Search Results

Results (1521)

Search Parameters:

Keyword: SP
Order results
Results per page
Open AccessArticle
8 Pages, 1,323 KB Download PDF

Augmented Reality Prototype HUD for Passenger Infotainment in a Vehicular Environment

Advances in Science, Technology and Engineering Systems Journal, Volume 2, Issue 3, Page # 634–641, 2017; DOI: 10.25046/aj020381
Abstract:

The paper presents a prototype Head Up Display interface which acts as an interactive infotainment system for rear seat younger passengers, aiming to minimize driver distraction. The interface employs an Augmented Reality medium that utilizes the external scenery as a background for two platform games explicitly designed for this system. Additionally, the system provides AR…

Read More
(This article belongs to the SP3 (Special issue on Recent Advances in Engineering Systems 2017) & Section Interdisciplinary Applications of Computer Science (CSI))
Open AccessArticle
11 Pages, 1,481 KB Download PDF

FAG – a management support tool with BI techniques to assist teachers in the virtual learning environment Moodle

Advances in Science, Technology and Engineering Systems Journal, Volume 2, Issue 3, Page # 587–597, 2017; DOI: 10.25046/aj020375
Abstract:

One of the great challenges in distance-learning is to follow the actions of the teachers/tutors and also the actions of students during the process of teaching and learning. This article presents the FAG Tool integrated with the LMS Moodle was developed to help managers of the Distance Education environment to monitor the actions of teachers/tutors…

Read More
(This article belongs to the SP3 (Special issue on Recent Advances in Engineering Systems 2017) & Section Interdisciplinary Applications of Computer Science (CSI))
Open AccessArticle
9 Pages, 5,165 KB Download PDF

Semantic-less Breach Detection of Polymorphic Malware in Federated Cloud

Advances in Science, Technology and Engineering Systems Journal, Volume 2, Issue 3, Page # 553–561, 2017; DOI: 10.25046/aj020371
Abstract:

Cloud computing is one of the largest emerging utility services that is expected to grow enormously over the next decade. Many organizations are moving into hybrid cloud/hosted computing models. Single cloud service provider introduces cost and environmental challenges. Also, multi-cloud solution implemented by the Cloud tenant is suboptimal as it requires expensive adaptation costs. Cloud…

Read More
(This article belongs to the SP3 (Special issue on Recent Advances in Engineering Systems 2017) & Section Interdisciplinary Applications of Computer Science (CSI))
Open AccessArticle
5 Pages, 368 KB Download PDF

An Encryption Key for Secure Authentication: The Dynamic Solution

Advances in Science, Technology and Engineering Systems Journal, Volume 2, Issue 3, Page # 540–544, 2017; DOI: 10.25046/aj020369
Abstract:

In modern day technology, the Information Society is at risk. Passwords are a multi-user computer systems usual first line of defence against intrusion. A password may be textual with any combination of alphanumeric characters or biometric or 3-D. But no authentication protocol is fully secured against todays hackers as all of them are Static in…

Read More
(This article belongs to the SP3 (Special issue on Recent Advances in Engineering Systems 2017) & Section Interdisciplinary Applications of Computer Science (CSI))
Open AccessArticle
8 Pages, 1,031 KB Download PDF

Self-Organizing Map based Feature Learning in Bio-Signal Processing

Advances in Science, Technology and Engineering Systems Journal, Volume 2, Issue 3, Page # 505–512, 2017; DOI: 10.25046/aj020365
Abstract:

Feature extraction is playing a significant role in bio-signal processing. Feature identification and selection has two approaches. The standard method is engineering handcraft which is based on user experience and application area. While the other approach is feature learning that based on making the system identify and select the best features suit the application. The…

Read More
(This article belongs to the SP3 (Special issue on Recent Advances in Engineering Systems 2017) & Section Biomedical Engineering (EBI))
Open AccessArticle
7 Pages, 1,572 KB Download PDF

Design, Fabrication and Testing of a Dual-Range XY Micro-Motion Stage Driven by Voice Coil Actuators

Advances in Science, Technology and Engineering Systems Journal, Volume 2, Issue 3, Page # 498–504, 2017; DOI: 10.25046/aj020364
Abstract:

Nowadays, compliant micro-motion stages offer high positioning accuracy and repeatability. When assembled with conventional stages, the resulting dual-range positioning systems allow for nanometer scale accuracy within a centimeter scale working area. However, such systems invoke a high cost and large footprint. This paper presents a low-cost, compact compliant XY micro-motion stage where dual-range manipulation has…

Read More
(This article belongs to the SP3 (Special issue on Recent Advances in Engineering Systems 2017) & Section Biomedical Engineering (EBI))
Open AccessArticle
7 Pages, 1,047 KB Download PDF

Optimal Sizing and Control Strategy of renewable hybrid systems PV-Diesel Generator-Battery: application to the case of Djanet city of Algeria

Advances in Science, Technology and Engineering Systems Journal, Volume 2, Issue 3, Page # 485–491, 2017; DOI: 10.25046/aj020362
Abstract:

A method for optimal sizing of hybrid system consisting of a Photovoltaic (PV) panel, diesel generator, Battery banks and load is considered in this paper. To this end a novel approach is proposed. More precisely a methodology for the design and simulation of the behavior of Hybrid system PV-Diesel-Battery banks to electrify an isolated rural…

Read More
(This article belongs to the SP3 (Special issue on Recent Advances in Engineering Systems 2017) & Section Electrical Engineering (ELE))
Open AccessArticle
10 Pages, 1,226 KB Download PDF

Segmented and Detailed Visualization of Anatomical Structures based on Augmented Reality for Health Education and Knowledge Discovery

Advances in Science, Technology and Engineering Systems Journal, Volume 2, Issue 3, Page # 469–478, 2017; DOI: 10.25046/aj020360
Abstract:

The evolution of technology has changed the face of education, especially when combined with appropriate pedagogical bases. This combination has created innovation opportunities in order to add quality to teaching through new perspectives for traditional methods applied in the classroom. In the Health field, particularly, augmented reality and interaction design techniques can assist the teacher…

Read More
(This article belongs to the SP3 (Special issue on Recent Advances in Engineering Systems 2017) & Section Artificial Intelligence in Computer Science (CAI))
Open AccessArticle
9 Pages, 1,289 KB Download PDF

Image Segmentation Using Fuzzy Inference System on YCbCr Color Model

Advances in Science, Technology and Engineering Systems Journal, Volume 2, Issue 3, Page # 460–468, 2017; DOI: 10.25046/aj020359
Abstract:

This paper This paper presents a reliable method for image segmentation using a fuzzy inference system. The Fuzzy Membership function is applied on the YCbCr color space. Triangular membership functions are used in the input of the fuzzy system, Mamdani type fuzzy inference system is applied and for the output universe, singleton-type functions are used;…

Read More
(This article belongs to the SP3 (Special issue on Recent Advances in Engineering Systems 2017) & Section Interdisciplinary Applications of Computer Science (CSI))
Open AccessArticle
11 Pages, 1,022 KB Download PDF

Verifying the Detection Results of Impersonation Attacks in Service Clouds

Advances in Science, Technology and Engineering Systems Journal, Volume 2, Issue 3, Page # 449–459, 2017; DOI: 10.25046/aj020358
Abstract:

A web service impersonation is a class of attacks in which an attacker poses as or assumes the identity of a legitimate service to maliciously utilize that service’s privileges. Providing security for interacting cloud services requires more than user authentication with passwords or digital certificates and confidentiality in data transmission. In this paper, we focus…

Read More
(This article belongs to the SP3 (Special issue on Recent Advances in Engineering Systems 2017) & Section Interdisciplinary Applications of Computer Science (CSI))
Open AccessArticle
8 Pages, 697 KB Download PDF

A Reconfigurable Metal-Plasma Yagi-Uda Antenna for Microwave Applications

Advances in Science, Technology and Engineering Systems Journal, Volume 2, Issue 3, Page # 441–448, 2017; DOI: 10.25046/aj020357
Abstract:

This paper is an extension of the work originally presented at the European Microwave Conference (EuMC) about a reconfigurable hybrid metal-plasma Yagi-Uda antenna operating at 1.55 GHz: this antenna consists of metallic reflector and active element and two plasma directors. The conference work showed through full-wave numerical simulations (CST Microwave Studio) how it is possible…

Read More
(This article belongs to the SP3 (Special issue on Recent Advances in Engineering Systems 2017) & Section Telecommunications (TEL))
Open AccessArticle
6 Pages, 959 KB Download PDF

Principal Component Analysis Application on Flavonoids Characterization

Advances in Science, Technology and Engineering Systems Journal, Volume 2, Issue 3, Page # 435–440, 2017; DOI: 10.25046/aj020356
Abstract:

Flavonoid is one of the bioactive compounds that are currently used in pharmaceutical and medicinal industries due to their health benefit. The focus of current research is mainly on the extraction and isolation of bioactive compounds; however non to date has explored on the identification of flavonoids classes under the Fourier Transform Infrared spectroscopy (FTIR).…

Read More
(This article belongs to the SP3 (Special issue on Recent Advances in Engineering Systems 2017) & Section Pharmacology & Pharmacy (PHR))
Open AccessArticle
7 Pages, 1,776 KB Download PDF

A Highly-Secured Arithmetic Hiding cum Look-Up Table (AHLUT) based S-Box for AES-128 Implementation

Advances in Science, Technology and Engineering Systems Journal, Volume 2, Issue 3, Page # 420–426, 2017; DOI: 10.25046/aj020354
Abstract:

Side-Channel Attack (SCA) is an effective method in extracting the secret key of cryptographic algorithms by correlating the physical leakage information with the processed data. In this paper, we propose an arithmetic hiding cum Look-up Table (AHLUT) based Substitution-Box (S-Box) in AES-128 cryptographic algorithm implementation to countermeasure against SCA. There are three key features in…

Read More
(This article belongs to the SP3 (Special issue on Recent Advances in Engineering Systems 2017) & Section Cybernetics in Computer Science (CCY))
Open AccessArticle
8 Pages, 1,704 KB Download PDF

Secure Path Selection under Random Fading

Advances in Science, Technology and Engineering Systems Journal, Volume 2, Issue 3, Page # 376–383, 2017; DOI: 10.25046/aj020348
Abstract:

Application-oriented Wireless Sensor Networks (WSNs) promises to be one of the most useful technologies of this century. However, secure communication between nodes in WSNs is still an unresolved issue. In this context, we propose two protocols (i.e. Optimal Secure Path (OSP) and Sub-optimal Secure Path (SSP)) to minimize the outage probability of secrecy capacity in…

Read More
(This article belongs to the SP3 (Special issue on Recent Advances in Engineering Systems 2017) & Section Telecommunications (TEL))
Open AccessArticle
9 Pages, 3,742 KB Download PDF

Simulation and Implementation of Sensorless Control in Multi-Motors Electric Drives with High Dynamics

Advances in Science, Technology and Engineering Systems Journal, Volume 2, Issue 4, Page # 59–67, 2017; DOI: 10.25046/aj020409
Abstract:

In this article we’ll tackle the control of multi-motors electric drives with high dynamic, with rapid changes in torque and speed, with rigid or flexible coupling of motors, where the control strategy is FOC (Field Oriented Control) for each drives and the distributed control in local network using the CANopen protocol. In the surface mining…

Read More
(This article belongs to Section Electrical Engineering (ELE))
Open AccessArticle
6 Pages, 856 KB Download PDF

An Overview of Traceability: Towards a general multi-domain model

Advances in Science, Technology and Engineering Systems Journal, Volume 2, Issue 3, Page # 356–361, 2017; DOI: 10.25046/aj020345
Abstract:

Traceability for some people, is merely a tool to keep a history over something important that happened in the past. For others, is has no added value to their actual processes or products. In fact, it is becoming more and more valued. Traceability is still a vast area of research and an undiscovered field that…

Read More
(This article belongs to the SP3 (Special issue on Recent Advances in Engineering Systems 2017) & Section Software Engineering in Computer Science (CSE))
Open AccessArticle
11 Pages, 1,478 KB Download PDF

The Model of Adaptive Learning Objects for virtual environments instanced by the competencies

Advances in Science, Technology and Engineering Systems Journal, Volume 2, Issue 3, Page # 345–355, 2017; DOI: 10.25046/aj020344
Abstract:

This article presents the instantiation of the Model of Adaptation of Learning Objects (MALO) developed in previous works, using the competencies to be developed in a given educational context. MALO has been developed for virtual environments based on an extension of the LOM standard. The model specifies modularly and independently two categories of rules, of…

Read More
(This article belongs to the SP3 (Special issue on Recent Advances in Engineering Systems 2017) & Section Interdisciplinary Applications of Computer Science (CSI))
Open AccessArticle
19 Pages, 1,686 KB Download PDF

A Computationally Intelligent Approach to the Detection of Wormhole Attacks in Wireless Sensor Networks

Advances in Science, Technology and Engineering Systems Journal, Volume 2, Issue 3, Page # 302–320, 2017; DOI: 10.25046/aj020340
Abstract:

A wormhole attack is one of the most critical and challenging security threats for wireless sensor networks because of its nature and ability to perform concealed malicious activities. This paper proposes an innovative wormhole detection scheme to detect wormhole attacks using computational intelligence and an artificial neural network (ANN). Most wormhole detection schemes reported in…

Read More
(This article belongs to the SP3 (Special issue on Recent Advances in Engineering Systems 2017) & Section Information Systems in Computer Science (CIS))
Open AccessArticle
3 Pages, 491 KB Download PDF

Matrix Encryption Scheme

Advances in Science, Technology and Engineering Systems Journal, Volume 2, Issue 4, Page # 56–58, 2017; DOI: 10.25046/aj020408
Abstract:

In classical cryptography, the Hill cipher is a polygraphic substitution cipher based on linear algebra. In this work, we proposed a new problem applicable to the public key cryptography, based on the Matrices, called “Matrix discrete logarithm problem”, it uses certain elements formed by matrices whose coefficients are elements in a finite field. We have…

Read More
(This article belongs to Section Mathematics (MAT))
Open AccessArticle
7 Pages, 454 KB Download PDF

Synthesis of Important Design Criteria for Future Vehicle Electric System

Advances in Science, Technology and Engineering Systems Journal, Volume 2, Issue 3, Page # 277–283, 2017; DOI: 10.25046/aj020337
Abstract:

In this article, we give a brief overview of future trends and corresponding stakeholder requests regarding the design of automotive electric and electronic (e/e)-architectures. While today’s optimization is mainly based on the static design criteria of unit costs and weight, three dynamic design criteria are considered decisive factors in the future: voltage stability, vehicle energy…

Read More
(This article belongs to the SP3 (Special issue on Recent Advances in Engineering Systems 2017) & Section Automation & Control Systems (ACS))
Open AccessArticle
9 Pages, 1,523 KB Download PDF

Energy-Efficient Mobile Sensing in Distributed Multi-Agent Sensor Networks

Advances in Science, Technology and Engineering Systems Journal, Volume 2, Issue 3, Page # 245–253, 2017; DOI: 10.25046/aj020334
Abstract:

In this paper, we exploit an integration between Compressive sensing (CS) and the random mobility of sensors in distributed mobile sensor networks (MSNs). A small number of distributed mobile sensors are deployed randomly in a sensing area to observe a large number of positions. The distributed mobile sensors sparsely sample the sensing area for data…

Read More
(This article belongs to the SP3 (Special issue on Recent Advances in Engineering Systems 2017) & Section Telecommunications (TEL))
Open AccessArticle
4 Pages, 593 KB Download PDF

Magnetically Levitated and Guided Systems

Advances in Science, Technology and Engineering Systems Journal, Volume 2, Issue 3, Page # 241–244, 2017; DOI: 10.25046/aj020333
Abstract:

The paper describes the fundamentals of magnetic levitation technology. A general background of the magnetic levitation is given in this article, including applications of this technology, several comparisons with other types of technologies, the real stage of its development, etc. Further in the paper, the two main types of magnetically levitated systems are compared within…

Read More
(This article belongs to the SP3 (Special issue on Recent Advances in Engineering Systems 2017) & Section Biomaterials in Materials Science (MSB))
Open AccessArticle
5 Pages, 583 KB Download PDF

Chikungunya virus; Review of Epidemiology and Outbreak in Pakistan

Advances in Science, Technology and Engineering Systems Journal, Volume 2, Issue 4, Page # 51–55, 2017; DOI: 10.25046/aj020407
Abstract:

Chikungunya virus (CHIKV) is mosquito-borne, alpha virus. It causes acute fever and acute and chronic musculoskeletal pain in humans. CHIKV has spread to 22 countries including Pakistan resulting in hundreds of thousands of death across the world. International travel stands out as one of the major risk factors for rapid global spread of the disease.…

Read More
(This article belongs to Section Virology (VIR))
Open AccessArticle
8 Pages, 2,236 KB Download PDF

Classifying region of interests from mammograms with breast cancer into BIRADS using Artificial Neural Networks

Advances in Science, Technology and Engineering Systems Journal, Volume 2, Issue 3, Page # 233–240, 2017; DOI: 10.25046/aj020332
Abstract:

Breast cancer is one of the most common cancers among female diseases all over the world. Early diagnosis and treatment is particularly important in reducing the mortality rate. This research is focused on the prevention of breast cancer, therefore it is important to detect micro-calcifications (MCs) which are a sign of early stage breast cancer.…

Read More
(This article belongs to the SP3 (Special issue on Recent Advances in Engineering Systems 2017) & Section Artificial Intelligence in Computer Science (CAI))
Open AccessArticle
6 Pages, 606 KB Download PDF

Directional Antenna Modulation Technique using A Two-Element Frequency Diverse Array

Advances in Science, Technology and Engineering Systems Journal, Volume 2, Issue 3, Page # 227–232, 2017; DOI: 10.25046/aj020331
Abstract:

Direction dependent antenna modulation (DAM), as a potential physical-layer security technique, is able to enhance the security of wireless communication systems by virtue of the capability of its direction-dependent signal modulation format transmission. In this paper, DAM using frequency diverse array (FDA) to produce the modulation is presented. By phase shifting each element, the desired…

Read More
(This article belongs to the SP3 (Special issue on Recent Advances in Engineering Systems 2017) & Section Telecommunications (TEL))

Journal Menu

Journal Browser


Special Issues

Special Issue on Digital Frontiers of Entrepreneurship: Integrating AI, Gender Equity, and Sustainable Futures
Guest Editors: Dr. Muhammad Nawaz Tunio, Dr. Aamir Rashid, Dr. Imamuddin Khoso
Deadline: 30 May 2026

Special Issue on Sustainable Technologies for a Resilient Future
Guest Editors: Dr. Debasis Mitra, Dr. Sourav Chattaraj, Dr. Addisu Assefa
Deadline: 30 April 2026