Search Results

Results (158)

Search Parameters:

Keyword: Machine learning
Order results
Results per page
Open AccessArticle
15 Pages, 1,070 KB Download PDF

On the Ensemble of Recurrent Neural Network for Air Pollution Forecasting: Issues and Challenges

Advances in Science, Technology and Engineering Systems Journal, Volume 5, Issue 2, Page # 512–526, 2020; DOI: 10.25046/aj050265
Abstract:

Time-series is a sequence of observations that are taken sequentially over time. Modelling a system that generates a future value from past observations is considered as time-series forecasting system. Recurrent neural network is a machine learning method that is widely used in the prediction of future values. Due to variant improvements on recurrent neural networks,…

Read More
(This article belongs to Section Artificial Intelligence in Computer Science (CAI))
Open AccessArticle
10 Pages, 7,929 KB Download PDF

Interaction Model and Respect of Rules to Enhance Collaborative Brainstorming Results

Advances in Science, Technology and Engineering Systems Journal, Volume 5, Issue 2, Page # 484–493, 2020; DOI: 10.25046/aj050262
Abstract:

This paper presents a collaborative interaction model (CIAO) and several behaviour rules that could enhance brainstorming results. The model is composed of five elements which may be used during brainstorming sessions, consisting of activities performed by partici- pants which are characteristic of different modes of interaction. Some sequences of these interactions may be considered more…

Read More
(This article belongs to the SP8 (Special Issue on Multidisciplinary Sciences and Engineering 2019-20) & Section Engineering Management (EMM))
Open AccessArticle
8 Pages, 1,473 KB Download PDF

Object Classifications by Image Super-Resolution Preprocessing for Convolutional Neural Networks

Advances in Science, Technology and Engineering Systems Journal, Volume 5, Issue 2, Page # 476–483, 2020; DOI: 10.25046/aj050261
Abstract:

Blurred small objects produced by cropping, warping, or intrinsically so, are challenging to detect and classify. Therefore, much recent research is focused on feature extraction built on Faster R-CNN and follow-up systems. In particular, RPN, SPP, FPN, SSD, and DSSD are the layered feature extraction methods for multiple object detections and small objects. However, super-resolution…

Read More
(This article belongs to Section Artificial Intelligence in Computer Science (CAI))
Open AccessArticle
6 Pages, 672 KB Download PDF

Productify News Article Classification Model with Sagemaker

Advances in Science, Technology and Engineering Systems Journal, Volume 5, Issue 2, Page # 13–18, 2020; DOI: 10.25046/aj050202
Abstract:

News companies have a need to automate and make the process of writing about popular and new events more effective. Current technologies involve robotic programs that fill in values in templates and website listeners that notify editors when changes are made so that the editor can read up on the source change on the actual…

Read More
(This article belongs to the SP7 (Special Issue on Advancement in Engineering and Computer Science 2019) & Section Interdisciplinary Applications of Computer Science (CSI))
Open AccessArticle
13 Pages, 4,475 KB Download PDF

An ML-optimized dRRM Solution for IEEE 802.11 Enterprise Wlan Networks

Advances in Science, Technology and Engineering Systems Journal, Volume 4, Issue 6, Page # 19–31, 2019; DOI: 10.25046/aj040603
Abstract:

In an enterprise Wifi network, indoor and dense, co-channel interference is a major issue. Wifi controllers help tackle this problem thanks to radio resource management (RRM). RRM is a fundamental building block of any controller functional architecture. One aim of RRM is to process the radio plan such as to maximize the overall network transmit…

Read More
(This article belongs to the SP8 (Special Issue on Multidisciplinary Sciences and Engineering 2019-20) & Section Network Engineering (ENW))
Open AccessArticle
8 Pages, 1,116 KB Download PDF

EKMC: Ensemble of kNN using MetaCost for Efficient Anomaly Detection

Advances in Science, Technology and Engineering Systems Journal, Volume 4, Issue 5, Page # 401–408, 2019; DOI: 10.25046/aj040552
Abstract:

Anomaly detection aims at identification of suspicious items, observations or events by differing from most of the data. Intrusion Detection, Fault Detection, and Fraud Detection are some of the various applications of Anomaly Detection. The Machine learning classifier algorithms used in these applications would greatly affect the overall efficiency. This work is an extension of…

Read More
(This article belongs to Section Artificial Intelligence in Computer Science (CAI))
Open AccessArticle
7 Pages, 438 KB Download PDF

An Integrated Framework for Pronominal Anaphora Resolution in Malayalam

Advances in Science, Technology and Engineering Systems Journal, Volume 4, Issue 5, Page # 287–293, 2019; DOI: 10.25046/aj040536
Abstract:

Anaphora resolution is one of the old problems in Natural Language Processing. It is the process of identifying the antecedent of an anaphoric expression in a natural language text. Most of the NLP applications such as text summarization, question answering, information extraction, machine translation etc. require the successful resolution of anaphors. In this paper, we…

Read More
(This article belongs to the SP8 (Special Issue on Multidisciplinary Sciences and Engineering 2019-20) & Section Information Systems in Computer Science (CIS))
Open AccessArticle
7 Pages, 1,263 KB Download PDF

Improve the Accuracy of Short-Term Forecasting Algorithms by Standardized Load Profile and Support Regression Vector: Case study Vietnam

Advances in Science, Technology and Engineering Systems Journal, Volume 4, Issue 5, Page # 243–249, 2019; DOI: 10.25046/aj040530
Abstract:

Short-term load forecasting (STLF) plays an important role in building business strategies, ensuring reliability and safe operation for any electrical system. There are many different methods, including: regression models, time series, neural networks, expert systems, fuzzy logic, machine learning and statistical algorithms used for short-term forecasts. However, the practical requirement is how to minimize the…

Read More
(This article belongs to Section Electronic Engineering (EEE))
Open AccessArticle
9 Pages, 866 KB Download PDF

A Fuzzy-Based Approach and Adaptive Genetic Algorithm in Multi-Criteria Recommender Systems

Advances in Science, Technology and Engineering Systems Journal, Volume 4, Issue 4, Page # 449–457, 2019; DOI: 10.25046/aj040454
Abstract:

Recommender Systems (RSs) are termed as web-based applications that make use of filtering methods and several machine learning algorithms to suggest relevant user objects. It can be said that some techniques are usually adopted or trained to develop these systems that generate lists of suitable recommendations. Conventionally, RS uses a single rating approach to preference…

Read More
(This article belongs to the SP7 (Special Issue on Advancement in Engineering and Computer Science 2019) & Section Artificial Intelligence in Computer Science (CAI))
Open AccessArticle
6 Pages, 430 KB Download PDF

Predictive Modelling of Student Dropout Using Ensemble Classifier Method in Higher Education

Advances in Science, Technology and Engineering Systems Journal, Volume 4, Issue 4, Page # 206–211, 2019; DOI: 10.25046/aj040425
Abstract:

Currently, one of the challenges of educational institutions is drop-out student issues. Several factors have been found and determined potentially capable to stimulate dropouts. Many researchers have been applied data mining methods to analyze, predict dropout students and also optimize finding dropout variables in advance. The main objective of this study is to find the…

Read More
(This article belongs to Section Software Engineering in Computer Science (CSE))
Open AccessArticle
7 Pages, 784 KB Download PDF

Aggrandized Random Forest to Detect the Credit Card Frauds

Advances in Science, Technology and Engineering Systems Journal, Volume 4, Issue 4, Page # 121–127, 2019; DOI: 10.25046/aj040414
Abstract:

From the collection of supervised machine learning technique, an ensemble procedure is used in Random Forest. In the arena of Data mining, there is an excellent claim for machine learning techniques. Random Forest has tremendous latent of becoming a widespread technique for forthcoming classifiers as its performance has been found analogous with ensemble techniques bagging…

Read More
(This article belongs to the SP7 (Special Issue on Advancement in Engineering and Computer Science 2019) & Section Interdisciplinary Applications of Computer Science (CSI))
Open AccessArticle
12 Pages, 1,659 KB Download PDF

Early Detection of Alzheimer’s Using Digital Image Processing Through Iridology, An Alternative Method

Advances in Science, Technology and Engineering Systems Journal, Volume 4, Issue 3, Page # 126–137, 2019; DOI: 10.25046/aj040317
Abstract:

Over the years, alternative medicine has carried out numerous systematic studies related to the ophthalmological field, specifically the eye. Studies that propose as support of analysis to the Iridology, which studies the alterations of the iris in correspondence with the organs of the human body. Thus, it presents the opportunity to investigate neuronal diseases related…

Read More
(This article belongs to Section Interdisciplinary Applications of Computer Science (CSI))
Open AccessArticle
8 Pages, 466 KB Download PDF

Feature Selection for Musical Genre Classification Using a Genetic Algorithm

Advances in Science, Technology and Engineering Systems Journal, Volume 4, Issue 2, Page # 162–169, 2019; DOI: 10.25046/aj040221
Abstract:

Music genre classification is an important multimedia research domain, including aspects of music piece representation, distances between genres, and categorization of music databases. The objective of this study was to develop a model for automatic classification of musical genres from audio data by using features from low-level time and frequency domains. These features can highlight…

Read More
(This article belongs to the SP7 (Special Issue on Advancement in Engineering and Computer Science 2019) & Section Bioinformatics (BIF))
Open AccessArticle
10 Pages, 544 KB Download PDF

Observing and Forecasting the Trajectory of the Thrown Body with use of Genetic Programming

Advances in Science, Technology and Engineering Systems Journal, Volume 4, Issue 1, Page # 248–257, 2019; DOI: 10.25046/aj040124
Abstract:

Robotic catching of thrown objects is one of the common robotic tasks, which is explored in a number of papers. This task includes subtask of tracking and forecasting the trajectory of the thrown object. Here we propose an algorithm for estimating future trajectory based on video signal from two cameras. Most of existing implementations use…

Read More
(This article belongs to the SP6 (Special Issue on Recent Advances in Engineering Systems 2018-19) & Section Interdisciplinary Applications of Computer Science (CSI))
Open AccessArticle
6 Pages, 3,439 KB Download PDF

Low Contrast Image Enhancement Using Convolutional Neural Network with Simple Reflection Model

Advances in Science, Technology and Engineering Systems Journal, Volume 4, Issue 1, Page # 159–164, 2019; DOI: 10.25046/aj040115
Abstract:

Low contrast images degrade the performance of image processing system. To solve the issue, plenty of image enhancement methods have been proposed. But the methods work properly on the fixed environment or specific images. The methods dependent on fixed image conditions cannot perform image enhancement properly and perspective of smart device users, algorithms including iterative…

Read More
(This article belongs to the SP6 (Special Issue on Recent Advances in Engineering Systems 2018-19) & Section Interdisciplinary Applications of Computer Science (CSI))
Open AccessArticle
8 Pages, 872 KB Download PDF

Modeling an Energy Consumption System with Partial-Value Data Associations

Advances in Science, Technology and Engineering Systems Journal, Volume 3, Issue 6, Page # 372–379, 2018; DOI: 10.25046/aj030645
Abstract:

Many existing system modeling techniques based on statistical modeling, data mining and machine learning have a shortcoming of building variable relations for the full ranges of variable values using one model, although certain variable relations may hold for only some but not all variable values. This shortcoming is overcome by the Partial-Value Association Discovery (PVAD)…

Read More
(This article belongs to the SP6 (Special Issue on Recent Advances in Engineering Systems 2018-19) & Section Construction & Building Technology (CBT))
Open AccessArticle
5 Pages, 725 KB Download PDF

TPMTM: Topic Modeling over Papers’ Abstract

Advances in Science, Technology and Engineering Systems Journal, Volume 3, Issue 2, Page # 69–73, 2018; DOI: 10.25046/aj030208
Abstract:

Probabilities topic models are active research area in text mining, machine learning, information retrieval, etc. Most of the current statistical topic modeling methods, such as Probabilistic Latent Semantic Analysis (pLSA) and Latent Dirichlet Allocation (LDA). They are used to build models from unstructured text and produce a term-based representation to describe a topic by choosing…

Read More
(This article belongs to the SP4 (Special issue on Advancement in Engineering Technology 2017-18) & Section Interdisciplinary Applications of Computer Science (CSI))
Open AccessArticle
9 Pages, 1,662 KB Download PDF

An Advanced Algorithm Combining SVM and ANN Classifiers to Categorize Tumor with Position from Brain MRI Images

Advances in Science, Technology and Engineering Systems Journal, Volume 3, Issue 2, Page # 40–48, 2018; DOI: 10.25046/aj030205
Abstract:

Brain tumor is such an abnormality of brain tissue that causes brain hemorrhage. Therefore, apposite detections of brain tumor, its size, and position are the foremost condition for the remedy. To obtain better performance in brain tumor and its stages detection as well as its position in MRI images, this research work proposes an advanced…

Read More
(This article belongs to the SP4 (Special issue on Advancement in Engineering Technology 2017-18) & Section Artificial Intelligence in Computer Science (CAI))
Open AccessArticle
12 Pages, 931 KB Download PDF

Software and Hardware Enhancement of Convolutional Neural Networks on GPGPUs

Advances in Science, Technology and Engineering Systems Journal, Volume 3, Issue 2, Page # 28–39, 2018; DOI: 10.25046/aj030204
Abstract:

Convolutional Neural Networks (CNNs) have gained attention in recent years for their ability to perform complex machine learning tasks with high accuracy and resilient to noise of inputs. The time-consuming convolution operations of CNNs pose great challenges to both software as well as hardware designers. To achieve superior performance, a design involves careful concerns between…

Read More
(This article belongs to the SP4 (Special issue on Advancement in Engineering Technology 2017-18) & Section Software Engineering in Computer Science (CSE))
Open AccessArticle
6 Pages, 621 KB Download PDF

An Analysis of K-means Algorithm Based Network Intrusion Detection System

Advances in Science, Technology and Engineering Systems Journal, Volume 3, Issue 1, Page # 496–501, 2018; DOI: 10.25046/aj030160
Abstract:

In this modern age, information technology (IT) plays a role in a number of different fields. And therefore, the role of security is very important to control and assist the flow of activities over the network. Intrusion detection (ID) is a kind of security management system for computers and networks. There are many approaches and…

Read More
(This article belongs to the SP4 (Special issue on Advancement in Engineering Technology 2017-18) & Section Interdisciplinary Applications of Computer Science (CSI))
Open AccessArticle
5 Pages, 744 KB Download PDF

Virtual Memory Introspection Framework for Cyber Threat Detection in Virtual Environment

Advances in Science, Technology and Engineering Systems Journal, Volume 3, Issue 1, Page # 25–29, 2018; DOI: 10.25046/aj030104
Abstract:

In today’s information based world, it is increasingly important to safeguard the data owned by any organization, be it intellectual property or personal information. With ever increasing sophistication of malware, it is imperative to come up with an automated and advanced methods of attack vector recognition and isolation. Existing methods are not dynamic enough to…

Read More
(This article belongs to the SP4 (Special issue on Advancement in Engineering Technology 2017-18) & Section Interdisciplinary Applications of Computer Science (CSI))
Open AccessArticle
16 Pages, 2,101 KB Download PDF

Modeling Double Subjectivity for Gaining Programmable Insights: Framing the Case of Uber

Advances in Science, Technology and Engineering Systems Journal, Volume 2, Issue 3, Page # 1677–1692, 2017; DOI: 10.25046/aj0203209
Abstract:

The Internet is the premier platform that enable the emergence of new technologies. Online news is unstructured narrative text that embeds facts, frames, and amplification that can influence society attitudes about technology adoption. Online news sources are carriers of voluminous amounts of news for reaching significantly large audience and have no geographical or time boundaries.…

Read More
(This article belongs to the SP3 (Special issue on Recent Advances in Engineering Systems 2017) & Section Interdisciplinary Applications of Computer Science (CSI))
Open AccessArticle
10 Pages, 5,355 KB Download PDF

Soft Handoff Evaluation and Efficient Access Network Selection in Next Generation Cellular Systems

Advances in Science, Technology and Engineering Systems Journal, Volume 2, Issue 3, Page # 1616–1625, 2017; DOI: 10.25046/aj0203201
Abstract:

The increased motivation (by service providers) to offer user-centric and seamless communication services – that satisfies users’ quality of experience (QoE), has manifested a myriad of challenges in the field of wireless communication; and given the increased traffic capacity and sudden explosion of cellular devices, communication systems are constantly threatened by performance related issues –…

Read More
(This article belongs to the SP3 (Special issue on Recent Advances in Engineering Systems 2017) & Section Telecommunications (TEL))
Open AccessArticle
8 Pages, 445 KB Download PDF

Towards Deployment Strategies for Deception Systems

Advances in Science, Technology and Engineering Systems Journal, Volume 2, Issue 3, Page # 1272–1279, 2017; DOI: 10.25046/aj0203161
Abstract:

Network security is often built on perimeter defense. Sophisticated attacks are able to penetrate the perimeter and access valuable resources in the network. A more complete defense strategy also contains mechanisms to detect and mitigate perimeter breaches. Deceptive systems are a promising technology to detect, deceive and counter infiltration. In this work we provide an…

Read More
(This article belongs to the SP3 (Special issue on Recent Advances in Engineering Systems 2017) & Section Information Systems in Computer Science (CIS))
Open AccessArticle
7 Pages, 391 KB Download PDF

Deterministic Approach to Detect Heart Sound Irregularities

Advances in Science, Technology and Engineering Systems Journal, Volume 2, Issue 3, Page # 974–980, 2017; DOI: 10.25046/aj0203123
Abstract:

A new method to detect heart sound that does not require machine learning is proposed. The heart sound is a time series event which is generated by the heart mechanical system. From the analysis of heart sound S-transform and the understanding of how heart works, it can be deducted that each heart sound component has…

Read More
(This article belongs to the SP3 (Special issue on Recent Advances in Engineering Systems 2017) & Section Biomedical Engineering (EBI))

Journal Menu

Journal Browser


Special Issues

Special Issue on Digital Frontiers of Entrepreneurship: Integrating AI, Gender Equity, and Sustainable Futures
Guest Editors: Dr. Muhammad Nawaz Tunio, Dr. Aamir Rashid, Dr. Imamuddin Khoso
Deadline: 30 May 2026

Special Issue on Sustainable Technologies for a Resilient Future
Guest Editors: Dr. Debasis Mitra, Dr. Sourav Chattaraj, Dr. Addisu Assefa
Deadline: 30 April 2026