Search Results

Results (234)

Search Parameters:

Keyword: Processing
Order results
Results per page
Open AccessArticle
5 Pages, 2,229 KB Download PDF

Intelligent Wireless System for PV Supervision Based on The Raspberry Pi

Advances in Science, Technology and Engineering Systems Journal, Volume 4, Issue 6, Page # 94–98, 2019; DOI: 10.25046/aj040611
Abstract:

Photovoltaic systems and monitoring go hand in hand. There is no better way to check the health of your photovoltaic system than to utilize a remote monitoring system. Monitoring and tracking of photovoltaic systems are crucial for reliable functioning and optimal yield of any solar electric system. This paper aims to introduce a remote electronic…

Read More
(This article belongs to the isaect-18 (Special Issue on Advanced Electrical and Communication Technologies 2019) & Section Green & Sustainable Science & Technology (GSS))
Open AccessArticle
8 Pages, 1,116 KB Download PDF

EKMC: Ensemble of kNN using MetaCost for Efficient Anomaly Detection

Advances in Science, Technology and Engineering Systems Journal, Volume 4, Issue 5, Page # 401–408, 2019; DOI: 10.25046/aj040552
Abstract:

Anomaly detection aims at identification of suspicious items, observations or events by differing from most of the data. Intrusion Detection, Fault Detection, and Fraud Detection are some of the various applications of Anomaly Detection. The Machine learning classifier algorithms used in these applications would greatly affect the overall efficiency. This work is an extension of…

Read More
(This article belongs to Section Artificial Intelligence in Computer Science (CAI))
Open AccessArticle
6 Pages, 1,341 KB Download PDF

Verification of the Usefulness of Personal Authentication with Aerial Input Numerals Using Leap Motion

Advances in Science, Technology and Engineering Systems Journal, Volume 4, Issue 5, Page # 369–374, 2019; DOI: 10.25046/aj040548
Abstract:

With the progress of IoT, everything is going to be connected to the network. It will bring us a lot of benefits however some security risks will be occurred by connecting network. To avoid such problems, it is indispensable to strengthen security more than now. We focus on personal authentication as one of the security.…

Read More
(This article belongs to Section Artificial Intelligence in Computer Science (CAI))
Open AccessArticle
7 Pages, 438 KB Download PDF

An Integrated Framework for Pronominal Anaphora Resolution in Malayalam

Advances in Science, Technology and Engineering Systems Journal, Volume 4, Issue 5, Page # 287–293, 2019; DOI: 10.25046/aj040536
Abstract:

Anaphora resolution is one of the old problems in Natural Language Processing. It is the process of identifying the antecedent of an anaphoric expression in a natural language text. Most of the NLP applications such as text summarization, question answering, information extraction, machine translation etc. require the successful resolution of anaphors. In this paper, we…

Read More
(This article belongs to the SP8 (Special Issue on Multidisciplinary Sciences and Engineering 2019-20) & Section Information Systems in Computer Science (CIS))
Open AccessArticle
6 Pages, 737 KB Download PDF

Sentiment Analysis of Transjakarta Based on Twitter using Convolutional Neural Network

Advances in Science, Technology and Engineering Systems Journal, Volume 4, Issue 5, Page # 281–286, 2021; DOI: 10.25046/aj040535
Abstract:

TransJakarta is one of the methods to reduce congestion in Jakarta. However, the number of TransJakarta users compared to number of private vehicle users is very small, only 24% of the total population in Jakarta. The purpose of this research is to know public opinions about TransJakarta whether positive or negative by doing sentiment analysis…

Read More
(This article belongs to Section Artificial Intelligence in Computer Science (CAI))
Open AccessArticle
14 Pages, 1,172 KB Download PDF

Prediction of Non-Communicable Diseases Using Class Comparison Data Mining

Advances in Science, Technology and Engineering Systems Journal, Volume 4, Issue 5, Page # 193–206, 2019; DOI: 10.25046/aj040525
Abstract:

Data mining is recognized as an effective technique for extracting and retrieving valuable information or decision from the vast available data. Because of the nature of the functionality of medical centers and hospitals, their data centers contain a collection of valuable information about their patients. By properly processing these data, different applications can be developed…

Read More
(This article belongs to the SP7 (Special Issue on Advancement in Engineering and Computer Science 2019) & Section Interdisciplinary Applications of Computer Science (CSI))
Open AccessArticle
11 Pages, 3,149 KB Download PDF

Chatting with Plants (Orchids) in Automated Smart Farming using IoT, Fuzzy Logic and Chatbot

Advances in Science, Technology and Engineering Systems Journal, Volume 4, Issue 5, Page # 163–173, 2019; DOI: 10.25046/aj040522
Abstract:

Plants are living organisms that can hear and recognize the environment around them but cannot communicate to inform their needs. Thus, in the past, humans thought that it was impossible to communicate with plants. However, in this modern era, humans can be able to communicate with these plants. In this paper, we propose a model…

Read More
(This article belongs to the SP8 (Special Issue on Multidisciplinary Sciences and Engineering 2019-20) & Section Agricultural Engineering (AEN))
Open AccessArticle
7 Pages, 262 KB Download PDF

Detecting Malicious Assembly using Convolutional, Recurrent Neural Networks

Advances in Science, Technology and Engineering Systems Journal, Volume 4, Issue 5, Page # 46–52, 2019; DOI: 10.25046/aj040506
Abstract:

We present findings on classifying the class of executable code using convolutional, re- current neural networks by creating images from only the .text section of executables and dividing them into standard-size windows, using minimal preprocessing. We achieve up to 98.24% testing accuracy on classifying 9 types of malware, and 99.50% testing accuracy on classifying malicious…

Read More
(This article belongs to the SP7 (Special Issue on Advancement in Engineering and Computer Science 2019) & Section Interdisciplinary Applications of Computer Science (CSI))
Open AccessArticle
7 Pages, 519 KB Download PDF

Melanoma detection using color and texture features in computer vision systems

Advances in Science, Technology and Engineering Systems Journal, Volume 4, Issue 5, Page # 16–22, 2019; DOI: 10.25046/aj040502
Abstract:

All forms of skin cancer are becoming widespread. These forms of cancer, and melanoma in particular, are insidious and aggressive and if not treated promptly can be lethal to humans. Effective treatment of skin lesions depends strongly on the timeliness of the diagnosis: for this reason, artificial vision systems are required to play a crucial…

Read More
(This article belongs to the SP7 (Special Issue on Advancement in Engineering and Computer Science 2019) & Section Bioinformatics (BIF))
Open AccessArticle
8 Pages, 1,159 KB Download PDF

Embedded Artificial Neural Network FPGA Controlled Cart

Advances in Science, Technology and Engineering Systems Journal, Volume 4, Issue 4, Page # 509–516, 2019; DOI: 10.25046/aj040461
Abstract:

An artificial neural network (ANN) computing system can be significantly influenced by its implementation type. The software implemented ANN can produce high accuracy output with slow computation time performance compared to hardware implemented ANN which runs at a faster computation time but with low accuracy. Normally, software implementation reduces the proficiency and efficiency of the…

Read More
(This article belongs to Section Electronic Engineering (EEE))
Open AccessArticle
7 Pages, 1,108 KB Download PDF

Development of Wavelet-Based Tools for Event Related Potentials’ N400 Detection: Application to Visual and Auditory Vowelling and Semantic Priming in Arabic Language

Advances in Science, Technology and Engineering Systems Journal, Volume 4, Issue 4, Page # 414–420, 2019; DOI: 10.25046/aj040450
Abstract:

Neurological signals are generally very weak in amplitude and strongly noisy. As a result, one of the major challenges in neuroscience is to be able to eliminate noise and thus exploit the maximum amount of information contained in neurological signals (EEG…). In this paper, we aimed at studying the N400 wave of the Event-Related Potentials…

Read More
(This article belongs to the SP7 (Special Issue on Advancement in Engineering and Computer Science 2019) & Section Biomedical Engineering (EBI))
Open AccessArticle
7 Pages, 4,180 KB Download PDF

Hidden Surface Removal for Interaction between Hand and Virtual Objects in Augmented Reality

Advances in Science, Technology and Engineering Systems Journal, Volume 4, Issue 4, Page # 359–365, 2019; DOI: 10.25046/aj040444
Abstract:

Recently, augmented reality (AR) technology has been applied to the inter- action technology between human and virtual objects. In AR interaction technology, it is necessary for users to be able to manipulate virtual objects intuitively. Thus, we focus on manipulating virtual objects directly with the user’s bare hands in this study. On the other hand,…

Read More
(This article belongs to the SP7 (Special Issue on Advancement in Engineering and Computer Science 2019) & Section Interdisciplinary Applications of Computer Science (CSI))
Open AccessArticle
9 Pages, 737 KB Download PDF

Event Monitoring using Distributed Pattern Recognition Approach on Integrated IoT-Blockchain Network

Advances in Science, Technology and Engineering Systems Journal, Volume 4, Issue 4, Page # 256–264, 2019; DOI: 10.25046/aj040432
Abstract:

With the advancement in the field of Internet-of-Things (IoT), event monitoring applications have rapidly evolved from a simple event data acquisition towards predictive event analytics involving multi-sensory data aggregation in a distributed environment. Existing event monitoring schemes are mainly relying on ine_cient centralized processing mechanism, which may lead to the common single-point of failure for…

Read More
(This article belongs to the SP7 (Special Issue on Advancement in Engineering and Computer Science 2019) & Section Interdisciplinary Applications of Computer Science (CSI))
Open AccessArticle
4 Pages, 570 KB Download PDF

Digitization Impact Assessment Model for Secondary Schools: Case of Nairobi County in Kenya

Advances in Science, Technology and Engineering Systems Journal, Volume 4, Issue 3, Page # 194–197, 2019; DOI: 10.25046/aj040326
Abstract:

Digitization is viewed as the capability to utilize digital technologies for generating processing, sharing and transacting information. Studies show that digitization has now become ubiquitous. In almost all the sectors, we routinely interact with digital technologies. As a result, the impact of digitization is being observed in such sectors. For instance, the positive impact of…

Read More
(This article belongs to the SP6 (Special Issue on Recent Advances in Engineering Systems 2018-19) & Section Interdisciplinary Applications of Computer Science (CSI))
Open AccessArticle
9 Pages, 708 KB Download PDF

Cognitive Systems for Monitoring: Architectural View

Advances in Science, Technology and Engineering Systems Journal, Volume 4, Issue 3, Page # 117–125, 2019; DOI: 10.25046/aj040316
Abstract:

The modern stage of information technology development is characterized by the acute need to use cognitive technologies for the solution of tasks of practice, in particular, in the sphere of real world objects monitoring and management. Practical usage of cognitive systems of monitoring is significantly limited to two factors now: operation at the level of…

Read More
(This article belongs to Section Theory & Methods in Computer Science (CTM))
Open AccessArticle
6 Pages, 1,029 KB Download PDF

Walker Ergonomic Design for Visually Impaired Elderly

Advances in Science, Technology and Engineering Systems Journal, Volume 4, Issue 3, Page # 47–52, 2019; DOI: 10.25046/aj040307
Abstract:

The study proposed a self-driven guidance walker through user-oriented integration design. The common two-wheel drive performs left and right turn. By reducing the weight of the walker body, the durability of the battery can be increased. Secondly, we use a foldable structure so that the walker can be conveniently stored in a small space. A…

Read More
(This article belongs to the SP7 (Special Issue on Advancement in Engineering and Computer Science 2019) & Section Instruments & Instrumentation (IIN))
Open AccessArticle
9 Pages, 929 KB Download PDF

Vowel Classification Based on Waveform Shapes

Advances in Science, Technology and Engineering Systems Journal, Volume 4, Issue 3, Page # 16–24, 2019; DOI: 10.25046/aj040303
Abstract:

Vowel classification is an essential part of speech recognition. In classical studies, this problem is mostly handled by using spectral domain features. In this study, a novel approach is proposed for vowel classification based on the visual features of speech waveforms. In sound vocalizing, the position of certain organs of the human vocal system such…

Read More
(This article belongs to Section Electronic Engineering (EEE))
Open AccessArticle
11 Pages, 2,143 KB Download PDF

Hybrid Technique for Enhancing Underwater Image in blurry conditions

Advances in Science, Technology and Engineering Systems Journal, Volume 4, Issue 2, Page # 340–350, 2019; DOI: 10.25046/aj040243
Abstract:

Enhancing underwater visualization using hybrid technique is generally employed into oceanic production. Through growing oceanic learning, undersea processing has drawn extra importance owing towards necessary task of picture towards attaining data. Although, suitable to reality of dust-like constituent and beam reduction, undersea descriptions continually experience small contrast and color alteration. In this paper, we estimate…

Read More
(This article belongs to the SP7 (Special Issue on Advancement in Engineering and Computer Science 2019) & Section Interdisciplinary Applications of Computer Science (CSI))
Open AccessArticle
9 Pages, 870 KB Download PDF

Noise Cancellation Algorithm Based on Air- and Bone-Conducted Speech Signals by Considering an Unscented Transformation Method

Advances in Science, Technology and Engineering Systems Journal, Volume 4, Issue 2, Page # 305–313, 2019; DOI: 10.25046/aj040239
Abstract:

Noise control is essential when applying speech recognition in noisy environments such as factories. In this study, a signal processing for noise cancellation is proposed by using a noise-insensitive bone-conducted speech signal together with an air-conducted speech signal. The speech signal is generally expressed by a nonlinear model. The extended Kalman filter is very famous…

Read More
(This article belongs to the SP7 (Special Issue on Advancement in Engineering and Computer Science 2019) & Section Electronic Engineering (EEE))
Open AccessArticle
7 Pages, 578 KB Download PDF

Automatic Stitching of Medical Images Using Feature Based Approach

Advances in Science, Technology and Engineering Systems Journal, Volume 4, Issue 2, Page # 127–133, 2019; DOI: 10.25046/aj040217
Abstract:

Image stitching is a process of creating a panoramic image by combining multiple images that have overlapping regions of the same scene. It is a challenging topic in image processing, multimedia, and medical applications. The proposed system can be applied in medical applications for scoliosis operations and other long limb operations. The problem of the…

Read More
(This article belongs to the SP7 (Special Issue on Advancement in Engineering and Computer Science 2019) & Section Bioinformatics (BIF))
Open AccessArticle
5 Pages, 1,597 KB Download PDF

Design and Analysis of 32-bit Parallel Prefix Adders for Low Power VLSI Applications

Advances in Science, Technology and Engineering Systems Journal, Volume 4, Issue 2, Page # 102–106, 2019; DOI: 10.25046/aj040213
Abstract:

The basic processes like addition, subtraction can be done using various types of binary adders with dissimilar addition times (delay), area and power consumption in any digital processing applications. To minimize the Power Delay Product (PDP) of Digital Signal Processing (DSP) processors is necessary for high performance in Very Large Scale Integration (VLSI) applications. In…

Read More
(This article belongs to Section Electronic Engineering (EEE))
Open AccessArticle
11 Pages, 841 KB Download PDF

A Systematic Mapping Study of Cloud, Fog, and Edge/Mobile Devices Management, Hierarchy Models and Business Models

Advances in Science, Technology and Engineering Systems Journal, Volume 4, Issue 2, Page # 91–101, 2019; DOI: 10.25046/aj040212
Abstract:

Cloud computing is an exceptional paradigm, which is facilitating the developments and utilization of resources over the internet. Fog computing operates at the edge of the network saving bandwidth, by not sending all information to the cloud, while edge computing does processing of data at the edge of the cloud. Edge computing reduces the distance…

Read More
(This article belongs to the SP7 (Special Issue on Advancement in Engineering and Computer Science 2019) & Section Software Engineering in Computer Science (CSE))
Open AccessArticle
5 Pages, 336 KB Download PDF

A Relation Extraction System for Indian Languages

Advances in Science, Technology and Engineering Systems Journal, Volume 4, Issue 2, Page # 65–69, 2019; DOI: 10.25046/aj040208
Abstract:

Relation Extraction is an important subtask of Information Extraction that involves extracting significant facts from natural language text. Extracting structured information from the plaintext is the ultimate goal of IE systems. The Indian language content on the internet is increasing day to day. Extracting relevant information from this huge unstructured data is a challenging task…

Read More
(This article belongs to the SP6 (Special Issue on Recent Advances in Engineering Systems 2018-19) & Section Bioinformatics (BIF))
Open AccessArticle
12 Pages, 700 KB Download PDF

Application Layer Security Authentication Protocols for the Internet of Things: A Survey

Advances in Science, Technology and Engineering Systems Journal, Volume 4, Issue 1, Page # 317–328, 2019; DOI: 10.25046/aj040131
Abstract:

Network security challenges due to nearly limitless internet connectivity, platform limitations, ubiquitous nodal mobility and huge data transactions is burgeoning by the day and the need for transcend Internet of Things (IoT) based cloud security authentication protocols is on an exponential rise. Even though many secure classic layered security mechanisms are available for implementation, they…

Read More
(This article belongs to Section Cybernetics in Computer Science (CCY))
Open AccessArticle
10 Pages, 3,798 KB Download PDF

Over-The-Air Testing of Automotive Antennas and Wireless Links in The Installed State on The Basis of LTE Downlink Communication Parameters

Advances in Science, Technology and Engineering Systems Journal, Volume 4, Issue 1, Page # 282–291, 2019; DOI: 10.25046/aj040127
Abstract:

Modern automobiles have been turning more and more into wireless sensor and communication networks. Accordingly, the number of radio systems is steadily increasing. Due to strict safety requirements, these radio systems need to be tested extensively for functionality and reliability, especially under poor radio channel conditions. Beside the large electrical size of cars at frequencies…

Read More
(This article belongs to the SP6 (Special Issue on Recent Advances in Engineering Systems 2018-19) & Section Telecommunications (TEL))

Journal Menu

Journal Browser


Special Issues

Special Issue on Digital Frontiers of Entrepreneurship: Integrating AI, Gender Equity, and Sustainable Futures
Guest Editors: Dr. Muhammad Nawaz Tunio, Dr. Aamir Rashid, Dr. Imamuddin Khoso
Deadline: 30 May 2026

Special Issue on Indigenous Knowledge Systems of the Tribal Communities of the Asia Pacific
Guest Editors: Dr. Anurag Hazarika
Deadline: 31 October 2026

Special Issue on Sustainable Technologies for a Resilient Future
Guest Editors: Dr. Debasis Mitra, Dr. Sourav Chattaraj, Dr. Addisu Assefa
Deadline: 30 April 2026