Search Results

Results (162)

Search Parameters:

Keyword: Classification
Order results
Results per page
Open AccessArticle
7 Pages, 911 KB Download PDF

Exploring the Performance Characteristics of the Naïve Bayes Classifier in the Sentiment Analysis of an Airline’s Social Media Data

Advances in Science, Technology and Engineering Systems Journal, Volume 5, Issue 4, Page # 266–272, 2020; DOI: 10.25046/aj050433
Abstract:

Airline operators get much feedback from their customers which are vital for both operational and strategic planning. Social media has become one of the most popular platforms for obtaining such feedback. However, to analyze, categorize, and generate useful insight from the huge quantity of data on social media is not a trivial task. This study…

Read More
(This article belongs to Section Artificial Intelligence in Computer Science (CAI))
Open AccessArticle
7 Pages, 750 KB Download PDF

Risk Management: The Case of Intrusion Detection using Data Mining Techniques

Advances in Science, Technology and Engineering Systems Journal, Volume 5, Issue 3, Page # 529–535, 2020; DOI: 10.25046/aj050365
Abstract:

Every institution nowadays relies on their online system and framework to do businesses. Such procedures need more attention due to the massive amount of attacks that occurs. These procedures have to go first through the management team of the institution, in order to prevent exploits of the attackers. Thus, the risk management can easily control…

Read More
(This article belongs to Section Information Systems in Computer Science (CIS))
Open AccessArticle
14 Pages, 1,346 KB Download PDF

Racial Categorization Methods: A Survey

Advances in Science, Technology and Engineering Systems Journal, Volume 5, Issue 3, Page # 388–401, 2020; DOI: 10.25046/aj050350
Abstract:

Face explicitly provides the direct and quick way to evaluate human soft biometric information such as race, age and gender. Race is a group of human beings who differ from human beings of other races with respect to physical or social attributes. Race identification plays a significant role in applications such as criminal judgment and…

Read More
(This article belongs to the SP8 (Special Issue on Multidisciplinary Sciences and Engineering 2019-20) & Section Artificial Intelligence in Computer Science (CAI))
Open AccessArticle
10 Pages, 1,523 KB Download PDF

ANN Based MRAC-PID Controller Implementation for a Furuta Pendulum System Stabilization

Advances in Science, Technology and Engineering Systems Journal, Volume 5, Issue 3, Page # 324–333, 2020; DOI: 10.25046/aj050342
Abstract:

Nowadays, process automation and smart systems have gained increasing importance in a wide variety of sectors, and robotics have a fundamental role in it. Therefore, it has attracted greater research interests; among them, Underactuated Mechanical Systems (UMS) have been the subject of many studies, due to their application capabilities in different disciplines. Nevertheless, control of…

Read More
(This article belongs to the SP8 (Special Issue on Multidisciplinary Sciences and Engineering 2019-20) & Section Automation & Control Systems (ACS))
Open AccessArticle
8 Pages, 1,815 KB Download PDF

University Students Result Analysis and Prediction System by Decision Tree Algorithm

Advances in Science, Technology and Engineering Systems Journal, Volume 5, Issue 3, Page # 115–122, 2020; DOI: 10.25046/aj050315
Abstract:

The main assets of universities are students. The performance of students plays a vital role in producing excellent graduate students who will be the future viable leader and manpower in charge of a country’s financial and societal progress. The purpose of this research is to develop a “University Students Result Analysis and Prediction System” that…

Read More
(This article belongs to Section Information Systems in Computer Science (CIS))
Open AccessArticle
10 Pages, 703 KB Download PDF

Intrusion Detection in Cyber Security: Role of Machine Learning and Data Mining in Cyber Security

Advances in Science, Technology and Engineering Systems Journal, Volume 5, Issue 3, Page # 72–81, 2020; DOI: 10.25046/aj050310
Abstract:

In recent years, cyber security has been received interest from several research communities with respect to Intrusion Detection System (IDS). Cyber security is “a fast-growing field demanding a great deal of attention because of remarkable progresses in social networks, cloud and web technologies, online banking, mobile environment, smart grid, etc.” An IDS is a software…

Read More
(This article belongs to Section Hardware & Architecture in Computer Science (CHA))
Open AccessArticle
9 Pages, 1,157 KB Download PDF

Face Recognition on Low Resolution Face Image With TBE-CNN Architecture

Advances in Science, Technology and Engineering Systems Journal, Volume 5, Issue 2, Page # 730–738, 2020; DOI: 10.25046/aj050291
Abstract:

Face recognition in low resolution images has challenges in active research because face recognition is usually implemented in high resolution images (HR). In general, research leads to a combination of pre-processing and training models. Therefore, this study aims to classify low-resolution face images using a combination of pre-processing and deep learning. In addition, this study…

Read More
(This article belongs to Section Information Systems in Computer Science (CIS))
Open AccessArticle
24 Pages, 5,041 KB Download PDF

Multi Biometric Thermal Face Recognition Using FWT and LDA Feature Extraction Methods with RBM DBN and FFNN Classifier Algorithms

Advances in Science, Technology and Engineering Systems Journal, Volume 4, Issue 6, Page # 67–90, 2019; DOI: 10.25046/aj040609
Abstract:

Person recognition using thermal imaging, multi-biometric traits, with groups of feature filters and classifiers, is the subject of this paper. These were used to tackle the problems of biometric systems, such as a change in illumination and spoof attacks. Using a combination of, hard and soft-biometric, attributes in thermal facial images. The hard-biometric trait, of…

Read More
(This article belongs to the SP8 (Special Issue on Multidisciplinary Sciences and Engineering 2019-20) & Section Artificial Intelligence in Computer Science (CAI))
Open AccessArticle
8 Pages, 1,116 KB Download PDF

EKMC: Ensemble of kNN using MetaCost for Efficient Anomaly Detection

Advances in Science, Technology and Engineering Systems Journal, Volume 4, Issue 5, Page # 401–408, 2019; DOI: 10.25046/aj040552
Abstract:

Anomaly detection aims at identification of suspicious items, observations or events by differing from most of the data. Intrusion Detection, Fault Detection, and Fraud Detection are some of the various applications of Anomaly Detection. The Machine learning classifier algorithms used in these applications would greatly affect the overall efficiency. This work is an extension of…

Read More
(This article belongs to Section Artificial Intelligence in Computer Science (CAI))
Open AccessArticle
7 Pages, 262 KB Download PDF

Detecting Malicious Assembly using Convolutional, Recurrent Neural Networks

Advances in Science, Technology and Engineering Systems Journal, Volume 4, Issue 5, Page # 46–52, 2019; DOI: 10.25046/aj040506
Abstract:

We present findings on classifying the class of executable code using convolutional, re- current neural networks by creating images from only the .text section of executables and dividing them into standard-size windows, using minimal preprocessing. We achieve up to 98.24% testing accuracy on classifying 9 types of malware, and 99.50% testing accuracy on classifying malicious…

Read More
(This article belongs to the SP7 (Special Issue on Advancement in Engineering and Computer Science 2019) & Section Interdisciplinary Applications of Computer Science (CSI))
Open AccessArticle
7 Pages, 519 KB Download PDF

Melanoma detection using color and texture features in computer vision systems

Advances in Science, Technology and Engineering Systems Journal, Volume 4, Issue 5, Page # 16–22, 2019; DOI: 10.25046/aj040502
Abstract:

All forms of skin cancer are becoming widespread. These forms of cancer, and melanoma in particular, are insidious and aggressive and if not treated promptly can be lethal to humans. Effective treatment of skin lesions depends strongly on the timeliness of the diagnosis: for this reason, artificial vision systems are required to play a crucial…

Read More
(This article belongs to the SP7 (Special Issue on Advancement in Engineering and Computer Science 2019) & Section Bioinformatics (BIF))
Open AccessArticle
8 Pages, 908 KB Download PDF

Investigating The Detection of Intention Signal During Different Exercise Protocols in Robot-Assisted Hand Movement of Stroke Patients and Healthy Subjects Using EEG-BCI System

Advances in Science, Technology and Engineering Systems Journal, Volume 4, Issue 4, Page # 300–307, 2019; DOI: 10.25046/aj040438
Abstract:

Improving the hand motor skills in post-stroke patients through rehabilitation based on movement intention derived signals from the brain in conjunction with robot-assistive technologies are explored. The experimental work is conducted using Electroencephalogram based Brain-Computer Interface (EEG-BCI) system and the AMADEO hand rehabilitation robotic device. Two protocols using visual-cues and then using a 2-Dimensional (2D)…

Read More
(This article belongs to the SP7 (Special Issue on Advancement in Engineering and Computer Science 2019) & Section Biomedical Engineering (EBI))
Open AccessArticle
7 Pages, 784 KB Download PDF

Aggrandized Random Forest to Detect the Credit Card Frauds

Advances in Science, Technology and Engineering Systems Journal, Volume 4, Issue 4, Page # 121–127, 2019; DOI: 10.25046/aj040414
Abstract:

From the collection of supervised machine learning technique, an ensemble procedure is used in Random Forest. In the arena of Data mining, there is an excellent claim for machine learning techniques. Random Forest has tremendous latent of becoming a widespread technique for forthcoming classifiers as its performance has been found analogous with ensemble techniques bagging…

Read More
(This article belongs to the SP7 (Special Issue on Advancement in Engineering and Computer Science 2019) & Section Interdisciplinary Applications of Computer Science (CSI))
Open AccessArticle
6 Pages, 984 KB Download PDF

Application of Feature Extraction for Breast Cancer using One Order Statistic, GLCM, GLRLM, and GLDM

Advances in Science, Technology and Engineering Systems Journal, Volume 4, Issue 4, Page # 115–120, 2019; DOI: 10.25046/aj040413
Abstract:

The increasing number of breast cancer in recent years has attracted numerous researchers’ attention. Several techniques of Computer Aided Diagnosis System have been proposed as alternative solutions to diagnose breast cancer. The flaw of simply using the naked eye to see the differences between normal and with cancer mammogram images makes the texture analysis play…

Read More
(This article belongs to Section Artificial Intelligence in Computer Science (CAI))
Open AccessArticle
18 Pages, 2,130 KB Download PDF

A Support Vector Machine Cost Function in Simulated Annealing for Network Intrusion Detection

Advances in Science, Technology and Engineering Systems Journal, Volume 4, Issue 3, Page # 260–277, 2019; DOI: 10.25046/aj040334
Abstract:

This paper proposes a computationally intelligent algorithm for extracting relevant features from a training set. An optimal subset of features is extracted from training examples of network intrusion datasets. The Support Vector Machine (SVM) algorithm is used as the cost function within the thermal equilibrium loop of the Simulated Annealing (SA) algorithm. The proposed fusion…

Read More
(This article belongs to Section Artificial Intelligence in Computer Science (CAI))
Open AccessArticle
25 Pages, 2,086 KB Download PDF

An Empirical Study of Icon Recognition in a Virtual Gallery Interface

Advances in Science, Technology and Engineering Systems Journal, Volume 3, Issue 6, Page # 289–313, 2018; DOI: 10.25046/aj030637
Abstract:

This paper reports on an empirical study (an extension of a pilot study) that analyses the design of icons in a German 3-D virtual art gallery interface. It evaluates the extent to which a sample of typical computer users from a range of ages, educational attainments and employments can interpret the meaning of icons from…

Read More
(This article belongs to the SP5 (Special Issue on Multidisciplinary Sciences and Engineering 2018) & Section Interdisciplinary Applications of Computer Science (CSI))
Open AccessArticle
9 Pages, 959 KB Download PDF

Auto-Encoder based Deep Learning for Surface Electromyography Signal Processing

Advances in Science, Technology and Engineering Systems Journal, Volume 3, Issue 1, Page # 94–102, 2018; DOI: 10.25046/aj030111
Abstract:

Feature extraction is taking a very vital and essential part of bio-signal processing. We need to choose one of two paths to identify and select features in any system. The most popular track is engineering handcrafted, which mainly depends on the user experience and the field of application. While the other path is feature learning,…

Read More
(This article belongs to the SP4 (Special issue on Advancement in Engineering Technology 2017-18) & Section Artificial Intelligence in Computer Science (CAI))
Open AccessArticle
5 Pages, 1,524 KB Download PDF

Applying Machine Learning and High Performance Computing to Water Quality Assessment and Prediction

Advances in Science, Technology and Engineering Systems Journal, Volume 2, Issue 6, Page # 285–289, 2017; DOI: 10.25046/aj020635
Abstract:

Water quality assessment and prediction is a more and more important issue. Traditional ways either take lots of time or they can only do assessments. In this research, by applying machine learning algorithm to a long period time of water attributes’ data; we can generate a decision tree so that it can predict the future…

Read More
(This article belongs to the SP4 (Special issue on Advancement in Engineering Technology 2017-18) & Section Environmental Engineering (EEV))
Open AccessArticle
9 Pages, 882 KB Download PDF

Review on security issues in RFID systems

Advances in Science, Technology and Engineering Systems Journal, Volume 2, Issue 6, Page # 194–202, 2017; DOI: 10.25046/aj020624
Abstract:

Radio frequency Identification (RFID) is currently considered as one of the most used technologies for an automatic identification of objects or people. Based on a combination of tags and readers, RFID technology has widely been applied in various areas including supply chain, production and traffic control systems. However, despite of its numerous advantages, the technology…

Read More
(This article belongs to the SP4 (Special issue on Advancement in Engineering Technology 2017-18) & Section Interdisciplinary Applications of Computer Science (CSI))
Open AccessArticle
7 Pages, 1,135 KB Download PDF

Retrieving Dialogue History in Deep Neural Networks for Spoken Language Understanding

Advances in Science, Technology and Engineering Systems Journal, Volume 2, Issue 3, Page # 1741–1747, 2017; DOI: 10.25046/aj0203213
Abstract:

In this paper, we propose a revised version of the semantic decoder for multi-label classification task in the spoken language understanding (SLU) pilot task of the Dialog State Tracking Challenge 5 (DSTC5). Our model concatenates two deep neural networks – a Convolutional Neural Network (CNN) and a Recurrent Neural Networks (RNN) – for detecting semantic…

Read More
(This article belongs to the SP3 (Special issue on Recent Advances in Engineering Systems 2017) & Section Interdisciplinary Applications of Computer Science (CSI))
Open AccessArticle
14 Pages, 1,135 KB Download PDF

On Modeling Affect in Audio with Non-Linear Symbolic Dynamics

Advances in Science, Technology and Engineering Systems Journal, Volume 2, Issue 3, Page # 1727–1740, 2017; DOI: 10.25046/aj0203212
Abstract:

The discovery of semantic information from complex signals is a task concerned with connecting humans’ perceptions and/or intentions with the signals content. In the case of audio signals, complex perceptions are appraised in a listener’s mind, that trigger affective responses that may be relevant for well-being and survival. In this paper we are interested in…

Read More
(This article belongs to the SP3 (Special issue on Recent Advances in Engineering Systems 2017) & Section Interdisciplinary Applications of Computer Science (CSI))
Open AccessArticle
10 Pages, 5,355 KB Download PDF

Soft Handoff Evaluation and Efficient Access Network Selection in Next Generation Cellular Systems

Advances in Science, Technology and Engineering Systems Journal, Volume 2, Issue 3, Page # 1616–1625, 2017; DOI: 10.25046/aj0203201
Abstract:

The increased motivation (by service providers) to offer user-centric and seamless communication services – that satisfies users’ quality of experience (QoE), has manifested a myriad of challenges in the field of wireless communication; and given the increased traffic capacity and sudden explosion of cellular devices, communication systems are constantly threatened by performance related issues –…

Read More
(This article belongs to the SP3 (Special issue on Recent Advances in Engineering Systems 2017) & Section Telecommunications (TEL))
Open AccessArticle
12 Pages, 1,044 KB Download PDF

A Category Based Threat Evaluation Model Using Platform Kinematics Data

Advances in Science, Technology and Engineering Systems Journal, Volume 2, Issue 3, Page # 1330–1341, 2017; DOI: 10.25046/aj0203168
Abstract:

Command and control (C2) systems direct operators to make accurate decisions in the stressful atmosphere of the battlefield at the earliest. There are powerful tools that fuse various instant piece of information and brings summary of those in front of operators. Threat evaluation is one of the important fusion method that provides these assistance to…

Read More
(This article belongs to the SP3 (Special issue on Recent Advances in Engineering Systems 2017) & Section Automation & Control Systems (ACS))
Open AccessArticle
6 Pages, 930 KB Download PDF

Support Vector Machine based Vehicle Make and Model Recognition System

Advances in Science, Technology and Engineering Systems Journal, Volume 2, Issue 3, Page # 1080–1085, 2017; DOI: 10.25046/aj0203137
Abstract:

Vehicle analysis is a very useful component in various real world applications. In this paper, we have developed a Vehicle Make and Model Recognition (VMMR) system using Support Vector Machine (SVM). Scale Invariant Feature Transform (SIFT) and Speed-Up Robust Transform (SURF) are used to extract local features from an image. Bag-of-Features (BoF) model is used…

Read More
(This article belongs to the SP3 (Special issue on Recent Advances in Engineering Systems 2017) & Section Interdisciplinary Applications of Computer Science (CSI))
Open AccessArticle
8 Pages, 1,316 KB Download PDF

Multiclass Myoelectric Identification of Five Fingers Motion using Artificial Neural Network and Support Vector Machine

Advances in Science, Technology and Engineering Systems Journal, Volume 2, Issue 3, Page # 1026–1033, 2017; DOI: 10.25046/aj0203130
Abstract:

The research in Neuro-Prosthetics is gaining more significance and popularity as the advancement in prosthetics control allows amputees to perform even more tasks. Indeed, the improvement of classification accuracy is a challenge in prosthetics control. In this research, a system is developed in order to improve the multiclass classification rate. Two classifiers namely Artificial Neural…

Read More
(This article belongs to the SP3 (Special issue on Recent Advances in Engineering Systems 2017) & Section Artificial Intelligence in Computer Science (CAI))

Journal Menu

Journal Browser


Special Issues

Special Issue on Digital Frontiers of Entrepreneurship: Integrating AI, Gender Equity, and Sustainable Futures
Guest Editors: Dr. Muhammad Nawaz Tunio, Dr. Aamir Rashid, Dr. Imamuddin Khoso
Deadline: 30 May 2026

Special Issue on Sustainable Technologies for a Resilient Future
Guest Editors: Dr. Debasis Mitra, Dr. Sourav Chattaraj, Dr. Addisu Assefa
Deadline: 30 April 2026