Search Results

Results (187)

Search Parameters:

Keyword: Features
Order results
Results per page
Open AccessArticle
6 Pages, 930 KB Download PDF

Support Vector Machine based Vehicle Make and Model Recognition System

Advances in Science, Technology and Engineering Systems Journal, Volume 2, Issue 3, Page # 1080–1085, 2017; DOI: 10.25046/aj0203137
Abstract:

Vehicle analysis is a very useful component in various real world applications. In this paper, we have developed a Vehicle Make and Model Recognition (VMMR) system using Support Vector Machine (SVM). Scale Invariant Feature Transform (SIFT) and Speed-Up Robust Transform (SURF) are used to extract local features from an image. Bag-of-Features (BoF) model is used…

Read More
(This article belongs to the SP3 (Special issue on Recent Advances in Engineering Systems 2017) & Section Interdisciplinary Applications of Computer Science (CSI))
Open AccessArticle
5 Pages, 824 KB Download PDF

Computer Tomography from Micro-Electronics to Assembled Products

Advances in Science, Technology and Engineering Systems Journal, Volume 2, Issue 3, Page # 932–936, 2017; DOI: 10.25046/aj0203117
Abstract:

Traditional CT in our industry has been limited to Business card sized samples, due to the Cone Beam x-ray systems used by Electronics manufacturing companies. Inclined or Partial CT provides a slightly different solution showing layers or slices in 2D very well, but due to the partial nature of the scans does not produce very…

Read More
(This article belongs to the SP3 (Special issue on Recent Advances in Engineering Systems 2017) & Section Electronic Engineering (EEE))
Open AccessArticle
10 Pages, 2,431 KB Download PDF

A novel model for Time-Series Data Clustering Based on piecewise SVD and BIRCH for Stock Data Analysis on Hadoop Platform

Advances in Science, Technology and Engineering Systems Journal, Volume 2, Issue 3, Page # 855–864, 2017; DOI: 10.25046/aj0203106
Abstract:

With the rapid growth of financial markets, analyzers are paying more attention on predictions. Stock data are time series data, with huge amounts. Feasible solution for handling the increasing amount of data is to use a cluster for parallel processing, and Hadoop parallel computing platform is a typical representative. There are various statistical models for…

Read More
(This article belongs to the SP3 (Special issue on Recent Advances in Engineering Systems 2017) & Section Interdisciplinary Applications of Computer Science (CSI))
Open AccessArticle
8 Pages, 1,031 KB Download PDF

Self-Organizing Map based Feature Learning in Bio-Signal Processing

Advances in Science, Technology and Engineering Systems Journal, Volume 2, Issue 3, Page # 505–512, 2017; DOI: 10.25046/aj020365
Abstract:

Feature extraction is playing a significant role in bio-signal processing. Feature identification and selection has two approaches. The standard method is engineering handcraft which is based on user experience and application area. While the other approach is feature learning that based on making the system identify and select the best features suit the application. The…

Read More
(This article belongs to the SP3 (Special issue on Recent Advances in Engineering Systems 2017) & Section Biomedical Engineering (EBI))
Open AccessArticle
7 Pages, 1,776 KB Download PDF

A Highly-Secured Arithmetic Hiding cum Look-Up Table (AHLUT) based S-Box for AES-128 Implementation

Advances in Science, Technology and Engineering Systems Journal, Volume 2, Issue 3, Page # 420–426, 2017; DOI: 10.25046/aj020354
Abstract:

Side-Channel Attack (SCA) is an effective method in extracting the secret key of cryptographic algorithms by correlating the physical leakage information with the processed data. In this paper, we propose an arithmetic hiding cum Look-up Table (AHLUT) based Substitution-Box (S-Box) in AES-128 cryptographic algorithm implementation to countermeasure against SCA. There are three key features in…

Read More
(This article belongs to the SP3 (Special issue on Recent Advances in Engineering Systems 2017) & Section Cybernetics in Computer Science (CCY))
Open AccessArticle
8 Pages, 1,047 KB Download PDF

Computational Intelligence Methods for Identifying Voltage Sag in Smart Grid

Advances in Science, Technology and Engineering Systems Journal, Volume 2, Issue 3, Page # 412–419, 2017; DOI: 10.25046/aj020353
Abstract:

In recent years pattern recognition of power quality (PQ) disturbances in smart grids has developed into crucial topic for system equipments and end-users. Undoubtedly analyzing the PQ disturbances develop and maintain smart grids effectiveness. Voltage sags are the most common events that affect power quality. These faults are also the most costly. This paper represents…

Read More
(This article belongs to the SP3 (Special issue on Recent Advances in Engineering Systems 2017) & Section Electrical Engineering (ELE))
Open AccessArticle
5 Pages, 1,002 KB Download PDF

Assessment of the usefulness and appeal of stigma-stop by psychology students: a serious game designed to reduce the stigma of mental illness

Advances in Science, Technology and Engineering Systems Journal, Volume 2, Issue 3, Page # 186–190, 2017; DOI: 10.25046/aj020324
Abstract:

The present work describes the first serious game designed to reduce the stigma among students towards mental health problems. The game is called Stigma-Stop, and it features characters who suffer from various mental disorders. Players are provided with information about different mental illnesses, and they are presented with several options on how to act when…

Read More
(This article belongs to the SP3 (Special issue on Recent Advances in Engineering Systems 2017) & Section Interdisciplinary Applications of Computer Science (CSI))
Open AccessArticle
12 Pages, 2,619 KB Download PDF

Deep venous thrombus characterization: ultrasonography, elastography and scattering operator

Advances in Science, Technology and Engineering Systems Journal, Volume 2, Issue 3, Page # 48–59, 2017; DOI: 10.25046/aj020308
Abstract:

A thrombus or a blood clot is the result of blood coagulation which is a natural process to prevent bleeding. An inappropriate formation of a thrombus in a deep vein is known as Deep Venous Thrombosis (DVT). The main complication of a DVT is a Pulmonary Embolism (PE) which occurs when a thrombus breaks loose…

Read More
(This article belongs to the SP3 (Special issue on Recent Advances in Engineering Systems 2017) & Section Radiology (RIO))
Open AccessArticle
8 Pages, 1,454 KB Download PDF

Proposal of a congestion control technique in LAN networks using an econometric model ARIMA

Advances in Science, Technology and Engineering Systems Journal, Volume 2, Issue 1, Page # 269–276, 2017; DOI: 10.25046/aj020133
Abstract:

Hasty software development can produce immediate implementations with source code unnecessarily complex and hardly readable. These small kinds of software decay generate a technical debt that could be big enough to seriously affect future maintenance activities. This work presents an analysis technique for identifying architectural technical debt related to non-uniformity of naming patterns; the technique…

Read More
(This article belongs to the SP2 (Special Issue on Computer Systems, Information Technology, Electrical and Electronics Engineering 2017) & Section Telecommunications (TEL))
Open AccessArticle
7 Pages, 810 KB Download PDF

Using Naming Patterns for Identifying Architectural Technical Debt

Advances in Science, Technology and Engineering Systems Journal, Volume 2, Issue 1, Page # 248–254, 2017; DOI: 10.25046/aj020130
Abstract:

Hasty software development can produce immediate implementations with source code unnecessarily complex and hardly readable. These small kinds of software decay generate a technical debt that could be big enough to seriously affect future maintenance activities. This work presents an analysis technique for identifying architectural technical debt related to non-uniformity of naming patterns; the technique…

Read More
(This article belongs to the SP2 (Special Issue on Computer Systems, Information Technology, Electrical and Electronics Engineering 2017) & Section Software Engineering in Computer Science (CSE))
Open AccessArticle
11 Pages, 872 KB Download PDF

Cross layers security approach via an implementation of data privacy and by authentication mechanism for mobile WSNs

Advances in Science, Technology and Engineering Systems Journal, Volume 2, Issue 1, Page # 97–107, 2017; DOI: 10.25046/aj020112
Abstract:

To implement a new secure network with high mobility and low energy consumption, we use smart sensors. These sensors are powered by micro batteries generally non rechargeable. So, to extend their lifetime, it is necessary to implement new energy conservation techniques. Existing works separate the two features (security, energy conservation) and are interested specifically in…

Read More
(This article belongs to the SP2 (Special Issue on Computer Systems, Information Technology, Electrical and Electronics Engineering 2017) & Section Network Engineering (ENW))
Open AccessArticle
6 Pages, 734 KB Download PDF

Strong Authentication Protocol based on Java Crypto Chip as a Secure Element

Advances in Science, Technology and Engineering Systems Journal, Volume 1, Issue 5, Page # 21–26, 2016; DOI: 10.25046/aj010505
Abstract:

Smart electronic devices and gadgets and their applications are becoming more and more popular. Most of those devices and their applications handle personal, financial, medical and other sensitive data that require security and privacy protection. In this paper we describe one aspect of such protection – user authentication protocol based on the use of X.509…

Read More
(This article belongs to the Special issue on Recent Advances in Electrical and Electronics Engineering 2016 & Section Cybernetics in Computer Science (CCY))
1 6 7 8

Journal Menu

Journal Browser


Special Issues

Special Issue on Digital Frontiers of Entrepreneurship: Integrating AI, Gender Equity, and Sustainable Futures
Guest Editors: Dr. Muhammad Nawaz Tunio, Dr. Aamir Rashid, Dr. Imamuddin Khoso
Deadline: 30 May 2026

Special Issue on Sustainable Technologies for a Resilient Future
Guest Editors: Dr. Debasis Mitra, Dr. Sourav Chattaraj, Dr. Addisu Assefa
Deadline: 30 April 2026