden anti-terrorist drives conducted by the law enforcement agencies, a localized cyber security system happens to be a special tactic to avert the unprecedented massacre and gruesome fatalities against the residents of that area by disconnecting the affected territory from the rest of the world; so that the militants and their outside accomplices cannot…

Read More
(This article belongs to the SP5 (Special Issue on Multidisciplinary Sciences and Engineering 2018) & Section Telecommunications (TEL))
Open AccessArticle
15 Pages, 2,335 KB Download PDF

Design of True Random Numbers Generators with Ternary Physical Unclonable Functions

Advances in Science, Technology and Engineering Systems Journal, Volume 3, Issue 3, Page # 15–29, 2018; DOI: 10.25046/aj030303
Abstract:

Memory based ternary physical unclonable functions contain cells with fuzzy states that are exploited to create multiple sources of physical randomness, and design true random numbers generators. A XOR compiler enhances the randomness of the binary data streams generated with such components, while a modulo-3 addition enhances the randomness of the native ternary data streams,…

Read More
(This article belongs to the SP5 (Special Issue on Multidisciplinary Sciences and Engineering 2018) & Section Electronic Engineering (EEE))
Open AccessArticle
10 Pages, 3,659 KB Download PDF

Numerical Solution of Fuzzy Differential Equations with Z-numbers using Fuzzy Sumudu Transforms

Advances in Science, Technology and Engineering Systems Journal, Volume 3, Issue 1, Page # 66–75, 2018; DOI: 10.25046/aj030108
Abstract:

The uncertain nonlinear systems can be modeled with fuzzy differential equations (FDEs) and the solutions of these equations are applied to analyze many engineering problems. However, it is very difficult to obtain solutions of FDEs. In this paper, the solutions of FDEs are approximated by utilizing the fuzzy Sumudu transform (FST) method. Here, the uncertainties…

Read More
(This article belongs to the SP4 (Special issue on Advancement in Engineering Technology 2017-18) & Section Automation & Control Systems (ACS))
Open AccessArticle
5 Pages, 744 KB Download PDF

Virtual Memory Introspection Framework for Cyber Threat Detection in Virtual Environment

Advances in Science, Technology and Engineering Systems Journal, Volume 3, Issue 1, Page # 25–29, 2018; DOI: 10.25046/aj030104
Abstract:

In today’s information based world, it is increasingly important to safeguard the data owned by any organization, be it intellectual property or personal information. With ever increasing sophistication of malware, it is imperative to come up with an automated and advanced methods of attack vector recognition and isolation. Existing methods are not dynamic enough to…

Read More
(This article belongs to the SP4 (Special issue on Advancement in Engineering Technology 2017-18) & Section Interdisciplinary Applications of Computer Science (CSI))

Journal Menu

Journal Browser


Special Issues

Special Issue on Digital Frontiers of Entrepreneurship: Integrating AI, Gender Equity, and Sustainable Futures
Guest Editors: Dr. Muhammad Nawaz Tunio, Dr. Aamir Rashid, Dr. Imamuddin Khoso
Deadline: 30 May 2026

Special Issue on Sustainable Technologies for a Resilient Future
Guest Editors: Dr. Debasis Mitra, Dr. Sourav Chattaraj, Dr. Addisu Assefa
Deadline: 30 April 2026