Search Results

Results (1602)

Search Parameters:

Keyword: App
Order results
Results per page
Open AccessArticle
11 Pages, 1,545 KB Download PDF

Multi Level Integrity Management in LTE/LTE-A Networks

Advances in Science, Technology and Engineering Systems Journal, Volume 2, Issue 3, Page # 658–668, 2017; DOI: 10.25046/aj020384
Abstract:

The sector of telecommunications is experiencing a large growth and rapid change in developing applications due to the variety of technologies, to increase the number of users and to arrival services varied from the high demand of the service quality such as streaming, web navigation. In this regard, the 3rd Generation Partnership Project (3GPP) organization…

Read More
(This article belongs to the SP3 (Special issue on Recent Advances in Engineering Systems 2017) & Section Telecommunications (TEL))
Open AccessArticle
8 Pages, 1,315 KB Download PDF

Human Robot Interaction for Hybrid Collision Avoidance System for Indoor Mobile Robots

Advances in Science, Technology and Engineering Systems Journal, Volume 2, Issue 3, Page # 650–657, 2017; DOI: 10.25046/aj020383
Abstract:

In this paper, a novel approach for collision avoidance for indoor mobile robots based on human-robot interaction is realized. The main contribution of this work is a new technique for collision avoidance by engaging the human and the robot in generating new collision-free paths. In mobile robotics, collision avoidance is critical for the success of…

Read More
(This article belongs to the SP3 (Special issue on Recent Advances in Engineering Systems 2017) & Section Robotics (ROB))
Open AccessArticle
8 Pages, 1,323 KB Download PDF

Augmented Reality Prototype HUD for Passenger Infotainment in a Vehicular Environment

Advances in Science, Technology and Engineering Systems Journal, Volume 2, Issue 3, Page # 634–641, 2017; DOI: 10.25046/aj020381
Abstract:

The paper presents a prototype Head Up Display interface which acts as an interactive infotainment system for rear seat younger passengers, aiming to minimize driver distraction. The interface employs an Augmented Reality medium that utilizes the external scenery as a background for two platform games explicitly designed for this system. Additionally, the system provides AR…

Read More
(This article belongs to the SP3 (Special issue on Recent Advances in Engineering Systems 2017) & Section Interdisciplinary Applications of Computer Science (CSI))
Open AccessArticle
11 Pages, 913 KB Download PDF

Data Error Detection and Recovery in Embedded Systems: a Literature Review

Advances in Science, Technology and Engineering Systems Journal, Volume 2, Issue 3, Page # 623–633, 2017; DOI: 10.25046/aj020380
Abstract:

This paper presents a literature review on data flow error detection and recovery techniques in embedded systems. In recent years, embedded systems are being used more and more in an enormous number of applications from small mobile device to big medical devices. At the same time, it is becoming important for embedded developers to make…

Read More
(This article belongs to the SP3 (Special issue on Recent Advances in Engineering Systems 2017) & Section Information Systems in Computer Science (CIS))
Open AccessArticle
6 Pages, 692 KB Download PDF

Optimisation of Software-Defined Networks Performance Using a Hybrid Intelligent System

Advances in Science, Technology and Engineering Systems Journal, Volume 2, Issue 3, Page # 617–622, 2017; DOI: 10.25046/aj020379
Abstract:

This paper proposes a novel intelligent technique that has been designed to optimise the performance of Software Defined Networks (SDN). The proposed hybrid intelligent system has employed integration of intelligence-based optimisation approaches with the artificial neural network. These heuristic optimisation methods include Genetic Algorithms (GA) and Particle Swarm Optimisation (PSO). These methods were utilised separately…

Read More
(This article belongs to the SP3 (Special issue on Recent Advances in Engineering Systems 2017) & Section Artificial Intelligence in Computer Science (CAI))
Open AccessArticle
7 Pages, 1,279 KB Download PDF

Power requirements and battery life measurement for wireless transmission between two nodes in different mediums

Advances in Science, Technology and Engineering Systems Journal, Volume 2, Issue 3, Page # 605–611, 2017; DOI: 10.25046/aj020377
Abstract:

One of the most important roles of the wireless sensor networks (WSN) is to avoid wiring costs, be self-sustainable and be able to function for several years. However, due to the slow progress in battery technology, power continues to be a limited resource in wireless sensor communication and electric energy storage remains to be an…

Read More
(This article belongs to the SP3 (Special issue on Recent Advances in Engineering Systems 2017) & Section Telecommunications (TEL))
Open AccessArticle
7 Pages, 644 KB Download PDF

A comparative between CRISP-DM and SEMMA through the construction of a MODIS repository for studies of land use and cover change

Advances in Science, Technology and Engineering Systems Journal, Volume 2, Issue 3, Page # 598–604, 2017; DOI: 10.25046/aj020376
Abstract:

Among the most popular methodologies for development of data mining projects are CRISP-DM and SEMMA, This research paper explains the reason why it was decided to compare them from a specific case study. Therefore, this document describes in detail each phase, task and activity proposed by each methodology, applying it in the construction of a…

Read More
(This article belongs to the SP3 (Special issue on Recent Advances in Engineering Systems 2017) & Section Information Systems in Computer Science (CIS))
Open AccessArticle
11 Pages, 1,481 KB Download PDF

FAG – a management support tool with BI techniques to assist teachers in the virtual learning environment Moodle

Advances in Science, Technology and Engineering Systems Journal, Volume 2, Issue 3, Page # 587–597, 2017; DOI: 10.25046/aj020375
Abstract:

One of the great challenges in distance-learning is to follow the actions of the teachers/tutors and also the actions of students during the process of teaching and learning. This article presents the FAG Tool integrated with the LMS Moodle was developed to help managers of the Distance Education environment to monitor the actions of teachers/tutors…

Read More
(This article belongs to the SP3 (Special issue on Recent Advances in Engineering Systems 2017) & Section Interdisciplinary Applications of Computer Science (CSI))
Open AccessArticle
9 Pages, 807 KB Download PDF

The Search for a Convergent Option to Deploy Smart Grids on IoT Scenario

Advances in Science, Technology and Engineering Systems Journal, Volume 2, Issue 3, Page # 569–577, 2017; DOI: 10.25046/aj020373
Abstract:

Smart city projects are quickly evolving in several countries as a feasible solution to the urban organization to provide sustainable socioeconomic growth and solve problems that arise as the populations of these cities grow. In this sense, technology application plays an important role in enabling automation of processes, improving the citizen’s quality of life and…

Read More
(This article belongs to the SP3 (Special issue on Recent Advances in Engineering Systems 2017) & Section Telecommunications (TEL))
Open AccessArticle
9 Pages, 5,165 KB Download PDF

Semantic-less Breach Detection of Polymorphic Malware in Federated Cloud

Advances in Science, Technology and Engineering Systems Journal, Volume 2, Issue 3, Page # 553–561, 2017; DOI: 10.25046/aj020371
Abstract:

Cloud computing is one of the largest emerging utility services that is expected to grow enormously over the next decade. Many organizations are moving into hybrid cloud/hosted computing models. Single cloud service provider introduces cost and environmental challenges. Also, multi-cloud solution implemented by the Cloud tenant is suboptimal as it requires expensive adaptation costs. Cloud…

Read More
(This article belongs to the SP3 (Special issue on Recent Advances in Engineering Systems 2017) & Section Interdisciplinary Applications of Computer Science (CSI))
Open AccessArticle
12 Pages, 1,830 KB Download PDF

Modelization of cognition, activity and motivation as indicators for Interactive Learning Environment

Advances in Science, Technology and Engineering Systems Journal, Volume 2, Issue 3, Page # 520–531, 2017; DOI: 10.25046/aj020367
Abstract:

In Interactive Learning Environment (ILE), the cognitive activity and behavior of learners are the center of the researchers’ concerns. The improvement of learning through combining these axes as a structure of indicators for well-designed learning environment, encloses the measurement of the educational activity as a part of the learning process. In this paper, we propose…

Read More
(This article belongs to the SP3 (Special issue on Recent Advances in Engineering Systems 2017) & Section Interdisciplinary Applications of Computer Science (CSI))
Open AccessArticle
8 Pages, 1,031 KB Download PDF

Self-Organizing Map based Feature Learning in Bio-Signal Processing

Advances in Science, Technology and Engineering Systems Journal, Volume 2, Issue 3, Page # 505–512, 2017; DOI: 10.25046/aj020365
Abstract:

Feature extraction is playing a significant role in bio-signal processing. Feature identification and selection has two approaches. The standard method is engineering handcraft which is based on user experience and application area. While the other approach is feature learning that based on making the system identify and select the best features suit the application. The…

Read More
(This article belongs to the SP3 (Special issue on Recent Advances in Engineering Systems 2017) & Section Biomedical Engineering (EBI))
Open AccessArticle
6 Pages, 700 KB Download PDF

Intrusion detection in cloud computing based attack patterns and risk assessment

Advances in Science, Technology and Engineering Systems Journal, Volume 2, Issue 3, Page # 479–484, 2017; DOI: 10.25046/aj020361
Abstract:

This paper is an extension of work originally presented in SYSCO CONF.We extend our previous work by presenting the initial results of the implementation of intrusion detection based on risk assessment on cloud computing. The idea focuses on a novel approach for detecting cyber-attacks on the cloud environment by analyzing attacks pattern using risk assessment…

Read More
(This article belongs to the SP3 (Special issue on Recent Advances in Engineering Systems 2017) & Section Information Systems in Computer Science (CIS))
Open AccessArticle
10 Pages, 1,226 KB Download PDF

Segmented and Detailed Visualization of Anatomical Structures based on Augmented Reality for Health Education and Knowledge Discovery

Advances in Science, Technology and Engineering Systems Journal, Volume 2, Issue 3, Page # 469–478, 2017; DOI: 10.25046/aj020360
Abstract:

The evolution of technology has changed the face of education, especially when combined with appropriate pedagogical bases. This combination has created innovation opportunities in order to add quality to teaching through new perspectives for traditional methods applied in the classroom. In the Health field, particularly, augmented reality and interaction design techniques can assist the teacher…

Read More
(This article belongs to the SP3 (Special issue on Recent Advances in Engineering Systems 2017) & Section Artificial Intelligence in Computer Science (CAI))
Open AccessArticle
9 Pages, 1,289 KB Download PDF

Image Segmentation Using Fuzzy Inference System on YCbCr Color Model

Advances in Science, Technology and Engineering Systems Journal, Volume 2, Issue 3, Page # 460–468, 2017; DOI: 10.25046/aj020359
Abstract:

This paper This paper presents a reliable method for image segmentation using a fuzzy inference system. The Fuzzy Membership function is applied on the YCbCr color space. Triangular membership functions are used in the input of the fuzzy system, Mamdani type fuzzy inference system is applied and for the output universe, singleton-type functions are used;…

Read More
(This article belongs to the SP3 (Special issue on Recent Advances in Engineering Systems 2017) & Section Interdisciplinary Applications of Computer Science (CSI))
Open AccessArticle
11 Pages, 1,022 KB Download PDF

Verifying the Detection Results of Impersonation Attacks in Service Clouds

Advances in Science, Technology and Engineering Systems Journal, Volume 2, Issue 3, Page # 449–459, 2017; DOI: 10.25046/aj020358
Abstract:

A web service impersonation is a class of attacks in which an attacker poses as or assumes the identity of a legitimate service to maliciously utilize that service’s privileges. Providing security for interacting cloud services requires more than user authentication with passwords or digital certificates and confidentiality in data transmission. In this paper, we focus…

Read More
(This article belongs to the SP3 (Special issue on Recent Advances in Engineering Systems 2017) & Section Interdisciplinary Applications of Computer Science (CSI))
Open AccessArticle
8 Pages, 683 KB Download PDF

Service Productivity and Complexity in Medical Rescue Services

Advances in Science, Technology and Engineering Systems Journal, Volume 2, Issue 3, Page # 427–434, 2017; DOI: 10.25046/aj020355
Abstract:

The increasing impact of services on economic wealth and income in high wage countries calls for a detailed examination of service productivity and complexity in current research projects. This paper describes the development of a measurement model of service productivity and complexity within the domain of medical service provision. While the measurement model of service…

Read More
(This article belongs to the SP3 (Special issue on Recent Advances in Engineering Systems 2017) & Section Biomedical Engineering (EBI))
Open AccessArticle
5 Pages, 669 KB Download PDF

Security in SWIPT with Power Splitting Eavesdropper

Advances in Science, Technology and Engineering Systems Journal, Volume 2, Issue 3, Page # 384–388, 2017; DOI: 10.25046/aj020349
Abstract:

Simultaneous wireless information and power transfer (SWIPT) has drawn significant research interest in recent years. In this paper, we investigate the information theoretic secrecy of a SWIPT system under Weibull fading channel. To be specific, we analyze the information security in the presence of an energy harvesting and information decoding eavesdropper. All links are subjected…

Read More
(This article belongs to the SP3 (Special issue on Recent Advances in Engineering Systems 2017) & Section Telecommunications (TEL))
Open AccessArticle
8 Pages, 1,704 KB Download PDF

Secure Path Selection under Random Fading

Advances in Science, Technology and Engineering Systems Journal, Volume 2, Issue 3, Page # 376–383, 2017; DOI: 10.25046/aj020348
Abstract:

Application-oriented Wireless Sensor Networks (WSNs) promises to be one of the most useful technologies of this century. However, secure communication between nodes in WSNs is still an unresolved issue. In this context, we propose two protocols (i.e. Optimal Secure Path (OSP) and Sub-optimal Secure Path (SSP)) to minimize the outage probability of secrecy capacity in…

Read More
(This article belongs to the SP3 (Special issue on Recent Advances in Engineering Systems 2017) & Section Telecommunications (TEL))
Open AccessArticle
9 Pages, 3,742 KB Download PDF

Simulation and Implementation of Sensorless Control in Multi-Motors Electric Drives with High Dynamics

Advances in Science, Technology and Engineering Systems Journal, Volume 2, Issue 4, Page # 59–67, 2017; DOI: 10.25046/aj020409
Abstract:

In this article we’ll tackle the control of multi-motors electric drives with high dynamic, with rapid changes in torque and speed, with rigid or flexible coupling of motors, where the control strategy is FOC (Field Oriented Control) for each drives and the distributed control in local network using the CANopen protocol. In the surface mining…

Read More
(This article belongs to Section Electrical Engineering (ELE))
Open AccessArticle
6 Pages, 856 KB Download PDF

An Overview of Traceability: Towards a general multi-domain model

Advances in Science, Technology and Engineering Systems Journal, Volume 2, Issue 3, Page # 356–361, 2017; DOI: 10.25046/aj020345
Abstract:

Traceability for some people, is merely a tool to keep a history over something important that happened in the past. For others, is has no added value to their actual processes or products. In fact, it is becoming more and more valued. Traceability is still a vast area of research and an undiscovered field that…

Read More
(This article belongs to the SP3 (Special issue on Recent Advances in Engineering Systems 2017) & Section Software Engineering in Computer Science (CSE))
Open AccessArticle
7 Pages, 749 KB Download PDF

Validity of Mind Monitoring System as a Mental Health Indicator using Voice

Advances in Science, Technology and Engineering Systems Journal, Volume 2, Issue 3, Page # 338–344, 2017; DOI: 10.25046/aj020343
Abstract:

We have been developing a method of evaluating the mental health condition of a person based on the sound of their voice. Currently, we have applied this technology to create a smartphone application that shows the vitality and the mental activity as mental health condition indices. Using voice to measure one’s mental health condition is…

Read More
(This article belongs to the SP3 (Special issue on Recent Advances in Engineering Systems 2017) & Section Biomedical Engineering (EBI))
Open AccessArticle
6 Pages, 1,103 KB Download PDF

Real Time Advanced Clustering System

Advances in Science, Technology and Engineering Systems Journal, Volume 2, Issue 3, Page # 321–326, 2017; DOI: 10.25046/aj020341
Abstract:

This paper describes a system to gather information from a stationary camera to identify moving objects. The proposed solution makes only use of motion vectors between adjacent frames, obtained from any algorithm. Starting from them, the system is able to retrieve clusters of moving objects in a scene acquired by an image sensor device. Since…

Read More
(This article belongs to the SP3 (Special issue on Recent Advances in Engineering Systems 2017) & Section Interdisciplinary Applications of Computer Science (CSI))
Open AccessArticle
3 Pages, 491 KB Download PDF

Matrix Encryption Scheme

Advances in Science, Technology and Engineering Systems Journal, Volume 2, Issue 4, Page # 56–58, 2017; DOI: 10.25046/aj020408
Abstract:

In classical cryptography, the Hill cipher is a polygraphic substitution cipher based on linear algebra. In this work, we proposed a new problem applicable to the public key cryptography, based on the Matrices, called “Matrix discrete logarithm problem”, it uses certain elements formed by matrices whose coefficients are elements in a finite field. We have…

Read More
(This article belongs to Section Mathematics (MAT))
Open AccessArticle
7 Pages, 6,945 KB Download PDF

Gestural Interaction for Virtual Reality Environments through Data Gloves

Advances in Science, Technology and Engineering Systems Journal, Volume 2, Issue 3, Page # 284–290, 2017; DOI: 10.25046/aj020338
Abstract:

In virtual environments, virtual hand interactions play a key role in interactivity and realism allowing to perform fine motions. Data glove is widely used in Virtual Reality (VR) and through simulating a human hands natural anatomy (Avatar’s hands) in its appearance and motion is possible to interact with the environment and virtual objects. Recently, hand…

Read More
(This article belongs to the SP3 (Special issue on Recent Advances in Engineering Systems 2017) & Section Interdisciplinary Applications of Computer Science (CSI))

Journal Menu

Journal Browser


Special Issues

Special Issue on Digital Frontiers of Entrepreneurship: Integrating AI, Gender Equity, and Sustainable Futures
Guest Editors: Dr. Muhammad Nawaz Tunio, Dr. Aamir Rashid, Dr. Imamuddin Khoso
Deadline: 30 May 2026

Special Issue on Sustainable Technologies for a Resilient Future
Guest Editors: Dr. Debasis Mitra, Dr. Sourav Chattaraj, Dr. Addisu Assefa
Deadline: 30 April 2026