Search Results

Results (245)

Search Parameters:

Keyword: Detection
Order results
Results per page
Open AccessArticle
11 Pages, 1,998 KB Download PDF

A Circular Invariant Convolution Model-Based Mapping for Multimodal Change Detection

Advances in Science, Technology and Engineering Systems Journal, Volume 5, Issue 5, Page # 1288–1298, 2020; DOI: 10.25046/aj0505155
Abstract:

The large and ever-increasing variety of remote sensing sensors used in satellite imagery today explains why detecting changes between identical locations in images that are captured, at two separate times, from heterogeneous capturing systems is a major and challenging recent research problem in the field of satellite imaging for fast and accurate determination of temporal…

Read More
(This article belongs to the SP9 (Special Issue on Multidisciplinary Innovation in Engineering Science & Technology 2020) & Section Remote Sensing (RMS))
Open AccessArticle
8 Pages, 962 KB Download PDF

Student’s Belief Detection and Segmentation for Real-Time: A Case Study of Indian University

Advances in Science, Technology and Engineering Systems Journal, Volume 5, Issue 5, Page # 742–749, 2020; DOI: 10.25046/aj050590
Abstract:

This paper has explored the technology beliefs of university students considering four parameters. We have proposed an automatic belief identification system for academic institutions. For this, we used two different clustering algorithms to segment the student group with different beliefs about the technology. In the Hierarchical Clustering (HC), the Agglomerative approach was followed. The beliefs…

Read More
(This article belongs to Section Artificial Intelligence in Computer Science (CAI))
Open AccessArticle
7 Pages, 548 KB Download PDF

Machine Learning for Network Intrusion Detection Based on SVM Binary Classification Model

Advances in Science, Technology and Engineering Systems Journal, Volume 5, Issue 4, Page # 638–644, 2020; DOI: 10.25046/aj050476
Abstract:

Recently, the number of connected machines around the worldwide has become very large, generating a huge amount of data either to be stored or to be communicated. Data protection is a concern for all institutions, it is difficult to manage the masses of data that are susceptible to multiple threats. In this work, we present…

Read More
(This article belongs to the iraset-20 (Special Issue on Innovative Research in Applied Science, Engineering and Technology 2020) & Section Interdisciplinary Applications of Computer Science (CSI))
Open AccessArticle
12 Pages, 14,328 KB Download PDF

Real-Time Traffic Sign Detection and Recognition System for Assistive Driving

Advances in Science, Technology and Engineering Systems Journal, Volume 5, Issue 4, Page # 600–611, 2020; DOI: 10.25046/aj050471
Abstract:

Road traffic accidents are primarily caused by drivers error. Safer roads infrastructure and facilities like traffic signs and signals are built to aid drivers on the road. But several factors affect the awareness of drivers to traffic signs including visual complexity, environmental condition, and poor drivers education. This led to the development of different ADAs…

Read More
(This article belongs to the SP9 (Special Issue on Multidisciplinary Innovation in Engineering Science & Technology 2020) & Section Artificial Intelligence in Computer Science (CAI))
Open AccessArticle
12 Pages, 1,022 KB Download PDF

A Support Vector Machine Based Technique for Fault Detection in A Power Distribution Integrated System with Renewable Energy Distributed Generation

Advances in Science, Technology and Engineering Systems Journal, Volume 5, Issue 4, Page # 577–588, 2020; DOI: 10.25046/aj050468
Abstract:

The integration of renewable energy distributed generation (REDG) into the energized distribution power grid has become more popular in recent years. This has been escalated by the general global energy shortages. The REDG has proven to be effective for energy sustainability and reliability. However, there are technical challenges which arise from integrating REDG into the…

Read More
(This article belongs to Section Electrical Engineering (ELE))
Open AccessArticle
10 Pages, 3,910 KB Download PDF

Nonlinear \(\ell_{2,p}\)-norm based PCA for Anomaly Network Detection

Advances in Science, Technology and Engineering Systems Journal, Volume 5, Issue 4, Page # 234–243, 2020; DOI: 10.25046/aj050429
Abstract:

Intrusion detection systems are well known for their ability to detect internal and external intrusions, it usually recognizes intrusions through learning the normal behaviour of users or the normal traffic of activities in the network. So, if any suspicious activity or behaviour is detected, it informs the users of the network. Nonetheless, intrusion detection system…

Read More
(This article belongs to Section Interdisciplinary Applications of Computer Science (CSI))
Open AccessArticle
7 Pages, 1,092 KB Download PDF

Fraud Detection Call Detail Record Using Machine Learning in Telecommunications Company

Advances in Science, Technology and Engineering Systems Journal, Volume 5, Issue 4, Page # 63–69, 2020; DOI: 10.25046/aj050409
Abstract:

Fraud calls have a serious impact on telecommunications operator revenues. Fraud detection is very important because service providers can feel a significant loss of income. We conducted a fraud research case study on one of the operators that experienced fraud in 2009 and 2018. Call Detail Record (CDR) containing records of customer conversations such as…

Read More
(This article belongs to Section Information Systems in Computer Science (CIS))
Open AccessArticle
7 Pages, 750 KB Download PDF

Risk Management: The Case of Intrusion Detection using Data Mining Techniques

Advances in Science, Technology and Engineering Systems Journal, Volume 5, Issue 3, Page # 529–535, 2020; DOI: 10.25046/aj050365
Abstract:

Every institution nowadays relies on their online system and framework to do businesses. Such procedures need more attention due to the massive amount of attacks that occurs. These procedures have to go first through the management team of the institution, in order to prevent exploits of the attackers. Thus, the risk management can easily control…

Read More
(This article belongs to Section Information Systems in Computer Science (CIS))
Open AccessArticle
10 Pages, 1,131 KB Download PDF

A Survey on Image Forgery Detection Using Different Forensic Approaches

Advances in Science, Technology and Engineering Systems Journal, Volume 5, Issue 3, Page # 361–370, 2020; DOI: 10.25046/aj050347
Abstract:

Recently, digital image forgery detection is an emergent and important area of image processing. Digital image plays a vital role in providing evidence for any unusual incident. However, the image forgery my hide evidence and prevents the detection of such criminal cases due to advancement in image processing and availability of sophisticated software tamper of…

Read More
(This article belongs to Section Electronic Engineering (EEE))
Open AccessArticle
7 Pages, 930 KB Download PDF

A Hybrid Approach for Intrusion Detection using Integrated K-Means based ANN with PSO Optimization

Advances in Science, Technology and Engineering Systems Journal, Volume 5, Issue 3, Page # 317–323, 2020; DOI: 10.25046/aj050341
Abstract:

Many advances in computer systems and IT infrastructures increases the risks associated with the use of these technologies. Specifically, intrusion into computer systems by unauthorized users is a growing problem and it is very challenging to detect. Intrusion detection technologies are therefore becoming extremely important to improve the overall security of computer systems. In the…

Read More
(This article belongs to the SP9 (Special Issue on Multidisciplinary Innovation in Engineering Science & Technology 2020) & Section Interdisciplinary Applications of Computer Science (CSI))
Open AccessArticle
10 Pages, 1,578 KB Download PDF

Improved Nonlinear Fuzzy Robust PCA for Anomaly-based Intrusion Detection

Advances in Science, Technology and Engineering Systems Journal, Volume 5, Issue 3, Page # 249–258, 2020; DOI: 10.25046/aj050332
Abstract:

Among the most popular tools in security field is the anomaly based Intrusion Detection System (IDS), it detects intrusions by learning to classify the normal activities of the network. Thus if any abnormal activity or behaviour is recognized it raises an alarm to inform the users of a given network. Nevertheless, IDS is generally susceptible…

Read More
(This article belongs to the SP9 (Special Issue on Multidisciplinary Innovation in Engineering Science & Technology 2020) & Section Interdisciplinary Applications of Computer Science (CSI))
Open AccessArticle
6 Pages, 928 KB Download PDF

Alternative Real-time Image-Based Smoke Detection Algorithm

Advances in Science, Technology and Engineering Systems Journal, Volume 5, Issue 3, Page # 123–128, 2020; DOI: 10.25046/aj050316
Abstract:

Most buildings are equipped with various types of sensors to detect smoke in the event of a fire, though most are located internally. Practically, smoke has to reach the sensor in order for the sensor to react. The limitations of these sensors are their inability to respond in the early stages of a fire, and…

Read More
(This article belongs to Section Artificial Intelligence in Computer Science (CAI))
Open AccessArticle
10 Pages, 703 KB Download PDF

Intrusion Detection in Cyber Security: Role of Machine Learning and Data Mining in Cyber Security

Advances in Science, Technology and Engineering Systems Journal, Volume 5, Issue 3, Page # 72–81, 2020; DOI: 10.25046/aj050310
Abstract:

In recent years, cyber security has been received interest from several research communities with respect to Intrusion Detection System (IDS). Cyber security is “a fast-growing field demanding a great deal of attention because of remarkable progresses in social networks, cloud and web technologies, online banking, mobile environment, smart grid, etc.” An IDS is a software…

Read More
(This article belongs to Section Hardware & Architecture in Computer Science (CHA))
Open AccessArticle
9 Pages, 927 KB Download PDF

A Comprehensive Survey on Image Modality Based Computerized Dry Eye Disease Detection Techniques

Advances in Science, Technology and Engineering Systems Journal, Volume 5, Issue 2, Page # 748–756, 2020; DOI: 10.25046/aj050293
Abstract:

Dry Eye Disease (DED) is one of the commonly occurring chronic disease today, affecting the vision of eye. It causes severe discomfort in eye, visual disturbance and blurred vision impacting the quality of life of patients. Due to recent advancements in Artificial Intelligence (AI) and rapid progress of analytics techniques, several image modality based computerized…

Read More
(This article belongs to Section Interdisciplinary Applications of Computer Science (CSI))
Open AccessArticle
8 Pages, 1,398 KB Download PDF

Combination of Salient Object Detection and Image Matching for Object Instance Recognition

Advances in Science, Technology and Engineering Systems Journal, Volume 5, Issue 2, Page # 584–591, 2020; DOI: 10.25046/aj050273
Abstract:

Object Instance Recognition aims to classify objects specifically and usually use a single reference image. It is possible to be used in many applications such as visual search, information retrieval and augmented reality. However, various things affect the appearance of the objects, which makes the recognition process harder, especially if a single reference image is…

Read More
(This article belongs to Section Artificial Intelligence in Computer Science (CAI))
Open AccessArticle
10 Pages, 1,105 KB Download PDF

Approach to Combine an Ontology-Based on Payment System with Neural Network for Transaction Fraud Detection

Advances in Science, Technology and Engineering Systems Journal, Volume 5, Issue 2, Page # 551–560, 2020; DOI: 10.25046/aj050269
Abstract:

Fraud, as regards means of payment, means the behavior of any legal or natural one that makes an abnormal or irregular use of a way of payment, elements of it or information contained therein, to improperly obtain an honest, service or enrichment, and or causing financial damage to the one that has distributed the means…

Read More
(This article belongs to Section Artificial Intelligence in Computer Science (CAI))
Open AccessArticle
6 Pages, 747 KB Download PDF

A Systematic Literature Review of Vessel Anomaly Behavior Detection Methods Based on Automatic Identification System (AIS) and another Sensor Fusion

Advances in Science, Technology and Engineering Systems Journal, Volume 5, Issue 2, Page # 287–292, 2020; DOI: 10.25046/aj050237
Abstract:

The high flow of vessel traffic affects the difficulty of monitoring vessel in the middle of the sea because of limited human visibility, occurrence of vessel accidents at the sea and other illegal activities that illustrate abnormal vessel behavior such as oil bunkering, piracy, illegal fishing and other crimes that will continue and will certainly…

Read More
(This article belongs to Section Interdisciplinary Applications of Computer Science (CSI))
Open AccessArticle
10 Pages, 435 KB Download PDF

Enhancing an SDN Architecture with DoS Attack Detection Mechanisms

Advances in Science, Technology and Engineering Systems Journal, Volume 5, Issue 2, Page # 215–224, 2020; DOI: 10.25046/aj050228
Abstract:

A Software Defined Network (SDN) architecture is characterized by decoupling the data plane and control plane. This feature enables the establishment of a programmable environ- ment in which the control plane acts under the data plane, managing and configuring the network over a standard protocol, such as OpenFlow. Although there are numerous benefits to the…

Read More
(This article belongs to the SP8 (Special Issue on Multidisciplinary Sciences and Engineering 2019-20) & Section Interdisciplinary Applications of Computer Science (CSI))
Open AccessArticle
7 Pages, 1,017 KB Download PDF

Sensor Based on-the-go Detection of Macro Nutrients for Agricultural Crops

Advances in Science, Technology and Engineering Systems Journal, Volume 5, Issue 1, Page # 128–134, 2020; DOI: 10.25046/aj050117
Abstract:

Agriculture, being the vital sector, contributes to India’s GDP by 18%. It is necessary to enhance the production in this sector with minimal need of resources to get the good yield of crops. It in turn boosts up the necessity of automation in the field of agriculture. This paper discusses about the experimental study which…

Read More
(This article belongs to the SP7 (Special Issue on Advancement in Engineering and Computer Science 2019) & Section Agronomy (AGN))
Open AccessArticle
6 Pages, 827 KB Download PDF

Fuzzy Modelling using Firefly Algorithm for Phishing Detection

Advances in Science, Technology and Engineering Systems Journal, Volume 4, Issue 6, Page # 291–296, 2019; DOI: 10.25046/aj040637
Abstract:

A fuzzy system is a rule-based system that uses human experts’ knowledge to make a particular decision, while fuzzy modeling refers to the identification process of the fuzzy parameters. To generate the fuzzy parameters automatically, an optimization method is needed. One of the suitable methods provides the Firefly Algorithm (FA). FA is a nature-inspired algorithm…

Read More
(This article belongs to the SP8 (Special Issue on Multidisciplinary Sciences and Engineering 2019-20) & Section Artificial Intelligence in Computer Science (CAI))
Open AccessArticle
8 Pages, 1,116 KB Download PDF

EKMC: Ensemble of kNN using MetaCost for Efficient Anomaly Detection

Advances in Science, Technology and Engineering Systems Journal, Volume 4, Issue 5, Page # 401–408, 2019; DOI: 10.25046/aj040552
Abstract:

Anomaly detection aims at identification of suspicious items, observations or events by differing from most of the data. Intrusion Detection, Fault Detection, and Fraud Detection are some of the various applications of Anomaly Detection. The Machine learning classifier algorithms used in these applications would greatly affect the overall efficiency. This work is an extension of…

Read More
(This article belongs to Section Artificial Intelligence in Computer Science (CAI))
Open AccessArticle
7 Pages, 519 KB Download PDF

Melanoma detection using color and texture features in computer vision systems

Advances in Science, Technology and Engineering Systems Journal, Volume 4, Issue 5, Page # 16–22, 2019; DOI: 10.25046/aj040502
Abstract:

All forms of skin cancer are becoming widespread. These forms of cancer, and melanoma in particular, are insidious and aggressive and if not treated promptly can be lethal to humans. Effective treatment of skin lesions depends strongly on the timeliness of the diagnosis: for this reason, artificial vision systems are required to play a crucial…

Read More
(This article belongs to the SP7 (Special Issue on Advancement in Engineering and Computer Science 2019) & Section Bioinformatics (BIF))
Open AccessArticle
15 Pages, 714 KB Download PDF

Logic Error Detection System based on Structure Pattern and Error Degree

Advances in Science, Technology and Engineering Systems Journal, Volume 4, Issue 5, Page # 01–15, 2019; DOI: 10.25046/aj040501
Abstract:

The importance of programming skills has increased with advances in information and communication technology (ICT). However, the difficulty of learning programming is a major problem for novices. Therefore, we propose a logic error detection algorithm based on structure patterns, which are an index of similarity based on abstract syntax trees, and error degree, which is…

Read More
(This article belongs to the SP7 (Special Issue on Advancement in Engineering and Computer Science 2019) & Section Interdisciplinary Applications of Computer Science (CSI))
Open AccessArticle
7 Pages, 1,108 KB Download PDF

Development of Wavelet-Based Tools for Event Related Potentials’ N400 Detection: Application to Visual and Auditory Vowelling and Semantic Priming in Arabic Language

Advances in Science, Technology and Engineering Systems Journal, Volume 4, Issue 4, Page # 414–420, 2019; DOI: 10.25046/aj040450
Abstract:

Neurological signals are generally very weak in amplitude and strongly noisy. As a result, one of the major challenges in neuroscience is to be able to eliminate noise and thus exploit the maximum amount of information contained in neurological signals (EEG…). In this paper, we aimed at studying the N400 wave of the Event-Related Potentials…

Read More
(This article belongs to the SP7 (Special Issue on Advancement in Engineering and Computer Science 2019) & Section Biomedical Engineering (EBI))
Open AccessArticle
8 Pages, 908 KB Download PDF

Investigating The Detection of Intention Signal During Different Exercise Protocols in Robot-Assisted Hand Movement of Stroke Patients and Healthy Subjects Using EEG-BCI System

Advances in Science, Technology and Engineering Systems Journal, Volume 4, Issue 4, Page # 300–307, 2019; DOI: 10.25046/aj040438
Abstract:

Improving the hand motor skills in post-stroke patients through rehabilitation based on movement intention derived signals from the brain in conjunction with robot-assistive technologies are explored. The experimental work is conducted using Electroencephalogram based Brain-Computer Interface (EEG-BCI) system and the AMADEO hand rehabilitation robotic device. Two protocols using visual-cues and then using a 2-Dimensional (2D)…

Read More
(This article belongs to the SP7 (Special Issue on Advancement in Engineering and Computer Science 2019) & Section Biomedical Engineering (EBI))

Journal Menu

Journal Browser


Special Issues

Special Issue on Digital Frontiers of Entrepreneurship: Integrating AI, Gender Equity, and Sustainable Futures
Guest Editors: Dr. Muhammad Nawaz Tunio, Dr. Aamir Rashid, Dr. Imamuddin Khoso
Deadline: 30 May 2026

Special Issue on Indigenous Knowledge Systems of the Tribal Communities of the Asia Pacific
Guest Editors: Dr. Anurag Hazarika
Deadline: 31 October 2026

Special Issue on Sustainable Technologies for a Resilient Future
Guest Editors: Dr. Debasis Mitra, Dr. Sourav Chattaraj, Dr. Addisu Assefa
Deadline: 30 April 2026