Search Results

Results (9)

Search Parameters:

Keyword: Windows
Order results
Results per page
Open AccessArticle
7 Pages, 1,226 KB Download PDF

Distribution Management Problem: Heuristic Solution for Vehicle Routing Problem with Time Windows (VRPTW) in the Moroccan Petroleum Sector

Advances in Science, Technology and Engineering Systems Journal, Volume 8, Issue 4, Page # 66–72, 2023; DOI: 10.25046/aj080408
Abstract:

The attributes of the vehicle routing problem (VRP) are as many additional characteristics or constraints which aim to better take into account the specificities of real application cs. The variants of the VRP thus formed are the support of an extremely rich literature, comprising an immense variety of heuristics. This article constitutes an industrial application…

Read More
(This article belongs to the SP14 (Special Issue on Computing, Engineering and Multidisciplinary Sciences 2022-23) & Section Transportation Science & Technology (TST))
Open AccessArticle
6 Pages, 2,622 KB Download PDF

Operating Systems Vulnerability – An Examination of Windows 10, macOS, and Ubuntu from 2015 to 2021

Advances in Science, Technology and Engineering Systems Journal, Volume 7, Issue 6, Page # 230–235, 2022; DOI: 10.25046/aj070625
Abstract:

This study investigated the vulnerabilities of three operating systems: Windows 10, macOS, and Ubuntu. The analysis of secondary data obtained from the CVE and NVD databases for the study period demonstrates varying OS vulnerability. Quantitative assessment of the vulnerability (using the vulnerability score) for the investigated operating systems found consistent results in the security vulnerability…

Read More
(This article belongs to Section Information Systems in Computer Science (CIS))
Open AccessArticle
10 Pages, 1,243 KB Download PDF

A Scheduling Algorithm with RTiK+ for MIL-STD-1553B Based on Windows for Real-Time Operation System

Advances in Science, Technology and Engineering Systems Journal, Volume 6, Issue 4, Page # 385–394, 2021; DOI: 10.25046/aj060443
Abstract:

In devices using Windows operating system based on x86 system, the real-time performance is not guaranteed by Windows. It is because Windows is not a real-time operating system. Users who develop applications in such a Windows environment generally use commercial solutions such as the RTX or the INtime to provide real-time performance to the system.…

Read More
(This article belongs to the SP11 (Special Issue on Innovation in Computing, Engineering Science & Technology 2021) & Section Software Engineering in Computer Science (CSE))
Open AccessArticle
14 Pages, 1,742 KB Download PDF

Application-Programming Interface (API) for Song Recognition Systems

Advances in Science, Technology and Engineering Systems Journal, Volume 6, Issue 2, Page # 846–859, 2021; DOI: 10.25046/aj060298
Abstract:

The main contribution of this paper is the framework of Application Programming Interface (API) to be integrated on a smartphone app. The integration with algorithm that generates fingerprints from the method ST-PSD with several parameter configurations (Windows size, threshold, and sub-score linear combination coefficient). An approach capable of recognizing an audio piece of music with…

Read More
(This article belongs to the SP10 (Special Issue on Multidisciplinary Sciences and Engineering 2020-21) & Section Information Systems in Computer Science (CIS))
Open AccessArticle
8 Pages, 1,200 KB Download PDF

Simulation Based Energy Consumption Optimization for Buildings by Using Various Energy Saving Methods

Advances in Science, Technology and Engineering Systems Journal, Volume 5, Issue 6, Page # 1480–1487, 2020; DOI: 10.25046/aj0506178
Abstract:

The world has turned in the modern era to reduce peak times for electricity consumption, where the peak times cause excessive load on the electricity grid and power stations. In Egypt air conditioning loads are considered the main contributing reasons for the peak time’s problem due to presence of large unshaded glazed surfaces, which cause…

Read More
(This article belongs to Section Electrical Engineering (ELE))
Open AccessArticle
10 Pages, 2,685 KB Download PDF

Windowing Accuracy Evaluation for PSLR Enhancement of SAR Image Recovery

Advances in Science, Technology and Engineering Systems Journal, Volume 5, Issue 1, Page # 48–57, 2020; DOI: 10.25046/aj050107
Abstract:

Synthetic aperture radar (SAR) is an imaging device mounted on a moving platform. Its ability to identify a weak target from a nearby strong one depends upon the peak side lobe ratio (PSLR). This paper is intended to ameliorate such important ratio through the use of windowing of the transmitted pulse and studying the noise…

Read More
(This article belongs to Section Aerospace Engineering (EAR))
Open AccessArticle
9 Pages, 5,642 KB Download PDF

A Proposal of TCP Fairness Control Method for Two-Host Concurrent Communications in Elastic WLAN System Using Raspberry Pi Access-Point

Advances in Science, Technology and Engineering Systems Journal, Volume 4, Issue 6, Page # 10–18, 2019; DOI: 10.25046/aj040602
Abstract:

The IEEE802.11n based Wireless Local Area Networks (WLANs) have been extensively deployed due to the flexible coverage, the easy installation, and the lower cost. To reduce the energy consumption while increasing the performance, the elastic WLAN system has been studied, such that it can dynamically change the network configuration according to traffic demands. As well,…

Read More
(This article belongs to the SP8 (Special Issue on Multidisciplinary Sciences and Engineering 2019-20) & Section Network Engineering (ENW))
Open AccessArticle
7 Pages, 262 KB Download PDF

Detecting Malicious Assembly using Convolutional, Recurrent Neural Networks

Advances in Science, Technology and Engineering Systems Journal, Volume 4, Issue 5, Page # 46–52, 2019; DOI: 10.25046/aj040506
Abstract:

We present findings on classifying the class of executable code using convolutional, re- current neural networks by creating images from only the .text section of executables and dividing them into standard-size windows, using minimal preprocessing. We achieve up to 98.24% testing accuracy on classifying 9 types of malware, and 99.50% testing accuracy on classifying malicious…

Read More
(This article belongs to the SP7 (Special Issue on Advancement in Engineering and Computer Science 2019) & Section Interdisciplinary Applications of Computer Science (CSI))
Open AccessArticle
5 Pages, 744 KB Download PDF

Virtual Memory Introspection Framework for Cyber Threat Detection in Virtual Environment

Advances in Science, Technology and Engineering Systems Journal, Volume 3, Issue 1, Page # 25–29, 2018; DOI: 10.25046/aj030104
Abstract:

In today’s information based world, it is increasingly important to safeguard the data owned by any organization, be it intellectual property or personal information. With ever increasing sophistication of malware, it is imperative to come up with an automated and advanced methods of attack vector recognition and isolation. Existing methods are not dynamic enough to…

Read More
(This article belongs to the SP4 (Special issue on Advancement in Engineering Technology 2017-18) & Section Interdisciplinary Applications of Computer Science (CSI))

Journal Menu

Journal Browser


Special Issues

Special Issue on Digital Frontiers of Entrepreneurship: Integrating AI, Gender Equity, and Sustainable Futures
Guest Editors: Dr. Muhammad Nawaz Tunio, Dr. Aamir Rashid, Dr. Imamuddin Khoso
Deadline: 30 May 2026

Special Issue on Sustainable Technologies for a Resilient Future
Guest Editors: Dr. Debasis Mitra, Dr. Sourav Chattaraj, Dr. Addisu Assefa
Deadline: 30 April 2026