Search Results

Results (3)

Search Parameters:

Keyword: l2
Order results
Results per page
Open AccessArticle
11 Pages, 1,647 KB Download PDF

An Ensemble of Voting- based Deep Learning Models with Regularization Functions for Sleep Stage Classification

Advances in Science, Technology and Engineering Systems Journal, Volume 8, Issue 1, Page # 84–94, 2023; DOI: 10.25046/aj080110
Abstract:

Sleep stage performs a vital role in people’s daily lives in the detection of sleep-related diseases. Conventional automated sleep stage classifier models are not efficient due to the complexity linked to the design of mathematical models and extraction of hand-engineering features. Further, quick oscillations amongst sleep stages frequently lead to indistinct feature extraction, which might…

Read More
(This article belongs to Section Biomedical Engineering (EBI))
Open AccessArticle
6 Pages, 1,274 KB Download PDF

A Study on the Tool Wear in Milling Process of the Gleason Spiral Bevel Gear

Advances in Science, Technology and Engineering Systems Journal, Volume 5, Issue 6, Page # 1402–1407, 2020; DOI: 10.25046/aj0506169
Abstract:

In this paper, the investigated results on tool wear in milling process of a Gleason spiral bevel gear was investigated. The CVD Ti (C, N)-Al2O3-TiN coated carbide inserts were used in the experimental process. The cutting inserts clamped on the tool head of Gleason tool head system. The workpiece material that was used in this…

Read More
(This article belongs to Section Mechanical Engineering (EMH))
Open AccessArticle
10 Pages, 3,910 KB Download PDF

Nonlinear \(\ell_{2,p}\)-norm based PCA for Anomaly Network Detection

Advances in Science, Technology and Engineering Systems Journal, Volume 5, Issue 4, Page # 234–243, 2020; DOI: 10.25046/aj050429
Abstract:

Intrusion detection systems are well known for their ability to detect internal and external intrusions, it usually recognizes intrusions through learning the normal behaviour of users or the normal traffic of activities in the network. So, if any suspicious activity or behaviour is detected, it informs the users of the network. Nonetheless, intrusion detection system…

Read More
(This article belongs to Section Interdisciplinary Applications of Computer Science (CSI))

Journal Menu

Journal Browser


Special Issues

Special Issue on Digital Frontiers of Entrepreneurship: Integrating AI, Gender Equity, and Sustainable Futures
Guest Editors: Dr. Muhammad Nawaz Tunio, Dr. Aamir Rashid, Dr. Imamuddin Khoso
Deadline: 30 May 2026

Special Issue on Indigenous Knowledge Systems of the Tribal Communities of the Asia Pacific
Guest Editors: Dr. Anurag Hazarika
Deadline: 31 October 2026

Special Issue on Sustainable Technologies for a Resilient Future
Guest Editors: Dr. Debasis Mitra, Dr. Sourav Chattaraj, Dr. Addisu Assefa
Deadline: 30 April 2026