Search Results

Results (14)

Search Parameters:

Keyword: Open source
Order results
Results per page
Open AccessArticle
13 Pages, 9,801 KB Download PDF

Design of an Open Source Anthropomorphic Robotic Hand for Telepresence Robot

Advances in Science, Technology and Engineering Systems Journal, Volume 8, Issue 1, Page # 17–29, 2023; DOI: 10.25046/aj080103
Abstract:

Most anthropomorphic robotic hands use a lot of actuators to imitate the number of joints and the movement of the human hand. As a result, the forearm of the robot hand has a large size for the installation of all actuators. This robot hand is designed to reduce the number of actuators, but also retain…

Read More
(This article belongs to the SP14 (Special Issue on Computing, Engineering and Multidisciplinary Sciences 2022-23) & Section Robotics (ROB))
Open AccessArticle
6 Pages, 637 KB Download PDF

Source Code Vulnerabilities in IoT Software Systems

Advances in Science, Technology and Engineering Systems Journal, Volume 2, Issue 3, Page # 1502–1507, 2017; DOI: 10.25046/aj0203188
Abstract:

An empirical study that examines the usage of known vulnerable statements in software systems developed in C/C++ and used for IoT is presented. The study is conducted on 18 open source systems comprised of millions of lines of code and containing thousands of files. Static analysis methods are applied to each system to determine the…

Read More
(This article belongs to the SP3 (Special issue on Recent Advances in Engineering Systems 2017) & Section Information Systems in Computer Science (CIS))
Open AccessArticle
7 Pages, 632 KB Download PDF

TETRA™ Techniques to Assess and Manage the Software Technical Debt

Advances in Science, Technology and Engineering Systems Journal, Volume 6, Issue 5, Page # 303–309, 2021; DOI: 10.25046/aj060534
Abstract:

The paper examines the company’s proprietary means for determining the quality of a software product and measuring its technical debt. The paper’s authors explain how a software product’s quality is directly correlated with the amount of varying technical debts that the end-users receive. All debts can be paid, and technical debt is no exception: one…

Read More
(This article belongs to Section Automation & Control Systems (ACS))
Open AccessArticle
9 Pages, 2,164 KB Download PDF

Survey of Agent-Based Simulations for Modelling COVID-19 Pandemic

Advances in Science, Technology and Engineering Systems Journal, Volume 6, Issue 2, Page # 439–447, 2021; DOI: 10.25046/aj060250
Abstract:

On the 11th of March 2020, the World Health Organization (WHO) declared COVID-19 as a pandemic. Part of controlling measures of the pandemic is to understand the disease’s trajectories. There are several possible interventions that can prevent and control its spread. Determining an optimal strategy is critical for policymakers to understand the impact of different…

Read More
(This article belongs to Section Theory & Methods in Computer Science (CTM))
Open AccessArticle
14 Pages, 606 KB Download PDF

A Large Empirical Study on Automatically Classifying Software Maintainability Concerns from Issue Summaries

Advances in Science, Technology and Engineering Systems Journal, Volume 6, Issue 2, Page # 161–174, 2021; DOI: 10.25046/aj060219
Abstract:

Software maintenance contributes the majority of software system life cycle costs. However, existing approaches with automated code analysis are limited by accuracy and scope. Using human-assessed methods or implementing quality standards are more comprehensive alternatives, but they are much more costly for smaller organizations, especially in open- source software projects. Instead, bugs are generally used…

Read More
(This article belongs to the SP10 (Special Issue on Multidisciplinary Sciences and Engineering 2020-21) & Section Information Systems in Computer Science (CIS))
Open AccessArticle
6 Pages, 881 KB Download PDF

Recommendation System for SmartMart-A Virtual Supermarket

Advances in Science, Technology and Engineering Systems Journal, Volume 5, Issue 6, Page # 1408–1413, 2020; DOI: 10.25046/aj0506170
Abstract:

The current online shopping system does not provide the actual shopping experience to the users where they scroll through the web pages and select an item to purchase, which becomes monotonous soon and lacks the shopping experience. This paper describes the development of the SmartMart, a 3D shopping mart where the user can navigate around…

Read More
(This article belongs to Section Information Systems in Computer Science (CIS))
Open AccessArticle
5 Pages, 2,229 KB Download PDF

Intelligent Wireless System for PV Supervision Based on The Raspberry Pi

Advances in Science, Technology and Engineering Systems Journal, Volume 4, Issue 6, Page # 94–98, 2019; DOI: 10.25046/aj040611
Abstract:

Photovoltaic systems and monitoring go hand in hand. There is no better way to check the health of your photovoltaic system than to utilize a remote monitoring system. Monitoring and tracking of photovoltaic systems are crucial for reliable functioning and optimal yield of any solar electric system. This paper aims to introduce a remote electronic…

Read More
(This article belongs to the isaect-18 (Special Issue on Advanced Electrical and Communication Technologies 2019) & Section Green & Sustainable Science & Technology (GSS))
Open AccessArticle
11 Pages, 1,239 KB Download PDF

ITSM Software Ranking for Small Medium Enterprises Based on ITIL V3 Quick Win Criteria using Fuzzy SIR Method

Advances in Science, Technology and Engineering Systems Journal, Volume 4, Issue 2, Page # 288–298, 2019; DOI: 10.25046/aj040237
Abstract:

There are various software related to the implementation of IT Service Management (ITSM) for a company, including those that are open source and commercial. An input is needed for companies in determining what software to choose from various software, especially for small and medium enterprises (SMEs) that have limited human and financial resources. In this…

Read More
(This article belongs to Section Interdisciplinary Applications of Computer Science (CSI))
Open AccessArticle
5 Pages, 744 KB Download PDF

Virtual Memory Introspection Framework for Cyber Threat Detection in Virtual Environment

Advances in Science, Technology and Engineering Systems Journal, Volume 3, Issue 1, Page # 25–29, 2018; DOI: 10.25046/aj030104
Abstract:

In today’s information based world, it is increasingly important to safeguard the data owned by any organization, be it intellectual property or personal information. With ever increasing sophistication of malware, it is imperative to come up with an automated and advanced methods of attack vector recognition and isolation. Existing methods are not dynamic enough to…

Read More
(This article belongs to the SP4 (Special issue on Advancement in Engineering Technology 2017-18) & Section Interdisciplinary Applications of Computer Science (CSI))
Open AccessArticle
12 Pages, 2,878 KB Download PDF

Clean Energy Use for Cloud Computing Federation Workloads

Advances in Science, Technology and Engineering Systems Journal, Volume 2, Issue 6, Page # 1–12, 2017; DOI: 10.25046/aj020601
Abstract:

Cloud providers seek to maximize their market share. Traditionally, they deploy datacenters with sufficient capacity to accommodate their entire computing demand while maintaining geographical affinity to its customers. Achieving these goals by a single cloud provider is increasingly unrealistic from a cost of ownership perspective. Moreover, the carbon emissions from underutilized datacenters place an increasing…

Read More
(This article belongs to the SP4 (Special issue on Advancement in Engineering Technology 2017-18) & Section Interdisciplinary Applications of Computer Science (CSI))
Open AccessArticle
7 Pages, 1,237 KB Download PDF

3D Senor-based Library Navigation System

Advances in Science, Technology and Engineering Systems Journal, Volume 2, Issue 3, Page # 967–973, 2017; DOI: 10.25046/aj0203122
Abstract:

The discussed system in this paper uses the Kinect’s 3D input (acquired through IR projector and Camera) to detect gestures and then based on these gestures perform certain tasks, and display certain results on an output screen. The programming language used here is the Processing open source software and a database was implemented to manage…

Read More
(This article belongs to the SP3 (Special issue on Recent Advances in Engineering Systems 2017) & Section Interdisciplinary Applications of Computer Science (CSI))
Open AccessArticle
14 Pages, 918 KB Download PDF

The main characteristics of five distributed file systems required for big data: A comparative study

Advances in Science, Technology and Engineering Systems Journal, Volume 2, Issue 4, Page # 78–91, 2017; DOI: 10.25046/aj020411
Abstract:

These last years, the amount of data generated by information systems has exploded. It is not only the quantities of information that are now estimated in Exabyte, but also the variety of these data which is more and more structurally heterogeneous and the velocity of generation of these data which can be compared in many…

Read More
(This article belongs to Section Software Engineering in Computer Science (CSE))
Open AccessArticle
7 Pages, 1,543 KB Download PDF

Kinect-Based Moving Human Tracking System with Obstacle Avoidance

Advances in Science, Technology and Engineering Systems Journal, Volume 2, Issue 3, Page # 191–197, 2017; DOI: 10.25046/aj020325
Abstract:

This paper is an extension of work originally presented and published in IEEE International Multidisciplinary Conference on Engineering Technology (IMCET). This work presents a design and implementation of a moving human tracking system with obstacle avoidance. The system scans the environment by using Kinect, a 3D sensor, and tracks the center of mass of a…

Read More
(This article belongs to the SP3 (Special issue on Recent Advances in Engineering Systems 2017) & Section Robotics (ROB))
Open AccessArticle
6 Pages, 1,060 KB Download PDF

Scapy Scripting to Automate Testing of Networking Middleboxes

Advances in Science, Technology and Engineering Systems Journal, Volume 5, Issue 2, Page # 293–298, 2020; DOI: 10.25046/aj050238
Abstract:

Middleboxes like load balancers are being used by all the corporations to manage and support their infrastructures. These devices see a large amount of bandwidth every day. This might include a range of protocols which might be varying from network layer to the application layer. This traffic can be corrupt or malicious thus causing these…

Read More
(This article belongs to Section Software Engineering in Computer Science (CSE))

Journal Menu

Journal Browser


Special Issues

Special Issue on Digital Frontiers of Entrepreneurship: Integrating AI, Gender Equity, and Sustainable Futures
Guest Editors: Dr. Muhammad Nawaz Tunio, Dr. Aamir Rashid, Dr. Imamuddin Khoso
Deadline: 30 May 2026

Special Issue on Sustainable Technologies for a Resilient Future
Guest Editors: Dr. Debasis Mitra, Dr. Sourav Chattaraj, Dr. Addisu Assefa
Deadline: 30 April 2026