Search Results

Results (349)

Search Parameters:

Section: csi
Order results
Results per page
Open AccessArticle
9 Pages, 996 KB Download PDF

Review of Pedagogical Principles of Cyber Security Exercises

Advances in Science, Technology and Engineering Systems Journal, Volume 5, Issue 5, Page # 592–600, 2020; DOI: 10.25046/aj050572
Abstract:

Modern digitalized cyber domains are extremely complex ensemble. Cyber attacks or incidents against system may affect capricious effects for another system or even for physical devices. For understanding and training to encounter those effects requires an effective and complex simulation capability. Cyber Security Exercises are an effective expedient for training and learning measures and operations…

Read More
(This article belongs to the SP9 (Special Issue on Multidisciplinary Innovation in Engineering Science & Technology 2020) & Section Interdisciplinary Applications of Computer Science (CSI))
Open AccessArticle
15 Pages, 290 KB Download PDF

Advances in Optimisation Algorithms and Techniques for Deep Learning

Advances in Science, Technology and Engineering Systems Journal, Volume 5, Issue 5, Page # 563–577, 2020; DOI: 10.25046/aj050570
Abstract:

In the last decade, deep learning(DL) has witnessed excellent performances on a variety of problems, including speech recognition, object recognition, detection, and natural language processing (NLP) among many others. Of these applications, one common challenge is to obtain ideal parameters during the training of the deep neural networks (DNN). These typical parameters are obtained by…

Read More
(This article belongs to Section Interdisciplinary Applications of Computer Science (CSI))
Open AccessArticle
7 Pages, 903 KB Download PDF

Contextual Word Representation and Deep Neural Networks-based Method for Arabic Question Classification

Advances in Science, Technology and Engineering Systems Journal, Volume 5, Issue 5, Page # 478–484, 2020; DOI: 10.25046/aj050559
Abstract:

Contextual continuous word representation showed promising performances in different natural language processing tasks. It stems from the fact that these word representations consider the context in which a word appears. But until recently, very little attention was paid to the contextual representations in Arabic question classification task. In the present study, we employed a contextual…

Read More
(This article belongs to the iraset-20 (Special Issue on Innovative Research in Applied Science, Engineering and Technology 2020) & Section Interdisciplinary Applications of Computer Science (CSI))
Open AccessArticle
8 Pages, 1,058 KB Download PDF

Shape Optimization of Planar Inductors for RF Circuits using a Metaheuristic Technique based on Evolutionary Approach

Advances in Science, Technology and Engineering Systems Journal, Volume 5, Issue 5, Page # 426–433, 2020; DOI: 10.25046/aj050553
Abstract:

In this article, we concentrate on the use of a metaheuristic technique based on an Evolutionary Algorithm (EA) for determining the optimal geometrical parameters of spiral inductors for RF circuits. For this purpose, we have opted for an optimization procedure through an enhanced Differential Evolution (DE) algorithm. The proposed tool allows the design of optimized…

Read More
(This article belongs to the isaect-20 (Special Issue on Advanced Electrical and Communication Technologies 2020) & Section Interdisciplinary Applications of Computer Science (CSI))
Open AccessArticle
18 Pages, 1,503 KB Download PDF

ISR Data Processing in Military Operations

Advances in Science, Technology and Engineering Systems Journal, Volume 5, Issue 5, Page # 314–331, 2020; DOI: 10.25046/aj050540
Abstract:

This paper provides an overview of Intelligence, Surveillance, and Reconnaissance (ISR) data with respect on NATO standards and recommendations; further presents methods, tools, and experiences in ISR data processing in military operations. The steps of the Intelligence cycle and disciplines Business Intelligence (BI), Data Warehousing, Data Mining, and Big Data are presented in the introduction.…

Read More
(This article belongs to the SP9 (Special Issue on Multidisciplinary Innovation in Engineering Science & Technology 2020) & Section Interdisciplinary Applications of Computer Science (CSI))
Open AccessArticle
8 Pages, 605 KB Download PDF

Assessing Heutagogical Elements in Learning of Engineering Education: Instrument Validation

Advances in Science, Technology and Engineering Systems Journal, Volume 5, Issue 5, Page # 245–252, 2020; DOI: 10.25046/aj050530
Abstract:

Practically level of design element (i.e., explore, sharing, connect) is an essential of heutagogical approach. The self-determined learning process can be at ease with the implementation of these elements, and the critical step is reliability to measure teaching and learning feedback. Although various instruments were proposed in the literature to assess heutagogy elements, the specific…

Read More
(This article belongs to the SP9 (Special Issue on Multidisciplinary Innovation in Engineering Science & Technology 2020) & Section Interdisciplinary Applications of Computer Science (CSI))
Open AccessArticle
13 Pages, 4,219 KB Download PDF

Four-Dimensional Sparse Data Structures for Representing Text Data

Advances in Science, Technology and Engineering Systems Journal, Volume 5, Issue 5, Page # 154–166, 2020; DOI: 10.25046/aj050521
Abstract:

This paper focuses on a string encoding algorithm, which produces sparse distributed representations of text data. A characteristic feature of the algorithm described here, is that it works without tokenizing the text and can avoid other data preparation steps, such as stemming and lemmatization. The text can be of arbitrary size, whether it is a…

Read More
(This article belongs to the SP9 (Special Issue on Multidisciplinary Innovation in Engineering Science & Technology 2020) & Section Interdisciplinary Applications of Computer Science (CSI))
Open AccessArticle
8 Pages, 681 KB Download PDF

Quantitative Approach in Enhancing Decision Making Through Big Data as An Advanced Technology

Advances in Science, Technology and Engineering Systems Journal, Volume 5, Issue 5, Page # 109–116, 2020; DOI: 10.25046/aj050515
Abstract:

The technology of Big Data got the capability to process large amounts of data, manage them effectively and make retrieval whenever it is required. Decision making in any organisation is a challenging task since decisions need to be made based on the accessibility of data and its status, this becomes more challenging especially in large…

Read More
(This article belongs to the iraset-20 (Special Issue on Innovative Research in Applied Science, Engineering and Technology 2020) & Section Interdisciplinary Applications of Computer Science (CSI))
Open AccessArticle
6 Pages, 451 KB Download PDF

Fast Stream Cipher based Chaos Neural Network for Data Security in CAN Bus

Advances in Science, Technology and Engineering Systems Journal, Volume 5, Issue 5, Page # 63–68, 2020; DOI: 10.25046/aj050509
Abstract:

Vehicle systems are controlled by embedded electronic devices called electronic control units (ECUs). These ECUs are connected together with network protocols. The Controller Area Network (CAN) protocol is widely implemented due to its high fault tolerance. However, the CAN is a serial broadcast bus, and it has no protection against security threats. In this paper,…

Read More
(This article belongs to the SP9 (Special Issue on Multidisciplinary Innovation in Engineering Science & Technology 2020) & Section Interdisciplinary Applications of Computer Science (CSI))
Open AccessArticle
17 Pages, 1,547 KB Download PDF

Fine Tuning the Performance of Parallel Codes

Advances in Science, Technology and Engineering Systems Journal, Volume 5, Issue 4, Page # 824–840, 2020; DOI: 10.25046/aj050497
Abstract:

We propose a multilevel method to speed highly optimized parallel codes whose runtime increases faster than their workload. This method requires the ability to solve large in- stances by decomposing them into smaller instances. Using a simple parallel computing model, we derive a mathematical model that predicts whether or not our method can im- prove…

Read More
(This article belongs to the SP9 (Special Issue on Multidisciplinary Innovation in Engineering Science & Technology 2020) & Section Interdisciplinary Applications of Computer Science (CSI))
Open AccessArticle
11 Pages, 1,340 KB Download PDF

Mentoring Model in an Active Learning Culture for Undergraduate Projects

Advances in Science, Technology and Engineering Systems Journal, Volume 5, Issue 4, Page # 805–815, 2020; DOI: 10.25046/aj050495
Abstract:

Senior projects allow students to move the learning process from basic knowledge to an interdisciplinary approach. The purpose of this research is (1) to analysis attitude and perception, which is a collaboration between teachers and students to develop a model for clustering of appropriate advisors and advisee who cooperate in senior project, and (2) to…

Read More
(This article belongs to the SP9 (Special Issue on Multidisciplinary Innovation in Engineering Science & Technology 2020) & Section Interdisciplinary Applications of Computer Science (CSI))
Open AccessArticle
7 Pages, 680 KB Download PDF

Ethics as a Motivation Indicator in Second Language Vocational Digital Teaching

Advances in Science, Technology and Engineering Systems Journal, Volume 5, Issue 4, Page # 776–782, 2020; DOI: 10.25046/aj050492
Abstract:

The non-selective second language course at vocational colleges and universities makes teachers strive at fostering students’ motivation to learn by choosing from a variety of enhancing factors. Teacher’s personality and skills if they comply with pedagogical ethics are considered to be inspiring for students to learn. The aim of this piloting study was to collect…

Read More
(This article belongs to the SP9 (Special Issue on Multidisciplinary Innovation in Engineering Science & Technology 2020) & Section Interdisciplinary Applications of Computer Science (CSI))
Open AccessArticle
8 Pages, 706 KB Download PDF

An Explanatory Review on Cybersecurity Capability Maturity Models

Advances in Science, Technology and Engineering Systems Journal, Volume 5, Issue 4, Page # 762–769, 2020; DOI: 10.25046/aj050490
Abstract:

Cybersecurity is growing exponentially day by day in both the public and private sectors. This growth also comes with a new and dynamic cyber-threats risk that causes both sectors’ performance to halt. These sectors must update their cybersecurity measures and must understand the capability and maturity of their organization’s cybersecurity preparedness. Cybersecurity maturity models are…

Read More
(This article belongs to the SP10 (Special Issue on Multidisciplinary Sciences and Engineering 2020-21) & Section Interdisciplinary Applications of Computer Science (CSI))
Open AccessArticle
14 Pages, 955 KB Download PDF

A Review on Cross-Layer Design Approach in WSN by Different Techniques

Advances in Science, Technology and Engineering Systems Journal, Volume 5, Issue 4, Page # 741–754, 2020; DOI: 10.25046/aj050488
Abstract:

Wireless Sensor Networks (WSN) include a large number of sensor nodes that are connected to each other with the limitations in energy sources, battery life, memory, mobility and computational capacity. Since the traditional layered architecture was appropriate only for the wired network. It works within a strict boundary that leads to more energy usage as…

Read More
(This article belongs to Section Interdisciplinary Applications of Computer Science (CSI))
Open AccessArticle
10 Pages, 980 KB Download PDF

Clustering of Mindset towards Self-Regulated Learning of Undergraduate Students at the University of Phayao

Advances in Science, Technology and Engineering Systems Journal, Volume 5, Issue 4, Page # 676–685, 2020; DOI: 10.25046/aj050481
Abstract:

The effects of Covid-19 severely affected the Thai higher education model. Therefore, there are three significant objectives in this research: (1) to cluster the mindsets and attitudes toward self-regulated learning styles of undergraduate students at the University of Phayao. (2) to construct a predictive model for recommending an appropriate student learning clusters. (3) to evaluate…

Read More
(This article belongs to the SP10 (Special Issue on Multidisciplinary Sciences and Engineering 2020-21) & Section Interdisciplinary Applications of Computer Science (CSI))
Open AccessArticle
7 Pages, 680 KB Download PDF

Correlation-Based Incremental Learning Network for Gas Sensors Drift Compensation Classification

Advances in Science, Technology and Engineering Systems Journal, Volume 5, Issue 4, Page # 660–666, 2020; DOI: 10.25046/aj050479
Abstract:

A gas sensor array is used for gas analysis to aid in an inspection. The signals from the sensor array are fed into machine learning models for learning and classification. These signals are characterized by time series fluctuating according to the environment or drift. When an unseen pattern is entered, the classification may be incorrect,…

Read More
(This article belongs to the SP9 (Special Issue on Multidisciplinary Innovation in Engineering Science & Technology 2020) & Section Interdisciplinary Applications of Computer Science (CSI))
Open AccessArticle
7 Pages, 548 KB Download PDF

Machine Learning for Network Intrusion Detection Based on SVM Binary Classification Model

Advances in Science, Technology and Engineering Systems Journal, Volume 5, Issue 4, Page # 638–644, 2020; DOI: 10.25046/aj050476
Abstract:

Recently, the number of connected machines around the worldwide has become very large, generating a huge amount of data either to be stored or to be communicated. Data protection is a concern for all institutions, it is difficult to manage the masses of data that are susceptible to multiple threats. In this work, we present…

Read More
(This article belongs to the iraset-20 (Special Issue on Innovative Research in Applied Science, Engineering and Technology 2020) & Section Interdisciplinary Applications of Computer Science (CSI))
Open AccessArticle
6 Pages, 763 KB Download PDF

Customer Satisfaction Recognition Based on Facial Expression and Machine Learning Techniques

Advances in Science, Technology and Engineering Systems Journal, Volume 5, Issue 4, Page # 594–599, 2020; DOI: 10.25046/aj050470
Abstract:

Nowadays, Customer satisfaction is important for businesses and organizations. Manual methods exist, namely surveys and distributing questionnaires to customers. However, marketers and businesses are looking for quick ways to get effective and efficient feedback results for their potential customers. In this paper, we propose a new method for facial emotion detection to recognize customer’s satisfaction…

Read More
(This article belongs to the SP9 (Special Issue on Multidisciplinary Innovation in Engineering Science & Technology 2020) & Section Interdisciplinary Applications of Computer Science (CSI))
Open AccessArticle
10 Pages, 641 KB Download PDF

Application of EARLYBREAK for Line Segment Hausdorff Distance for Face Recognition

Advances in Science, Technology and Engineering Systems Journal, Volume 5, Issue 4, Page # 557–566, 2020; DOI: 10.25046/aj050466
Abstract:

The Hausdorff distance (HD) is defined as MAX-MIN distance between two geometric objects for measuring the dissimilarity between two objects. Because MAX-MIN distance is sensitive with the outliers, in face recognition field, average Hausdorff distance is used for measuring the dissimilarity between two sets of features. The computational complexity of HD, and also average HD,…

Read More
(This article belongs to the SP9 (Special Issue on Multidisciplinary Innovation in Engineering Science & Technology 2020) & Section Interdisciplinary Applications of Computer Science (CSI))
Open AccessArticle
11 Pages, 1,095 KB Download PDF

Decision Making System for Improving Firewall Rule Anomaly Based on Evidence and Behavior

Advances in Science, Technology and Engineering Systems Journal, Volume 5, Issue 4, Page # 505–515, 2020; DOI: 10.25046/aj050460
Abstract:

Firewalls are controlled by rules which often incur anomalies. The anomalies are considered serious problems that administrators do not desire to happen over their firewalls because they cause more vulnerabilities and decrease the overall performance of the firewall. Resolving anomaly rules that have already occurred on the firewall is difficult and mainly depends on the…

Read More
(This article belongs to the SP9 (Special Issue on Multidisciplinary Innovation in Engineering Science & Technology 2020) & Section Interdisciplinary Applications of Computer Science (CSI))
Open AccessArticle
8 Pages, 805 KB Download PDF

The Sound of Trust: Towards Modelling Computational Trust using Voice-only Cues at Zero-Acquaintance

Advances in Science, Technology and Engineering Systems Journal, Volume 5, Issue 4, Page # 469–476, 2020; DOI: 10.25046/aj050456
Abstract:

Trust is essential in many interdependent human relationships. Trustworthiness is measured via the effectiveness of the relationships involving human perception. The decision to trust others is often made quickly (even at zero acquaintance). Previous research has shown the significance of voice in perceived trustworthiness. However, the listeners’ characteristics were not considered. A system has yet…

Read More
(This article belongs to the SP9 (Special Issue on Multidisciplinary Innovation in Engineering Science & Technology 2020) & Section Interdisciplinary Applications of Computer Science (CSI))
Open AccessArticle
9 Pages, 1,095 KB Download PDF

The Role of KM in Enhancing AI Algorithms and Systems

Advances in Science, Technology and Engineering Systems Journal, Volume 5, Issue 4, Page # 388–396, 2020; DOI: 10.25046/aj050445
Abstract:

Knowledge Management processes present a vital role in improving AI systems and algorithms. Many studies and reviews were carried out to examine the relationship between KM processes and AI systems. However, studies were focusing on specific methods and the impact on some AI algorithms, neglecting the role of other KM processes and how it may…

Read More
(This article belongs to the iraset-20 (Special Issue on Innovative Research in Applied Science, Engineering and Technology 2020) & Section Interdisciplinary Applications of Computer Science (CSI))
Open AccessArticle
7 Pages, 663 KB Download PDF

Survey Analysis: Enhancing the Security of Vectorization by Using word2vec and CryptDB

Advances in Science, Technology and Engineering Systems Journal, Volume 5, Issue 4, Page # 374–380, 2020; DOI: 10.25046/aj050443
Abstract:

Vectorization is extracting data from strings through Natural Language Processing by using different approaches; one of the best approaches used in vectorization is word2vec. To make the vectorized data secure, we must apply a security method, which will be CryptDB. The paper is analyzing the survey, which is created to interview security engineers through the…

Read More
(This article belongs to the iraset-20 (Special Issue on Innovative Research in Applied Science, Engineering and Technology 2020) & Section Interdisciplinary Applications of Computer Science (CSI))
Open AccessArticle
10 Pages, 3,910 KB Download PDF

Nonlinear \(\ell_{2,p}\)-norm based PCA for Anomaly Network Detection

Advances in Science, Technology and Engineering Systems Journal, Volume 5, Issue 4, Page # 234–243, 2020; DOI: 10.25046/aj050429
Abstract:

Intrusion detection systems are well known for their ability to detect internal and external intrusions, it usually recognizes intrusions through learning the normal behaviour of users or the normal traffic of activities in the network. So, if any suspicious activity or behaviour is detected, it informs the users of the network. Nonetheless, intrusion detection system…

Read More
(This article belongs to Section Interdisciplinary Applications of Computer Science (CSI))
Open AccessArticle
11 Pages, 2,063 KB Download PDF

Dynamic Decision-Making Process in the Opportunistic Spectrum Access

Advances in Science, Technology and Engineering Systems Journal, Volume 5, Issue 4, Page # 223–233, 2020; DOI: 10.25046/aj050428
Abstract:

We investigate in this paper many problems related to the decision-making process in the Cognitive Radio (CR), where a Secondary User (SU) tries to maximize its opportunities by finding the most vacant channel. Recently, Multi-Armed Bandit (MAB) problems attracted the attention to help a single SU, in the context of CR, makes an optimal decision…

Read More
(This article belongs to the SP9 (Special Issue on Multidisciplinary Innovation in Engineering Science & Technology 2020) & Section Interdisciplinary Applications of Computer Science (CSI))
1 4 5 6 7 8 14

Journal Menu

Journal Browser


Special Issues

Special Issue on Digital Frontiers of Entrepreneurship: Integrating AI, Gender Equity, and Sustainable Futures
Guest Editors: Dr. Muhammad Nawaz Tunio, Dr. Aamir Rashid, Dr. Imamuddin Khoso
Deadline: 30 May 2026

Special Issue on Sustainable Technologies for a Resilient Future
Guest Editors: Dr. Debasis Mitra, Dr. Sourav Chattaraj, Dr. Addisu Assefa
Deadline: 30 April 2026