Search Results

Results (202)

Search Parameters:

Keyword: SUE
Order results
Results per page
Open AccessArticle
7 Pages, 1,015 KB Download PDF

Resourceful Residual Energy Consumption in TDMA Scheduling for IoT-based Wireless Sensor Network

Advances in Science, Technology and Engineering Systems Journal, Volume 4, Issue 3, Page # 31–37, 2019; DOI: 10.25046/aj040305
Abstract:

Recently, wireless sensor network (WSN) gets more concern due to the robustness in the latest communication technology iteration such as big data, IoT and 5G. Such daily usage of these technologies includes smart home, smart farming, smart traffic control etc. Moreover, WSN becomes the best preference for mobile objects in data accumulating in a wild…

Read More
(This article belongs to Section Interdisciplinary Applications of Computer Science (CSI))
Open AccessArticle
9 Pages, 712 KB Download PDF

Cloud Service Level Agreements and Resource Management

Advances in Science, Technology and Engineering Systems Journal, Volume 4, Issue 2, Page # 228–236, 2019; DOI: 10.25046/aj040230
Abstract:

Cloud computing is a technical “as-a-service” usage model utilizing virtualization. Virtual machines are the core of cloud computing that runs as independent machine grouped into different networks within the hypervisor. Practically done by deployment of clouds computing hosts enterprise servers in virtual machines on an array of high-end servers. Managing cloud resources has to do…

Read More
(This article belongs to the SP7 (Special Issue on Advancement in Engineering and Computer Science 2019) & Section Software Engineering in Computer Science (CSE))
Open AccessArticle
12 Pages, 700 KB Download PDF

Application Layer Security Authentication Protocols for the Internet of Things: A Survey

Advances in Science, Technology and Engineering Systems Journal, Volume 4, Issue 1, Page # 317–328, 2019; DOI: 10.25046/aj040131
Abstract:

Network security challenges due to nearly limitless internet connectivity, platform limitations, ubiquitous nodal mobility and huge data transactions is burgeoning by the day and the need for transcend Internet of Things (IoT) based cloud security authentication protocols is on an exponential rise. Even though many secure classic layered security mechanisms are available for implementation, they…

Read More
(This article belongs to Section Cybernetics in Computer Science (CCY))
Open AccessArticle
6 Pages, 3,439 KB Download PDF

Low Contrast Image Enhancement Using Convolutional Neural Network with Simple Reflection Model

Advances in Science, Technology and Engineering Systems Journal, Volume 4, Issue 1, Page # 159–164, 2019; DOI: 10.25046/aj040115
Abstract:

Low contrast images degrade the performance of image processing system. To solve the issue, plenty of image enhancement methods have been proposed. But the methods work properly on the fixed environment or specific images. The methods dependent on fixed image conditions cannot perform image enhancement properly and perspective of smart device users, algorithms including iterative…

Read More
(This article belongs to the SP6 (Special Issue on Recent Advances in Engineering Systems 2018-19) & Section Interdisciplinary Applications of Computer Science (CSI))
Open AccessArticle
9 Pages, 1,013 KB Download PDF

Web Authentication: no Password; Listen and Touch

Advances in Science, Technology and Engineering Systems Journal, Volume 4, Issue 1, Page # 84–92, 2019; DOI: 10.25046/aj040109
Abstract:

Just as electricity has an essential role in our lives, the internet network and especially web services have become of vital importance nowadays. Without security service layers, apparently small things like checking a child’s school schedule on web may turn the daily routine into a nightmare. Web services users are still required to use many…

Read More
(This article belongs to the SP6 (Special Issue on Recent Advances in Engineering Systems 2018-19) & Section Interdisciplinary Applications of Computer Science (CSI))
Open AccessArticle
7 Pages, 1,429 KB Download PDF

Perfect Molding Challenges and The Limitations “A Case Study”

Advances in Science, Technology and Engineering Systems Journal, Volume 3, Issue 6, Page # 489–495, 2018; DOI: 10.25046/aj030657
Abstract:

Driven by today’s market demand, semiconductor is pushing towards the zero-defect direction. The improvement demanded in semiconductor manufacturing is becoming increasingly challenging. In this paper, common molding defects comprise of voids, incomplete fills, and piping holes are studied systematically, focusing on three key areas: 1) Potential mold flow weakness; 2) Molding temperature stability; as well…

Read More
(This article belongs to the SP5 (Special Issue on Multidisciplinary Sciences and Engineering 2018) & Section Manufacturing Engineering (EMF))
Open AccessArticle
14 Pages, 2,221 KB Download PDF

Simulation-Optimisation of a Granularity Controlled Consumer Supply Network Using Genetic Algorithms

Advances in Science, Technology and Engineering Systems Journal, Volume 3, Issue 6, Page # 455–468, 2018; DOI: 10.25046/aj030654
Abstract:

The decision support systems regarding the Supply Chains (SCs) management services can be significantly improved if an effective viable method is utilised. This paper presents a robust simulation optimisation approach (SOA) for the design and analysis of a granularity controlled and complex system known as Consumer Supply Network (CSN) incorporating uncertain demand and capacity. Minimising…

Read More
(This article belongs to the SP5 (Special Issue on Multidisciplinary Sciences and Engineering 2018) & Section Industrial Engineering (EID))
Open AccessArticle
8 Pages, 910 KB Download PDF

Probabilistic Method for Anomalies Detection Based on the Analysis of Cyber Parameters in a Group of Mobile Robots

Advances in Science, Technology and Engineering Systems Journal, Volume 3, Issue 6, Page # 281–288, 2018; DOI: 10.25046/aj030636
Abstract:

This article is devoted to the issues of ensuring the security of a group of mobile robots in the implementation of attacks aimed at the property of accessibility of information and the availability of network nodes. The article presents a method for detecting an abnormal behavior of a network node based on the analysis by…

Read More
(This article belongs to the SP5 (Special Issue on Multidisciplinary Sciences and Engineering 2018) & Section Interdisciplinary Applications of Computer Science (CSI))
Open AccessArticle
11 Pages, 1,285 KB Download PDF

A Holistic User Centric Acute Myocardial Infarction Prediction System With Model Evaluation Using Data Mining Techniques

Advances in Science, Technology and Engineering Systems Journal, Volume 3, Issue 6, Page # 56–66, 2018; DOI: 10.25046/aj030605
Abstract:

Acute Myocardial Infarction (Heart Attack), a Coronary Heart Disease (CHD) is one of the major killers worldwide. Around one thousand data has been collected from AMI patients, people are at risk of maybe a heart attack and individuals with the significant features closely related to heart attack. The sophistication in mobile technology, health care applications…

Read More
(This article belongs to Section Artificial Intelligence in Computer Science (CAI))
Open AccessArticle
13 Pages, 1,687 KB Download PDF

Fuzzy Uncertainty Management in Multi-Shift Single-Vehicle Routing Problem

Advances in Science, Technology and Engineering Systems Journal, Volume 3, Issue 6, Page # 33–45, 2018; DOI: 10.25046/aj030603
Abstract:

Our research deals with the single-vehicle routing problem (VRP) with multi-shift and fuzzy uncertainty. In such a problem, a company constantly uses one vehicle to serve demand over a scheduling period of different work shifts. Our issue relies on a routing problem in maintenance jobs, where a crew executes jobs in different sites. The crew…

Read More
(This article belongs to the SP5 (Special Issue on Multidisciplinary Sciences and Engineering 2018) & Section Operations Research & Management Science (ORM))
Open AccessArticle
9 Pages, 664 KB Download PDF

Towards Adoption of Authentication and Authorization in Identity Management and Single Sign On

Advances in Science, Technology and Engineering Systems Journal, Volume 3, Issue 5, Page # 492–500, 2018; DOI: 10.25046/aj030556
Abstract:

Identity and Access Management (IAM) and Single Sign on (SSO) are two security concepts that are related to each other. IAM governs the user access in an organization whereas SSO facilitates the user by authenticating to one centralized application and not having to re-authenticate when trying to access other applications. This paper addresses the different…

Read More
(This article belongs to the SP5 (Special Issue on Multidisciplinary Sciences and Engineering 2018) & Section Interdisciplinary Applications of Computer Science (CSI))
Open AccessArticle
12 Pages, 549 KB Download PDF

Improved DTC Control Strategy of B12 Inverter Fed BLDC Motor Drives Considering Commutation Torque Dips

Advances in Science, Technology and Engineering Systems Journal, Volume 3, Issue 5, Page # 427–438, 2018; DOI: 10.25046/aj030549
Abstract:

In most industrial high-power applications, the brushless DC (BLDC) motor is connected to multi-level inverters specially the three-level NPC inverters (B12). Torque ripple is a critical issue in BLDC motor drives. Accordingly, minimizing the ripple produced in the torque is necessary to enhance the BLDC motor drive performances. This paper aims to develop two direct…

Read More
(This article belongs to the SP5 (Special Issue on Multidisciplinary Sciences and Engineering 2018) & Section Electrical Engineering (ELE))
Open AccessArticle
6 Pages, 1,080 KB Download PDF

Effect of Various Parameters for Temperature Distribution in Human Body: An Analytic Approach

Advances in Science, Technology and Engineering Systems Journal, Volume 3, Issue 5, Page # 421–426, 2018; DOI: 10.25046/aj030548
Abstract:

This paper is the extension of the work originally presented in 2nd International Conference on Man and Machine Interfacing (MAMI 2017) and the paper of Yue et al. The present study aims at observing the effect of various parameters on temperature distribution profiles at various environmental temperature, tissue thermal conductivities, metabolic rates, blood perfusion rates,…

Read More
(This article belongs to the SP6 (Special Issue on Recent Advances in Engineering Systems 2018-19) & Section Chemical Engineering (ENC))
Open AccessArticle
10 Pages, 2,141 KB Download PDF

A Study on Improving Security and Efficiency using Dynamic Ownership Management in Client-Side Deduplication Environments

Advances in Science, Technology and Engineering Systems Journal, Volume 3, Issue 5, Page # 267–276, 2018; DOI: 10.25046/aj030532
Abstract:

Data deduplication technology is used to improve the spatial efficiency of cloud storage. This technology is used for storing data on a cloud and omitting data uploading if the data are already present. However, various security threats may occur during the deduplication process. These security threats include poison attacks and user identity exposure through ownership.…

Read More
(This article belongs to the SP5 (Special Issue on Multidisciplinary Sciences and Engineering 2018) & Section Interdisciplinary Applications of Computer Science (CSI))
Open AccessArticle
10 Pages, 1,092 KB Download PDF

A Machine Learning Framework Using Distinctive Feature Extraction for Hand Gesture Recognition

Advances in Science, Technology and Engineering Systems Journal, Volume 3, Issue 5, Page # 72–81, 2018; DOI: 10.25046/aj030510
Abstract:

There are more than 7billion people in the world where there are around 500 million people in the world who are denied from normal lifestyle due to physical and mental issue. It is completely fair to say that every person deserves to enjoy a normal lifestyle. While physically and mentally challenged people find suitable way…

Read More
(This article belongs to the SP5 (Special Issue on Multidisciplinary Sciences and Engineering 2018) & Section Interdisciplinary Applications of Computer Science (CSI))
Open AccessArticle
11 Pages, 1,751 KB Download PDF

Interactive Virtual Reality Educational Application

Advances in Science, Technology and Engineering Systems Journal, Volume 3, Issue 4, Page # 72–82, 2018; DOI: 10.25046/aj030409
Abstract:

Virtual Reality (VR) technology has become one of the most advanced techniques that is used currently in many fields. The role of education is extremely important in every society; therefore, it should always be updated to be in line with new technologies and lifestyles. Applying technology in education enhances the way of teaching and learning.…

Read More
(This article belongs to the SP5 (Special Issue on Multidisciplinary Sciences and Engineering 2018) & Section Interdisciplinary Applications of Computer Science (CSI))
Open AccessArticle
8 Pages, 1,233 KB Download PDF

A detailed step-by-step electrical parameters identification method for photovoltaic generators using a combination of two approaches

Advances in Science, Technology and Engineering Systems Journal, Volume 3, Issue 4, Page # 45–52, 2018; DOI: 10.25046/aj030406
Abstract:

The object of this paper is to identify the unknown electrical parameters of solar photovoltaic generators in real time, through the application of a novel suggested hybrid method. The identification process is discussed with details, about the four steps of identification. In this issue, the first step describes the experimental data acquisition work done to…

Read More
(This article belongs to the SP5 (Special Issue on Multidisciplinary Sciences and Engineering 2018) & Section Electrical Engineering (ELE))
Open AccessArticle
12 Pages, 1,665 KB Download PDF

Towards Process Standardization for Requirements Analysis of Agent-Based Systems

Advances in Science, Technology and Engineering Systems Journal, Volume 3, Issue 3, Page # 80–91, 2018; DOI: 10.25046/aj030311
Abstract:

The development of agent-based systems is negatively impacted by the lack of process standardization across the major development phases, such as the requirements analysis phase. This issue creates a key barrier for agent technology stockholders regarding comprehending and analyzing complexity associated with these systems specifications. Instead, such fundamental low-level infrastructure is loosely attended to in…

Read More
(This article belongs to the SP5 (Special Issue on Multidisciplinary Sciences and Engineering 2018) & Section Software Engineering in Computer Science (CSE))
Open AccessArticle
6 Pages, 692 KB Download PDF

What Should Be Considered for Acceptance Mobile Payment: An Investigation of the Factors Affecting of the Intention to Use System Services T-Cash

Advances in Science, Technology and Engineering Systems Journal, Volume 3, Issue 2, Page # 257–262, 2018; DOI: 10.25046/aj030230
Abstract:

E-Money mobile payments, also called digital money, are electronic payments, payment transactions using an Internet network integrated with NFC-enabled smartphones and prepaid cards. In Indonesia not only banks that issue e-money products, telecom operators from Telkomsel also issued an e-money product called T-cash. T-cash is a new innovation of electronic money presented by Telkomsel. The…

Read More
(This article belongs to the SP5 (Special Issue on Multidisciplinary Sciences and Engineering 2018) & Section Interdisciplinary Applications of Computer Science (CSI))
Open AccessArticle
10 Pages, 812 KB Download PDF

A Model for Optimising the Deployment of Cloud-hosted Application Components for Guaranteeing Multitenancy Isolation

Advances in Science, Technology and Engineering Systems Journal, Volume 3, Issue 2, Page # 174–183, 2018; DOI: 10.25046/aj030220
Abstract:

Tenants associated with a cloud-hosted application seek to reduce running costs and minimize resource consumption by sharing components and resources. However, despite the benefits, sharing resources can affect tenant’s access and overall performance if one tenant abruptly experiences a significant workload, particularly if the application fails to accommodate this sudden increase in workload. In cases…

Read More
(This article belongs to the SP4 (Special issue on Advancement in Engineering Technology 2017-18) & Section Interdisciplinary Applications of Computer Science (CSI))
Open AccessArticle
9 Pages, 1,662 KB Download PDF

An Advanced Algorithm Combining SVM and ANN Classifiers to Categorize Tumor with Position from Brain MRI Images

Advances in Science, Technology and Engineering Systems Journal, Volume 3, Issue 2, Page # 40–48, 2018; DOI: 10.25046/aj030205
Abstract:

Brain tumor is such an abnormality of brain tissue that causes brain hemorrhage. Therefore, apposite detections of brain tumor, its size, and position are the foremost condition for the remedy. To obtain better performance in brain tumor and its stages detection as well as its position in MRI images, this research work proposes an advanced…

Read More
(This article belongs to the SP4 (Special issue on Advancement in Engineering Technology 2017-18) & Section Artificial Intelligence in Computer Science (CAI))
Open AccessArticle
12 Pages, 931 KB Download PDF

Software and Hardware Enhancement of Convolutional Neural Networks on GPGPUs

Advances in Science, Technology and Engineering Systems Journal, Volume 3, Issue 2, Page # 28–39, 2018; DOI: 10.25046/aj030204
Abstract:

Convolutional Neural Networks (CNNs) have gained attention in recent years for their ability to perform complex machine learning tasks with high accuracy and resilient to noise of inputs. The time-consuming convolution operations of CNNs pose great challenges to both software as well as hardware designers. To achieve superior performance, a design involves careful concerns between…

Read More
(This article belongs to the SP4 (Special issue on Advancement in Engineering Technology 2017-18) & Section Software Engineering in Computer Science (CSE))
Open AccessArticle
10 Pages, 344 KB Download PDF

A Joint Safety and Security Analysis of message protection for CAN bus protocol

Advances in Science, Technology and Engineering Systems Journal, Volume 3, Issue 1, Page # 384–393, 2018; DOI: 10.25046/aj030147
Abstract:

One of the prominent challenges of the automotive-transportation system is represented by the integration of security and safety properties within protocols, applications and connectivity mechanisms. A joint safety/security design can sometimes expose to trade-offs, since their requirements may not match perfectly or even be incompatible. This paper analyses an example of security and safety design,…

Read More
(This article belongs to the SP4 (Special issue on Advancement in Engineering Technology 2017-18) & Section Information Systems in Computer Science (CIS))
Open AccessArticle
13 Pages, 1,436 KB Download PDF

The Use of LMS AMESim in the Fault Diagnosis of a Commercial PEM Fuel Cell System

Advances in Science, Technology and Engineering Systems Journal, Volume 3, Issue 1, Page # 297–309, 2018; DOI: 10.25046/aj030136
Abstract:

The world’s pollution rates have been increasing exponentially due to the many reckless lifestyle practices of human beings as well as their choices of contaminating power sources. Eventually, this lead to a worldwide awareness on the risks of those power sources, and in turn, a movement towards the exploration and deployment of several green technologies…

Read More
(This article belongs to the SP4 (Special issue on Advancement in Engineering Technology 2017-18) & Section Electrical Engineering (ELE))
Open AccessArticle
7 Pages, 1,166 KB Download PDF

Impact of Line Resistance Combined with Device Variability on Resistive RAM Memories

Advances in Science, Technology and Engineering Systems Journal, Volume 3, Issue 1, Page # 11–17, 2018; DOI: 10.25046/aj030102
Abstract:

In this paper, the performance and reliability of oxide-based Resistive RAM (ReRAM) memory is investigated in a 28nm FDSOI technology versus interconnects resistivity combined with device variability. Indeed, common problems with ReRAM are related to high variability in operating conditions and low yield. At a cell level ReRAMs suffer from variability. At an array level,…

Read More
(This article belongs to the SP4 (Special issue on Advancement in Engineering Technology 2017-18) & Section Electronic Engineering (EEE))

Journal Menu

Journal Browser


Special Issues

Special Issue on Digital Frontiers of Entrepreneurship: Integrating AI, Gender Equity, and Sustainable Futures
Guest Editors: Dr. Muhammad Nawaz Tunio, Dr. Aamir Rashid, Dr. Imamuddin Khoso
Deadline: 30 May 2026

Special Issue on Sustainable Technologies for a Resilient Future
Guest Editors: Dr. Debasis Mitra, Dr. Sourav Chattaraj, Dr. Addisu Assefa
Deadline: 30 April 2026