Search Results

Results (722)

Search Parameters:

Keyword: ITS
Order results
Results per page
Open AccessArticle
9 Pages, 1,662 KB Download PDF

An Advanced Algorithm Combining SVM and ANN Classifiers to Categorize Tumor with Position from Brain MRI Images

Advances in Science, Technology and Engineering Systems Journal, Volume 3, Issue 2, Page # 40–48, 2018; DOI: 10.25046/aj030205
Abstract:

Brain tumor is such an abnormality of brain tissue that causes brain hemorrhage. Therefore, apposite detections of brain tumor, its size, and position are the foremost condition for the remedy. To obtain better performance in brain tumor and its stages detection as well as its position in MRI images, this research work proposes an advanced…

Read More
(This article belongs to the SP4 (Special issue on Advancement in Engineering Technology 2017-18) & Section Artificial Intelligence in Computer Science (CAI))
Open AccessArticle
16 Pages, 3,319 KB Download PDF

Two-Stage Performance Engineering of Container-based Virtualization

Advances in Science, Technology and Engineering Systems Journal, Volume 3, Issue 1, Page # 521–536, 2018; DOI: 10.25046/aj030163
Abstract:

Cloud computing has become a compelling paradigm built on compute and storage virtualization technologies. The current virtualization solution in the Cloud widely relies on hypervisor-based technologies. Given the recent booming of the container ecosystem, the container-based virtualization starts receiving more attention for being a promising alternative. Although the container technologies are generally considered to be…

Read More
(This article belongs to the SP4 (Special issue on Advancement in Engineering Technology 2017-18) & Section Information Systems in Computer Science (CIS))
Open AccessArticle
6 Pages, 621 KB Download PDF

An Analysis of K-means Algorithm Based Network Intrusion Detection System

Advances in Science, Technology and Engineering Systems Journal, Volume 3, Issue 1, Page # 496–501, 2018; DOI: 10.25046/aj030160
Abstract:

In this modern age, information technology (IT) plays a role in a number of different fields. And therefore, the role of security is very important to control and assist the flow of activities over the network. Intrusion detection (ID) is a kind of security management system for computers and networks. There are many approaches and…

Read More
(This article belongs to the SP4 (Special issue on Advancement in Engineering Technology 2017-18) & Section Interdisciplinary Applications of Computer Science (CSI))
Open AccessArticle
8 Pages, 791 KB Download PDF

Security Analysis and the Contribution of UPFC for Improving Voltage Stability

Advances in Science, Technology and Engineering Systems Journal, Volume 3, Issue 1, Page # 404–411, 2018; DOI: 10.25046/aj030149
Abstract:

The occurrence of many failures in the power system can lead to power instability and affects the system parameters to go beyond its operating limits. It may lead to obstructing the secure operations and reliability of power systems. Ensuring power system security needs proper actions to be taken for the undesirable contingency. Thus, security analysis…

Read More
(This article belongs to the SP4 (Special issue on Advancement in Engineering Technology 2017-18) & Section Electrical Engineering (ELE))
Open AccessArticle
9 Pages, 897 KB Download PDF

Theoretical Investigation of Combined Use of PSO, Tabu Search and Lagrangian Relaxation methods to solve the Unit Commitment Problem

Advances in Science, Technology and Engineering Systems Journal, Volume 3, Issue 1, Page # 357–365, 2018; DOI: 10.25046/aj030144
Abstract:

Solving the Unit Commitment problem (UCP) optimizes the combination of production units operations and determines the appropriate operational scheduling of each production units to satisfy the expected consumption which varies from one day to one month. Besides, each production unit is conducted to constraints that render this problem complex, combinatorial and nonlinear. In this paper,…

Read More
(This article belongs to the SP4 (Special issue on Advancement in Engineering Technology 2017-18) & Section Electrical Engineering (ELE))
Open AccessArticle
4 Pages, 618 KB Download PDF

LabVIEW-based data acquisition system for Diode I-V Characterization

Advances in Science, Technology and Engineering Systems Journal, Volume 3, Issue 1, Page # 348–351, 2018; DOI: 10.25046/aj030142
Abstract:

This work describes computerized data acquisition system for current-voltage (I-V) characteristics of diodes. The proposed system consist of a personal computer pre-installed with LabVIEW, two units of power supply, an interface board, current and voltage sensors. Two devices under test (DUTs) are selected namely 1N4007 silicon and 1N34 germanium diodes. The current flow through the…

Read More
(This article belongs to the SP4 (Special issue on Advancement in Engineering Technology 2017-18) & Section Electronic Engineering (EEE))
Open AccessArticle
7 Pages, 712 KB Download PDF

A Dynamic Reallocation Based Window Access Scheme for Enhancing QoS of Vehicular Ad-hoc Networks (VANETs)

Advances in Science, Technology and Engineering Systems Journal, Volume 3, Issue 1, Page # 322–328, 2018; DOI: 10.25046/aj030139
Abstract:

This article proposes a new MAC scheme for Vehicle-to-Infrastructure (V2I) communications that dynamically reallocates unused TDMA slots. By maintaining a balanced waiting time, the proposed TDMA based scheduling scheme allocates TDMA slots in a rational way to minimize merging and one-hop neighboring collision. The proposed scheme ensures dynamic reallocation of unused slots by using “time…

Read More
(This article belongs to the SP4 (Special issue on Advancement in Engineering Technology 2017-18) & Section Telecommunications (TEL))
Open AccessArticle
7 Pages, 694 KB Download PDF

A Survey of Security Challenges in Internet of Things

Advances in Science, Technology and Engineering Systems Journal, Volume 3, Issue 1, Page # 274–280, 2018; DOI: 10.25046/aj030133
Abstract:

Internet of things (IoT) is an innovative technology subject to all kind of imaginary and science fictional solutions. Dreams and speculations are still possible about it. A technology combining real life objects and virtual life (Internet) is indeed a fertile pitch of fantasy and original ideas. However, IoT has in practice to face several challenges…

Read More
(This article belongs to Section Telecommunications (TEL))
Open AccessArticle
5 Pages, 652 KB Download PDF

Medium Voltage Microgrid Test Setup and Procedures Implemented on a Real Pilot Project

Advances in Science, Technology and Engineering Systems Journal, Volume 3, Issue 1, Page # 234–238, 2018; DOI: 10.25046/aj030128
Abstract:

This paper presents various concepts related to the application of a microgrid pilot project in a residential condominium at Fortaleza / CE – Brazil, such as battery energy system, renewable and distributed generation, islanding recloser and all different units using interface based on power electronics. This papers main objective is to create information about microgrid…

Read More
(This article belongs to the SP4 (Special issue on Advancement in Engineering Technology 2017-18) & Section Electrical Engineering (ELE))
Open AccessArticle
9 Pages, 1,189 KB Download PDF

Velocity obstacles for car-like mobile robots: Determination of colliding velocity and curvature pairs

Advances in Science, Technology and Engineering Systems Journal, Volume 3, Issue 1, Page # 225–233, 2018; DOI: 10.25046/aj030127
Abstract:

This paper addresses the motion planning problem of Reeds-Shepp-type car-like mobile robots moving among static and dynamic obstacles. If the positions and the velocity vectors of the obstacles are known or well estimated, the Velocity Obstacles (VO) method and its non-linear version (NLVO) can be used to plan a collision-free trajectory for a robot in…

Read More
(This article belongs to the SP4 (Special issue on Advancement in Engineering Technology 2017-18) & Section Robotics (ROB))
Open AccessArticle
23 Pages, 1,293 KB Download PDF

Linear algebra as an alternative approach to the synthesis of digital devices of automation and control systems

Advances in Science, Technology and Engineering Systems Journal, Volume 3, Issue 1, Page # 168–190, 2018; DOI: 10.25046/aj030121
Abstract:

The article considers linear algebra as an alternative mathematical tool of logic synthesis of digital structures to Boolean algebra and synthesis methods of digital electronic component base (ECB) on its ground. The methods of solving the applied problems of logic synthesis are shown, including the expansion of an arbitrary logic function by means of monotonic…

Read More
(This article belongs to the SP4 (Special issue on Advancement in Engineering Technology 2017-18) & Section Automation & Control Systems (ACS))
Open AccessArticle
7 Pages, 1,001 KB Download PDF

Development of Indicators for Technical Condition Indexing of Power Transformers

Advances in Science, Technology and Engineering Systems Journal, Volume 3, Issue 1, Page # 148–154, 2018; DOI: 10.25046/aj030118
Abstract:

Reliable operation of a power transformer with a certain load depends on the technical condition of individual construction parts and the ability to prevent defects that can cause a failure. During the lifecycle of a transformer, valuable data is constantly accumulated, which forms the basis for technical or risk assessment of the equipment. Therefore it…

Read More
(This article belongs to the SP4 (Special issue on Advancement in Engineering Technology 2017-18) & Section Electrical Engineering (ELE))
Open AccessArticle
13 Pages, 1,427 KB Download PDF

Algorithms for Technical Integration of Virtual Power Plants into German System Operation

Advances in Science, Technology and Engineering Systems Journal, Volume 3, Issue 1, Page # 135–147, 2018; DOI: 10.25046/aj030117
Abstract:

This paper critically evaluates the operational perspective of Virtual Power Plants (VPP) in Germany by analyzing key factors to replace conventional power plants in the future power system. Therefore, its necessity for the secure operation as well as the technical and economic benefits for the German power system are pointed out. The single sections describe…

Read More
(This article belongs to the SP4 (Special issue on Advancement in Engineering Technology 2017-18) & Section Electrical Engineering (ELE))
Open AccessArticle
10 Pages, 972 KB Download PDF

Constructing Learning-by-Doing Pedagogical Model for Delivering 21st Century Engineering Education

Advances in Science, Technology and Engineering Systems Journal, Volume 3, Issue 1, Page # 115–124, 2018; DOI: 10.25046/aj030114
Abstract:

The United Arab Emirates (UAE) is dedicated to establishing the best teaching and learning environment for students and staff across all higher education institutions. To heed this call, the engineering division adopted the Learning-by-Doing (LBD) pedagogical philosophy for 21st Century education at the heart of its strategic directions. This study intends to explore how LBD…

Read More
(This article belongs to the SP4 (Special issue on Advancement in Engineering Technology 2017-18) & Section Interdisciplinary Applications of Computer Science (CSI))
Open AccessArticle
7 Pages, 975 KB Download PDF

Building an Efficient Alert Management Model for Intrusion Detection Systems

Advances in Science, Technology and Engineering Systems Journal, Volume 3, Issue 1, Page # 18–24, 2018; DOI: 10.25046/aj030103
Abstract:

This paper is an extension of work originally presented in WITS-2017 CONF. We extend our previous works by improving the Risk calculation formula, and risk assessment of an alert cluster instead of every single alert. Also, we presented the initial results of the implementation of our model based on risk assessment and alerts prioritization. The…

Read More
(This article belongs to the SP4 (Special issue on Advancement in Engineering Technology 2017-18) & Section Information Systems in Computer Science (CIS))
Open AccessArticle
6 Pages, 814 KB Download PDF

Threshold Multi Split-Row algorithm for decoding irregular LDPC codes

Advances in Science, Technology and Engineering Systems Journal, Volume 2, Issue 5, Page # 88–93, 2017; DOI: 10.25046/aj020514
Abstract:

In this work, we propose a new threshold multi split-row algorithm in order to improve the multi split-row algorithm for LDPC irregular codes decoding. We give a complete description of our algorithm as well as its advantages for the LDPC codes. The simulation results over an additive white gaussian channel show that an improvement in…

Read More
(This article belongs to Section Applied Mathematics (MAP))
Open AccessArticle
10 Pages, 1,040 KB Download PDF

A Multilingual System for Cyberbullying Detection: Arabic Content Detection using Machine Learning

Advances in Science, Technology and Engineering Systems Journal, Volume 2, Issue 6, Page # 275–284, 2017; DOI: 10.25046/aj020634
Abstract:

With the abundance of Internet and electronic devices bullying has moved its place from schools and backyards into cyberspace; to be now known as Cyberbullying. Cyberbullying is affecting a lot of children around the world, especially Arab countries. Thus concerns from cyberbullying are rising. A lot of research is ongoing with the purpose of diminishing…

Read More
(This article belongs to the SP4 (Special issue on Advancement in Engineering Technology 2017-18) & Section Information Systems in Computer Science (CIS))
Open AccessArticle
10 Pages, 1,329 KB Download PDF

Efficiency Assessment of Plasma-Aided Porous Media Surface Finishing

Advances in Science, Technology and Engineering Systems Journal, Volume 2, Issue 6, Page # 242–251, 2017; DOI: 10.25046/aj020629
Abstract:

The efficiency of a plasma-aided finishing process, namely capillary impregnation, can be predicted only by setting two basic parameters of the real wood porous surface and the actual impregnating solution – surface free energy and surface tension. In general, the following processing efficiency parameter was found and the rule is true: “The plasma aided or…

Read More
(This article belongs to the SP4 (Special issue on Advancement in Engineering Technology 2017-18) & Section Chemical Engineering (ENC))
Open AccessArticle
11 Pages, 663 KB Download PDF

A Taxonomy for Enhancing Usability, Flexibility, and Security of User Authentication

Advances in Science, Technology and Engineering Systems Journal, Volume 2, Issue 6, Page # 225–235, 2017; DOI: 10.25046/aj020627
Abstract:

Two technology trends – a move toward software defined capabilities and toward networked devices – support both unprecedented innovations and requirements for security. A fundamental aspect of security is user authentication, which allows devices and software applications to establish their user’s identity and identity is in turn used to establish which of its capabilities the…

Read More
(This article belongs to the SP4 (Special issue on Advancement in Engineering Technology 2017-18) & Section Interdisciplinary Applications of Computer Science (CSI))
Open AccessArticle
14 Pages, 2,481 KB Download PDF

Novel Analysis of Synchronous and Induction Generators in Parallel Operation Mode in an Isolated Electric System

Advances in Science, Technology and Engineering Systems Journal, Volume 2, Issue 6, Page # 203–216, 2017; DOI: 10.25046/aj020625
Abstract:

This paper presents an analysis of a parallel connection of one synchronous generator and one self-excited induction generator that feeds a resistive load and an Induction Motor. The system voltage and frequency are controlled by a voltage control loop and a speed control loop connected to synchronous generator. The induction generator speed is controlled by…

Read More
(This article belongs to the SP4 (Special issue on Advancement in Engineering Technology 2017-18) & Section Electrical Engineering (ELE))
Open AccessArticle
9 Pages, 882 KB Download PDF

Review on security issues in RFID systems

Advances in Science, Technology and Engineering Systems Journal, Volume 2, Issue 6, Page # 194–202, 2017; DOI: 10.25046/aj020624
Abstract:

Radio frequency Identification (RFID) is currently considered as one of the most used technologies for an automatic identification of objects or people. Based on a combination of tags and readers, RFID technology has widely been applied in various areas including supply chain, production and traffic control systems. However, despite of its numerous advantages, the technology…

Read More
(This article belongs to the SP4 (Special issue on Advancement in Engineering Technology 2017-18) & Section Interdisciplinary Applications of Computer Science (CSI))
Open AccessArticle
13 Pages, 383 KB Download PDF

Mealy-to-Moore Transformation – A state stable design of automata

Advances in Science, Technology and Engineering Systems Journal, Volume 2, Issue 6, Page # 162–174, 2017; DOI: 10.25046/aj020621
Abstract:

The paper shows a method of transforming an asynchronously feedbacked Mealy machine into a Moore machine. The transformation is done in dual-rail logic under the use of the RS-buffer. The transformed machine stabilizes itself and is safe to use. The transformation is visualized via KV-diagrams and calculated with formulas. We will present three use-cases for…

Read More
(This article belongs to the SP4 (Special issue on Advancement in Engineering Technology 2017-18) & Section Electronic Engineering (EEE))
Open AccessArticle
6 Pages, 911 KB Download PDF

Analysis of Economic Load Dispatch with a lot of Constraints Using Vortex Search Algorithm

Advances in Science, Technology and Engineering Systems Journal, Volume 2, Issue 6, Page # 151–156, 2017; DOI: 10.25046/aj020619
Abstract:

In modern powers systems, one of the most considerable topics is economic load dispatch (ELD). ELD is non-linear problem and it became non-convex and non-smooth problem with some constraints such as valve point loading effect. ELD is very crucial for energy generation and distribution in power systems. For solving ELD problem, a lot of methods…

Read More
(This article belongs to the SP4 (Special issue on Advancement in Engineering Technology 2017-18) & Section Electrical Engineering (ELE))
Open AccessArticle
5 Pages, 787 KB Download PDF

A Review of Anti- Podal Vivaldi Antenna Operating in Cellular Mobile Communications

Advances in Science, Technology and Engineering Systems Journal, Volume 2, Issue 4, Page # 204–208, 2017; DOI: 10.25046/aj020427
Abstract:

The antenna proposed is a new geomantic structure of Ultra-Wideband (UWB) Anti- Podal Vivaldi antenna (AVA). It remarkably offers an attractive performance over the bands of cellular networks. However, its benefits are not limited only in particular applications, whereas radar imaging, mining detection, the biomedical science in the heating of brain cancer tumor and treatment,…

Read More
(This article belongs to Section Electrical Engineering (ELE))
Open AccessArticle
12 Pages, 1,921 KB Download PDF

Cognitive Cybernetics vs. Captology

Advances in Science, Technology and Engineering Systems Journal, Volume 2, Issue 6, Page # 107–118, 2017; DOI: 10.25046/aj020614
Abstract:

In acronym Captology – Computers as Persuasive Technology, a persuasive component (lat. persuasibilibus – enticing) refers to the persuasive stimulation by intelligent technologies. Latter being transitive and interactive as intelligent systems, they have imposed, by their persuasivity, a ‘cult of information’, after which information has become a type of goods that as a utilitarian resource…

Read More
(This article belongs to the SP4 (Special issue on Advancement in Engineering Technology 2017-18) & Section Information Systems in Computer Science (CIS))
1 23 24 25 26 27 29

Journal Menu

Journal Browser


Special Issues

Special Issue on Digital Frontiers of Entrepreneurship: Integrating AI, Gender Equity, and Sustainable Futures
Guest Editors: Dr. Muhammad Nawaz Tunio, Dr. Aamir Rashid, Dr. Imamuddin Khoso
Deadline: 30 May 2026

Special Issue on Sustainable Technologies for a Resilient Future
Guest Editors: Dr. Debasis Mitra, Dr. Sourav Chattaraj, Dr. Addisu Assefa
Deadline: 30 April 2026