Search Results

Results (315)

Search Parameters:

Keyword: MAC
Order results
Results per page
Open AccessArticle
12 Pages, 1,016 KB Download PDF

Enhancing the Network Anomaly Detection using CNN-Bidirectional LSTM Hybrid Model and Sampling Strategies for Imbalanced Network Traffic Data

Advances in Science, Technology and Engineering Systems Journal, Volume 9, Issue 1, Page # 67–78, 2024; DOI: 10.25046/aj090107
Abstract:

The cybercriminal utilized the skills and freely available tools to breach the networks of internet-connected devices by exploiting confidentiality, integrity, and availability. Network anomaly detection is crucial for ensuring the security of information resources. Detecting abnormal network behavior poses challenges because of the extensive data, imbalanced attack class nature, and the abundance of features in…

Read More
(This article belongs to the SP16 (Special Issue on Computing, Engineering and Multidisciplinary Sciences 2024) & Section Cybernetics in Computer Science (CCY))
Open AccessArticle
18 Pages, 1,349 KB Download PDF

Improved Candidate-Career Matching Using Comparative Semantic Resume Analysis

Advances in Science, Technology and Engineering Systems Journal, Volume 9, Issue 1, Page # 15–32, 2024; DOI: 10.25046/aj090103
Abstract:

A resume is a prevalent and generally employed method for individuals to showcase their proficiency and qualifications. It is typically composed using diverse customized, personalized methods in multiple inconsistent formats (such as pdf, txt, doc, etc.). Screening candidates based on the alignment of their resume with a set of job requirements is typically a labori-…

Read More
(This article belongs to the SP15 (Special Issue on Innovation in Computing, Engineering Science & Technology 2023) & Section Artificial Intelligence in Computer Science (CAI))
Open AccessArticle
11 Pages, 1,143 KB Download PDF

Optimizing the Performance of Network Anomaly Detection Using Bidirectional Long Short-Term Memory (Bi-LSTM) and Over-sampling for Imbalance Network Traffic Data

Advances in Science, Technology and Engineering Systems Journal, Volume 8, Issue 6, Page # 144–154, 2023; DOI: 10.25046/aj080614
Abstract:

Cybercriminal exploits integrity, confidentiality, and availability of information resources. Cyberattacks are typically invisible to the naked eye, even though they target a wide range of our digital assets, such as internet-connected smart devices, computers, and networking devices. Implementing network anomaly detection proves to be an effective method for identifying these malicious activities. The traditional anomaly…

Read More
(This article belongs to the SP15 (Special Issue on Innovation in Computing, Engineering Science & Technology 2023) & Section Cybernetics in Computer Science (CCY))
Open AccessArticle
13 Pages, 3,740 KB Download PDF

Enhancing Cloud Security: A Comprehensive Framework for Real-Time Detection, Analysis and Cyber Threat Intelligence Sharing

Advances in Science, Technology and Engineering Systems Journal, Volume 8, Issue 6, Page # 107–119, 2023; DOI: 10.25046/aj080612
Abstract:

Cloud computing has emerged as a pivotal component of contemporary IT systems, affording organizations the agility and scalability required to meet the ever-changing demands of business. However, this technological evolution has introduced a new era of cybersecurity challenges, as attackers employ increasingly sophisticated strategies to breach cloud networks. Such breaches can have far-reaching consequences, including…

Read More
(This article belongs to the SP15 (Special Issue on Innovation in Computing, Engineering Science & Technology 2023) & Section -)
Open AccessArticle
8 Pages, 1,226 KB Download PDF

Comparative Study of J48 Decision Tree and CART Algorithm for Liver Cancer Symptom Analysis Using Data from Carnegie Mellon University

Advances in Science, Technology and Engineering Systems Journal, Volume 8, Issue 6, Page # 57–64, 2023; DOI: 10.25046/aj080607
Abstract:

Liver cancer is a major contributor to cancer-related mortality both in the United States and worldwide. A range of liver diseases, such as chronic liver disease, liver cirrhosis, hepatitis, and liver cancer, play a role in this statistic. Hepatitis, in particular, is the main culprit behind liver cancer. As a consequence, it is decisive to…

Read More
(This article belongs to the SP15 (Special Issue on Innovation in Computing, Engineering Science & Technology 2023) & Section Bioinformatics (BIF))
Open AccessArticle
7 Pages, 972 KB Download PDF

Tree-Based Ensemble Models, Algorithms and Performance Measures for Classification

Advances in Science, Technology and Engineering Systems Journal, Volume 8, Issue 6, Page # 19–25, 2023; DOI: 10.25046/aj080603
Abstract:

An ensemble method is a Machine Learning (ML) algorithm that aggregates the predictions of multiple estimators or models. The purpose of an ensemble module is to provide better predictive performance than any single contributing model. This can be achieved by producing a predictive model with reduced variance using bagging, and bias using boosting. The Tree-Based…

Read More
(This article belongs to the SP15 (Special Issue on Innovation in Computing, Engineering Science & Technology 2023) & Section Artificial Intelligence in Computer Science (CAI))
Open AccessArticle
7 Pages, 6,868 KB Download PDF

Design and Manufacturing of Soft Grippers for Robotics by Injection Molding Technology

Advances in Science, Technology and Engineering Systems Journal, Volume 8, Issue 4, Page # 11–17, 2023; DOI: 10.25046/aj080402
Abstract:

Soft robots have softer, more flexible, and more compliant characteristics than traditional rigid robots. These qualities encourage more secure relationships between people and machines. Nevertheless, traditional robots continue to rule the commercial sector. Due to the high cost of gripper production, soft robots are very far from being commercially feasible. This research focuses on fabricating…

Read More
(This article belongs to the SP15 (Special Issue on Innovation in Computing, Engineering Science & Technology 2023) & Section Manufacturing Engineering (EMF))
Open AccessArticle
7 Pages, 1,350 KB Download PDF

Forecasting Bitcoin Prices: An LSTM Deep-Learning Approach Using On-Chain Data

Advances in Science, Technology and Engineering Systems Journal, Volume 8, Issue 3, Page # 186–192, 2023; DOI: 10.25046/aj080321
Abstract:

Over the past decade, Bitcoin’s unprecedented performance has underscored its po-sition as the premier asset class. Starting from an insignificant value and reaching an astounding high of around 65,000 U.S dollars in 2021 – all without a central con-trolling authority – Bitcoin’s trajectory is undoubtedly a historical feat. Its intangible nature, initially a subject of…

Read More
(This article belongs to Section Information Systems in Computer Science (CIS))
Open AccessArticle
9 Pages, 4,340 KB Download PDF

Human-Centered Design, Development, and Evaluation of an Interface for a Microgrid Controller

Advances in Science, Technology and Engineering Systems Journal, Volume 8, Issue 3, Page # 80–88, 2023; DOI: 10.25046/aj080310
Abstract:

Many millions of people have adverse effects on their lives, both socially and economically, when a power outage occurs. Along with other electrical events, the lack of Situational Awareness (SA) is one of the root causes of power system outages. In order to promote adequate situational awareness, both power system and microgrid interfaces should communicate…

Read More
(This article belongs to the SP14 (Special Issue on Computing, Engineering and Multidisciplinary Sciences 2022-23) & Section Electrical Engineering (ELE))
Open AccessArticle
9 Pages, 3,409 KB Download PDF

Detecting CTC Attack in IoMT Communications using Deep Learning Approach

Advances in Science, Technology and Engineering Systems Journal, Volume 8, Issue 2, Page # 130–138, 2023; DOI: 10.25046/aj080215
Abstract:

Cyber security is based on different principles such as confidentiality and integrity of transmitted data. One of the main methods to send confidential messages is to use a shared secret to encrypt and decrypt them. Even if the amortized computational complexity of the hashing functions is Ο(1), there are several situations when it is not…

Read More
(This article belongs to the SP14 (Special Issue on Computing, Engineering and Multidisciplinary Sciences 2022-23) & Section Hardware & Architecture in Computer Science (CHA))
Open AccessArticle
20 Pages, 379 KB Download PDF

Hybrid Intrusion Detection Using the AEN Graph Model

Advances in Science, Technology and Engineering Systems Journal, Volume 8, Issue 2, Page # 44–63, 2023; DOI: 10.25046/aj080206
Abstract:

The Activity and Event Network (AEN) is a new dynamic knowledge graph that models different network entities and the relationships between them. The graph is generated by processing various network security logs, such as network packets, system logs, and intrusion detection alerts, which allows the graph to capture security-relevant activity and events in the network.…

Read More
(This article belongs to the SP14 (Special Issue on Computing, Engineering and Multidisciplinary Sciences 2022-23) & Section Hardware & Architecture in Computer Science (CHA))
Open AccessArticle
8 Pages, 10,279 KB Download PDF

A Multiplatform Application for Automatic Recognition of Personality Traits in Learning Environments

Advances in Science, Technology and Engineering Systems Journal, Volume 8, Issue 2, Page # 30–37, 2023; DOI: 10.25046/aj080204
Abstract:

The present work shows the development of a data collection platform that allows the researcher to collect new video and voice data sets in Spanish. It also allows the application of a standardized personality test and stores this information to analyze the effectiveness of the automatic personality recognizers concerning the results of a standardized personality…

Read More
(This article belongs to the SP14 (Special Issue on Computing, Engineering and Multidisciplinary Sciences 2022-23) & Section Information Systems in Computer Science (CIS))
Open AccessArticle
11 Pages, 405 KB Download PDF

Meta-heuristic and Heuristic Algorithms for Forecasting Workload Placement and Energy Consumption in Cloud Data Centers

Advances in Science, Technology and Engineering Systems Journal, Volume 8, Issue 1, Page # 01–11, 2023; DOI: 10.25046/aj080101
Abstract:

The increase of servers in data centers has become a significant problem in recent years that leads to a rise in energy consumption. The problem of high energy consumed by data centers is always related to the active hardware especially the servers that use virtualization to create a cloud workspace for the users. For this…

Read More
(This article belongs to the SP13 (Special Issue on Innovation in Computing, Engineering Science & Technology 2022) & Section Hardware & Architecture in Computer Science (CHA))
Open AccessArticle
12 Pages, 2,626 KB Download PDF

Technical Aspects and Social Science Expertise to Support Safe and Secure Handling of Autonomous Railway Systems

Advances in Science, Technology and Engineering Systems Journal, Volume 7, Issue 6, Page # 283–294, 2022; DOI: 10.25046/aj070632
Abstract:

In recent years the development of autonomous vehicles has increased tremendously and a variety of methodologies had been applied to make them more safe and secure. This work shows a multilevel approach combining Failure Mode, Effects and Criticality Analysis of an autonomous railway system with sociological and technical aspects to support safe operations and human-machine…

Read More
(This article belongs to the SP13 (Special Issue on Innovation in Computing, Engineering Science & Technology 2022) & Section Safety Science (SFS))
Open AccessArticle
7 Pages, 5,680 KB Download PDF

Transfer and Ensemble Learning in Real-time Accurate Age and Age-group Estimation

Advances in Science, Technology and Engineering Systems Journal, Volume 7, Issue 6, Page # 262–268, 2022; DOI: 10.25046/aj070630
Abstract:

Aging is considered to be a complex process in almost every species’ life, which can be studied at a variety of levels of abstraction as well as in different organs. Not surprisingly, biometric characteristics from facial images play a significant role in predicting human’s age. Specifically, automatic age estimation in real-time situation has begun to…

Read More
(This article belongs to the SP13 (Special Issue on Innovation in Computing, Engineering Science & Technology 2022) & Section Information Systems in Computer Science (CIS))
Open AccessArticle
9 Pages, 2,432 KB Download PDF

Profiling Attack on WiFi-based IoT Devices using an Eavesdropping of an Encrypted Data Frames

Advances in Science, Technology and Engineering Systems Journal, Volume 7, Issue 6, Page # 49–57, 2022; DOI: 10.25046/aj070606
Abstract:

The rapid advancement of the Internet of Things (IoT) is distinguished by heterogeneous technologies that provide cutting-edge services across a range of application domains. However, by eavesdropping on encrypted WiFi network traflc, attackers can infer private information such as the types and working status of IoT devices in a business or residential home. Moreover, since…

Read More
(This article belongs to the SP13 (Special Issue on Innovation in Computing, Engineering Science & Technology 2022) & Section Interdisciplinary Applications of Computer Science (CSI))
Open AccessArticle
7 Pages, 917 KB Download PDF

Matching TCP Packets to Detect Stepping-Stone Intrusion using Packet Crossover

Advances in Science, Technology and Engineering Systems Journal, Volume 7, Issue 6, Page # 13–19, 2022; DOI: 10.25046/aj070602
Abstract:

Hackers on the Internet often send attacking commands through compromised hosts, called stepping-stones, for the purpose to be hidden behind a long interactive communication session. In a stepping-stone attack, an intruder uses a chain of stepping-stones as relay machines and remotely login these machines using a remote login program such as SSH (secure shell). A…

Read More
(This article belongs to the SP13 (Special Issue on Innovation in Computing, Engineering Science & Technology 2022) & Section Interdisciplinary Applications of Computer Science (CSI))
Open AccessArticle
13 Pages, 1,972 KB Download PDF

BER Performance Evaluation Using Deep Learning Algorithm for Joint Source Channel Coding in Wireless Networks

Advances in Science, Technology and Engineering Systems Journal, Volume 7, Issue 4, Page # 127–139, 2022; DOI: 10.25046/aj070417
Abstract:

In the time past, virtually all the contemporary communication systems depend on distinct source and channel encoding schemes for data transmission. Irrespective of the recorded success of the distinct schemes, the new developed scheme known as joint source channel coding technique has proven to have technically outperformed the conventional schemes. The aim of the study…

Read More
(This article belongs to Section Telecommunications (TEL))
Open AccessArticle
8 Pages, 9,429 KB Download PDF

A Supervised Building Detection Based on Shadow using Segmentation and Texture in High-Resolution Images

Advances in Science, Technology and Engineering Systems Journal, Volume 7, Issue 3, Page # 166–173, 2022; DOI: 10.25046/aj070319
Abstract:

Building detection in aerial or satellite imagery is one of the most challenging tasks due to the variety of shapes, sizes, colors, and textures of man-made objects. To this end, in this paper, we propose a novel approach to extracting buildings in high-resolution images based on prior knowledge of the shadow position. Firstly, the image…

Read More
(This article belongs to Section Artificial Intelligence in Computer Science (CAI))
Open AccessArticle
7 Pages, 924 KB Download PDF

Analysis Methods and Classification Algorithms with a Novel Sentiment Classification for Arabic Text using the Lexicon-Based Approach

Advances in Science, Technology and Engineering Systems Journal, Volume 7, Issue 3, Page # 12–18, 2022; DOI: 10.25046/aj070302
Abstract:

Social networks have become a valuable platform for tracking and analyzing Internet users’ feelings. This analysis provides crucial information for decision-making in various areas, such as politics and marketing. In addition to this challenge and our interest in the field of big data and sentiment analysis in social networks, we have dedicated this work to…

Read More
(This article belongs to Section Information Systems in Computer Science (CIS))
Open AccessArticle
7 Pages, 1,800 KB Download PDF

Enhanced Dynamic Cross Layer Mechanism for real time HEVC Streaming over Vehicular Ad-hoc Networks (VANETs)

Advances in Science, Technology and Engineering Systems Journal, Volume 7, Issue 2, Page # 18–24, 2022; DOI: 10.25046/aj070202
Abstract:

Various applications have helped make vehicular Ad-hoc network communication a reality. Real-time applications, for example, need broadcasting in high video quality with minimal latency. The new High-Efficiency Video Coding (HEVC) has shown great promise for real-time video transmission through Vehicle Ad-hoc Networks due to its high compression level. These networks, on the other hand, have…

Read More
(This article belongs to the SP12 (Special Issue on Multidisciplinary Sciences and Engineering 2021-22) & Section Hardware & Architecture in Computer Science (CHA))
Open AccessArticle
14 Pages, 2,270 KB Download PDF

Improving of Heat Spreading in a SiC Propulsion Inverter using Graphene Assembled Films

Advances in Science, Technology and Engineering Systems Journal, Volume 6, Issue 6, Page # 98–111, 2021; DOI: 10.25046/aj060614
Abstract:

The focus of this work is first to establish the effect of the chip temperature and thermal feedback on the determination of the power loss in a three-phase propulsion inverter, then to demonstrate the possibility of achieving an improved heat spreading through the different layers inside a SiC power module by using graphene assembled films…

Read More
(This article belongs to the SP11 (Special Issue on Innovation in Computing, Engineering Science & Technology 2021) & Section Electronic Engineering (EEE))
Open AccessArticle
10 Pages, 1,011 KB Download PDF

Innovations in Recruitment—Social Media

Advances in Science, Technology and Engineering Systems Journal, Volume 6, Issue 6, Page # 88–97, 2021; DOI: 10.25046/aj060613
Abstract:

The main objective and contribution of the paper is to describe the creation of a model to support recruitment using social media information and its deployment in practice. The model includes the design of an automated solution for downloading social media data and a proposal for the subsequent analysis and creation of a predictive model…

Read More
(This article belongs to the SP11 (Special Issue on Innovation in Computing, Engineering Science & Technology 2021) & Section Interdisciplinary Applications of Computer Science (CSI))
Open AccessArticle
6 Pages, 965 KB Download PDF

Ensemble Learning of Deep URL Features based on Convolutional Neural Network for Phishing Attack Detection

Advances in Science, Technology and Engineering Systems Journal, Volume 6, Issue 5, Page # 291–296, 2021; DOI: 10.25046/aj060532
Abstract:

The deep learning-based URL classification approach using massive observations has been verified especially in the field of phishing attack detection. Various improvements have been achieved through the modeling of character and word sequence of URL based on convolutional and recurrent neural networks, and it has been proven that an ensemble approach of each model has…

Read More
(This article belongs to the SP12 (Special Issue on Multidisciplinary Sciences and Engineering 2021-22) & Section Information Systems in Computer Science (CIS))
Open AccessArticle
8 Pages, 348 KB Download PDF

Cyberbullying Detection by Including Emotion Model using Stacking Ensemble Method

Advances in Science, Technology and Engineering Systems Journal, Volume 6, Issue 5, Page # 229–236, 2021; DOI: 10.25046/aj060525
Abstract:

Cyberbullying is a serious problem and caused an immense impact to the victim. To prevent the cyberbullying, the solution is to develop an automatic detection system. In this research, we propose a combined model for cyberbullying detection and emotion detection by using stacking method. The experiment is to create a better model for cyberbullying detection…

Read More
(This article belongs to Section Information Systems in Computer Science (CIS))
1 3 4 5 6 7 13

Journal Menu

Journal Browser


Special Issues

Special Issue on Digital Frontiers of Entrepreneurship: Integrating AI, Gender Equity, and Sustainable Futures
Guest Editors: Dr. Muhammad Nawaz Tunio, Dr. Aamir Rashid, Dr. Imamuddin Khoso
Deadline: 30 May 2026

Special Issue on Sustainable Technologies for a Resilient Future
Guest Editors: Dr. Debasis Mitra, Dr. Sourav Chattaraj, Dr. Addisu Assefa
Deadline: 30 April 2026