Search Results

Results (222)

Search Parameters:

Keyword: Frame
Order results
Results per page
Open AccessArticle
10 Pages, 4,698 KB Download PDF

Monocular Height Estimation Method with 3 Degree-Of-Freedom Compensation of Road Unevennesses

Advances in Science, Technology and Engineering Systems Journal, Volume 2, Issue 3, Page # 1443–1452, 2017; DOI: 10.25046/aj0203180
Abstract:

Height estimation of objects is a valuable information for locomotion of autonomous robots and vehicles. Even though several sensors such as stereo cameras have been applied in these systems, cost and processing time have been motivating solutions with monocular cameras. This research proposes two new methods: i) height estimation of objects using only a monocular…

Read More
(This article belongs to the SP3 (Special issue on Recent Advances in Engineering Systems 2017) & Section Interdisciplinary Applications of Computer Science (CSI))
Open AccessArticle
11 Pages, 945 KB Download PDF

Radiation Hybrid Mapping: A Resampling-based Method for Building High-Resolution Maps

Advances in Science, Technology and Engineering Systems Journal, Volume 2, Issue 3, Page # 1390–1400, 2017; DOI: 10.25046/aj0203175
Abstract:

Abstract— The process of mapping large numbers of markers is computationally complex, as the increase of numbers of markers results in an exponential increase in the mapping runtime. Also, having unreliable markers in the dataset adds more complexity to the mapping process. In this research, we have addressed these two issues and proposed our solution.…

Read More
(This article belongs to the SP3 (Special issue on Recent Advances in Engineering Systems 2017) & Section Artificial Intelligence in Computer Science (CAI))
Open AccessArticle
8 Pages, 445 KB Download PDF

Towards Deployment Strategies for Deception Systems

Advances in Science, Technology and Engineering Systems Journal, Volume 2, Issue 3, Page # 1272–1279, 2017; DOI: 10.25046/aj0203161
Abstract:

Network security is often built on perimeter defense. Sophisticated attacks are able to penetrate the perimeter and access valuable resources in the network. A more complete defense strategy also contains mechanisms to detect and mitigate perimeter breaches. Deceptive systems are a promising technology to detect, deceive and counter infiltration. In this work we provide an…

Read More
(This article belongs to the SP3 (Special issue on Recent Advances in Engineering Systems 2017) & Section Information Systems in Computer Science (CIS))
Open AccessArticle
4 Pages, 673 KB Download PDF

Efficient Tensor Strategy for Recommendation

Advances in Science, Technology and Engineering Systems Journal, Volume 2, Issue 4, Page # 111–114, 2017; DOI: 10.25046/aj020415
Abstract:

The era of big data has witnessed the explosion of tensor datasets, and large scale Probabilistic Tensor Factorization (PTF) analysis is important to accommodate such increasing trend of data. Sparsity, and Cold-Start are some of the inherent problems of recommender systems in the era of big data. This paper proposes a novel Sentiment-Based Probabilistic Tensor…

Read More
(This article belongs to Section Information Systems in Computer Science (CIS))
Open AccessArticle
7 Pages, 591 KB Download PDF

Face Recognition and Tracking in Videos

Advances in Science, Technology and Engineering Systems Journal, Volume 2, Issue 3, Page # 1238–1244, 2017; DOI: 10.25046/aj0203156
Abstract:

Advancement in computer vision technology and availability of video capturing devices such as surveillance cameras has evoked new video processing applications. The research in video face recognition is mostly biased towards law enforcement applications. Applications involves human recognition based on face and iris, human computer interaction, behavior analysis, video surveillance etc. This paper presents face…

Read More
(This article belongs to the SP3 (Special issue on Recent Advances in Engineering Systems 2017) & Section Interdisciplinary Applications of Computer Science (CSI))
Open AccessArticle
9 Pages, 2,162 KB Download PDF

Recognition and Position Estimation for Multiple Labware Transportation Using Kinect V2 and Mobile Robots

Advances in Science, Technology and Engineering Systems Journal, Volume 2, Issue 3, Page # 1218–1226, 2017; DOI: 10.25046/aj0203154
Abstract:

Mobile robots can be used to perform transportation tasks for different objects. These tasks have to be implemented carefully. Therefore, an accurate approach for object recognition and position estimation is required. This work presents a concept for identification and position estimation of multiple labware. These labware, which contain chemical and biological components, have to be…

Read More
(This article belongs to the SP3 (Special issue on Recent Advances in Engineering Systems 2017) & Section Robotics (ROB))
Open AccessArticle
9 Pages, 781 KB Download PDF

Improving the Performance of Fair Scheduler in Hadoop

Advances in Science, Technology and Engineering Systems Journal, Volume 2, Issue 3, Page # 1050–1058, 2017; DOI: 10.25046/aj0203133
Abstract:

Cloud computing is a power platform to deal with big data. Among several software frameworks used for the construction of cloud computing systems, Apache Hadoop, which is an open-source software, becomes a popular one. Hadoop supports for distributed data storage and the process of large data sets on computer clusters based on a MapReduce parallel…

Read More
(This article belongs to the SP3 (Special issue on Recent Advances in Engineering Systems 2017) & Section Information Systems in Computer Science (CIS))
Open AccessArticle
9 Pages, 5,748 KB Download PDF

Template-like Tensor Domain Operations to Enhancing Diffusion Datasets Quality

Advances in Science, Technology and Engineering Systems Journal, Volume 2, Issue 3, Page # 987–995, 2017; DOI: 10.25046/aj0203125
Abstract:

Diffusion MRI-based tractography, which is built by connecting the principal components of the estimated water diffusion pattern, is used to elucidate neuronal connectivity. However, the anatomical accuracy of the method is affected by factors such as noise and imaging misalignments. In this manuscript, we present a method to clean diffusion datasets by rotating the diffusion…

Read More
(This article belongs to the SP3 (Special issue on Recent Advances in Engineering Systems 2017) & Section Artificial Intelligence in Computer Science (CAI))
Open AccessArticle
7 Pages, 803 KB Download PDF

Network Intrusion Detection System using Apache Storm

Advances in Science, Technology and Engineering Systems Journal, Volume 2, Issue 3, Page # 812–818, 2017; DOI: 10.25046/aj0203102
Abstract:

Network security implements various strategies for the identification and prevention of security breaches. Network intrusion detection is a critical component of network management for security, quality of service and other purposes. These systems allow early detection of network intrusion and malicious activities; so that the Network Security infrastructure can react to mitigate these threats. Various…

Read More
(This article belongs to the SP3 (Special issue on Recent Advances in Engineering Systems 2017) & Section Information Systems in Computer Science (CIS))
Open AccessArticle
7 Pages, 1,287 KB Download PDF

Moving Towards Reliability-Centred Management of Energy, Power and Transportation Assets

Advances in Science, Technology and Engineering Systems Journal, Volume 2, Issue 3, Page # 369–375, 2017; DOI: 10.25046/aj020347
Abstract:

Infrastructure Asset Management was first adopted in 1980s for challenges faced by the utilities, road and rail transport systems, mining, process and manufacturing industries in asset life cycle value optimization. International standards ISO 55000 and PAS 55 were subsequently developed to provide a basis for a structured methodology in the development of Asset Management System.…

Read More
(This article belongs to the SP3 (Special issue on Recent Advances in Engineering Systems 2017) & Section Information Systems in Computer Science (CIS))
Open AccessArticle
6 Pages, 1,103 KB Download PDF

Real Time Advanced Clustering System

Advances in Science, Technology and Engineering Systems Journal, Volume 2, Issue 3, Page # 321–326, 2017; DOI: 10.25046/aj020341
Abstract:

This paper describes a system to gather information from a stationary camera to identify moving objects. The proposed solution makes only use of motion vectors between adjacent frames, obtained from any algorithm. Starting from them, the system is able to retrieve clusters of moving objects in a scene acquired by an image sensor device. Since…

Read More
(This article belongs to the SP3 (Special issue on Recent Advances in Engineering Systems 2017) & Section Interdisciplinary Applications of Computer Science (CSI))
Open AccessArticle
14 Pages, 714 KB Download PDF

Validity and efficiency of conformal anomaly detection on big distributed data

Advances in Science, Technology and Engineering Systems Journal, Volume 2, Issue 3, Page # 254–267, 2017; DOI: 10.25046/aj020335
Abstract:

Conformal Prediction is a recently developed framework for reliable confident predictions. In this work we discuss its possible application to big data coming from different, possibly heterogeneous data sources. On example of anomaly detection problem, we study the question of saving validity of Conformal Prediction in this case. We show that the straight forward averaging…

Read More
(This article belongs to the SP3 (Special issue on Recent Advances in Engineering Systems 2017) & Section Information Systems in Computer Science (CIS))
Open AccessArticle
12 Pages, 1,778 KB Download PDF

ADOxx Modelling Method Conceptualization Environment

Advances in Science, Technology and Engineering Systems Journal, Volume 2, Issue 3, Page # 125–136, 2017; DOI: 10.25046/aj020317
Abstract:

The importance of Modelling Methods Engineering is equally rising with the importance of domain specific languages (DSL) and individual modelling approaches. In order to capture the relevant semantic primitives for a particular domain, it is necessary to involve both, (a) domain experts, who identify relevant concepts as well as (b) method engineers who compose a…

Read More
(This article belongs to the SP3 (Special issue on Recent Advances in Engineering Systems 2017) & Section Interdisciplinary Applications of Computer Science (CSI))
Open AccessArticle
7 Pages, 2,518 KB Download PDF

Improving customs’ border control by creating a reference database of cargo inspection X-ray images

Advances in Science, Technology and Engineering Systems Journal, Volume 2, Issue 3, Page # 60–66, 2017; DOI: 10.25046/aj020309
Abstract:

Countries’ effective and efficient border security is becoming increasingly important in today’s global world of economy and trade. To ensure these, customs organisations are responsible for the prevention of illicit goods’ transportation across borders, particularly upon entry. The predicament of the customs administrations will soon be aggravated by both the increase of global trade and…

Read More
(This article belongs to the SP3 (Special issue on Recent Advances in Engineering Systems 2017) & Section Remote Sensing (RMS))
Open AccessArticle
12 Pages, 1,124 KB Download PDF

Applications of Case Based Organizational Memory Supported by the PAbMM Architecture

Advances in Science, Technology and Engineering Systems Journal, Volume 2, Issue 3, Page # 12–23, 2017; DOI: 10.25046/aj020303
Abstract:

In the aim to manage and retrieve the organizational knowledge, in the last years numerous proposals of models and tools for knowledge management and knowledge representation have arisen. However, most of them store knowledge in a non-structured or semi-structured way, hindering the semantic and automatic processing of this knowledge. In this paper we present a…

Read More
(This article belongs to the SP3 (Special issue on Recent Advances in Engineering Systems 2017) & Section Artificial Intelligence in Computer Science (CAI))
Open AccessArticle
4 Pages, 655 KB Download PDF

A Clinical Review of Zika Virus (ZIKAV)

Advances in Science, Technology and Engineering Systems Journal, Volume 2, Issue 2, Page # 7–10, 2017; DOI: 10.25046/aj020202
Abstract:

Zika virus (ZIKAV) is a flavi-virus, first isolated in 1947 in the Zika Forest of Uganda. ZIKAV is a positive-sense single-stranded RNA virus. ZIKAV is made up of two noncoding regions (5′ and 3′ ) that verge an open reading frame, which put into code a polyprotein smote into the capsid, precursor of membrane, envelope,…

Read More
(This article belongs to Section Virology (VIR))
Open AccessArticle
8 Pages, 345 KB Download PDF

Power-Energy Simulation for Multi-Core Processors in Bench-marking

Advances in Science, Technology and Engineering Systems Journal, Volume 2, Issue 1, Page # 255–262, 2017; DOI: 10.25046/aj020131
Abstract:

At Microarchitectural level, multi-core processor, as a complex System on Chip, has sophisticated on-chip components including cores, shared caches, interconnects and system controllers such as memory and ethernet controllers. At technological level, architects should consider the device types forecast in the International Technology Roadmap for Semiconductors (ITRS). Energy simulation enables architects to study two important…

Read More
(This article belongs to the SP2 (Special Issue on Computer Systems, Information Technology, Electrical and Electronics Engineering 2017) & Section Hardware & Architecture in Computer Science (CHA))
Open AccessArticle
8 Pages, 719 KB Download PDF

Semantic modeling of portfolio assessment in e-learning environment

Advances in Science, Technology and Engineering Systems Journal, Volume 2, Issue 1, Page # 149–156, 2017; DOI: 10.25046/aj020117
Abstract:

In learning environment, portfolio is used as a tool to keep track of learner’s progress. Particularly, when it comes to e-learning, continuous assessment allows greater customization and efficiency in learning process and prevents students lost interest in their study. Also, each student has his own characteristics and learning skills that must be taken into account…

Read More
(This article belongs to the SP2 (Special Issue on Computer Systems, Information Technology, Electrical and Electronics Engineering 2017) & Section Education (EDU))
Open AccessArticle
13 Pages, 887 KB Download PDF

Mobi-Sim: An Emulation and Prototyping Platform for Protocols Validation of Mobile Wireless Sensors Networks

Advances in Science, Technology and Engineering Systems Journal, Volume 2, Issue 1, Page # 108–120, 2017; DOI: 10.25046/aj020113
Abstract:

The objective of this paper is to provide a new simulator framework for mobile WSN that emulate a sensor node at a laptop i.e. the laptop will model and replace a sensor node within a network. This platform can implement di?erent WSN routing protocols to simulate and validate new developed protocols in terms of energy…

Read More
(This article belongs to the SP2 (Special Issue on Computer Systems, Information Technology, Electrical and Electronics Engineering 2017) & Section Network Engineering (ENW))
Open AccessArticle
7 Pages, 916 KB Download PDF

Configuration/Infrastructure-aware testing of MapReduce programs

Advances in Science, Technology and Engineering Systems Journal, Volume 2, Issue 1, Page # 90–96, 2017; DOI: 10.25046/aj020111
Abstract:

The implemented programs in the MapReduce processing model are focused in the analysis of large volume of data in a distributed and parallel architecture. This architecture is automatically managed by the framework, so the developer could be focused in the program functionality regardless of infrastructure failures or resource allocation. However, the infrastructure state can cause…

Read More
(This article belongs to the SP2 (Special Issue on Computer Systems, Information Technology, Electrical and Electronics Engineering 2017) & Section Software Engineering in Computer Science (CSE))
Open AccessArticle
12 Pages, 1,017 KB Download PDF

A Novel Approach for Designing Mobile Native Apps

Advances in Science, Technology and Engineering Systems Journal, Volume 2, Issue 1, Page # 57–68, 2017; DOI: 10.25046/aj020107
Abstract:

Mobile devices are differed from desktop based systems in terms of particular execution environment, constrained resources, and high mobility requirement. To overcome these shortcomings, various agile based methodologies are developed for native mobile applications such as Mobile-D, Scrum etc. These agile techniques are based on various phases and these phases begin from exploring, initializing and…

Read More
(This article belongs to the SP2 (Special Issue on Computer Systems, Information Technology, Electrical and Electronics Engineering 2017) & Section Software Engineering in Computer Science (CSE))
Open AccessArticle
19 Pages, 1,833 KB Download PDF

Operational Efficiencies and Simulated Performance of Big Data Analytics Platform over Billions of Patient Records of a Hospital System

Advances in Science, Technology and Engineering Systems Journal, Volume 2, Issue 1, Page # 23–41, 2017; DOI: 10.25046/aj020104
Abstract:

Big Data Analytics (BDA) is important to utilize data from hospital systems to reduce healthcare costs. BDA enable queries of large volumes of patient data in an interactively dynamic way for healthcare. The study objective was high performance establishment of interactive BDA platform of hospital system. A Hadoop/MapReduce framework was established at University of Victoria…

Read More
(This article belongs to the SP2 (Special Issue on Computer Systems, Information Technology, Electrical and Electronics Engineering 2017) & Section Applied Mathematics (MAP))
1 7 8 9

Journal Menu

Journal Browser


Special Issues

Special Issue on Digital Frontiers of Entrepreneurship: Integrating AI, Gender Equity, and Sustainable Futures
Guest Editors: Dr. Muhammad Nawaz Tunio, Dr. Aamir Rashid, Dr. Imamuddin Khoso
Deadline: 30 May 2026

Special Issue on Sustainable Technologies for a Resilient Future
Guest Editors: Dr. Debasis Mitra, Dr. Sourav Chattaraj, Dr. Addisu Assefa
Deadline: 30 April 2026