Search Results

Results (1171)

Search Parameters:

Keyword: GA
Order results
Results per page
Open AccessArticle
8 Pages, 1,323 KB Download PDF

Augmented Reality Prototype HUD for Passenger Infotainment in a Vehicular Environment

Advances in Science, Technology and Engineering Systems Journal, Volume 2, Issue 3, Page # 634–641, 2017; DOI: 10.25046/aj020381
Abstract:

The paper presents a prototype Head Up Display interface which acts as an interactive infotainment system for rear seat younger passengers, aiming to minimize driver distraction. The interface employs an Augmented Reality medium that utilizes the external scenery as a background for two platform games explicitly designed for this system. Additionally, the system provides AR…

Read More
(This article belongs to the SP3 (Special issue on Recent Advances in Engineering Systems 2017) & Section Interdisciplinary Applications of Computer Science (CSI))
Open AccessArticle
6 Pages, 692 KB Download PDF

Optimisation of Software-Defined Networks Performance Using a Hybrid Intelligent System

Advances in Science, Technology and Engineering Systems Journal, Volume 2, Issue 3, Page # 617–622, 2017; DOI: 10.25046/aj020379
Abstract:

This paper proposes a novel intelligent technique that has been designed to optimise the performance of Software Defined Networks (SDN). The proposed hybrid intelligent system has employed integration of intelligence-based optimisation approaches with the artificial neural network. These heuristic optimisation methods include Genetic Algorithms (GA) and Particle Swarm Optimisation (PSO). These methods were utilised separately…

Read More
(This article belongs to the SP3 (Special issue on Recent Advances in Engineering Systems 2017) & Section Artificial Intelligence in Computer Science (CAI))
Open AccessArticle
7 Pages, 1,279 KB Download PDF

Power requirements and battery life measurement for wireless transmission between two nodes in different mediums

Advances in Science, Technology and Engineering Systems Journal, Volume 2, Issue 3, Page # 605–611, 2017; DOI: 10.25046/aj020377
Abstract:

One of the most important roles of the wireless sensor networks (WSN) is to avoid wiring costs, be self-sustainable and be able to function for several years. However, due to the slow progress in battery technology, power continues to be a limited resource in wireless sensor communication and electric energy storage remains to be an…

Read More
(This article belongs to the SP3 (Special issue on Recent Advances in Engineering Systems 2017) & Section Telecommunications (TEL))
Open AccessArticle
11 Pages, 1,481 KB Download PDF

FAG – a management support tool with BI techniques to assist teachers in the virtual learning environment Moodle

Advances in Science, Technology and Engineering Systems Journal, Volume 2, Issue 3, Page # 587–597, 2017; DOI: 10.25046/aj020375
Abstract:

One of the great challenges in distance-learning is to follow the actions of the teachers/tutors and also the actions of students during the process of teaching and learning. This article presents the FAG Tool integrated with the LMS Moodle was developed to help managers of the Distance Education environment to monitor the actions of teachers/tutors…

Read More
(This article belongs to the SP3 (Special issue on Recent Advances in Engineering Systems 2017) & Section Interdisciplinary Applications of Computer Science (CSI))
Open AccessArticle
9 Pages, 807 KB Download PDF

The Search for a Convergent Option to Deploy Smart Grids on IoT Scenario

Advances in Science, Technology and Engineering Systems Journal, Volume 2, Issue 3, Page # 569–577, 2017; DOI: 10.25046/aj020373
Abstract:

Smart city projects are quickly evolving in several countries as a feasible solution to the urban organization to provide sustainable socioeconomic growth and solve problems that arise as the populations of these cities grow. In this sense, technology application plays an important role in enabling automation of processes, improving the citizen’s quality of life and…

Read More
(This article belongs to the SP3 (Special issue on Recent Advances in Engineering Systems 2017) & Section Telecommunications (TEL))
Open AccessArticle
9 Pages, 5,165 KB Download PDF

Semantic-less Breach Detection of Polymorphic Malware in Federated Cloud

Advances in Science, Technology and Engineering Systems Journal, Volume 2, Issue 3, Page # 553–561, 2017; DOI: 10.25046/aj020371
Abstract:

Cloud computing is one of the largest emerging utility services that is expected to grow enormously over the next decade. Many organizations are moving into hybrid cloud/hosted computing models. Single cloud service provider introduces cost and environmental challenges. Also, multi-cloud solution implemented by the Cloud tenant is suboptimal as it requires expensive adaptation costs. Cloud…

Read More
(This article belongs to the SP3 (Special issue on Recent Advances in Engineering Systems 2017) & Section Interdisciplinary Applications of Computer Science (CSI))
Open AccessArticle
8 Pages, 778 KB Download PDF

Multi-Domain Virtual Network Embedding with Coordinated Link Mapping

Advances in Science, Technology and Engineering Systems Journal, Volume 2, Issue 3, Page # 545–552, 2017; DOI: 10.25046/aj020370
Abstract:

Network Virtualization, which allows the co-existence of various logical networks on shared physical infrastructure, has become popular in recent years. The optimal mapping of virtual resource to physical resource is a major issue in network virtualization. This problem, called virtual network embedding (VNE), has been well explored in the context of one physical domain, which…

Read More
(This article belongs to the SP3 (Special issue on Recent Advances in Engineering Systems 2017) & Section Interdisciplinary Applications of Computer Science (CSI))
Open AccessArticle
5 Pages, 368 KB Download PDF

An Encryption Key for Secure Authentication: The Dynamic Solution

Advances in Science, Technology and Engineering Systems Journal, Volume 2, Issue 3, Page # 540–544, 2017; DOI: 10.25046/aj020369
Abstract:

In modern day technology, the Information Society is at risk. Passwords are a multi-user computer systems usual first line of defence against intrusion. A password may be textual with any combination of alphanumeric characters or biometric or 3-D. But no authentication protocol is fully secured against todays hackers as all of them are Static in…

Read More
(This article belongs to the SP3 (Special issue on Recent Advances in Engineering Systems 2017) & Section Interdisciplinary Applications of Computer Science (CSI))
Open AccessArticle
12 Pages, 1,830 KB Download PDF

Modelization of cognition, activity and motivation as indicators for Interactive Learning Environment

Advances in Science, Technology and Engineering Systems Journal, Volume 2, Issue 3, Page # 520–531, 2017; DOI: 10.25046/aj020367
Abstract:

In Interactive Learning Environment (ILE), the cognitive activity and behavior of learners are the center of the researchers’ concerns. The improvement of learning through combining these axes as a structure of indicators for well-designed learning environment, encloses the measurement of the educational activity as a part of the learning process. In this paper, we propose…

Read More
(This article belongs to the SP3 (Special issue on Recent Advances in Engineering Systems 2017) & Section Interdisciplinary Applications of Computer Science (CSI))
Open AccessArticle
11 Pages, 1,022 KB Download PDF

Verifying the Detection Results of Impersonation Attacks in Service Clouds

Advances in Science, Technology and Engineering Systems Journal, Volume 2, Issue 3, Page # 449–459, 2017; DOI: 10.25046/aj020358
Abstract:

A web service impersonation is a class of attacks in which an attacker poses as or assumes the identity of a legitimate service to maliciously utilize that service’s privileges. Providing security for interacting cloud services requires more than user authentication with passwords or digital certificates and confidentiality in data transmission. In this paper, we focus…

Read More
(This article belongs to the SP3 (Special issue on Recent Advances in Engineering Systems 2017) & Section Interdisciplinary Applications of Computer Science (CSI))
Open AccessArticle
8 Pages, 697 KB Download PDF

A Reconfigurable Metal-Plasma Yagi-Uda Antenna for Microwave Applications

Advances in Science, Technology and Engineering Systems Journal, Volume 2, Issue 3, Page # 441–448, 2017; DOI: 10.25046/aj020357
Abstract:

This paper is an extension of the work originally presented at the European Microwave Conference (EuMC) about a reconfigurable hybrid metal-plasma Yagi-Uda antenna operating at 1.55 GHz: this antenna consists of metallic reflector and active element and two plasma directors. The conference work showed through full-wave numerical simulations (CST Microwave Studio) how it is possible…

Read More
(This article belongs to the SP3 (Special issue on Recent Advances in Engineering Systems 2017) & Section Telecommunications (TEL))
Open AccessArticle
6 Pages, 959 KB Download PDF

Principal Component Analysis Application on Flavonoids Characterization

Advances in Science, Technology and Engineering Systems Journal, Volume 2, Issue 3, Page # 435–440, 2017; DOI: 10.25046/aj020356
Abstract:

Flavonoid is one of the bioactive compounds that are currently used in pharmaceutical and medicinal industries due to their health benefit. The focus of current research is mainly on the extraction and isolation of bioactive compounds; however non to date has explored on the identification of flavonoids classes under the Fourier Transform Infrared spectroscopy (FTIR).…

Read More
(This article belongs to the SP3 (Special issue on Recent Advances in Engineering Systems 2017) & Section Pharmacology & Pharmacy (PHR))
Open AccessArticle
8 Pages, 683 KB Download PDF

Service Productivity and Complexity in Medical Rescue Services

Advances in Science, Technology and Engineering Systems Journal, Volume 2, Issue 3, Page # 427–434, 2017; DOI: 10.25046/aj020355
Abstract:

The increasing impact of services on economic wealth and income in high wage countries calls for a detailed examination of service productivity and complexity in current research projects. This paper describes the development of a measurement model of service productivity and complexity within the domain of medical service provision. While the measurement model of service…

Read More
(This article belongs to the SP3 (Special issue on Recent Advances in Engineering Systems 2017) & Section Biomedical Engineering (EBI))
Open AccessArticle
7 Pages, 1,776 KB Download PDF

A Highly-Secured Arithmetic Hiding cum Look-Up Table (AHLUT) based S-Box for AES-128 Implementation

Advances in Science, Technology and Engineering Systems Journal, Volume 2, Issue 3, Page # 420–426, 2017; DOI: 10.25046/aj020354
Abstract:

Side-Channel Attack (SCA) is an effective method in extracting the secret key of cryptographic algorithms by correlating the physical leakage information with the processed data. In this paper, we propose an arithmetic hiding cum Look-up Table (AHLUT) based Substitution-Box (S-Box) in AES-128 cryptographic algorithm implementation to countermeasure against SCA. There are three key features in…

Read More
(This article belongs to the SP3 (Special issue on Recent Advances in Engineering Systems 2017) & Section Cybernetics in Computer Science (CCY))
Open AccessArticle
10 Pages, 936 KB Download PDF

Forced Vibration Response of Double-Bay Multi-Storey Building Frames with Joints of Infinite Rigidity

Advances in Science, Technology and Engineering Systems Journal, Volume 2, Issue 4, Page # 68–77, 2017; DOI: 10.25046/aj020410
Abstract:

This paper studied external-source-excited vibration response of double-bay multi-storey building frames for the effect of joint stiffening on bending moment and joint displacement. One of the frames has normal rigid joints. Three others of the frames have stiffened joints of stiffened lengths: 275mm, 425mm and 775mm respectively. Lumped mass system was the dynamic model adopted.…

Read More
(This article belongs to Section Civil Engineering (ECV))
Open AccessArticle
6 Pages, 1,026 KB Download PDF

Performance Analysis of Phased Array and Frequency Diverse Array Radar Ambiguity Functions

Advances in Science, Technology and Engineering Systems Journal, Volume 2, Issue 3, Page # 389–394, 2017; DOI: 10.25046/aj020350
Abstract:

Radar ambiguity function is widely employed to analyze a radar system’s time delay (range) resolution, Doppler frequency (range rate) resolution, mainlobe width and sidelobes in both range and Doppler. In this paper, ambiguity functions of frequency diverse array (FDA) which offers range-angle dependent transmit beampattern and Phased array which yields angle transmit beampattern is investigated.…

Read More
(This article belongs to the SP3 (Special issue on Recent Advances in Engineering Systems 2017) & Section Telecommunications (TEL))
Open AccessArticle
5 Pages, 669 KB Download PDF

Security in SWIPT with Power Splitting Eavesdropper

Advances in Science, Technology and Engineering Systems Journal, Volume 2, Issue 3, Page # 384–388, 2017; DOI: 10.25046/aj020349
Abstract:

Simultaneous wireless information and power transfer (SWIPT) has drawn significant research interest in recent years. In this paper, we investigate the information theoretic secrecy of a SWIPT system under Weibull fading channel. To be specific, we analyze the information security in the presence of an energy harvesting and information decoding eavesdropper. All links are subjected…

Read More
(This article belongs to the SP3 (Special issue on Recent Advances in Engineering Systems 2017) & Section Telecommunications (TEL))
Open AccessArticle
8 Pages, 1,704 KB Download PDF

Secure Path Selection under Random Fading

Advances in Science, Technology and Engineering Systems Journal, Volume 2, Issue 3, Page # 376–383, 2017; DOI: 10.25046/aj020348
Abstract:

Application-oriented Wireless Sensor Networks (WSNs) promises to be one of the most useful technologies of this century. However, secure communication between nodes in WSNs is still an unresolved issue. In this context, we propose two protocols (i.e. Optimal Secure Path (OSP) and Sub-optimal Secure Path (SSP)) to minimize the outage probability of secrecy capacity in…

Read More
(This article belongs to the SP3 (Special issue on Recent Advances in Engineering Systems 2017) & Section Telecommunications (TEL))
Open AccessArticle
7 Pages, 749 KB Download PDF

Validity of Mind Monitoring System as a Mental Health Indicator using Voice

Advances in Science, Technology and Engineering Systems Journal, Volume 2, Issue 3, Page # 338–344, 2017; DOI: 10.25046/aj020343
Abstract:

We have been developing a method of evaluating the mental health condition of a person based on the sound of their voice. Currently, we have applied this technology to create a smartphone application that shows the vitality and the mental activity as mental health condition indices. Using voice to measure one’s mental health condition is…

Read More
(This article belongs to the SP3 (Special issue on Recent Advances in Engineering Systems 2017) & Section Biomedical Engineering (EBI))
Open AccessArticle
6 Pages, 1,103 KB Download PDF

Real Time Advanced Clustering System

Advances in Science, Technology and Engineering Systems Journal, Volume 2, Issue 3, Page # 321–326, 2017; DOI: 10.25046/aj020341
Abstract:

This paper describes a system to gather information from a stationary camera to identify moving objects. The proposed solution makes only use of motion vectors between adjacent frames, obtained from any algorithm. Starting from them, the system is able to retrieve clusters of moving objects in a scene acquired by an image sensor device. Since…

Read More
(This article belongs to the SP3 (Special issue on Recent Advances in Engineering Systems 2017) & Section Interdisciplinary Applications of Computer Science (CSI))
Open AccessArticle
19 Pages, 1,686 KB Download PDF

A Computationally Intelligent Approach to the Detection of Wormhole Attacks in Wireless Sensor Networks

Advances in Science, Technology and Engineering Systems Journal, Volume 2, Issue 3, Page # 302–320, 2017; DOI: 10.25046/aj020340
Abstract:

A wormhole attack is one of the most critical and challenging security threats for wireless sensor networks because of its nature and ability to perform concealed malicious activities. This paper proposes an innovative wormhole detection scheme to detect wormhole attacks using computational intelligence and an artificial neural network (ANN). Most wormhole detection schemes reported in…

Read More
(This article belongs to the SP3 (Special issue on Recent Advances in Engineering Systems 2017) & Section Information Systems in Computer Science (CIS))
Open AccessArticle
3 Pages, 491 KB Download PDF

Matrix Encryption Scheme

Advances in Science, Technology and Engineering Systems Journal, Volume 2, Issue 4, Page # 56–58, 2017; DOI: 10.25046/aj020408
Abstract:

In classical cryptography, the Hill cipher is a polygraphic substitution cipher based on linear algebra. In this work, we proposed a new problem applicable to the public key cryptography, based on the Matrices, called “Matrix discrete logarithm problem”, it uses certain elements formed by matrices whose coefficients are elements in a finite field. We have…

Read More
(This article belongs to Section Mathematics (MAT))
Open AccessArticle
7 Pages, 454 KB Download PDF

Synthesis of Important Design Criteria for Future Vehicle Electric System

Advances in Science, Technology and Engineering Systems Journal, Volume 2, Issue 3, Page # 277–283, 2017; DOI: 10.25046/aj020337
Abstract:

In this article, we give a brief overview of future trends and corresponding stakeholder requests regarding the design of automotive electric and electronic (e/e)-architectures. While today’s optimization is mainly based on the static design criteria of unit costs and weight, three dynamic design criteria are considered decisive factors in the future: voltage stability, vehicle energy…

Read More
(This article belongs to the SP3 (Special issue on Recent Advances in Engineering Systems 2017) & Section Automation & Control Systems (ACS))
Open AccessArticle
8 Pages, 2,236 KB Download PDF

Classifying region of interests from mammograms with breast cancer into BIRADS using Artificial Neural Networks

Advances in Science, Technology and Engineering Systems Journal, Volume 2, Issue 3, Page # 233–240, 2017; DOI: 10.25046/aj020332
Abstract:

Breast cancer is one of the most common cancers among female diseases all over the world. Early diagnosis and treatment is particularly important in reducing the mortality rate. This research is focused on the prevention of breast cancer, therefore it is important to detect micro-calcifications (MCs) which are a sign of early stage breast cancer.…

Read More
(This article belongs to the SP3 (Special issue on Recent Advances in Engineering Systems 2017) & Section Artificial Intelligence in Computer Science (CAI))
Open AccessArticle
7 Pages, 1,258 KB Download PDF

A security approach based on honeypots: Protecting Online Social network from malicious profiles

Advances in Science, Technology and Engineering Systems Journal, Volume 2, Issue 3, Page # 198–204, 2017; DOI: 10.25046/aj020326
Abstract:

In the recent years, the fast development and the exponential utilization of social networks have prompted an expansion of social Computing. In social networks users are interconnected by edges or links, where Facebook, twitter, LinkedIn are most popular social networks websites. Due to the growing popularity of these sites they serve as a target for…

Read More
(This article belongs to the SP3 (Special issue on Recent Advances in Engineering Systems 2017) & Section Interdisciplinary Applications of Computer Science (CSI))

Journal Menu

Journal Browser


Special Issues

Special Issue on Digital Frontiers of Entrepreneurship: Integrating AI, Gender Equity, and Sustainable Futures
Guest Editors: Dr. Muhammad Nawaz Tunio, Dr. Aamir Rashid, Dr. Imamuddin Khoso
Deadline: 30 May 2026

Special Issue on Sustainable Technologies for a Resilient Future
Guest Editors: Dr. Debasis Mitra, Dr. Sourav Chattaraj, Dr. Addisu Assefa
Deadline: 30 April 2026