Search Results

Results (160)

Search Parameters:

Keyword: Machine learning
Order results
Results per page
Open AccessArticle
13 Pages, 1,578 KB Download PDF

StradNet: Automated Structural Adaptation for Efficient Deep Neural Network Design

Advances in Science, Technology and Engineering Systems Journal, Volume 10, Issue 6, Page # 29–41, 2025; DOI: 10.25046/aj100603
Abstract:

Deep neural networks (DNNs) have demonstrated remarkable success across a wide range of machine learning tasks. However, determining an effective network architecture, particularly the sizes of the hidden layers, remains a significant challenge and often relies on inefficient trial-and-error experimentation. In this paper, we propose an automated architecture design approach based on structurally adaptive DNNs,…

Read More
(This article belongs to the SP19 (Special Issue on Innovation in Computing, Engineering Science & Technology 2025-26) & Section Artificial Intelligence in Computer Science (CAI))
Open AccessArticle
7 Pages, 1,007 KB Download PDF

Predictive Analytics in Marketing: Evaluating its Effectiveness in Driving Customer Engagement

Advances in Science, Technology and Engineering Systems Journal, Volume 10, Issue 3, Page # 45–51, 2025; DOI: 10.25046/aj100306
Abstract:

Understanding and responding to customer feedback is critical for business success. Customer response data offers valuable insights into preferences, behaviours, and sentiment. By analysing this data, businesses can optimize strategies, enhance customer experiences, and drive growth. Many analysis have been conducted in this field, while the review covers a broad range of AI and ML…

Read More
(This article belongs to Section Artificial Intelligence in Computer Science (CAI))
Open AccessArticle
7 Pages, 1,536 KB Download PDF

Impact of Integrating Chatbots into Digital Universities Platforms on the Interactions between the Learner and the Educational Content

Advances in Science, Technology and Engineering Systems Journal, Volume 10, Issue 1, Page # 13–19, 2025; DOI: 10.25046/aj100103
Abstract:

The rapid expansion of digital universities across Africa addresses the need for scalable higher education solutions, but challenges such as limited physical infrastructure and high dropout rates persist. In digital learning environments, effective interaction with educational content is crucial for student success. This article explores the transformative role of chatbots integrated into digital university platforms,…

Read More
(This article belongs to the sp-aiev24 (Special Issue on AI-empowered Smart Grid Technologies and EVs 2024) & Section Education (EDU))
Open AccessArticle
12 Pages, 1,683 KB Download PDF

Deploying Trusted and Immutable Predictive Models on a Public Blockchain Network

Advances in Science, Technology and Engineering Systems Journal, Volume 9, Issue 3, Page # 72–83, 2024; DOI: 10.25046/aj090307
Abstract:

Machine learning-based predictive models often face challenges, particularly biases and a lack of trust in their predictions when deployed by individual agents. Establishing a robust deployment methodology that supports validating the accuracy and fairness of these models is a critical endeavor. In this paper, we introduce a novel approach to deploying predictive models, such as…

Read More
(This article belongs to the SP16 (Special Issue on Computing, Engineering and Multidisciplinary Sciences 2024) & Section Interdisciplinary Applications of Computer Science (CSI))
Open AccessArticle
12 Pages, 1,016 KB Download PDF

Enhancing the Network Anomaly Detection using CNN-Bidirectional LSTM Hybrid Model and Sampling Strategies for Imbalanced Network Traffic Data

Advances in Science, Technology and Engineering Systems Journal, Volume 9, Issue 1, Page # 67–78, 2024; DOI: 10.25046/aj090107
Abstract:

The cybercriminal utilized the skills and freely available tools to breach the networks of internet-connected devices by exploiting confidentiality, integrity, and availability. Network anomaly detection is crucial for ensuring the security of information resources. Detecting abnormal network behavior poses challenges because of the extensive data, imbalanced attack class nature, and the abundance of features in…

Read More
(This article belongs to the SP16 (Special Issue on Computing, Engineering and Multidisciplinary Sciences 2024) & Section Cybernetics in Computer Science (CCY))
Open AccessArticle
18 Pages, 1,349 KB Download PDF

Improved Candidate-Career Matching Using Comparative Semantic Resume Analysis

Advances in Science, Technology and Engineering Systems Journal, Volume 9, Issue 1, Page # 15–32, 2024; DOI: 10.25046/aj090103
Abstract:

A resume is a prevalent and generally employed method for individuals to showcase their proficiency and qualifications. It is typically composed using diverse customized, personalized methods in multiple inconsistent formats (such as pdf, txt, doc, etc.). Screening candidates based on the alignment of their resume with a set of job requirements is typically a labori-…

Read More
(This article belongs to the SP15 (Special Issue on Innovation in Computing, Engineering Science & Technology 2023) & Section Artificial Intelligence in Computer Science (CAI))
Open AccessArticle
11 Pages, 1,143 KB Download PDF

Optimizing the Performance of Network Anomaly Detection Using Bidirectional Long Short-Term Memory (Bi-LSTM) and Over-sampling for Imbalance Network Traffic Data

Advances in Science, Technology and Engineering Systems Journal, Volume 8, Issue 6, Page # 144–154, 2023; DOI: 10.25046/aj080614
Abstract:

Cybercriminal exploits integrity, confidentiality, and availability of information resources. Cyberattacks are typically invisible to the naked eye, even though they target a wide range of our digital assets, such as internet-connected smart devices, computers, and networking devices. Implementing network anomaly detection proves to be an effective method for identifying these malicious activities. The traditional anomaly…

Read More
(This article belongs to the SP15 (Special Issue on Innovation in Computing, Engineering Science & Technology 2023) & Section Cybernetics in Computer Science (CCY))
Open AccessArticle
8 Pages, 1,226 KB Download PDF

Comparative Study of J48 Decision Tree and CART Algorithm for Liver Cancer Symptom Analysis Using Data from Carnegie Mellon University

Advances in Science, Technology and Engineering Systems Journal, Volume 8, Issue 6, Page # 57–64, 2023; DOI: 10.25046/aj080607
Abstract:

Liver cancer is a major contributor to cancer-related mortality both in the United States and worldwide. A range of liver diseases, such as chronic liver disease, liver cirrhosis, hepatitis, and liver cancer, play a role in this statistic. Hepatitis, in particular, is the main culprit behind liver cancer. As a consequence, it is decisive to…

Read More
(This article belongs to the SP15 (Special Issue on Innovation in Computing, Engineering Science & Technology 2023) & Section Bioinformatics (BIF))
Open AccessArticle
7 Pages, 972 KB Download PDF

Tree-Based Ensemble Models, Algorithms and Performance Measures for Classification

Advances in Science, Technology and Engineering Systems Journal, Volume 8, Issue 6, Page # 19–25, 2023; DOI: 10.25046/aj080603
Abstract:

An ensemble method is a Machine Learning (ML) algorithm that aggregates the predictions of multiple estimators or models. The purpose of an ensemble module is to provide better predictive performance than any single contributing model. This can be achieved by producing a predictive model with reduced variance using bagging, and bias using boosting. The Tree-Based…

Read More
(This article belongs to the SP15 (Special Issue on Innovation in Computing, Engineering Science & Technology 2023) & Section Artificial Intelligence in Computer Science (CAI))
Open AccessArticle
20 Pages, 379 KB Download PDF

Hybrid Intrusion Detection Using the AEN Graph Model

Advances in Science, Technology and Engineering Systems Journal, Volume 8, Issue 2, Page # 44–63, 2023; DOI: 10.25046/aj080206
Abstract:

The Activity and Event Network (AEN) is a new dynamic knowledge graph that models different network entities and the relationships between them. The graph is generated by processing various network security logs, such as network packets, system logs, and intrusion detection alerts, which allows the graph to capture security-relevant activity and events in the network.…

Read More
(This article belongs to the SP14 (Special Issue on Computing, Engineering and Multidisciplinary Sciences 2022-23) & Section Hardware & Architecture in Computer Science (CHA))
Open AccessArticle
9 Pages, 2,432 KB Download PDF

Profiling Attack on WiFi-based IoT Devices using an Eavesdropping of an Encrypted Data Frames

Advances in Science, Technology and Engineering Systems Journal, Volume 7, Issue 6, Page # 49–57, 2022; DOI: 10.25046/aj070606
Abstract:

The rapid advancement of the Internet of Things (IoT) is distinguished by heterogeneous technologies that provide cutting-edge services across a range of application domains. However, by eavesdropping on encrypted WiFi network traflc, attackers can infer private information such as the types and working status of IoT devices in a business or residential home. Moreover, since…

Read More
(This article belongs to the SP13 (Special Issue on Innovation in Computing, Engineering Science & Technology 2022) & Section Interdisciplinary Applications of Computer Science (CSI))
Open AccessArticle
8 Pages, 9,429 KB Download PDF

A Supervised Building Detection Based on Shadow using Segmentation and Texture in High-Resolution Images

Advances in Science, Technology and Engineering Systems Journal, Volume 7, Issue 3, Page # 166–173, 2022; DOI: 10.25046/aj070319
Abstract:

Building detection in aerial or satellite imagery is one of the most challenging tasks due to the variety of shapes, sizes, colors, and textures of man-made objects. To this end, in this paper, we propose a novel approach to extracting buildings in high-resolution images based on prior knowledge of the shadow position. Firstly, the image…

Read More
(This article belongs to Section Artificial Intelligence in Computer Science (CAI))
Open AccessArticle
7 Pages, 924 KB Download PDF

Analysis Methods and Classification Algorithms with a Novel Sentiment Classification for Arabic Text using the Lexicon-Based Approach

Advances in Science, Technology and Engineering Systems Journal, Volume 7, Issue 3, Page # 12–18, 2022; DOI: 10.25046/aj070302
Abstract:

Social networks have become a valuable platform for tracking and analyzing Internet users’ feelings. This analysis provides crucial information for decision-making in various areas, such as politics and marketing. In addition to this challenge and our interest in the field of big data and sentiment analysis in social networks, we have dedicated this work to…

Read More
(This article belongs to Section Information Systems in Computer Science (CIS))
Open AccessArticle
10 Pages, 1,011 KB Download PDF

Innovations in Recruitment—Social Media

Advances in Science, Technology and Engineering Systems Journal, Volume 6, Issue 6, Page # 88–97, 2021; DOI: 10.25046/aj060613
Abstract:

The main objective and contribution of the paper is to describe the creation of a model to support recruitment using social media information and its deployment in practice. The model includes the design of an automated solution for downloading social media data and a proposal for the subsequent analysis and creation of a predictive model…

Read More
(This article belongs to the SP11 (Special Issue on Innovation in Computing, Engineering Science & Technology 2021) & Section Interdisciplinary Applications of Computer Science (CSI))
Open AccessArticle
18 Pages, 2,108 KB Download PDF

iDRP Framework: An Intelligent Malware Exploration Framework for Big Data and Internet of Things (IoT) Ecosystem

Advances in Science, Technology and Engineering Systems Journal, Volume 6, Issue 5, Page # 185–202, 2021; DOI: 10.25046/aj060521
Abstract:

The Internet of Things (IoT) is at a face paced growth in the advanced Industrial Revolution (IR) 4.0 in the modern digital world. Considering the current network security challenges and sophistication of attacks in the heavily computerized and interconnected systems, such as an IoT ecosystem, the need for an innovative, robust, intelligent and adaptive malware…

Read More
(This article belongs to the SP11 (Special Issue on Innovation in Computing, Engineering Science & Technology 2021) & Section Information Systems in Computer Science (CIS))
Open AccessArticle
8 Pages, 3,143 KB Download PDF

Personalized Clinical Treatment Selection Using Genetic Algorithm and Analytic Hierarchy Process

Advances in Science, Technology and Engineering Systems Journal, Volume 6, Issue 4, Page # 406–413, 2021; DOI: 10.25046/aj060446
Abstract:

The development of Machine Learning methods and approaches offers enormous growth opportunities in the Healthcare field. One of the most exciting challenges in this field is the automation of clinical treatment selection for patient state optimization. Using necessary medical data and the application of Machine Learning methods (like the Genetic Algorithm and the Analytic Hierarchy…

Read More
(This article belongs to the SP11 (Special Issue on Innovation in Computing, Engineering Science & Technology 2021) & Section Artificial Intelligence in Computer Science (CAI))
Open AccessArticle
13 Pages, 3,825 KB Download PDF

Kamphaeng Saen Beef Cattle Identification Approach using Muzzle Print Image

Advances in Science, Technology and Engineering Systems Journal, Volume 6, Issue 4, Page # 110–122, 2021; DOI: 10.25046/aj060413
Abstract:

Identification of Kamphaeng Saen beef cattle is important of the registration and traceability purposes. For a traditional identification methods, Hot Branding, Freeze Branding, Paint Branding, and RFID Systems can be replaced by genius human. This paper proposed a Kamphaeng Saen beef cattle identification approach using muzzle print images as an Animal Biometric approach. There are…

Read More
(This article belongs to Section Artificial Intelligence in Computer Science (CAI))
Open AccessArticle
8 Pages, 964 KB Download PDF

Recognition of Emotion from Emoticon with Text in Microblog Using LSTM

Advances in Science, Technology and Engineering Systems Journal, Volume 6, Issue 3, Page # 347–354, 2021; DOI: 10.25046/aj060340
Abstract:

With the advent of internet technology and social media, patterns of social communication in daily lives have changed whereby people use different social networking platforms. Microblog is a new platform for sharing opinions by means of emblematic expressions, which has become a resource for research on emotion analysis. Recognition of emotion from microblogs (REM) is…

Read More
(This article belongs to the SP11 (Special Issue on Innovation in Computing, Engineering Science & Technology 2021) & Section Information Systems in Computer Science (CIS))
Open AccessArticle
9 Pages, 878 KB Download PDF

Performance Evaluation of Convolutional Neural Networks (CNNs) And VGG on Real Time Face Recognition System

Advances in Science, Technology and Engineering Systems Journal, Volume 6, Issue 2, Page # 956–964, 2021; DOI: 10.25046/aj0602109
Abstract:

Face Recognition (FR) is considered as a heavily studied topic in computer vision field. The capability to automatically identify and authenticate human’s faces using real-time images is an important aspect in surveillance, security, and other related domains. There are separate applications that help in identifying individuals at specific locations which help in detecting intruders. The…

Read More
(This article belongs to the SP11 (Special Issue on Innovation in Computing, Engineering Science & Technology 2021) & Section Information Systems in Computer Science (CIS))
Open AccessArticle
6 Pages, 751 KB Download PDF

Efficient 2D Detection and Positioning of Complex Objects for Robotic Manipulation Using Fully Convolutional Neural Network

Advances in Science, Technology and Engineering Systems Journal, Volume 6, Issue 2, Page # 915–920, 2021; DOI: 10.25046/aj0602104
Abstract:

Programming industrial robots in a real-life environment is a significant task necessary to be dealt with in modern facilities. The “pick up and place” task is undeniably one of the regular robot programming problems which needs to be solved. At the beginning of the “pick and place” task, the position determination and exact detection of…

Read More
(This article belongs to the SP11 (Special Issue on Innovation in Computing, Engineering Science & Technology 2021) & Section Robotics (ROB))
Open AccessArticle
5 Pages, 781 KB Download PDF

Food Price Prediction Using Time Series Linear Ridge Regression with The Best Damping Factor

Advances in Science, Technology and Engineering Systems Journal, Volume 6, Issue 2, Page # 694–698, 2021; DOI: 10.25046/aj060280
Abstract:

Forecasting food prices play an important role in livestock and agriculture to maximize profits and minimizing risks. An accurate food price prediction model can help the government which leads to optimization of resource allocation. This paper uses ridge regression as an approach for forecasting with many predictors that are related to the target variable. Ridge…

Read More
(This article belongs to Section Artificial Intelligence in Computer Science (CAI))
Open AccessArticle
7 Pages, 848 KB Download PDF

Node-Node Data Exchange in IoT Devices Using Twofish and DHE

Advances in Science, Technology and Engineering Systems Journal, Volume 6, Issue 2, Page # 622–628, 2021; DOI: 10.25046/aj060271
Abstract:

Internet of Things provides the support for devices, people and things to collaborate in collecting, analyzing and sharing sensitive information from one device onto the other through the internet. The internet of things is thriving largely due to access, connectivity, artificial intelligence and machine learning approaches that it supports. The stability and enhanced speed of…

Read More
(This article belongs to the SP10 (Special Issue on Multidisciplinary Sciences and Engineering 2020-21) & Section Information Systems in Computer Science (CIS))
Open AccessArticle
7 Pages, 714 KB Download PDF

Using Supervised Classification Methods for the Analysis of Multi-spectral Signatures of Rice Varieties in Panama

Advances in Science, Technology and Engineering Systems Journal, Volume 6, Issue 2, Page # 552–558, 2021; DOI: 10.25046/aj060262
Abstract:

In this article supervised classification methods for the analysis of local Panamanian rice crops using Near-Infrared (NIR) spectral signatures are assessed. Neural network ( Multilayer Perceptron-MLP) and Tree based (Decision Trees-DT and Random Forest-RF) algorithms are used as regression and supervised classification of the spectral signatures by rice varieties, against other crops and by plant…

Read More
(This article belongs to the SP10 (Special Issue on Multidisciplinary Sciences and Engineering 2020-21) & Section Agricultural Engineering (AEN))
Open AccessArticle
15 Pages, 468 KB Download PDF

A Model for the Application of Automatic Speech Recognition for Generating Lesson Summaries

Advances in Science, Technology and Engineering Systems Journal, Volume 6, Issue 2, Page # 526–540, 2021; DOI: 10.25046/aj060260
Abstract:

Automatic Speech Recognition (ASR) technology has the potential to improve the learning experience of students in the classroom. This article addresses some of the key theoretical areas identified in the pursuit of implementing a speech recognition system, capable of lesson summary generation in the educational setting. The article discusses: some of the applica- tions of…

Read More
(This article belongs to the SP10 (Special Issue on Multidisciplinary Sciences and Engineering 2020-21) & Section Interdisciplinary Applications of Computer Science (CSI))
Open AccessArticle
8 Pages, 591 KB Download PDF

Improved Detection of Advanced Persistent Threats Using an Anomaly Detection Ensemble Approach

Advances in Science, Technology and Engineering Systems Journal, Volume 6, Issue 2, Page # 295–302, 2021; DOI: 10.25046/aj060234
Abstract:

Rated a high-risk cyber-attack type, Advanced Persistent Threat (APT) has become a cause for concern to cyber security experts. Detecting the presence of APT in order to mitigate this attack has been a major challenge as successful attacks to large organizations still abound. Our approach combines static rule anomaly detection through pattern recognition and machine…

Read More
(This article belongs to Section Cybernetics in Computer Science (CCY))

Journal Menu

Journal Browser


Special Issues

Special Issue on Digital Frontiers of Entrepreneurship: Integrating AI, Gender Equity, and Sustainable Futures
Guest Editors: Dr. Muhammad Nawaz Tunio, Dr. Aamir Rashid, Dr. Imamuddin Khoso
Deadline: 30 May 2026

Special Issue on Indigenous Knowledge Systems of the Tribal Communities of the Asia Pacific
Guest Editors: Dr. Anurag Hazarika
Deadline: 31 October 2026

Special Issue on Sustainable Technologies for a Resilient Future
Guest Editors: Dr. Debasis Mitra, Dr. Sourav Chattaraj, Dr. Addisu Assefa
Deadline: 30 April 2026