Search Results

Results (468)

Search Parameters:

Keyword: BER
Order results
Results per page
Open AccessArticle
10 Pages, 1,040 KB Download PDF

A Multilingual System for Cyberbullying Detection: Arabic Content Detection using Machine Learning

Advances in Science, Technology and Engineering Systems Journal, Volume 2, Issue 6, Page # 275–284, 2017; DOI: 10.25046/aj020634
Abstract:

With the abundance of Internet and electronic devices bullying has moved its place from schools and backyards into cyberspace; to be now known as Cyberbullying. Cyberbullying is affecting a lot of children around the world, especially Arab countries. Thus concerns from cyberbullying are rising. A lot of research is ongoing with the purpose of diminishing…

Read More
(This article belongs to the SP4 (Special issue on Advancement in Engineering Technology 2017-18) & Section Information Systems in Computer Science (CIS))
Open AccessArticle
12 Pages, 1,921 KB Download PDF

Cognitive Cybernetics vs. Captology

Advances in Science, Technology and Engineering Systems Journal, Volume 2, Issue 6, Page # 107–118, 2017; DOI: 10.25046/aj020614
Abstract:

In acronym Captology – Computers as Persuasive Technology, a persuasive component (lat. persuasibilibus – enticing) refers to the persuasive stimulation by intelligent technologies. Latter being transitive and interactive as intelligent systems, they have imposed, by their persuasivity, a ‘cult of information’, after which information has become a type of goods that as a utilitarian resource…

Read More
(This article belongs to the SP4 (Special issue on Advancement in Engineering Technology 2017-18) & Section Information Systems in Computer Science (CIS))
Open AccessArticle
16 Pages, 2,101 KB Download PDF

Modeling Double Subjectivity for Gaining Programmable Insights: Framing the Case of Uber

Advances in Science, Technology and Engineering Systems Journal, Volume 2, Issue 3, Page # 1677–1692, 2017; DOI: 10.25046/aj0203209
Abstract:

The Internet is the premier platform that enable the emergence of new technologies. Online news is unstructured narrative text that embeds facts, frames, and amplification that can influence society attitudes about technology adoption. Online news sources are carriers of voluminous amounts of news for reaching significantly large audience and have no geographical or time boundaries.…

Read More
(This article belongs to the SP3 (Special issue on Recent Advances in Engineering Systems 2017) & Section Interdisciplinary Applications of Computer Science (CSI))
Open AccessArticle
5 Pages, 970 KB Download PDF

Factors Affecting the Adsorption of Trivalent Chromium Ions by Activated Carbon Prepared from Waste Rubber Tyres

Advances in Science, Technology and Engineering Systems Journal, Volume 2, Issue 3, Page # 1660–1664, 2017; DOI: 10.25046/aj0203206
Abstract:

Economic gains are generally the outcome of industrialization and consequently urbanization. However, positive fiscal index generates a negative impact on natural environment sources heaving pollutant burden on soil, air and water. Industries throw tones of contaminated water into soil and water bodies without proper treatment and create a potential threat for both living and non-living…

Read More
(This article belongs to the SP3 (Special issue on Recent Advances in Engineering Systems 2017) & Section Biochemistry & Molecular Biology (BMB))
Open AccessArticle
4 Pages, 649 KB Download PDF

Analytical and Algorithmic Approaches to Determine the Number of Sensor Nodes for Minimum Power Consumption in LWSNs

Advances in Science, Technology and Engineering Systems Journal, Volume 2, Issue 3, Page # 1487–1490, 2017; DOI: 10.25046/aj0203186
Abstract:

A Linear Wireless Sensor Network (LWSN) is a kind of wireless sensor network where the nodes are deployed in a line. Since the sensor nodes are energy restricted, energy efficiency becomes one of the most significant design issues for LWSNs as well as wireless sensor networks. With the proper deployment, the power consumption could be…

Read More
(This article belongs to the SP3 (Special issue on Recent Advances in Engineering Systems 2017) & Section Telecommunications (TEL))
Open AccessArticle
4 Pages, 1,378 KB Download PDF

10 Gbps Full Duplex Cost Effective Architecture GPON Network with Single Fiber

Advances in Science, Technology and Engineering Systems Journal, Volume 1, Issue 5, Page # 6–9, 2016; DOI: 10.25046/aj010502
Abstract:

In this paper, a full duplex Gigabit Passive Optical Network (GPON) architecture supporting 10Gbps data transmission through single fiber cable network is proposed and demonstrated. A Non Return to Zero Differential Phase Shift Keying (NRZ-DPSK) is utilized for downstream and re-modulate the downstream signal using intensity modulator (on-off keying OOK) in Return to Zero (RZ)…

Read More
(This article belongs to the Special issue on Recent Advances in Electrical and Electronics Engineering 2016 & Section Telecommunications (TEL))
Open AccessArticle
4 Pages, 817 KB Download PDF

Compressive Strength of Cement Mortar blended with Coconut Fibers and Human Hair

Advances in Science, Technology and Engineering Systems Journal, Volume 1, Issue 4, Page # 1–4, 2016; DOI: 10.25046/aj010401
Abstract:

Mortar is used all over the world for construction purpose. It consists of cement paste and fine aggregates and admixtures if required are also incorporated to modify some of its properties. In this study coconut fibers and human hair were used as an additive materials in the mortar and its effects on compressive strength of…

Read More
(This article belongs to Section Construction & Building Technology (CBT))
Open AccessArticle
11 Pages, 790 KB Download PDF

CIRB-Edge for Secure, Energy-Efficient, and Real-Time Edge Computing

Advances in Science, Technology and Engineering Systems Journal, Volume 10, Issue 5, Page # 40–50, 2025; DOI: 10.25046/aj100505
Abstract:

In this work, we present CIRB-Edge, a novel integer compression method designed specifically to overcome the limitations of traditional techniques such as Huffman coding, Delta encoding, and dictionary-based algorithms. These legacy methods often fall short in meeting the stringent requirements of secure, energy-efficient, and real-time edge computing due to their high computational overhead, memory demands,…

Read More
(This article belongs to Section Software Engineering in Computer Science (CSE))
Open AccessArticle
12 Pages, 914 KB Download PDF

Complete System and Interactions of MMF Harmonics in a Squirrel Cage Induction Motor; Differential Leakage; Analytic Calculation

Advances in Science, Technology and Engineering Systems Journal, Volume 10, Issue 4, Page # 20–31, 2025; DOI: 10.25046/aj100403
Abstract:

The importance of MMF space harmonics in squirrel-cage induction motors has been recognized in the literature since the beginning. Their details have been analyzed over the years, but only partly systematized. In this article, however, not only the origin and the entire system of that harmonics are described, but also their interaction causing the asynchronous…

Read More
(This article belongs to Section Electrical Engineering (ELE))
Open AccessArticle
6 Pages, 830 KB Download PDF

The First Study on Ionospheric Peak Variability over Equatorial Africa (COSMIC-2)

Advances in Science, Technology and Engineering Systems Journal, Volume 10, Issue 4, Page # 14–19, 2025; DOI: 10.25046/aj100402
Abstract:

In regions like the African equatorial region, where ground-based sensors like ionosondes and incoherent scatter radars are limited, satellite-based radio occultation (RO) observations offer a new alternative for ionospheric data collecting and optimization. Using RO measurements from the mostly newly launched COSMIC-2 (Constellation Observing System for Meteorology, Ionosphere, and Climate-2) mission, hence, the equatorial Africa,…

Read More
(This article belongs to Section Meteorology & Atmospheric Sciences (MAS))
Open AccessArticle
7 Pages, 253 KB Download PDF

A Review of Natural Language Processing Techniques in Under-Resourced Languages

Advances in Science, Technology and Engineering Systems Journal, Volume 10, Issue 2, Page # 35–41, 2025; DOI: 10.25046/aj100204
Abstract:

Natural language processing (NLP) techniques have transformed a number of tasks in the modern age of information explosion where millions of gigabytes of data are generated every day. Despite achieving state-of-the-art performance in high-resource languages, current techniques struggle with processing under-resourced languages which are characterized by data scarcity, linguistic diversity, computational limitations, ambiguity of language…

Read More
(This article belongs to Section Interdisciplinary Applications of Computer Science (CSI))
Open AccessArticle
11 Pages, 2,600 KB Download PDF

Hardware and Secure Implementation of Enhanced ZUC Steam Cipher Based on Chaotic Dynamic S-Box

Advances in Science, Technology and Engineering Systems Journal, Volume 10, Issue 1, Page # 37–47, 2025; DOI: 10.25046/aj100105
Abstract:

Despite the development of the Internet and wired networks such as fiber optics, mobile networks remain the most used thanks to the mobility they offer to the user. However, data protection in these networks is more complex because of the radio channels they use for transmission. Hence,there is a need to find more sophisticated data…

Read More
(This article belongs to the SP17 (Special Issue on Innovation in Computing, Engineering Science & Technology 2024-25) & Section Hardware & Architecture in Computer Science (CHA))
Open AccessArticle
9 Pages, 940 KB Download PDF

Evaluation of a Classroom Support System for Programming Education Using Tangible Materials

Advances in Science, Technology and Engineering Systems Journal, Volume 9, Issue 5, Page # 21–29, 2024; DOI: 10.25046/aj090503
Abstract:

In recent years, the utilization of tangible educational materials has attracted attention on educational settings. They provide hands-on learning experiences for beginners. This trend is especially notable in the field of programming education. Such educational materials are employed in many institutions worldwide. They liberate learners of programming from programming languages that are confined in a…

Read More
(This article belongs to the SP17 (Special Issue on Innovation in Computing, Engineering Science & Technology 2024-25) & Section Education (EDU))
Open AccessArticle
8 Pages, 823 KB Download PDF

Energy Management Policy and Strategies in ASEAN

Advances in Science, Technology and Engineering Systems Journal, Volume 9, Issue 4, Page # 102–109, 2024; DOI: 10.25046/aj090411
Abstract:

This research analyses the challenges faced by ASEAN countries in managing its energy efficiencies and resources due to rapid economic growth, increasing energy demand, and diverse energy infrastructures across member states. This paper explores the energy management policies and strategies within the ASEAN region, focusing on the integration of energy efficiency measures, renewable energy initiatives,…

Read More
(This article belongs to the SP17 (Special Issue on Innovation in Computing, Engineering Science & Technology 2024-25) & Section Energy & Fuels (ENF))
Open AccessArticle
6 Pages, 14,807 KB Download PDF

Effectiveness of a voice analysis technique in the assessment of depression status of individuals from Ho Chi Minh City, Viet Nam: A cross-sectional study

Advances in Science, Technology and Engineering Systems Journal, Volume 9, Issue 4, Page # 73–78, 2024; DOI: 10.25046/aj090408
Abstract:

The Mind Monitoring System (MIMOSYS) is a novel voice analysis technique for mental health assessment that has been validated in some languages; however, no research has been conducted on the Vietnamese yet. This study aimed to examine the ability of the Vitality score extracted from the MIMOSYS system to assess depression status based on the…

Read More
(This article belongs to Section Biomedical Engineering (EBI))
Open AccessArticle
13 Pages, 484 KB Download PDF

On Mining Most Popular Packages

Advances in Science, Technology and Engineering Systems Journal, Volume 9, Issue 4, Page # 60–72, 2024; DOI: 10.25046/aj090407
Abstract:

In this paper, we will discuss two algorithms to solve the so-called package design problem, by which a set of queries (referred to as a query log) is represented by a collection of bit strings with each indicating the favourite activities or items of customers. For such a query log, we are required to design…

Read More
(This article belongs to Section Artificial Intelligence in Computer Science (CAI))
Open AccessArticle
14 Pages, 1,599 KB Download PDF

GPT-Enhanced Hierarchical Deep Learning Model for Automated ICD Coding

Advances in Science, Technology and Engineering Systems Journal, Volume 9, Issue 4, Page # 21–34, 2024; DOI: 10.25046/aj090404
Abstract:

In healthcare, accurate communication is critical, and medical coding, especially coding using the ICD (International Classification of Diseases) standards, plays a vital role in achieving this accuracy. Traditionally, ICD coding has been a time-consuming manual process performed by trained professionals, involving the assignment of codes to patient records, such as doctor’s notes. In this paper,…

Read More
(This article belongs to the SP16 (Special Issue on Computing, Engineering and Multidisciplinary Sciences 2024) & Section Hardware & Architecture in Computer Science (CHA))
Open AccessArticle
11 Pages, 1,752 KB Download PDF

An Adaptive Heterogeneous Ensemble Learning Model for Credit Card Fraud Detection

Advances in Science, Technology and Engineering Systems Journal, Volume 9, Issue 3, Page # 01–11, 2024; DOI: 10.25046/aj090301
Abstract:

The proliferation of internet economies has given the corporate world manifold advantages to businesses, as they can now incorporate the latest innovations into their operations, thereby enhancing ease of doing business. For instance, financial institutions have leveraged credit card usage on the aforesaid proliferation. However, this exposes clients to cybercrime, as fraudsters always find ways…

Read More
(This article belongs to Section Artificial Intelligence in Computer Science (CAI))
Open AccessArticle
7 Pages, 2,726 KB Download PDF

Spatial Distribution Patterns of the Royal Development Projects Initiated by King Rama 9th of Thailand

Advances in Science, Technology and Engineering Systems Journal, Volume 9, Issue 2, Page # 26–32, 2024; DOI: 10.25046/aj090204
Abstract:

The study aimed to create a chronological overview of the royal development projects initiated by King Rama IX and to analyze their spatial distribution patterns. The research used a mixed-methods approach, combining quantitative and qualitative data collection methods such as obtaining data from relevant offices, internet research, and field observations. Data analysis involved descriptive statistics…

Read More
(This article belongs to the SP16 (Special Issue on Computing, Engineering and Multidisciplinary Sciences 2024) & Section History & Philosophy of Science (HIS))
Open AccessArticle
16 Pages, 1,687 KB Download PDF

Development of a GSM-RC Automated Device for Measuring Mobile Communication Signal Strength and Meteorological Parameters

Advances in Science, Technology and Engineering Systems Journal, Volume 9, Issue 1, Page # 149–164, 2024; DOI: 10.25046/aj090115
Abstract:

The automated Global System for Mobile Communication Signal Strength and Radio Climatological (GSM-RC) measuring device is an integration of different electronic sensors in a box for an in-situ measuring system. The sensor, data logging, and communication subsystems are integrated for transmitting information on meteorological parameters (MPs) and GSM signal strength level (SSL). The goal is…

Read More
(This article belongs to Section Applied Physics (PAP))
Open AccessArticle
12 Pages, 1,016 KB Download PDF

Enhancing the Network Anomaly Detection using CNN-Bidirectional LSTM Hybrid Model and Sampling Strategies for Imbalanced Network Traffic Data

Advances in Science, Technology and Engineering Systems Journal, Volume 9, Issue 1, Page # 67–78, 2024; DOI: 10.25046/aj090107
Abstract:

The cybercriminal utilized the skills and freely available tools to breach the networks of internet-connected devices by exploiting confidentiality, integrity, and availability. Network anomaly detection is crucial for ensuring the security of information resources. Detecting abnormal network behavior poses challenges because of the extensive data, imbalanced attack class nature, and the abundance of features in…

Read More
(This article belongs to the SP16 (Special Issue on Computing, Engineering and Multidisciplinary Sciences 2024) & Section Cybernetics in Computer Science (CCY))
Open AccessArticle
18 Pages, 11,927 KB Download PDF

Enhancing Compressive Strength of Pervious Concrete for Use as Pavement Layer in Urban Roads Aper

Advances in Science, Technology and Engineering Systems Journal, Volume 9, Issue 1, Page # 49–66, 2024; DOI: 10.25046/aj090106
Abstract:

South African Drainage and Stormwater Systems in urban roads has been of great concern, more so with recent flash floods in Gauteng and KwaZulu Natal Province in South Africa. Pervious concrete can be used to mitigate these challenges for urban roads. Pervious concrete is a concrete that contains no fines or only a small amount…

Read More
(This article belongs to Section Civil Engineering (ECV))
Open AccessArticle
9 Pages, 705 KB Download PDF

Strengthening LoRaWAN Servers: A Comprehensive Update with AES Encryption and Grafana Mapping Solutions

Advances in Science, Technology and Engineering Systems Journal, Volume 9, Issue 1, Page # 33–41, 2024; DOI: 10.25046/aj090104
Abstract:

This work enhances the LoRaWAN server framework, focusing on an innovative approach for robust security and dynamic data visualization in network management. Migrating from RVC4 to AES encryption, it fortifies the network’s defense against cyber threats, a crucial advancement in IoT security. Furthermore, the integration with Grafana’s mapping plugin capitalizes on geolocation data, a strategic…

Read More
(This article belongs to the SP15 (Special Issue on Innovation in Computing, Engineering Science & Technology 2023) & Section Network Engineering (ENW))
Open AccessArticle
11 Pages, 1,143 KB Download PDF

Optimizing the Performance of Network Anomaly Detection Using Bidirectional Long Short-Term Memory (Bi-LSTM) and Over-sampling for Imbalance Network Traffic Data

Advances in Science, Technology and Engineering Systems Journal, Volume 8, Issue 6, Page # 144–154, 2023; DOI: 10.25046/aj080614
Abstract:

Cybercriminal exploits integrity, confidentiality, and availability of information resources. Cyberattacks are typically invisible to the naked eye, even though they target a wide range of our digital assets, such as internet-connected smart devices, computers, and networking devices. Implementing network anomaly detection proves to be an effective method for identifying these malicious activities. The traditional anomaly…

Read More
(This article belongs to the SP15 (Special Issue on Innovation in Computing, Engineering Science & Technology 2023) & Section Cybernetics in Computer Science (CCY))
Open AccessArticle
24 Pages, 13,802 KB Download PDF

Dual Mode Control of an Inverted Pendulum: Design, Analysis and Experimental Evaluation

Advances in Science, Technology and Engineering Systems Journal, Volume 8, Issue 6, Page # 120–143, 2023; DOI: 10.25046/aj080613
Abstract:

We present an inverted pendulum design using readily available V-slot rail components and 3D printing to construct custom parts. To enable the examination of different pendulum characteristics, we constructed three pendulum poles of different lengths. We implemented a brake mechanism to modify sliding friction resistance and built a paddle that can be attached to the…

Read More
(This article belongs to the SP15 (Special Issue on Innovation in Computing, Engineering Science & Technology 2023) & Section Automation & Control Systems (ACS))

Journal Menu

Journal Browser


Special Issues

Special Issue on Digital Frontiers of Entrepreneurship: Integrating AI, Gender Equity, and Sustainable Futures
Guest Editors: Dr. Muhammad Nawaz Tunio, Dr. Aamir Rashid, Dr. Imamuddin Khoso
Deadline: 30 May 2026

Special Issue on Sustainable Technologies for a Resilient Future
Guest Editors: Dr. Debasis Mitra, Dr. Sourav Chattaraj, Dr. Addisu Assefa
Deadline: 30 April 2026