Search Results

Results (16)

Search Parameters:

Keyword: Signature
Order results
Results per page
Open AccessArticle
9 Pages, 1,700 KB Download PDF

A Multi-class Acoustic Dataset and Interactive Tool for Analyzing Drone Signatures in Real-World Environments

Advances in Science, Technology and Engineering Systems Journal, Volume 10, Issue 6, Page # 88–96, 2025; DOI: 10.25046/aj100608
Abstract:

The rapid proliferation of drones across various industries has introduced significant challenges related to privacy, security, and noise pollution. Current drone detection systems, primarily based on visual and radar technologies, face limitations under certain conditions, highlighting the need for effective acoustic-based detection methods. This paper presents a unique and comprehensive dataset of drone acoustic signatures,…

Read More
(This article belongs to the SP19 (Special Issue on Innovation in Computing, Engineering Science & Technology 2025-26) & Section Acoustics (ACO))
Open AccessArticle
7 Pages, 714 KB Download PDF

Using Supervised Classification Methods for the Analysis of Multi-spectral Signatures of Rice Varieties in Panama

Advances in Science, Technology and Engineering Systems Journal, Volume 6, Issue 2, Page # 552–558, 2021; DOI: 10.25046/aj060262
Abstract:

In this article supervised classification methods for the analysis of local Panamanian rice crops using Near-Infrared (NIR) spectral signatures are assessed. Neural network ( Multilayer Perceptron-MLP) and Tree based (Decision Trees-DT and Random Forest-RF) algorithms are used as regression and supervised classification of the spectral signatures by rice varieties, against other crops and by plant…

Read More
(This article belongs to the SP10 (Special Issue on Multidisciplinary Sciences and Engineering 2020-21) & Section Agricultural Engineering (AEN))
Open AccessArticle
7 Pages, 1,424 KB Download PDF

Offline Signature Recognition and Verification Using ORB Key Point Matching Techniques

Advances in Science, Technology and Engineering Systems Journal, Volume 5, Issue 4, Page # 01–07, 2020; DOI: 10.25046/aj050401
Abstract:

An extensive work has been carried out in the field of human transcribe-verification and transcribe-recognition by extensive scholars across the globe from past decades. In order to demeanour immense experiments for considering the performance of the newly intended models and to substantiate the efficacy of the proposed model which is moderately required. This paper monologue…

Read More
(This article belongs to the SP9 (Special Issue on Multidisciplinary Innovation in Engineering Science & Technology 2020) & Section Information Systems in Computer Science (CIS))
Open AccessArticle
20 Pages, 379 KB Download PDF

Hybrid Intrusion Detection Using the AEN Graph Model

Advances in Science, Technology and Engineering Systems Journal, Volume 8, Issue 2, Page # 44–63, 2023; DOI: 10.25046/aj080206
Abstract:

The Activity and Event Network (AEN) is a new dynamic knowledge graph that models different network entities and the relationships between them. The graph is generated by processing various network security logs, such as network packets, system logs, and intrusion detection alerts, which allows the graph to capture security-relevant activity and events in the network.…

Read More
(This article belongs to the SP14 (Special Issue on Computing, Engineering and Multidisciplinary Sciences 2022-23) & Section Hardware & Architecture in Computer Science (CHA))
Open AccessArticle
10 Pages, 865 KB Download PDF

Secured Multi-Layer Blockchain Framework for IoT Aggregate Verification

Advances in Science, Technology and Engineering Systems Journal, Volume 7, Issue 3, Page # 106–115, 2022; DOI: 10.25046/aj070312
Abstract:

Technologies designed for digital provenance, especially the Internet of Things (IoT) and blockchain, may allow for security, transparency, and traceability in the global supply chain. However, upstream nodes in the supply chain that work for large-scale production suppliers are not considered. In addition, most IoT blockchain systems adopt an ID-based signature scheme that may affect…

Read More
(This article belongs to the SP13 (Special Issue on Innovation in Computing, Engineering Science & Technology 2022) & Section Interdisciplinary Applications of Computer Science (CSI))
Open AccessArticle
7 Pages, 1,010 KB Download PDF

Observer-Based Method of Feature Extraction for the Fault Detection of Permanent Magnet Synchronous Motors

Advances in Science, Technology and Engineering Systems Journal, Volume 6, Issue 2, Page # 942–948, 2021; DOI: 10.25046/aj0602107
Abstract:

This paper presents a new observer-based method which deals with the extraction of amplitude of characteristic frequencies for the fault diagnosis in permanent magnet synchronous motors (PMSM). First, a pilot survey is made to investigate the typical harmonics in the line currents of PMSM. Second, an appropriate structure of observer is formulated with the input…

Read More
(This article belongs to Section Electrical Engineering (ELE))
Open AccessArticle
9 Pages, 1,860 KB Download PDF

LED Lighting and the Impact on the PLC Channel

Advances in Science, Technology and Engineering Systems Journal, Volume 6, Issue 2, Page # 933–941, 2021; DOI: 10.25046/aj0602106
Abstract:

Light Emitting Diode (LED) lamps are used as a replacement of “old-fashioned” or incandescent lighting sources, as they reduce the amount of energy consumed. As a side-effect of more efficient energy usage they produce electrical noise. This noise reduces the efficiency of information signal transfer when Power Line Communications (PLC) are used. This study focuses…

Read More
(This article belongs to Section Electrical Engineering (ELE))
Open AccessArticle
7 Pages, 366 KB Download PDF

Mobile Money Wallet Attack Resistance using ID-based Signcryption Cryptosystem with Equality Test

Advances in Science, Technology and Engineering Systems Journal, Volume 5, Issue 6, Page # 988–994, 2020; DOI: 10.25046/aj0506118
Abstract:

This paper is an extension of a research work presented at ICSIoT 2019. An attack continuum against the insider attack in mobile money security in Ghana using a witness based crypto- graphic method proposed by Alornyo et al. resisted the service provider from peddling with users data for economic gains. Our improved scheme achieves a…

Read More
(This article belongs to the SP10 (Special Issue on Multidisciplinary Sciences and Engineering 2020-21) & Section Information Systems in Computer Science (CIS))
Open AccessArticle
10 Pages, 906 KB Download PDF

Hand-Based Biometric Recognition Technique – Survey

Advances in Science, Technology and Engineering Systems Journal, Volume 5, Issue 6, Page # 689–698, 2020; DOI: 10.25046/aj050683
Abstract:

In today’s modern world, reliable automatic personal recognition is a crucial area of discussion, primarily because of the increased security risks. A large number of systems first require the recognition of a person before they can access their services. Biometric recognition can be used, which can be understood as automatic identification or automatic verification of…

Read More
(This article belongs to the SP9 (Special Issue on Multidisciplinary Innovation in Engineering Science & Technology 2020) & Section Interdisciplinary Applications of Computer Science (CSI))
Open AccessArticle
18 Pages, 2,339 KB Download PDF

Nature Inspired and Transform Based Image Encryption Techniques: A Comparative Study

Advances in Science, Technology and Engineering Systems Journal, Volume 5, Issue 5, Page # 1075–1092, 2020; DOI: 10.25046/aj0505132
Abstract:

In this paper, performances of two variations of chaos based algorithms are compared. First algorithm is a self-adaptive color image encryption algorithm is proposed based on Radial Hilbert Transform and chaos. This technique uses chaotic random phase masks operated on the transformed pixels to increase the randomness in confusion and diffusion operations. Also, a random…

Read More
(This article belongs to the SP9 (Special Issue on Multidisciplinary Innovation in Engineering Science & Technology 2020) & Section Information Systems in Computer Science (CIS))
Open AccessArticle
5 Pages, 595 KB Download PDF

Ontologic Design of Software Engineering Knowledge Area Knowledge Components

Advances in Science, Technology and Engineering Systems Journal, Volume 5, Issue 4, Page # 30–34, 2020; DOI: 10.25046/aj050404
Abstract:

The article sets forth the solution of the educational resources semantic context knowledge components development task, based on the learning technology project-oriented concepts, graduate’s competency model and ontological; engineering. The being considered ontology model and knowledge display formalisms allow, firstly, relevantly image the educational resources semantic context in the support concepts ontology format, and their…

Read More
(This article belongs to Section Software Engineering in Computer Science (CSE))
Open AccessArticle
10 Pages, 1,131 KB Download PDF

A Survey on Image Forgery Detection Using Different Forensic Approaches

Advances in Science, Technology and Engineering Systems Journal, Volume 5, Issue 3, Page # 361–370, 2020; DOI: 10.25046/aj050347
Abstract:

Recently, digital image forgery detection is an emergent and important area of image processing. Digital image plays a vital role in providing evidence for any unusual incident. However, the image forgery my hide evidence and prevents the detection of such criminal cases due to advancement in image processing and availability of sophisticated software tamper of…

Read More
(This article belongs to Section Electronic Engineering (EEE))
Open AccessArticle
11 Pages, 959 KB Download PDF

Securing Hybrid SDN-based Geographic Routing Protocol using a Distributed Trust Model

Advances in Science, Technology and Engineering Systems Journal, Volume 5, Issue 2, Page # 567–577, 2020; DOI: 10.25046/aj050271
Abstract:

In this paper, the vulnerabilities and the security attacks against vehicular networks, SDN architecture and some security solutions for SDVN are studied. Secondly, a complete and improved version of the secure HSDN-GRA routing protocol based on a distributed trust model is proposed where public keys of the vehicles are managed in a distributed way. Besides,…

Read More
(This article belongs to the SP8 (Special Issue on Multidisciplinary Sciences and Engineering 2019-20) & Section Information Systems in Computer Science (CIS))
Open AccessArticle
12 Pages, 264 KB Download PDF

Using Privacy Enhancing and Fine-Grained Access Controlled eKYC to implement Privacy Aware eSign

Advances in Science, Technology and Engineering Systems Journal, Volume 4, Issue 4, Page # 347–358, 2019; DOI: 10.25046/aj040443
Abstract:

eSign is an online electronic signature service which is recently gaining more prominence in India. eSign is based on two online services from UIDAI, viz. a viz., Aadhaar based authentication and retrieval of resident’s eKYC information after taking his/her consent. With increased adoption of Aadhaar based services, privacy of user data has become more and…

Read More
(This article belongs to the SP7 (Special Issue on Advancement in Engineering and Computer Science 2019) & Section Information Systems in Computer Science (CIS))
Open AccessArticle
8 Pages, 910 KB Download PDF

Probabilistic Method for Anomalies Detection Based on the Analysis of Cyber Parameters in a Group of Mobile Robots

Advances in Science, Technology and Engineering Systems Journal, Volume 3, Issue 6, Page # 281–288, 2018; DOI: 10.25046/aj030636
Abstract:

This article is devoted to the issues of ensuring the security of a group of mobile robots in the implementation of attacks aimed at the property of accessibility of information and the availability of network nodes. The article presents a method for detecting an abnormal behavior of a network node based on the analysis by…

Read More
(This article belongs to the SP5 (Special Issue on Multidisciplinary Sciences and Engineering 2018) & Section Interdisciplinary Applications of Computer Science (CSI))
Open AccessArticle
6 Pages, 869 KB Download PDF

Monitoring power breakers using vibro acoustic techniques

Advances in Science, Technology and Engineering Systems Journal, Volume 2, Issue 3, Page # 1771–1776, 2017; DOI: 10.25046/aj0203216
Abstract:

Speaking about the commutation’s equipment, it can be said that the best solution in increasing reliability and lowering the maintenance costs is a continuous monitoring of the equipment. However, if the price/quality ratio is considered, it is obvious that, for the moment, the diagnosis can be also an acceptable solution. Nowadays the predictive maintenance for…

Read More
(This article belongs to the SP3 (Special issue on Recent Advances in Engineering Systems 2017) & Section Electrical Engineering (ELE))

Journal Menu

Journal Browser


Special Issues

Special Issue on Digital Frontiers of Entrepreneurship: Integrating AI, Gender Equity, and Sustainable Futures
Guest Editors: Dr. Muhammad Nawaz Tunio, Dr. Aamir Rashid, Dr. Imamuddin Khoso
Deadline: 30 May 2026

Special Issue on Indigenous Knowledge Systems of the Tribal Communities of the Asia Pacific
Guest Editors: Dr. Anurag Hazarika
Deadline: 31 October 2026

Special Issue on Sustainable Technologies for a Resilient Future
Guest Editors: Dr. Debasis Mitra, Dr. Sourav Chattaraj, Dr. Addisu Assefa
Deadline: 30 April 2026