Search Results

Results (147)

Search Parameters:

Keyword: ERP
Order results
Results per page
Open AccessArticle
8 Pages, 640 KB Download PDF

The Relationship of Coalition on Employee Spiritual Engagement: Interplay of Organisational Politics

Advances in Science, Technology and Engineering Systems Journal, Volume 4, Issue 6, Page # 45–52, 2019; DOI: 10.25046/aj040606
Abstract:

The objective of the study was to establish the relationship between coalition and employee spiritual engagement. The research was quantitative, and data was administered and retrieved from employees at the selected private radio firms. Content validity was utilised to ascertain the validity of the instrument, and the reliability of the instrument was established using Cronbach’s…

Read More
(This article belongs to Section Behavioral Sciences (BHS))
Open AccessArticle
13 Pages, 4,475 KB Download PDF

An ML-optimized dRRM Solution for IEEE 802.11 Enterprise Wlan Networks

Advances in Science, Technology and Engineering Systems Journal, Volume 4, Issue 6, Page # 19–31, 2019; DOI: 10.25046/aj040603
Abstract:

In an enterprise Wifi network, indoor and dense, co-channel interference is a major issue. Wifi controllers help tackle this problem thanks to radio resource management (RRM). RRM is a fundamental building block of any controller functional architecture. One aim of RRM is to process the radio plan such as to maximize the overall network transmit…

Read More
(This article belongs to the SP8 (Special Issue on Multidisciplinary Sciences and Engineering 2019-20) & Section Network Engineering (ENW))
Open AccessArticle
11 Pages, 1,239 KB Download PDF

ITSM Software Ranking for Small Medium Enterprises Based on ITIL V3 Quick Win Criteria using Fuzzy SIR Method

Advances in Science, Technology and Engineering Systems Journal, Volume 4, Issue 2, Page # 288–298, 2019; DOI: 10.25046/aj040237
Abstract:

There are various software related to the implementation of IT Service Management (ITSM) for a company, including those that are open source and commercial. An input is needed for companies in determining what software to choose from various software, especially for small and medium enterprises (SMEs) that have limited human and financial resources. In this…

Read More
(This article belongs to Section Interdisciplinary Applications of Computer Science (CSI))
Open AccessArticle
13 Pages, 2,043 KB Download PDF

Educational Domain Management Knowledge Content Identification and Knowledge Updating Method, Based on Enterprise Management Information Interactions

Advances in Science, Technology and Engineering Systems Journal, Volume 4, Issue 2, Page # 140–152, 2019; DOI: 10.25046/aj040219
Abstract:

The aim of this paper is to develop the educational domain management knowledge content identification and knowledge updating method, based on formal descriptions of enterprise management information interactions. This is very important because the progress of modern science leads to the emergence of new factual or conceptual knowledge. There is a need for proper methods…

Read More
(This article belongs to the SP7 (Special Issue on Advancement in Engineering and Computer Science 2019) & Section Interdisciplinary Applications of Computer Science (CSI))
Open AccessArticle
7 Pages, 354 KB Download PDF

Theoretical developments for interpreting kernel spectral clustering from alternative viewpoints

Advances in Science, Technology and Engineering Systems Journal, Volume 2, Issue 3, Page # 1670–1676, 2017; DOI: 10.25046/aj0203208
Abstract:

To perform an exploration process over complex structured data within unsupervised settings, the so-called kernel spectral clustering (KSC) is one of the most recommended and appealing approaches, given its versatility and elegant formulation. In this work, we explore the relationship between (KSC) and other well-known approaches, namely normalized cut clustering and kernel k-means. To do…

Read More
(This article belongs to the SP3 (Special issue on Recent Advances in Engineering Systems 2017) & Section Artificial Intelligence in Computer Science (CAI))
Open AccessArticle
10 Pages, 1,268 KB Download PDF

Cognitive Artificial Intelligence Method for Interpreting Transformer Condition Based on Maintenance Data

Advances in Science, Technology and Engineering Systems Journal, Volume 2, Issue 3, Page # 1137–1146, 2017; DOI: 10.25046/aj0203143
Abstract:

A3S(Arwin-Adang-Aciek-Sembiring) is a method of information fusion at a single observation and OMA3S(Observation Multi-time A3S) is a method of information fusion for time-series data. This paper proposes OMA3S-based Cognitive Artificial-Intelligence method for interpreting Transformer Condition, which is calculated based on maintenance data from Indonesia National Electric Company (PLN). First, the proposed method is tested using…

Read More
(This article belongs to the SP3 (Special issue on Recent Advances in Engineering Systems 2017) & Section Electrical Engineering (ELE))
Open AccessArticle
12 Pages, 1,419 KB Download PDF

Methodology for Management of Information Security in Industrial Control Systems: A Proof of Concept aligned with Enterprise Objectives.

Advances in Science, Technology and Engineering Systems Journal, Volume 2, Issue 3, Page # 88–99, 2017; DOI: 10.25046/aj020313
Abstract:

This article is an extended version of the study presented at the IEEE Ecuador Technical Chapters Meeting (ETCM)-2016. At that time, a methodological proposal was designed, implemented, and applied in a group of industrial plants for the management of the information security of the Industrial control systems (ICS). The present study displays an adaptation and…

Read More
(This article belongs to the SP3 (Special issue on Recent Advances in Engineering Systems 2017) & Section Information Systems in Computer Science (CIS))
Open AccessArticle
10 Pages, 739 KB Download PDF

System Testing Evaluation for Enterprise Resource Planning to Reduce Failure Rate

Advances in Science, Technology and Engineering Systems Journal, Volume 2, Issue 1, Page # 6–15, 2016; DOI: 10.25046/aj020102
Abstract:

Enterprise Resource Planning (ERP) systems are widely used applications to manage resources, communication and data exchange between different departments and modules with the purpose of managing the overall business process of the organization using one integrated software system. Due to the large scale and the complexity nature of these systems, many ERP implementation projects have…

Read More
(This article belongs to the SP2 (Special Issue on Computer Systems, Information Technology, Electrical and Electronics Engineering 2017) & Section Artificial Intelligence in Computer Science (CAI))
Open AccessArticle
14 Pages, 3,471 KB Download PDF

Computationally Efficient Explainable AI Framework for Skin Cancer Detection

Advances in Science, Technology and Engineering Systems Journal, Volume 11, Issue 1, Page # 11–24, 2026; DOI: 10.25046/aj110102
Abstract:

Skin cancer stands among some of the fastest growing and fatal malignancies of the world as a result early and accurate diagnosis of skin cancer is essential in order to enhance patient survival and treatment prognosis. Conventional methods of diagnosis including dermoscopy and histopathological examinations are expensive and time consuming also subject to inter-observer error.…

Read More
(This article belongs to the ADAIS26 (Special Issue on Advances in Data-Driven Analytics and Intelligent Systems 2026) & Section Artificial Intelligence in Computer Science (CAI))
Open AccessArticle
22 Pages, 15,097 KB Download PDF

TIMeFoRCE: An Identity and Access Management Framework for IoT Devices in A Zero Trust Architecture

Advances in Science, Technology and Engineering Systems Journal, Volume 10, Issue 6, Page # 1–22, 2025; DOI: 10.25046/aj100601
Abstract:

Zero Trust Architecture offers a transformative approach to network security by emphasizing ”never trust, always verify.” IoT devices, while increasingly integral to modern ecosystems, pose unique challenges for identity management and access control due to their constrained processing power, memory, and energy capabilities. In a Zero Trust framework, every IoT device is treated as a…

Read More
(This article belongs to the SP19 (Special Issue on Innovation in Computing, Engineering Science & Technology 2025-26) & Section Telecommunications (TEL))
Open AccessArticle
10 Pages, 31,390 KB Download PDF

Implementation and Simulation of Sequential Adverse Condition Scenarios for Autonomous Driving

Advances in Science, Technology and Engineering Systems Journal, Volume 10, Issue 5, Page # 1–10, 2025; DOI: 10.25046/aj100501
Abstract:

Establishing an environment that allows for the quantitative evaluation of the ability of autonomous driving systems to respond to real-world adverse conditions is crucial to ensuring their safety and reliability. This study proposes a dynamic scenario-based simulation framework that simulates complex and sequential hazardous scenarios frequently encountered in actual road environments. The proposed scenarios are…

Read More
(This article belongs to the SP19 (Special Issue on Innovation in Computing, Engineering Science & Technology 2025-26) & Section Transportation Science & Technology (TST))
Open AccessArticle
9 Pages, 3,765 KB Download PDF

Integrating Speech and Gesture for Generating Reliable Robotic Task Configuration

Advances in Science, Technology and Engineering Systems Journal, Volume 9, Issue 4, Page # 51–59, 2024; DOI: 10.25046/aj090406
Abstract:

This paper presents a system that combines speech and pointing gestures along with four distinct hand gestures to precisely identify both the object of interest and parameters for robotic tasks. We utilized skeleton landmarks to detect pointing gestures and determine their direction, while a pre-trained model, trained on 21 hand landmarks from 2D images, was…

Read More
(This article belongs to the SP16 (Special Issue on Computing, Engineering and Multidisciplinary Sciences 2024) & Section Robotics (ROB))
Open AccessArticle
7 Pages, 1,851 KB Download PDF

From Sensors to Data: Model and Architecture of an IoT Public Network

Advances in Science, Technology and Engineering Systems Journal, Volume 9, Issue 4, Page # 14–20, 2024; DOI: 10.25046/aj090403
Abstract:

RetePAIoT of Emilia-Romagna region is an IoT Public Network, financed by Emilia-Romagna Region and developed by Lepida Scpa, where citizens, private companies and Public Administrations can integrate free of charge their own sensors of any type and anywhere in the region. The main objective of the project is to provide a facility to implement the…

Read More
(This article belongs to Section Hardware & Architecture in Computer Science (CHA))
Open AccessArticle
17 Pages, 2,552 KB Download PDF

Evaluation of Various Deep Learning Models for Short-Term Solar Forecasting in the Arctic using a Distributed Sensor Network

Advances in Science, Technology and Engineering Systems Journal, Volume 9, Issue 3, Page # 12–28, 2024; DOI: 10.25046/aj090302
Abstract:

The solar photovoltaic (PV) power generation industry has experienced substantial, ongoing growth over the past decades as a clean, cost-effective energy source. As electric grids use ever-larger proportions of solar PV, the technology’s inherent variability—primarily due to clouds—poses a challenge to maintaining grid stability. This is especially true for geographically dense, electrically isolated grids common…

Read More
(This article belongs to the SP16 (Special Issue on Computing, Engineering and Multidisciplinary Sciences 2024) & Section Electrical Engineering (ELE))
Open AccessArticle
12 Pages, 1,016 KB Download PDF

Enhancing the Network Anomaly Detection using CNN-Bidirectional LSTM Hybrid Model and Sampling Strategies for Imbalanced Network Traffic Data

Advances in Science, Technology and Engineering Systems Journal, Volume 9, Issue 1, Page # 67–78, 2024; DOI: 10.25046/aj090107
Abstract:

The cybercriminal utilized the skills and freely available tools to breach the networks of internet-connected devices by exploiting confidentiality, integrity, and availability. Network anomaly detection is crucial for ensuring the security of information resources. Detecting abnormal network behavior poses challenges because of the extensive data, imbalanced attack class nature, and the abundance of features in…

Read More
(This article belongs to the SP16 (Special Issue on Computing, Engineering and Multidisciplinary Sciences 2024) & Section Cybernetics in Computer Science (CCY))
Open AccessArticle
7 Pages, 2,708 KB Download PDF

Analysis of Emotions and Movements of Asian and European Facial Expressions

Advances in Science, Technology and Engineering Systems Journal, Volume 9, Issue 1, Page # 42–48, 2024; DOI: 10.25046/aj090105
Abstract:

The aim of this study is to develop an advanced framework that not only recognize the dominant facial emotion, but also contains modules for gesture recognition and text-to-speech recognition. Each module is meticulously designed and integrated into unified system. The implemented models have been revised, with the results presented through graphical representations, providing prevalent emotions…

Read More
(This article belongs to the SP15 (Special Issue on Innovation in Computing, Engineering Science & Technology 2023) & Section Interdisciplinary Applications of Computer Science (CSI))
Open AccessArticle
11 Pages, 1,143 KB Download PDF

Optimizing the Performance of Network Anomaly Detection Using Bidirectional Long Short-Term Memory (Bi-LSTM) and Over-sampling for Imbalance Network Traffic Data

Advances in Science, Technology and Engineering Systems Journal, Volume 8, Issue 6, Page # 144–154, 2023; DOI: 10.25046/aj080614
Abstract:

Cybercriminal exploits integrity, confidentiality, and availability of information resources. Cyberattacks are typically invisible to the naked eye, even though they target a wide range of our digital assets, such as internet-connected smart devices, computers, and networking devices. Implementing network anomaly detection proves to be an effective method for identifying these malicious activities. The traditional anomaly…

Read More
(This article belongs to the SP15 (Special Issue on Innovation in Computing, Engineering Science & Technology 2023) & Section Cybernetics in Computer Science (CCY))
Open AccessArticle
7 Pages, 972 KB Download PDF

Tree-Based Ensemble Models, Algorithms and Performance Measures for Classification

Advances in Science, Technology and Engineering Systems Journal, Volume 8, Issue 6, Page # 19–25, 2023; DOI: 10.25046/aj080603
Abstract:

An ensemble method is a Machine Learning (ML) algorithm that aggregates the predictions of multiple estimators or models. The purpose of an ensemble module is to provide better predictive performance than any single contributing model. This can be achieved by producing a predictive model with reduced variance using bagging, and bias using boosting. The Tree-Based…

Read More
(This article belongs to the SP15 (Special Issue on Innovation in Computing, Engineering Science & Technology 2023) & Section Artificial Intelligence in Computer Science (CAI))
Open AccessArticle
9 Pages, 4,913 KB Download PDF

SEVEN ReImagined: A Transmedia Storytelling Evolution Proposal

Advances in Science, Technology and Engineering Systems Journal, Volume 8, Issue 4, Page # 122–130, 2023; DOI: 10.25046/aj080414
Abstract:

“Seven ReImagined” is an innovative transmedia storytelling project that reshapes the exploration of the seven deadly sins in a modern context. Building upon the original artwork “Seven”, this venture incorporates traditional media, digital tools, and the latest immersive technologies to cultivate profound user engagement and interaction. The project’s objective is to enhance understanding of timeless…

Read More
(This article belongs to Section Interdisciplinary Applications of Computer Science (CSI))
Open AccessArticle
11 Pages, 1,210 KB Download PDF

Colorized iVAT Images for Labeled Data

Advances in Science, Technology and Engineering Systems Journal, Volume 8, Issue 4, Page # 111–121, 2023; DOI: 10.25046/aj080413
Abstract:

A 2-dimensional numerical data set X = {x1,…,xn} with associated category labels {l1,…,ln} can be accurately represented in a 2-dimensional scatterplot where color is used to represent each datum’s label. The colorized scatterplot indicates the presence or absence of spatial clusters in X and any special distribution of labels among those clusters. The same approach…

Read More
(This article belongs to the SP15 (Special Issue on Innovation in Computing, Engineering Science & Technology 2023) & Section Information Systems in Computer Science (CIS))
Open AccessArticle
10 Pages, 903 KB Download PDF

Application of Lean Practices in Food Supply Chain: The Case of Morocco

Advances in Science, Technology and Engineering Systems Journal, Volume 8, Issue 4, Page # 101–110, 2023; DOI: 10.25046/aj080412
Abstract:

Recent studies show the benefits of lean manufacturing implementation in agri-food industries to improve operational and environmental performance. However, only a restricted number of studies have addressed the implementation of lean practices in food companies located in developing countries. This study aims to assess the current implementation status of lean practices in Moroccan agri-food companies,…

Read More
(This article belongs to Section Industrial Engineering (EID))
Open AccessArticle
19 Pages, 1,572 KB Download PDF

A Circuit Designer’s Perspective to MOSFET Behaviour: Common Questions and Practical Insights

Advances in Science, Technology and Engineering Systems Journal, Volume 8, Issue 4, Page # 41–59, 2023; DOI: 10.25046/aj080406
Abstract:

Metal Oxide Semiconductor Field-Effect Transistors are commonly taught in courses for electrical engineers as they are the most common components within integrated circuits. However, despite numerous papers and books on MOSFETs, students still struggle with understanding their behaviour, particularly in the saturation region. This paper presents an expanded explanation of MOSFET behaviour, with a consistent…

Read More
(This article belongs to the SP14 (Special Issue on Computing, Engineering and Multidisciplinary Sciences 2022-23) & Section Electronic Engineering (EEE))
Open AccessArticle
10 Pages, 6,876 KB Download PDF

Inferring Student Needs Based on Facial Expression in Video Images

Advances in Science, Technology and Engineering Systems Journal, Volume 8, Issue 3, Page # 19–28, 2023; DOI: 10.25046/aj080303
Abstract:

Limited interactive communication modes between students and teachers in online environments may lead to teachers misinterpreting or overlooking student needs during online teaching. Students learning online may also hesitate to make their needs known even when latent desires in teaching flow, pacing, and review, may be beneficial to the quality of the learning experience. The…

Read More
(This article belongs to the SP14 (Special Issue on Computing, Engineering and Multidisciplinary Sciences 2022-23) & Section Education (EDU))
Open AccessArticle
20 Pages, 379 KB Download PDF

Hybrid Intrusion Detection Using the AEN Graph Model

Advances in Science, Technology and Engineering Systems Journal, Volume 8, Issue 2, Page # 44–63, 2023; DOI: 10.25046/aj080206
Abstract:

The Activity and Event Network (AEN) is a new dynamic knowledge graph that models different network entities and the relationships between them. The graph is generated by processing various network security logs, such as network packets, system logs, and intrusion detection alerts, which allows the graph to capture security-relevant activity and events in the network.…

Read More
(This article belongs to the SP14 (Special Issue on Computing, Engineering and Multidisciplinary Sciences 2022-23) & Section Hardware & Architecture in Computer Science (CHA))
Open AccessArticle
14 Pages, 7,389 KB Download PDF

Mobility Intelligence: Machine Learning Methods for Received Signal Strength Indicator-based Passive Outdoor Localization

Advances in Science, Technology and Engineering Systems Journal, Volume 7, Issue 6, Page # 269–282, 2022; DOI: 10.25046/aj070631
Abstract:

Knowledge of pedestrian and vehicle movement patterns can provide valuable insights for city planning. Such knowledge can be acquired via passive outdoor localization of WiFi-enabled devices using measurements of Received Signal Strength Indicator (RSSI) from WiFi probe requests. In this paper, which is an extension of the work initially presented in WiMob 2021, we continue…

Read More
(This article belongs to the SP13 (Special Issue on Innovation in Computing, Engineering Science & Technology 2022) & Section Artificial Intelligence in Computer Science (CAI))

Journal Menu

Journal Browser


Special Issues

Special Issue on Digital Frontiers of Entrepreneurship: Integrating AI, Gender Equity, and Sustainable Futures
Guest Editors: Dr. Muhammad Nawaz Tunio, Dr. Aamir Rashid, Dr. Imamuddin Khoso
Deadline: 30 May 2026

Special Issue on Sustainable Technologies for a Resilient Future
Guest Editors: Dr. Debasis Mitra, Dr. Sourav Chattaraj, Dr. Addisu Assefa
Deadline: 30 April 2026