Search Results

Results (59)

Search Parameters:

Keyword: Artificial intelligence
Order results
Results per page
Open AccessArticle
9 Pages, 676 KB Download PDF

Q2 YouTube: Quantitative and Qualitative Information Analysis based Influencer-aware YouTube Channel Ranking Scheme

Advances in Science, Technology and Engineering Systems Journal, Volume 4, Issue 6, Page # 01–09, 2019; DOI: 10.25046/aj040601
Abstract:

With the development of big data, artificial intelligence and deep learning, various social information networks are becoming exponentially intelligent. Of all the various social networks, YouTube is so popular that it is called the YouTube era. Not only video viewers, but also actual video producers, influencer youtubers, are increasing, allowing individuals as well as operators…

Read More
(This article belongs to the SP7 (Special Issue on Advancement in Engineering and Computer Science 2019) & Section Interdisciplinary Applications of Computer Science (CSI))
Open AccessArticle
13 Pages, 827 KB Download PDF

Revealing Strengths, Weaknesses and Prospects of Intelligent Collaborative e-Learning Systems

Advances in Science, Technology and Engineering Systems Journal, Volume 3, Issue 3, Page # 67–79, 2018; DOI: 10.25046/aj030310
Abstract:

The rapid evolution of Collaborative e-Learning Systems migrates to the use of new technologies such the artificial intelligence (AI). In this context, the role of AI in increasing the quality of learning and making it more productive, persistent and efficient. In addition, it can accomplish repetitive and complex tasks in record time and unmatched accuracy.…

Read More
(This article belongs to the SP5 (Special Issue on Multidisciplinary Sciences and Engineering 2018) & Section Artificial Intelligence in Computer Science (CAI))
Open AccessArticle
12 Pages, 1,921 KB Download PDF

Cognitive Cybernetics vs. Captology

Advances in Science, Technology and Engineering Systems Journal, Volume 2, Issue 6, Page # 107–118, 2017; DOI: 10.25046/aj020614
Abstract:

In acronym Captology – Computers as Persuasive Technology, a persuasive component (lat. persuasibilibus – enticing) refers to the persuasive stimulation by intelligent technologies. Latter being transitive and interactive as intelligent systems, they have imposed, by their persuasivity, a ‘cult of information’, after which information has become a type of goods that as a utilitarian resource…

Read More
(This article belongs to the SP4 (Special issue on Advancement in Engineering Technology 2017-18) & Section Information Systems in Computer Science (CIS))
Open AccessArticle
11 Pages, 1,263 KB Download PDF

Improved Hybrid Opponent System for Professional Military Training

Advances in Science, Technology and Engineering Systems Journal, Volume 2, Issue 3, Page # 1804–1814, 2017; DOI: 10.25046/aj0203220
Abstract:

Described herein is a general-purpose software engineering architecture for autonomous, computer controlled opponent implementation in modern maneuver warfare simulation and training. The implementation has been developed, refined, and tested in the user crucible for several years. The approach represents a hybrid application of various well-known AI techniques, including domain modeling, agent modeling, and object-oriented programming.…

Read More
(This article belongs to the SP3 (Special issue on Recent Advances in Engineering Systems 2017) & Section Artificial Intelligence in Computer Science (CAI))
Open AccessArticle
16 Pages, 2,101 KB Download PDF

Modeling Double Subjectivity for Gaining Programmable Insights: Framing the Case of Uber

Advances in Science, Technology and Engineering Systems Journal, Volume 2, Issue 3, Page # 1677–1692, 2017; DOI: 10.25046/aj0203209
Abstract:

The Internet is the premier platform that enable the emergence of new technologies. Online news is unstructured narrative text that embeds facts, frames, and amplification that can influence society attitudes about technology adoption. Online news sources are carriers of voluminous amounts of news for reaching significantly large audience and have no geographical or time boundaries.…

Read More
(This article belongs to the SP3 (Special issue on Recent Advances in Engineering Systems 2017) & Section Interdisciplinary Applications of Computer Science (CSI))
Open AccessArticle
8 Pages, 445 KB Download PDF

Towards Deployment Strategies for Deception Systems

Advances in Science, Technology and Engineering Systems Journal, Volume 2, Issue 3, Page # 1272–1279, 2017; DOI: 10.25046/aj0203161
Abstract:

Network security is often built on perimeter defense. Sophisticated attacks are able to penetrate the perimeter and access valuable resources in the network. A more complete defense strategy also contains mechanisms to detect and mitigate perimeter breaches. Deceptive systems are a promising technology to detect, deceive and counter infiltration. In this work we provide an…

Read More
(This article belongs to the SP3 (Special issue on Recent Advances in Engineering Systems 2017) & Section Information Systems in Computer Science (CIS))
Open AccessArticle
19 Pages, 1,686 KB Download PDF

A Computationally Intelligent Approach to the Detection of Wormhole Attacks in Wireless Sensor Networks

Advances in Science, Technology and Engineering Systems Journal, Volume 2, Issue 3, Page # 302–320, 2017; DOI: 10.25046/aj020340
Abstract:

A wormhole attack is one of the most critical and challenging security threats for wireless sensor networks because of its nature and ability to perform concealed malicious activities. This paper proposes an innovative wormhole detection scheme to detect wormhole attacks using computational intelligence and an artificial neural network (ANN). Most wormhole detection schemes reported in…

Read More
(This article belongs to the SP3 (Special issue on Recent Advances in Engineering Systems 2017) & Section Information Systems in Computer Science (CIS))
Open AccessArticle
11 Pages, 1,143 KB Download PDF

Optimizing the Performance of Network Anomaly Detection Using Bidirectional Long Short-Term Memory (Bi-LSTM) and Over-sampling for Imbalance Network Traffic Data

Advances in Science, Technology and Engineering Systems Journal, Volume 8, Issue 6, Page # 144–154, 2023; DOI: 10.25046/aj080614
Abstract:

Cybercriminal exploits integrity, confidentiality, and availability of information resources. Cyberattacks are typically invisible to the naked eye, even though they target a wide range of our digital assets, such as internet-connected smart devices, computers, and networking devices. Implementing network anomaly detection proves to be an effective method for identifying these malicious activities. The traditional anomaly…

Read More
(This article belongs to the SP15 (Special Issue on Innovation in Computing, Engineering Science & Technology 2023) & Section Cybernetics in Computer Science (CCY))
Open AccessArticle
8 Pages, 1,702 KB Download PDF

Design of smart chess board that can predict the next position based on FPGA

Advances in Science, Technology and Engineering Systems Journal, Volume 3, Issue 4, Page # 193–200, 2018; DOI: 10.25046/aj030417
Abstract:

The abilities of human brain to discover solutions for many problems is a great gift that motivate the scientists to develop the revolution of the artificial intelligence and using it in many areas. This paper proposed an intelligent chessboard which works in a way that similar to the human brain that predicts the next positions…

Read More
(This article belongs to the SP5 (Special Issue on Multidisciplinary Sciences and Engineering 2018) & Section Electronic Engineering (EEE))

Journal Menu

Journal Browser


Special Issues

Special Issue on Digital Frontiers of Entrepreneurship: Integrating AI, Gender Equity, and Sustainable Futures
Guest Editors: Dr. Muhammad Nawaz Tunio, Dr. Aamir Rashid, Dr. Imamuddin Khoso
Deadline: 30 May 2026

Special Issue on Sustainable Technologies for a Resilient Future
Guest Editors: Dr. Debasis Mitra, Dr. Sourav Chattaraj, Dr. Addisu Assefa
Deadline: 30 April 2026