Search Results

Results (722)

Search Parameters:

Keyword: ITS
Order results
Results per page
Open AccessArticle
10 Pages, 902 KB Download PDF

Harmonic Sensitivity Analysis of Power System with Wind Power

Advances in Science, Technology and Engineering Systems Journal, Volume 3, Issue 5, Page # 6–15, 2018; DOI: 10.25046/aj030502
Abstract:

As the contribution from renewable energy sources increase, the power quality degradation has become a challenge for the power system operator. There are major two factors causing power quality deterioration. First is the current harmonic generation by the power electronic converters used in renewable energy sources, and second is the magnification of harmonic voltage due…

Read More
(This article belongs to the SP5 (Special Issue on Multidisciplinary Sciences and Engineering 2018) & Section Electrical Engineering (ELE))
Open AccessArticle
5 Pages, 270 KB Download PDF

Evaluation of Methods for Sentence Similarity for Use in Intelligent Tutoring System

Advances in Science, Technology and Engineering Systems Journal, Volume 3, Issue 5, Page # 1–5, 2018; DOI: 10.25046/aj030501
Abstract:

Finding similarity of textual data is very important task in natural language processing. In this article we present approach to finding similarity of words, paragraphs, sentences and documents. Semantic similarity is one of the central tasks in many applications, including text summarization, Intelligent Tutoring Systems (ITS) etc. In ITS sentence similarity is used to compare…

Read More
(This article belongs to the SP5 (Special Issue on Multidisciplinary Sciences and Engineering 2018) & Section Artificial Intelligence in Computer Science (CAI))
Open AccessArticle
6 Pages, 1,005 KB Download PDF

IR Sensing Embedded System Development for Prototype Mobile Platform and Multisensory Data Fusion for Autonomous Convoy

Advances in Science, Technology and Engineering Systems Journal, Volume 3, Issue 4, Page # 372–377, 2018; DOI: 10.25046/aj030438
Abstract:

Advanced sensing technologies are providing for greater capabilities to discern and classify details of objects as they appear in actual environments as experienced by nonprofessional drivers. Distinctive geometric configurations of new sensory devices including but not limited to infrared (abbreviated as IR) and LIDAR sensory units are appearing as cost effective data acquisition systems for…

Read More
(This article belongs to the SP5 (Special Issue on Multidisciplinary Sciences and Engineering 2018) & Section Automation & Control Systems (ACS))
Open AccessArticle
13 Pages, 928 KB Download PDF

Defined Limited Fractional Channel Scheme for Call Admission Control by Two-Dimensional Markov Process based Statistical Modeling

Advances in Science, Technology and Engineering Systems Journal, Volume 3, Issue 4, Page # 295–307, 2018; DOI: 10.25046/aj030430
Abstract:

The increasing demand for advanced services in wireless networks raises the problem for quality of service (QoS) provisioning with proper resource management. In this research work, such a provisioning technique for wireless networks is performed by Call Admission Control (CAC). A new approach in CAC named by Defined Limited Fractional Channel (DLFC) is proposed in…

Read More
(This article belongs to Section Electronic Engineering (EEE))
Open AccessArticle
6 Pages, 810 KB Download PDF

Textural Analysis of Pap Smears Images for k-NN and SVM Based Cervical Cancer Classification System

Advances in Science, Technology and Engineering Systems Journal, Volume 3, Issue 4, Page # 218–223, 2018; DOI: 10.25046/aj030420
Abstract:

Early detection and treatment of cervical cancer is crucial to patients’ recovery with a reported success rate of nearly 100%. Presently, Pap smear test which is a visual inspection of cells collected from the ectocervix is the screening tool mainly used in cancer prevention programs. The Pap smear is relatively easy to handle however, it…

Read More
(This article belongs to Section Artificial Intelligence in Computer Science (CAI))
Open AccessArticle
43 Pages, 1,646 KB Download PDF

Acoustic Signal Processing and Noise Characterization Theory via Energy Conversion in a PV Solar Wall Device with Ventilation through a Room

Advances in Science, Technology and Engineering Systems Journal, Volume 3, Issue 4, Page # 130–172, 2018; DOI: 10.25046/aj030414
Abstract:

Noise defined as ‘a sensation of unwanted intensity of a wave’, is perception of a pollutant and a type of environmental stressor. The unwanted intensity of a wave is a propagation of noise due to transmission of waves (viz. physical agents) such as light, sound, heat, electricity, fluid and fire. The characterization of noise interference,…

Read More
(This article belongs to the SP5 (Special Issue on Multidisciplinary Sciences and Engineering 2018) & Section Telecommunications (TEL))
Open AccessArticle
13 Pages, 2,047 KB Download PDF

Extendable Board Game to Facilitate Learning in Supply Chain Management

Advances in Science, Technology and Engineering Systems Journal, Volume 3, Issue 4, Page # 99–111, 2018; DOI: 10.25046/aj030411
Abstract:

Game-based learning has been introduced as an interactive tool to facilitate learning and training processes in various fields, including supply chain management (SCM). Most of these games are specifically designed to focus on certain scenarios and concepts. For example, the original beer distribution game focuses on a single product supply chain without considering capacity and…

Read More
(This article belongs to the SP5 (Special Issue on Multidisciplinary Sciences and Engineering 2018) & Section Transportation Science & Technology (TST))
Open AccessArticle
6 Pages, 3,109 KB Download PDF

Dc-link voltage drift compensation in a four level Double- Star Converter using redundant states via phase-shifted PWM strategy

Advances in Science, Technology and Engineering Systems Journal, Volume 3, Issue 4, Page # 53–58, 2018; DOI: 10.25046/aj030407
Abstract:

The following work introduces the use of the available Redundant switching states introduced by the double star four level converter topology, for its application in a medium voltage variable speed drive under a wide range of operation loads. Redundant switching states are obtained using multi-carrier phase-shifted pulse width modulation (PWM) strategy. The converter performance is…

Read More
(This article belongs to the SP5 (Special Issue on Multidisciplinary Sciences and Engineering 2018) & Section Electrical Engineering (ELE))
Open AccessArticle
7 Pages, 319 KB Download PDF

Stream Cipher by Reed-Solomon Codes

Advances in Science, Technology and Engineering Systems Journal, Volume 3, Issue 4, Page # 26–32, 2018; DOI: 10.25046/aj030404
Abstract:

Stream cipher can be used in constrained environments to provide information security and reduce energy expense at data transmission. In this paper, it is shown that Reed-Solomon (RS) code can be used to implement stream cipher, which is widely used for error corrections of data in transmission and storages. The proposed stream cipher combines the…

Read More
(This article belongs to the SP5 (Special Issue on Multidisciplinary Sciences and Engineering 2018) & Section Information Systems in Computer Science (CIS))
Open AccessArticle
8 Pages, 912 KB Download PDF

Evaluating the effect of Locking on Multitenancy Isolation for Components of Cloud-hosted Services

Advances in Science, Technology and Engineering Systems Journal, Volume 3, Issue 3, Page # 92–99, 2018; DOI: 10.25046/aj030312
Abstract:

Multitenancy isolation is a way of ensuring that the performance, stored data volume and access privileges required by one tenant and/or component does not affect other tenants and/or components. One of the conditions that can influence the varying degrees of isolation is when locking is enabled for a process or component that is being shared.…

Read More
(This article belongs to the SP5 (Special Issue on Multidisciplinary Sciences and Engineering 2018) & Section Software Engineering in Computer Science (CSE))
Open AccessArticle
6 Pages, 881 KB Download PDF

EAES: Extended Advanced Encryption Standard with Extended Security

Advances in Science, Technology and Engineering Systems Journal, Volume 3, Issue 3, Page # 51–56, 2018; DOI: 10.25046/aj030307
Abstract:

Though AES is the highest secure symmetric cipher at present, many attacks are now effective against AES too which is seen from the review of recent attacks of AES. This paper describes an extended AES algorithm with key sizes of 256, 384 and 512 bits with round numbers of 10, 12 and 14 respectively. Data…

Read More
(This article belongs to Section Information Systems in Computer Science (CIS))
Open AccessArticle
8 Pages, 892 KB Download PDF

A Cyber-Vigilance System for Anti-Terrorist Drives Based on an Unmanned Aerial Vehicular Networking Signal Jammer for Specific Territorial Security

Advances in Science, Technology and Engineering Systems Journal, Volume 3, Issue 3, Page # 43–50, 2018; DOI: 10.25046/aj030306
Abstract:

During sudden anti-terrorist drives conducted by the law enforcement agencies, a localized cyber security system happens to be a special tactic to avert the unprecedented massacre and gruesome fatalities against the residents of that area by disconnecting the affected territory from the rest of the world; so that the militants and their outside accomplices cannot…

Read More
(This article belongs to the SP5 (Special Issue on Multidisciplinary Sciences and Engineering 2018) & Section Telecommunications (TEL))
Open AccessArticle
11 Pages, 1,341 KB Download PDF

Direct Torque Control Strategy Based on the Emulation of Six-Switch Inverter Operation by a Four-Switch Inverter Using an Adaptive Fuzzy Controller

Advances in Science, Technology and Engineering Systems Journal, Volume 3, Issue 2, Page # 346–356, 2018; DOI: 10.25046/aj030237
Abstract:

This paper presents a novel direct torque control (DTC) strategy aimed to four-switch three-phase (FSTP) inverter-fed an interior permanent magnet synchronous machine (IPMSM), using a fuzzy logic toolbox in speed control loop. In fact, the introduced DTC approach is based on the emulation of the operation of the standard six-switch three-phase (SSTP) inverter. This fact…

Read More
(This article belongs to Section Electrical Engineering (ELE))
Open AccessArticle
17 Pages, 1,067 KB Download PDF

Efficient Alignment of Very Long Sequences

Advances in Science, Technology and Engineering Systems Journal, Volume 3, Issue 2, Page # 329–345, 2018; DOI: 10.25046/aj030236
Abstract:

We consider the problem of aligning two very long biological sequences. The score for the best alignment may be found using the Smith-Waterman scoring algorithm while the best alignment itself may be determined using Myers and Miller’s alignment algorithm. Neither of these algorithms takes advantage of computer caches to obtain high efficiency. We propose cache-efficient…

Read More
(This article belongs to the SP5 (Special Issue on Multidisciplinary Sciences and Engineering 2018) & Section Interdisciplinary Applications of Computer Science (CSI))
Open AccessArticle
10 Pages, 1,048 KB Download PDF

Ontology Modeling of Social Roles of Users in Mobile Computing Environments

Advances in Science, Technology and Engineering Systems Journal, Volume 3, Issue 2, Page # 319–328, 2018; DOI: 10.25046/aj030235
Abstract:

Today, computing devices of various types with wireless interconnections are used for diverse tasks and increasingly in ad hoc manners. It is not always obvious which devices are present, reachable, and connected when users and their devices are mobile. In such mobile computing environment, the number of registered lines on the network via network operators…

Read More
(This article belongs to Section Artificial Intelligence in Computer Science (CAI))
Open AccessArticle
10 Pages, 2,583 KB Download PDF

Which User of technology? Perspectivising the UTAUT model by application of the SFL language Pronoun System towards a systems perspective of technology acceptance and use

Advances in Science, Technology and Engineering Systems Journal, Volume 3, Issue 2, Page # 309–318, 2018; DOI: 10.25046/aj030234
Abstract:

This study applies systemic functional linguistics (SFL) as complementary framework of analysis of technology acceptance models (TAMs). The purpose is to bridge research methodology language in international business (IB) studies and engineering management science. Currently TAMs and its consolidated version, the Unified Theory of Acceptance and Use of Technology (UTAUT) provides for a typology of…

Read More
(This article belongs to the SP5 (Special Issue on Multidisciplinary Sciences and Engineering 2018) & Section Interdisciplinary Applications of Computer Science (CSI))
Open AccessArticle
26 Pages, 2,269 KB Download PDF

Design and Implementation of Closed-loop PI Control Strategies in Real-time MATLAB Simulation Environment for Nonlinear and Linear ARMAX Models of HVAC Centrifugal Chiller Control Systems

Advances in Science, Technology and Engineering Systems Journal, Volume 3, Issue 2, Page # 283–308, 2018; DOI: 10.25046/aj030233
Abstract:

The objective of this paper is to investigate three different approaches of modeling, design and discrete-time implementation of PI closed-loop control strategies in SIMULINK simulation environment, applied to a centrifugal chiller system. Centrifugal chillers are widely used in large building HVAC systems. The system consists of an evaporator, a condenser, a centrifugal compressor and an…

Read More
(This article belongs to the SP5 (Special Issue on Multidisciplinary Sciences and Engineering 2018) & Section Automation & Control Systems (ACS))
Open AccessArticle
12 Pages, 3,341 KB Download PDF

Steganography System with Application to Crypto-Currency Cold Storage and Secure Transfer

Advances in Science, Technology and Engineering Systems Journal, Volume 3, Issue 2, Page # 271–282, 2018; DOI: 10.25046/aj030232
Abstract:

In this paper, we introduce and describe a novel approach to adaptive image steganography which is combined with One-Time Pad encryption and demonstrate the software which implements this methodology. Testing using the state-of-the-art steganalysis software tool StegExpose concludes the image hiding is reliably secure and undetectable using reasonably-sized message payloads (≤25% message bits per image…

Read More
(This article belongs to the SP5 (Special Issue on Multidisciplinary Sciences and Engineering 2018) & Section Software Engineering in Computer Science (CSE))
Open AccessArticle
7 Pages, 1,176 KB Download PDF

An Aggregation Model for Energy Resources Management and Market Negotiations

Advances in Science, Technology and Engineering Systems Journal, Volume 3, Issue 2, Page # 231–237, 2018; DOI: 10.25046/aj030227
Abstract:

Currently the use of distributed energy resources, especially renewable generation, and demand response programs are widely discussed in scientific contexts, since they are a reality in nowadays electricity markets and distribution networks. In order to benefit from these concepts, an efficient energy management system is needed to prevent energy wasting and increase profits. In this…

Read More
(This article belongs to the SP4 (Special issue on Advancement in Engineering Technology 2017-18) & Section Energy & Fuels (ENF))
Open AccessArticle
11 Pages, 1,054 KB Download PDF

Fuel Cell/ Super-capacitor power management system assessment and Lifetime Cost study in a 500kVA UPS

Advances in Science, Technology and Engineering Systems Journal, Volume 3, Issue 2, Page # 220–230, 2018; DOI: 10.25046/aj030226
Abstract:

A 500 KVA Uninterruptible power supply (UPS) using Fuel Cells (FC) and super-capacitors (SCs) was studied with the worst case of 10 minutes and eight hours of interruption per day. A power management system was established to control the FC and the SCs in order to extract the hybridization benefits with a comparison between a…

Read More
(This article belongs to Section Electrical Engineering (ELE))
Open AccessArticle
5 Pages, 1,361 KB Download PDF

The impact of Big Data on the Android Mobile Platform for Natural Disaster Situations

Advances in Science, Technology and Engineering Systems Journal, Volume 3, Issue 2, Page # 206–210, 2018; DOI: 10.25046/aj030224
Abstract:

This application developing for the project OCEMA comes as result of architecture building in Android, then the development of a professional modeling in Talend Open Studio for Big Data, which enabled the integration of data from many data sources. One of its uses is the quick identification of people found in areas affected by natural…

Read More
(This article belongs to the SP4 (Special issue on Advancement in Engineering Technology 2017-18) & Section Information Systems in Computer Science (CIS))
Open AccessArticle
10 Pages, 812 KB Download PDF

A Model for Optimising the Deployment of Cloud-hosted Application Components for Guaranteeing Multitenancy Isolation

Advances in Science, Technology and Engineering Systems Journal, Volume 3, Issue 2, Page # 174–183, 2018; DOI: 10.25046/aj030220
Abstract:

Tenants associated with a cloud-hosted application seek to reduce running costs and minimize resource consumption by sharing components and resources. However, despite the benefits, sharing resources can affect tenant’s access and overall performance if one tenant abruptly experiences a significant workload, particularly if the application fails to accommodate this sudden increase in workload. In cases…

Read More
(This article belongs to the SP4 (Special issue on Advancement in Engineering Technology 2017-18) & Section Interdisciplinary Applications of Computer Science (CSI))
Open AccessArticle
10 Pages, 1,643 KB Download PDF

Improving Patient Outcomes Through Untethered Patient-Centered Health Records

Advances in Science, Technology and Engineering Systems Journal, Volume 3, Issue 2, Page # 164–173, 2018; DOI: 10.25046/aj030219
Abstract:

Patient generated data, or personal clinical data, is considered an important aspect in improving patient outcomes. However, personal clinical data is difficult to collect and manage due to its distributed nature. For example, they can be located in multiple places such as doctors’ offices, radiology centers, hospitals, or some clinics. Another factor that can make…

Read More
(This article belongs to the SP4 (Special issue on Advancement in Engineering Technology 2017-18) & Section Artificial Intelligence in Computer Science (CAI))
Open AccessArticle
9 Pages, 884 KB Download PDF

Automated Text Annotation for Social Media Data during Natural Disasters

Advances in Science, Technology and Engineering Systems Journal, Volume 3, Issue 2, Page # 119–127, 2018; DOI: 10.25046/aj030214
Abstract:

Nowadays, text annotation plays an important role within real-time social media mining. Social media analysis provides actionable information to its users in times of natural disasters. This paper presents an approach to a real-time two layer text annotation system for social media stream to the domain of natural disasters. The proposed system annotates raw tweets…

Read More
(This article belongs to the SP4 (Special issue on Advancement in Engineering Technology 2017-18) & Section Interdisciplinary Applications of Computer Science (CSI))
Open AccessArticle
9 Pages, 910 KB Download PDF

Agent Based Fault Detection System for Chemical Processes using Negative Selection Algorithm

Advances in Science, Technology and Engineering Systems Journal, Volume 3, Issue 2, Page # 90–98, 2018; DOI: 10.25046/aj030211
Abstract:

Recently, the number of industrial accidents of chemical plants has been increasing in Japan. The fault detection system is required to keep chemical plant safely. In this study, a fault detection system for a chemical plant using agent framework and negative selection algorithm was proposed. The negative selection algorithm is one of artificial immune systems.…

Read More
(This article belongs to the SP4 (Special issue on Advancement in Engineering Technology 2017-18) & Section Artificial Intelligence in Computer Science (CAI))
1 22 23 24 25 26 29

Journal Menu

Journal Browser


Special Issues

Special Issue on Digital Frontiers of Entrepreneurship: Integrating AI, Gender Equity, and Sustainable Futures
Guest Editors: Dr. Muhammad Nawaz Tunio, Dr. Aamir Rashid, Dr. Imamuddin Khoso
Deadline: 30 May 2026

Special Issue on Sustainable Technologies for a Resilient Future
Guest Editors: Dr. Debasis Mitra, Dr. Sourav Chattaraj, Dr. Addisu Assefa
Deadline: 30 April 2026