Search Results

Results (502)

Search Parameters:

Keyword: Network
Order results
Results per page
Open AccessArticle
8 Pages, 778 KB Download PDF

Multi-Domain Virtual Network Embedding with Coordinated Link Mapping

Advances in Science, Technology and Engineering Systems Journal, Volume 2, Issue 3, Page # 545–552, 2017; DOI: 10.25046/aj020370
Abstract:

Network Virtualization, which allows the co-existence of various logical networks on shared physical infrastructure, has become popular in recent years. The optimal mapping of virtual resource to physical resource is a major issue in network virtualization. This problem, called virtual network embedding (VNE), has been well explored in the context of one physical domain, which…

Read More
(This article belongs to the SP3 (Special issue on Recent Advances in Engineering Systems 2017) & Section Interdisciplinary Applications of Computer Science (CSI))
Open AccessArticle
7 Pages, 393 KB Download PDF

A delay-dependent distributed SMC for stabilization of a networked robotic system exposed to external disturbances

Advances in Science, Technology and Engineering Systems Journal, Volume 2, Issue 3, Page # 513–519, 2017; DOI: 10.25046/aj020366
Abstract:

In this paper, a delay-dependent controller based on the sliding mode concept is proposed to stabilize a networked robotic system in a decentralized synchronization scheme. In addition to being affected by communication time-delays between agents, and seen that external disturbances obviously affect any physical and dynamic system, an unsettling action resulting from measurement errors affects…

Read More
(This article belongs to the SP3 (Special issue on Recent Advances in Engineering Systems 2017) & Section Automation & Control Systems (ACS))
Open AccessArticle
19 Pages, 1,686 KB Download PDF

A Computationally Intelligent Approach to the Detection of Wormhole Attacks in Wireless Sensor Networks

Advances in Science, Technology and Engineering Systems Journal, Volume 2, Issue 3, Page # 302–320, 2017; DOI: 10.25046/aj020340
Abstract:

A wormhole attack is one of the most critical and challenging security threats for wireless sensor networks because of its nature and ability to perform concealed malicious activities. This paper proposes an innovative wormhole detection scheme to detect wormhole attacks using computational intelligence and an artificial neural network (ANN). Most wormhole detection schemes reported in…

Read More
(This article belongs to the SP3 (Special issue on Recent Advances in Engineering Systems 2017) & Section Information Systems in Computer Science (CIS))
Open AccessArticle
11 Pages, 656 KB Download PDF

Solving the Capacitated Network Design Problem in Two Steps

Advances in Science, Technology and Engineering Systems Journal, Volume 2, Issue 3, Page # 291–301, 2017; DOI: 10.25046/aj020339
Abstract:

In this paper, we propose a two steps-based algorithm to solve the modular link version of the Capacitated Network Design Problem (CNDP) which consists to determine the optimal network that guarantees the routing of a set of commodities. In our proposition, CNDP is divided into two sub-problems: Network Design problem (NDP) and Network Loading Problem…

Read More
(This article belongs to the SP3 (Special issue on Recent Advances in Engineering Systems 2017) & Section Interdisciplinary Applications of Computer Science (CSI))
Open AccessArticle
9 Pages, 1,523 KB Download PDF

Energy-Efficient Mobile Sensing in Distributed Multi-Agent Sensor Networks

Advances in Science, Technology and Engineering Systems Journal, Volume 2, Issue 3, Page # 245–253, 2017; DOI: 10.25046/aj020334
Abstract:

In this paper, we exploit an integration between Compressive sensing (CS) and the random mobility of sensors in distributed mobile sensor networks (MSNs). A small number of distributed mobile sensors are deployed randomly in a sensing area to observe a large number of positions. The distributed mobile sensors sparsely sample the sensing area for data…

Read More
(This article belongs to the SP3 (Special issue on Recent Advances in Engineering Systems 2017) & Section Telecommunications (TEL))
Open AccessArticle
8 Pages, 2,236 KB Download PDF

Classifying region of interests from mammograms with breast cancer into BIRADS using Artificial Neural Networks

Advances in Science, Technology and Engineering Systems Journal, Volume 2, Issue 3, Page # 233–240, 2017; DOI: 10.25046/aj020332
Abstract:

Breast cancer is one of the most common cancers among female diseases all over the world. Early diagnosis and treatment is particularly important in reducing the mortality rate. This research is focused on the prevention of breast cancer, therefore it is important to detect micro-calcifications (MCs) which are a sign of early stage breast cancer.…

Read More
(This article belongs to the SP3 (Special issue on Recent Advances in Engineering Systems 2017) & Section Artificial Intelligence in Computer Science (CAI))
Open AccessArticle
4 Pages, 796 KB Download PDF

Analysis of Fractional-Order 2xn RLC Networks by Transmission Matrices

Advances in Science, Technology and Engineering Systems Journal, Volume 2, Issue 3, Page # 217–220, 2017; DOI: 10.25046/aj020329
Abstract:

In this study, a new method is devised and presented for the dynamic analysis of a 2xn RLC circuit network modeled with the fractional-order circuit elements. The analysis method is based on the principles of dynamic analysis with transfer function approximation. Firstly, the fractional-order 2xn RLC circuit network of interest which is divided into n…

Read More
(This article belongs to the SP3 (Special issue on Recent Advances in Engineering Systems 2017) & Section Electrical Engineering (ELE))
Open AccessArticle
7 Pages, 1,258 KB Download PDF

A security approach based on honeypots: Protecting Online Social network from malicious profiles

Advances in Science, Technology and Engineering Systems Journal, Volume 2, Issue 3, Page # 198–204, 2017; DOI: 10.25046/aj020326
Abstract:

In the recent years, the fast development and the exponential utilization of social networks have prompted an expansion of social Computing. In social networks users are interconnected by edges or links, where Facebook, twitter, LinkedIn are most popular social networks websites. Due to the growing popularity of these sites they serve as a target for…

Read More
(This article belongs to the SP3 (Special issue on Recent Advances in Engineering Systems 2017) & Section Interdisciplinary Applications of Computer Science (CSI))
Open AccessArticle
4 Pages, 819 KB Download PDF

Development and Validation of a Heat Pump System Model Using Artificial Neural Network

Advances in Science, Technology and Engineering Systems Journal, Volume 2, Issue 3, Page # 182–185, 2017; DOI: 10.25046/aj020323
Abstract:

Modeling of direct expansion (DX) air conditioning and heat pump systems can be necessary in developing energy saving methods required to reduce energy consumption in buildings. The artificial neural networks (ANN) can be simple and reliable as compared to traditional methods. A properly trained artificial neural network can provide accurate results, while being relatively straightforward…

Read More
(This article belongs to the SP3 (Special issue on Recent Advances in Engineering Systems 2017) & Section Construction & Building Technology (CBT))
Open AccessArticle
6 Pages, 670 KB Download PDF

Channel Inversion Schemes with Compensation Network for Two-Element Compact Array in Multi-User MIMO

Advances in Science, Technology and Engineering Systems Journal, Volume 2, Issue 4, Page # 26–31, 2017; DOI: 10.25046/aj020404
Abstract:

In this paper, we investigate the performance of channel inversion schemes for interference cancellation with compensation network in multi-user MIMO broadcasting channel. To achieve good performance, mutual coupling between two-element compact arrays is characterized by the receiving mutual impedance method (RMIM) to formulate the compensation network-operating matrix. A prototype of two-element compensation network with an…

Read More
(This article belongs to Section Electronic Engineering (EEE))
Open AccessArticle
6 Pages, 1,057 KB Download PDF

Zero Trust Cloud Networks using Transport Access Control and High Availability Optical Bypass Switching

Advances in Science, Technology and Engineering Systems Journal, Volume 2, Issue 3, Page # 30–35, 2017; DOI: 10.25046/aj020305
Abstract:

Cyberinfrastructure is undergoing a radical transformation as traditional enterprise and cloud computing environments hosting dynamic, mobile workloads replace telecommunication data centers.  Traditional data center security best practices involving network segmentation are not well suited to these new environments.  We discuss a novel network architecture, which enables an explicit zero trust approach, based on a steganographic…

Read More
(This article belongs to the SP3 (Special issue on Recent Advances in Engineering Systems 2017) & Section Telecommunications (TEL))
Open AccessArticle
11 Pages, 1,780 KB Download PDF

Spatial Sampling Requirements for Received Signal Level Measurements in Cellular Networks of Suburban Area

Advances in Science, Technology and Engineering Systems Journal, Volume 2, Issue 1, Page # 277–287, 2017; DOI: 10.25046/aj020134
Abstract:

A process for the determination of a required spatial resolution in the collection of the Received Signal Level (RSL) is discussed. This method considers RSL measurements as a three dimensional surface that is sampled through the data collection process. In addition, it is difficult to collect RSL measurements for an entire coverage area because of…

Read More
(This article belongs to the SP2 (Special Issue on Computer Systems, Information Technology, Electrical and Electronics Engineering 2017) & Section Telecommunications (TEL))
Open AccessArticle
8 Pages, 1,454 KB Download PDF

Proposal of a congestion control technique in LAN networks using an econometric model ARIMA

Advances in Science, Technology and Engineering Systems Journal, Volume 2, Issue 1, Page # 269–276, 2017; DOI: 10.25046/aj020133
Abstract:

Hasty software development can produce immediate implementations with source code unnecessarily complex and hardly readable. These small kinds of software decay generate a technical debt that could be big enough to seriously affect future maintenance activities. This work presents an analysis technique for identifying architectural technical debt related to non-uniformity of naming patterns; the technique…

Read More
(This article belongs to the SP2 (Special Issue on Computer Systems, Information Technology, Electrical and Electronics Engineering 2017) & Section Telecommunications (TEL))
Open AccessArticle
5 Pages, 843 KB Download PDF

MIMO Performance and Decoupling Network: Analysis of Uniform Rectangular array Using Correlated-Based Stochastic Models

Advances in Science, Technology and Engineering Systems Journal, Volume 2, Issue 1, Page # 192–196, 2017; DOI: 10.25046/aj020123
Abstract:

We explore the dependency of MIMO performance on azimuthal spread (AS) and elevation spread (ES) using correlated-based stochastic models (CBSMs). We represent the transmitter as uniform rectangular array (URA), and derive an analytical function for spatial correlation, in terms of maximum power when phase gradient of the incident wave follows a Student’s t-distribution. We model…

Read More
(This article belongs to the SP2 (Special Issue on Computer Systems, Information Technology, Electrical and Electronics Engineering 2017) & Section Telecommunications (TEL))
Open AccessArticle
13 Pages, 887 KB Download PDF

Mobi-Sim: An Emulation and Prototyping Platform for Protocols Validation of Mobile Wireless Sensors Networks

Advances in Science, Technology and Engineering Systems Journal, Volume 2, Issue 1, Page # 108–120, 2017; DOI: 10.25046/aj020113
Abstract:

The objective of this paper is to provide a new simulator framework for mobile WSN that emulate a sensor node at a laptop i.e. the laptop will model and replace a sensor node within a network. This platform can implement di?erent WSN routing protocols to simulate and validate new developed protocols in terms of energy…

Read More
(This article belongs to the SP2 (Special Issue on Computer Systems, Information Technology, Electrical and Electronics Engineering 2017) & Section Network Engineering (ENW))
Open AccessArticle
8 Pages, 1,522 KB Download PDF

Dynamic detection of abnormalities in video analysis of crowd behavior with DBSCAN and neural networks

Advances in Science, Technology and Engineering Systems Journal, Volume 1, Issue 5, Page # 56–63, 2016; DOI: 10.25046/aj010510
Abstract:

Visual analysis of human behavior is a broad field within computer vision.  In this field of work, we are interested in dynamic methods in the analysis of crowd behavior which consist in detecting the abnormal entities in a group in a dense scene. These scenes are characterized by the presence of a great number of…

Read More
(This article belongs to the Special issue on Recent Advances in Electrical and Electronics Engineering 2016 & Section Artificial Intelligence in Computer Science (CAI))
Open AccessArticle
4 Pages, 1,378 KB Download PDF

10 Gbps Full Duplex Cost Effective Architecture GPON Network with Single Fiber

Advances in Science, Technology and Engineering Systems Journal, Volume 1, Issue 5, Page # 6–9, 2016; DOI: 10.25046/aj010502
Abstract:

In this paper, a full duplex Gigabit Passive Optical Network (GPON) architecture supporting 10Gbps data transmission through single fiber cable network is proposed and demonstrated. A Non Return to Zero Differential Phase Shift Keying (NRZ-DPSK) is utilized for downstream and re-modulate the downstream signal using intensity modulator (on-off keying OOK) in Return to Zero (RZ)…

Read More
(This article belongs to the Special issue on Recent Advances in Electrical and Electronics Engineering 2016 & Section Telecommunications (TEL))
Open AccessArticle
8 Pages, 1,262 KB Download PDF

Detection Method and Mitigation of Server-Spoofing Attacks on SOME/IP at the Service Discovery Phase

Advances in Science, Technology and Engineering Systems Journal, Volume 11, Issue 1, Page # 25–32, 2026; DOI: 10.25046/aj110103
Abstract:

Service-oriented architecture has attracted attention in automotive development. The Automotive Open System Architecture (AUTOSAR) specifies Scalable Service-Oriented Middleware over IP (SOME/IP) as a key middleware for service-oriented communication in-vehicles. However, SOME/IP-based networks are vulnerable to server spoofing during the service discovery phase, enabling attackers to cause man-in-the-middle attacks by impersonating legitimate services. This paper proposes…

Read More
(This article belongs to the SP19 (Special Issue on Innovation in Computing, Engineering Science & Technology 2025-26) & Section Information Systems in Computer Science (CIS))
Open AccessArticle
14 Pages, 3,471 KB Download PDF

Computationally Efficient Explainable AI Framework for Skin Cancer Detection

Advances in Science, Technology and Engineering Systems Journal, Volume 11, Issue 1, Page # 11–24, 2026; DOI: 10.25046/aj110102
Abstract:

Skin cancer stands among some of the fastest growing and fatal malignancies of the world as a result early and accurate diagnosis of skin cancer is essential in order to enhance patient survival and treatment prognosis. Conventional methods of diagnosis including dermoscopy and histopathological examinations are expensive and time consuming also subject to inter-observer error.…

Read More
(This article belongs to the ADAIS26 (Special Issue on Advances in Data-Driven Analytics and Intelligent Systems 2026) & Section Artificial Intelligence in Computer Science (CAI))
Open AccessArticle
11 Pages, 3,198 KB Download PDF

PerfVis+: From Timestamps to Insight through Integration of Visual and Statistical Analysis

Advances in Science, Technology and Engineering Systems Journal, Volume 10, Issue 6, Page # 77–87, 2025; DOI: 10.25046/aj100607
Abstract:

Complex networked systems provide a cornucopia of network statistics, many of which relate to the temporal behaviour of subsystems, devices, or even individual protocol layers. Different and flexible visualizations can play a crucial role in discovering and making patterns, relations, and trends tangible. We developed PerfVis, a tool that visualizes timestamp data to aid in…

Read More
(This article belongs to the SP19 (Special Issue on Innovation in Computing, Engineering Science & Technology 2025-26) & Section Information Systems in Computer Science (CIS))
Open AccessArticle
22 Pages, 15,097 KB Download PDF

TIMeFoRCE: An Identity and Access Management Framework for IoT Devices in A Zero Trust Architecture

Advances in Science, Technology and Engineering Systems Journal, Volume 10, Issue 6, Page # 1–22, 2025; DOI: 10.25046/aj100601
Abstract:

Zero Trust Architecture offers a transformative approach to network security by emphasizing ”never trust, always verify.” IoT devices, while increasingly integral to modern ecosystems, pose unique challenges for identity management and access control due to their constrained processing power, memory, and energy capabilities. In a Zero Trust framework, every IoT device is treated as a…

Read More
(This article belongs to the SP19 (Special Issue on Innovation in Computing, Engineering Science & Technology 2025-26) & Section Telecommunications (TEL))
Open AccessArticle
9 Pages, 3,238 KB Download PDF

3D Facial Feature Tracking with Multimodal Depth Fusion

Advances in Science, Technology and Engineering Systems Journal, Volume 10, Issue 5, Page # 11–19, 2025; DOI: 10.25046/aj100502
Abstract:

As models based in artificial intelligence increase in sophistication, there is a higher demand for the integration of hardware components to heighten real-world implementations. Both facial feature tracking and shape-from-focus are known techniques in computer vision. However, the combination of these two elements, particularly in a cost-effective configuration, has not been extensively explored. In this…

Read More
(This article belongs to Section Automation & Control Systems (ACS))
Open AccessArticle
11 Pages, 2,600 KB Download PDF

Hardware and Secure Implementation of Enhanced ZUC Steam Cipher Based on Chaotic Dynamic S-Box

Advances in Science, Technology and Engineering Systems Journal, Volume 10, Issue 1, Page # 37–47, 2025; DOI: 10.25046/aj100105
Abstract:

Despite the development of the Internet and wired networks such as fiber optics, mobile networks remain the most used thanks to the mobility they offer to the user. However, data protection in these networks is more complex because of the radio channels they use for transmission. Hence,there is a need to find more sophisticated data…

Read More
(This article belongs to the SP17 (Special Issue on Innovation in Computing, Engineering Science & Technology 2024-25) & Section Hardware & Architecture in Computer Science (CHA))
Open AccessArticle
9 Pages, 767 KB Download PDF

Advanced Fall Analysis for Elderly Monitoring Using Feature Fusion and CNN-LSTM: A Multi-Camera Approach

Advances in Science, Technology and Engineering Systems Journal, Volume 9, Issue 6, Page # 12–20, 2024; DOI: 10.25046/aj090602
Abstract:

As society ages, the imbalance between family caregivers and elderly individuals increases, leading to inadequate support for seniors in many regions. This situation has ignited interest in automatic health monitoring systems, particularly in fall detection, due to the significant health risks that falls pose to older adults. This research presents a vision-based fall detection system…

Read More
(This article belongs to the SP17 (Special Issue on Innovation in Computing, Engineering Science & Technology 2024-25) & Section Artificial Intelligence in Computer Science (CAI))
Open AccessArticle
12 Pages, 376 KB Download PDF

Advancements in Explainable Artificial Intelligence for Enhanced Transparency and Interpretability across Business Applications

Advances in Science, Technology and Engineering Systems Journal, Volume 9, Issue 5, Page # 09–20, 2024; DOI: 10.25046/aj090502
Abstract:

This manuscript offers an in-depth analysis of Explainable Artificial Intelligence (XAI), em- phasizing its crucial role in developing transparent and ethically compliant AI systems. It traces AI’s evolution from basic algorithms to complex systems capable of autonomous de- cisions with self-explanation. The paper distinguishes between explainability—making AI decision processes understandable to humans—and interpretability, which provides…

Read More
(This article belongs to the SP16 (Special Issue on Computing, Engineering and Multidisciplinary Sciences 2024) & Section Artificial Intelligence in Computer Science (CAI))
1 5 6 7 8 9 21

Journal Menu

Journal Browser


Special Issues

Special Issue on Digital Frontiers of Entrepreneurship: Integrating AI, Gender Equity, and Sustainable Futures
Guest Editors: Dr. Muhammad Nawaz Tunio, Dr. Aamir Rashid, Dr. Imamuddin Khoso
Deadline: 30 May 2026

Special Issue on Sustainable Technologies for a Resilient Future
Guest Editors: Dr. Debasis Mitra, Dr. Sourav Chattaraj, Dr. Addisu Assefa
Deadline: 30 April 2026