Electronic Warfare Methods Combatting UAVs
Volume 5, Issue 6, Page No 447–454, 2020
Adv. Sci. Technol. Eng. Syst. J. 5(6), 447–454 (2020);
DOI: 10.25046/aj050653
Keywords: Unmanned Aerial System – UAS, Unmanned Aerial Vehicle – UAV, Air Defence, Electronic War-fare, Cybernetics, Neural Network
This paper describes methods of eliminating Unmanned Aerial Vehicles (UAV) non-destructively, using Electronic Warfare Methods. The aim is to introduce certain methods of UAV detection and elimination in a complex environment and terrain, e.g., in an urban and battlefield environment, that will result in finding the control device position and the UAV itself. Neural networks, cyber penetration elements, and wireless network scanning programs are all used to address this issue. The output of this article is a new concept of a comprehensive solution, which can be implemented into the existing complex system of electronic defence against UAVs, e.g., within the allied base. Conclusions will be also used to further improve the above-mentioned topics at the authors’ workplace, within the frame of long-term projects and specifically as a part of solutions applicable to the force protection of combat support units, namely field artillery, which is described here in detail.
1. Introduction
This paper is an extension of the work originally presented in proceedings of the “2019 International Conference on Military Technologies” (ICMT), Brno, Czech Republic [1]. The original material was enriched by the proposed concept applied in the urban area. The whole section proposing a possible concept applicable to artillery units was added.
A very dynamic development of Unmanned Aerial Systems (UASs) is becoming highly visible as they are used in all areas of human activities [2].
With the gradual widening of the UASs complexity and complementing other features, there is a demand for more complex security. The reason is that both military forces and terrorists have increasingly used Unmanned Aircraft Systems to plan, prepare, and execute attacks on ally and partner’s forces and on “soft targets” in the civilian sector. Preventing, protecting, and recovering from such attacks require a cross-governmental approach, bridging the different efforts that Allies, partners, NATO, other international organizations, industry, and academia are making on this topic, both in the military and in the civilian domain. The threat description, probable scenarios, and protection models concepts are well described now by several trustworthy documents, e.g., in [3].
In another word, simultaneously with UASs development, we have been witnessing the counter-UAS (C-UAS) systems rapid improvement as well. Moreover, the C-UAS systems development concerns not only the direct defence against flying apparatuses themselves, but this also applies to the whole loop of the air defence system: detection, command-control system and elimination itself. The whole engagement process is now a highly complex, sophisticated, and, from a scientific point of view, multidisciplinary one.
Thus, after transforming from simple radio-controlled machines into sophisticated, “smart”, digitally-controlled UAVs, an opportunity was developed to combat the whole UAS not only with standard methods, but – apart from another ones – also with cybernetic methods. Contemporary modern UAV can be seen as a small computer or a mobile phone with the ability to fly. This connects the current IT security issues and air defence issues together with the UAVs.
During the next development, it will be necessary to take into account the possibility of anti-aircraft defence congestion caused by the high availability of micro UAVs at a very low affordable price. Therefore, the developed means should be able to operate a large number of UAVs at the same time and at a minimum cost.
2. Methods of Cyberattack Applied to UAVs
In today’s digital age, the growth of cyberattacks can be seen not only on personal computers, servers, and mobile phones, but also with the introduction of “internet of things”, on any device that is able to connect and communicate over the network. This opens the possibility of cyberattacks on most types of UAVs too. Cybernetic methods of attack, like conventional methods, can be divided into two basic groups according to the expected effect. These methods are non-destructive and destructive.
2.1. Non-destructive Methods of Cyberattack
Non-destructive cybernetic methods of combat are understood as methods in which there is no direct destruction of any particular component of the affected system. This group includes the most contemporary cyberattacks. We can further divide these attacks into several subareas (in detail: [4]). Graphical representation of non-destructive cyberattack methods on UASs is depicted in Fig. 1.

Figure 1: Graphical representation of non-destructive cyberattack methods applied to UAV´s
1) Leakage of Information
This type of attack results in disclosure or leakage of protected information. The advantage is its detection difficulty and in most cases the speed of attack. In UAVs, this attack is about getting the downlink channel information providing the UAV’s mission or about getting the data to find the password for Wi-Fi communication.
2) Disturbance of Integrity
This subgroup includes attacks where the UAV’s data are destroyed, damaged, or changed. This type of attack is very well detectable, but in most cases until after its accomplishment.
3) Denial of Service
Denial of Service (DOS) attacks make it impossible to use a particular service or system of UAS. The C-UAS defender will focus on a particular access channel or a specific service and will disable real-time activity by systematically sending requests (see DoS attack below). This attack is very visible and is usually suppressed quite quickly.
4) Unlawful Use of Information
These attacks focus on using the obtained information to access non-public parts of the system or to use certain services without authorization. In UAVs, for example, the acquired password can be used to decrypt the intercepted communication or to take over its control.
2.2. Destructive Methods of Cyberattack
The destructive C-UAS cybernetic methods of combat have a direct impact on the part of the attacked system that is physically irreversibly damaged as a result of this activity. These methods mainly use the vulnerability in the lower layers of the OSI (Open Systems Inter-connection) model and focus primarily on individual hardware components that are used in multiple systems. The operation of these methods is primarily based on a mechanical damage. For example: the cybernetic attack induces a collision of mechanically moving components or the cybernetic attack forces a battery or some other component to overheat and thus damage themselves.
3. Signal Detection of the UAV
When combatting mini and micro UAVs, one of the biggest problems is the detection and identification of the UAS itself, especially in an urban densely built area. Using radar or other detection methods with optical equipment (in the visible or IR optical band) is often considerably complicated by many fixed obstacles [5]. Methods using specific acoustic characteristics of the UAVs are also limited due to the interfering ambient noise [6].
The best choice in such environments is, therefore, the detection and localization of signals transmitted by the UAV itself or its control station.
These signals can be relatively well detected and identified due to their known specific transmission frequencies and known encoding.
However, this detection becomes considerably harder if the UAV is managed only by Wi-Fi in an electronically complex environment. Contemporary modern cities are full of devices that use the same Wi-Fi standards, and that hides the UAV’ control signal among the other Wi-Fi networks within its range [7].
3.1. Localization Position of the remote control station or UAV
An UAV recognition method can be used, utilizing the MAC address to locate the position of the control station or the Wi-Fi standard to locate the position of the connected UAV itself. Each producer has a certain range of initial MAC address characters, which makes it uniquely identifiable. However, a problem occurs when the Wi-Fi module is modified or if the UAV MAC address is changed by software. Both of these methods are realizable by at least an average capable IT man.
3.2. Analysis of Data Flow Using Neural Network
One of the progressively evolving technologies is the technology of neural networks (NN). The main domain of these networks is their relatively rapid analysis of a large volume of data and the data subsequent evaluation. Neural networks, unlike algorithmic solutions, do not use serial computations. The task is solved simultaneously with several layers of neurons that interact with each other. Neural network inputs can also be parameters of the UAS Wi-Fi traffic, such as the number of frames, their size, and generally the data flow over time.
Thanks to NN advantages, especially in the field of data processing, i.e., their ability to take in a lot of inputs, process them to infer hidden as well as complex, nonlinear relationships, NNs are playing a big role in signal characteristic recognition. Based on these features, the NN should be able to recognize which device it is both the UAV itself and the control station as well. Thus, the next part is devoted the NN application to the UAS detection and identification.
4. The UAS Signal Detection Using Neural Network
Neural networks can be used in the process of data mining. This is currently an increasingly inflected term. In general, it can be understood as a process aimed at discovering dependencies or finding the required information in a large volume of usually experimentally obtained data. The output is a certain knowledge that can be used in solving a decision problem, predicting values for other new data, or simply understanding a certain phenomenon or context. [8]
In principle, three methods can be used to identify UASs using 802.11 standards. UAS can be identified by the SSID, which is the name of the access point. However, this can be changed very easily. Furthermore, we can use the identification according to the MAC (Media Access Control) address, because in the MAC address the first six characters identify the manufacturer. This method is already suitable for use, but the MAC address can also be changed. The third method is based on the analysis of the data flow and the creation of the so-called fingerprint. For this purpose, a neural network can be successfully used, which has the task of analysing the data flow to decide whether it is intercepted traffic originating from UAS communication or not.

Figure 2: Topology of the created neural network
Input data is a key element in training neural networks. The ability of the network to learn and evaluate, or rather to evaluate with sufficient accuracy, depends on the appropriate selection of individual parameters and the input data set.
The selection of input parameters was made on the basis of knowledge obtained by analysis of data flows originating from the tested UAS and several other applications (e.g. Skype, YouTube). Analysis of data streams revealed that one of the determining parameters is the number of unique frame sizes in a given sample. This is due to the nature of the transmitted stream, where certain activities or communications create a larger number of unique frame sizes than others. The second determining parameter is the number of frames transmitted per second. This is mainly related to the overall data flow, but it also in some way represents the disposition of the intercepted communication. The average frame size was chosen as the third parameter. It expresses whether the captured traffic contains rather smaller or larger frames. The size of the frames is affected by the disposition of the transmitted data. The last parameter was the ratio of the number of frames with a size greater than 100 B and less than 100 B. This value was chosen mainly based on the analysis of all data streams, where different operations have this ratio different. The topology of created neural network is depicted in the Fig. 2.
Based on these parameters, the neural network can distinguish whether it is UAS operation even when masking the SSID or changing the MAC address of the transmitted frames.
5. Possibilities for UAS Elimination Using EW Methods
5.1. Possibilities of Penetration into the UAV Communication Channel
In general, the resilience of security depends on several factors, of which the quality of the encryption used and the length of the password usually have the greatest influence. Specifically, WPA2 security uses the CCMP (Counter Cipher Mode Protocol) algorithm based on the Advanced Encryption Standard (AES) encryption algorithm. The length of the password that can be used with WPA2 is between 8-63 characters. Security resilience depends not only on the length of the password, but also on the character set used. It is also advisable to choose passwords that are not contained in dictionaries, or that do not contain word forms or diminutives [7].
Brute force Attack and Dictionary Attack by Cloud Computing
Brute force Attack and Dictionary Attack can be amplified by using Cloud Computing. In the case of a brute force attack, it is necessary to test all possible combinations in the set given by the specified parameters. Any known information about password parameters significantly speeds up the successful use of this attack. Brute force Attack will certainly find a password in the future, but it is better to use a dictionary attack first. Dictionary attack is based on creating as big as possible a dictionary of known words, which increases the chance of an earlier password being discovered. Commonly used high-performance computer sets can test even with a GPU (Graphic Processor Unit) of only 400 KHps (Kilo Hash per second) when used for WPA2 encryption. The way to amplify computing power is called Cloud Computing. With these services, it is possible under certain circumstances to break relatively long passwords in short or real time. These services can be rented from technology companies such as Google or Amazon, from 10 minutes for the duration of the rental [9].
Rainbow Table
In some cases, the “Hashing Function” format is used for encrypted communication. This function recalculates the password entered by the user and the output is “Hash”, which is a transformation of a string to a given number of characters. These hashes are precalculated within the “Rainbow Table” to make it easier to crack the password [10].
DoS Attack
Denial of Service attack is an attack which transmits recurring deauthentication frames that result in disconnection of communicating devices on 802.11 [11].
KRACK Method
The Key Reinstallation Attack (KRACK) method is one of the relatively newly discovered methods focusing on a certain vulnerability of the Wi-Fi standard. It uses a four-way authentication process, in which communication is established between the AP (Access point) and the client. Simply put, it works on the principle of delaying the response to the third message during the four-way authentication sent to the access point. As a result, the AP sends a new 3rd message with an increased “counter number”. When it receives the 3rd message for the first time, the client installs the GTK (Group Transient key) and PTK (Pairwise Transient Key) keys and sends the 4th message, which is then held. Upon receiving a retransmitted 3rd message with an increased counter number, the client reinstalls the previously installed GTK and PTK keys and resends the 4th message. Subsequently, both 4th messages are left to pass to the AP. Knowledge of changing the original and later reinstalled GTK and PTK keys can then be used to decrypt the communication [12].
5.2. Options after Successful Penetration into the UAV System
From the attacker’s point of view, there are several ways to penetrate the system, differing in danger and enabling different goals to be met [1].
Secret Observation
The most inconspicuous way to start a penetration is a simple observation of the video stream or telemetry data, which are received by the UAS control station. This makes it possible to identify the equipment of the UAS with specific sensor (measuring) devices or to identify the operator’ area of interest.
Sending Unobtrusive Commands
The operator’ control can be affected by sending confusing or conflicting commands. Such an effect on the UAS may lead to the termination of the UAS task, as the operator will think it is a technical fault.
Complete take over the UAS
For the complete takeover of the UAS, it is necessary to disconnect the original RC and prevent it from being reconnected. To do this, you need to know the password and the ability to change it in real time as well. Successful takeover largely depends on the manufacturer of the individual components or the UAS model itself.
6. The Proposed Concept of the EW C-UAS System
6.1. Basic principles and functioning of the proposed concept
The basic principles of system operation are clearly shown in the Figure 3. The whole system is divided into one main and two support sections, each of which brings a different ability, or added value. The proposed concept [6] may represent the addition of another element of complex defence against micro and mini UAS.
The concept includes devices to detect signals and record Wi-Fi data in passive mode and send deauthentication frames in active mode. Within one computer and control centre, information are collected from one or more devices.

Figure 3: The proposed neural network
- Detection, Identification, Position calculation and DoS Attack Using Deauthentication
The main section (shown in blue) provides the basic capabilities of the system and is the only one that can act automatically in a limited way. It contains 4 blocks providing initial signal detection (capture), device identification according to MAC address, position calculation based on information from one or more sensors and, if necessary, the DOS attack itself. Upon successful capture and identification of an unwanted UAS, we are able to send a deautentication frame to the nearest sensor to disconnect communication between the RC and the UAS or between the RC and the display device. After sending only one or a few deauthentication frames, the connection is established automatically, but if the deauthentication frames are still sent, the connection will not be established. [9]
Neural Network
The first support section (shown in green) evaluates the intercepted data stream using a neural network (explained in more detail in Section 4) and, based on the results, identifies the type of device or the type of traffic in the intercepted communication. This information is passed on to the main section for subsequent specification [6].
Possibilities to Find Password
The second support section (shown in yellow) aims to bring the ability to take control of the UAV. The process usually begins by sending a deauthentication frame and then capturing a 4-way handshake. This provides a signal pattern to perform the password retrieval process. After successfully finding the password, it is possible to take over the control, either completely or partially, or penetrate into the communication system. [6]
6.2. The proposed concept applied in the urban area
For practical use in urban areas, e.g., the device Alfa AWUS036ACM (see Fig. 4) can be used as a sensor and transmitter, providing sufficient omnidirectional range, supporting 802.11 a / b / g / n / and ac standards, and operating in the 2.4 GHz and 5 GHz frequency bands, respectively. Another indisputable advantage of this device is its low price in combination with normal commercial availability [6].

Figure 4: Device Alfa AWUS036AC
Figure 5 shows an object with a marked critical defence point (red circle), access roads (3, 5), high-rise areas (1,2,4), and a low building (6), which poses the greatest risk due to the possibility of direct visibility to defended point

Figure 5: Defended critical point
It is advisable to place the sensors so that they cover most of the area and selected places outside the area from which the UAS control could be performed. The Alfa AWUS036AC device, which is connected to a certain small computer, e.g. Raspberry Pi, is taken as a sensor. All sensors would then be connected to a central point where evaluation and control would take place.
Despite of this that the quantity of sensors seems to be a little considerable, by using low-price hardware mentioned above, we are able to cover the protected area completely. Connection to the EW C-UAS system proposed in subsection 6.1 can sustain full control of this defended critical area.

Figure 6: Defended critical point
6.3. Partial conclusion of Section 6
The previous parts described the general principles and division of cyber-attacks and the operation of the 802.11 standard of interest. To detect UAS using this standard was developed by applying the neural network and the concept in which it is embedded. However, instead of a neural network, it would be possible to use other methods of genetic programming, but the use of a neural network is suitable for this task.
Within this theoretical concept, the use of an existing HW and its deployment on the example of a defended object in a non-war area was also proposed. The use of the system in the military field is dealt with in the following section.
7. The proposed concept applied to artillery units
Based on knowledge from current conflicts, especially from the war in Ukraine and Syria, it is clear that UAVs – small, light, and cheap unmanned aerial vehicles pose a great risk to all combat units. The availability of these tools, which are available for small amounts of money, together with their capabilities makes them an ideal means of conducting aerial reconnaissance.
Findings from the conflicts in Ukraine and the Middle East clearly show that these instruments, when applied to fire support units, specifically artillery, can be used very effectively, especially for:
- reconnaissance (uncovering the battle group),
- target acquisition,
- artillery fire control,
- evaluation of the effectiveness of fires,
- perform attacks using explosives,
- perform attacks, using weapons s of mass destruction (chemical, biological, and possibly also radioactive “dirty” bombs).
In recent years, we can find countless combat situations, where small UAVs have successfully performed the tasks mentioned above. To illustrate this, several examples of the use of small UAVs are given in the table No 1.
Table 1: Examples of small UAV attacks
| Year | Example |
| 2005 | Al-Qaida used Chinese made remote control model airplanes to recon Pakistan security forces prior attacks. It was also weaponized with IED.[13] |
| 2014 | Islamic state used small quadcopters for recon missions of Syrian military bases prior to ground attacks. [13] |
| 2015 | Drone attacks on military bases in Ukraine. Each drone was equipped with one grenade (ZMG-1 type). [14] |
| 2015 | Several attacks on ammunition depots at Svatovo, Ukraine. Drones were equipped with grenades. [14] |
| 2016 | Two French Special Forces soldiers were injured and an exploding ISIS drone killed two Kurdish fighters. [14] |
| 2019 | Drone attacks struck two key oil installations inside Saudi Arabia [15]. |
| 2020 | Pro-Kremlin mercenaries use an unmanned aerial vehicle to drop a rocket-propelled grenade on Ukrainian emplacements. [16] |
These examples clearly show the possibilities of using small UAVs and their ability to cause significant losses. The use of small commercial UAVs in combat operations can provide the enemy with key information about the positions of our own troops and their manoeuvres. In combination with explosives or weapons of mass destruction, it is possible to cause significant losses in technique and manpower. For this reason, it is necessary to be prepared for this variant and be able to defend effectively against these types of attacks.
7.1. Artillery units in the regular operations and proposed concept of application
In a peer-to-peer war, all kinds of military forces and resources are involved in combat operations. For simplicity, examples of the application of the proposed concept of protection against small UAVs are reduced only to artillery units. However, a similar approach can be used for all types of units and their specializations wherever there is a real possibility of attack by these UAVs.
The artillery battalion (battery) is conducting its operations within a given position area of artillery (PAA) within the zone of attack (defence) of the brigade (task force). Part of this PAA are also battalion (battery) Fire Direction Centres (FDC). Fig. 7 gives an example of PAA [17].
The danger emerging from the use of small UAVs is, in particular, the possibility of uncovering a combat formation and subsequent directing fire on firing units and command posts, and attacks using explosives placed on the UAV or attacks using weapons of mass destruction. Artillery units are usually deployed in a hidden position, outside the firing positions, when they do not conduct fires. Weapon systems occupy firing positions only when they are firing. Firing positions and firing points are usually in the open space. At this point, they are vulnerable and easy targets.

Figure 7: The position area of artillery [18]
One of the main risks the artillery is facing is the counterbattery fires. Artillery units are always priority targets and it is necessary to avoid the risk of detection, which precedes the implementation of counterbattery fire. The tactic of using small UAVs by enemy reconnaissance and diversion groups has always been a danger. In connection with the development of capabilities and possibilities of using not only military, but also small commercial UAVs, new risks are emerging and their frequency may be higher due to their massive spread and availability.
With a standard time of one fire mission and time to leave the firing position, the probability of successful counterbattery fire is low. In the case of proactive counterbattery activity, where artillery units are actively searched for and neutralized without unmasking themselves by firing, the probability of success is much greater than in the case of reactive counterbattery fire when it is reacted to firing artillery. The enemy gains an advantage by knowing the coordinates of the firing positions and starts the fire mission when the cannons are taking up firing points to conduct fire. It is this key information that can be easily obtained using small UAVs. They are able to uncover a combat formation, detect individual artillery weapon sets and already in the phase of the manoeuvre into the firing position, warn the enemy, and provide sufficient information for the preparation and execution of fire. At the same time, they can provide a detailed evaluation of battle damage assessment (BDA) after firing.
Another variant is the use of UAVs as carriers of explosive devices, which can be used to destroy targets. In the case of artillery, a suitable target are FDCs. Destruction of them will eliminate the entire firing battery from combat for a period of time. Alternatively, it is possible to destroy individual artillery weapon sets, which cause a deficiency in fire support.
Based on these findings, the proposed concept of detection and neutralization of UAVs is a very effective tool for reducing the risk of detection by these means and the subsequent elimination of artillery units by enemy counterbattery fire, or explosive devices. From the point of view of the effective use of the proposed concept, it is necessary that the established measures reflect the tactics and procedures of artillery fire units. The biggest restrictions will be mainly area requirements. The firing battery of self-propelled cannon howitzers is deployed in the area of firing positions, usually 1 – 2 x 1 – 2 km, depending on the position conditions and the combat task [19]. This space must be covered with the ability to neutralize the UAV – this can be achieved by using a directional antenna with sufficient gain or power, which will ensure the required range. The individual antennas should be connected to an automated system, from which their focus and modes of operation will be controlled.
Firing units are most exposed to observation at the moment of performing fire missions, when they are deployed in firing positions. A suitable variant is the placement of equipment for neutralization of UAVs on vehicles of artillery reconnaissance/survey units, or on artillery weapons sets [20]. To a minimal extent, it would be sufficient to place this device on the lead gun of fire platoons, or vehicle of the platoon commander. However, this depends on the possibility of increasing the scope of the opportunity of neutralizing the enemy UAV within the proposed solution. At command points (FDCs), it would be sufficient to place the equipment on one vehicle of FDC.
7.2. Artillery units in asymmetric operations and proposed concept of application
The use of artillery in an asymmetric conflict has its specifics. Firing units are usually located on permanent or forward operational bases and provide fire support to units performing framework operations in the area of responsibility. They do not manoeuvre and are constantly at the firing points. In an asymmetrical operation, the risk of counterbattery fire is minimal according to current experience. However, commercially available UAVs can radically change this state if used correctly [21]. The danger of the UAV being used by the enemy lies mainly in the possibility of uncovering the combat formation, finding out the position of the firing point of individual artillery weapon sets, and possibly leading an attack on them using explosives placed on the UAV. In an asymmetrical environment, this way of conducting combat is one of the few ways to put the fire units located in the base area in danger. A coordinated attack can cause significant technical losses and limit the ability to provide artillery fire support in the area of operations. It is therefore appropriate to consider how to defend against such an attack and to provide protection for the artillery fire support units and other base personnel. Placing the defence EW device on the base in such a way, which achieves coverage of the base perimeter, is a suitable variant of solving the problem. In the event of a breach of the base perimeter, the operator is able to ensure the protection of base members and prevent the UAV from flying over the base within the proposed method.
7.3. Partial conclusion of Section 7
This concept of protection against small UAVs will ensure that units are not attacked or uncovered and the risk of losing artillery fire support will not increase. At the same time, the simplicity of the proposed solution will not place excessive demands on interventions in the construction of vehicles or buildings. The solution can be applied to all types of troops and its specialization, wherever the risk of using small UAVs in the combat activities of the enemy can be assumed.
8. Conclusion
UAV defence in a cyber environment combines elements of cyber security and air defence. The development of new methods for attack and defence is necessary due to the dynamics of the development of these areas, which is confirmed by current knowledge from the fighting in Nagorno-Karabakh, where unmanned aerial vehicles and artillery play a major role. One of the possible ways is the proposed solution for penetration into UAS control systems.
The methods described in this article focus on supplementing and extending existing complex solutions of UAV defence models. Their application clearly achieves an increase in capability in the implementation of defensive measures and the fight against the UAV opponent. Simplicity and ease of materials and new inexpensive technical means represent an advantage for application in practice, e.g. in the military environment, as described and suggested by the examples of artillery units.
As the main achievement, authors consider a practical demonstration of the possibility for identifying the device based on the characteristics of the data frames. For this purpose, a neural network was developed which, based on the entered parameters, can evaluate whether the intercepted traffic comes from UAV communication.
As all the UAS defence systems are usually aimed at a certain type of opponent, this concept is not universal. It focuses on complementing the existing comprehensive defence model with more options, thus creating the ability for the defence institutions to fight more effectively with highly sophisticated adversary means.
Subsequent research in this area could be aimed at expanding the input parameters of the neural network and output neurons. The neural network should then be able to identify not only the device or the type of data stream transmitted during UAV operation, but also other types of operation. The whole system could then be used for overall monitoring – for the purpose of using Wi-Fi networks in the area of interest. However, extending this system to such a level could mean a significant intrusion on the privacy of individual users. If implemented in practice, this problem would be forced by the author to solve both at the technical and legal level.
Conflict of Interest
The authors declare no conflict of interest.
Acknowledgment
This work was performed as a part of the project “PROKVES” for Development of Electro – Military Departments at Faculty of Military Technology and “SPECIFIC RESEARCH” at Faculty of Military Leadership, University of Defence in Brno. They have been financed from the Institutional Support Department funded by the Ministry of Defence Czech Republic.
- V. Minařík a M. Krátký, “Cybernetics fight against the UAV”. 2019 International Conference on Military Technologies (ICMT), Brno, Czech Republic: Institute of Electrical and Electronics Engineers Inc., 2019, p. 8870103. ISBN 978-172814593-8.
- M. Kratky and J. Farlik (2018). “Countering UAVs – the Mover of Research in Military Technology“. Defence Science Journal 2018, Vol. 68(5), 460-466. https://doi.org/10.14429/dsj.68.12442.
- NATO C-UAS Working Group, “NATO Countering Class I Unmanned Aircraft Systems (C-UAS) Handbook”. Version 1.8. Brussels, BEL 2020.
- J. Kolouch, “Kybernetické útkoy” [online]. [cit. 2019-01-5]. Available from: https://csirt.cesnet.cz/_media/cs/documents/kyberneticke_utoky.pdf
- T. Kornelly, J. Casar, V. Stary and J. Farlik, “Mobile phone optical sensor usage for navigation tasks” 2017 International Conference on Military Technologies (ICMT), Brno, 2017, pp. 671-675. doi: 10.1109/MILTECHS.2017.7988842.
- V. Minařík, “Elektronický boj v obraně proti bezpilotním prostředkům”. Brno, 2019. Ph.D. exam thesis. University of Defence.
- V. Minařík a M. Krátký, “The Non-destructive Methods of Fight Against UAVs”. 2017 International Conference on Military Technologies (ICMT), Brno, 2017, pp. 690-694. doi: 10.1109/MILTECHS.2017.7988845.
- M. Lastovka, “Data mining jako moderní prostředek analýzy dat a možnosti jeho uplatnění v podmínkách AČR”. Brno, 2015. Diploma thesis. University of Defence.
- “Ethical Hacking and Countermeasures v10”. EC-council, 2018. [Online book] [cit 2019-02-14]. Available from: https://iclass.eccouncil.org/.
- “Rainbow tables tajemství zbavené” [Online article]. 2015 [cit. 2019-01-5]. Available from: https://www.soom.cz/clanky/1165–Rainbow-tables-tajemstvi-zbavene.
- J. Kolouch, P. Bašta, “CYBERSECURITY”. Praha: CZ.NIC, z. s. p. o, 2019. ISBN 978-80-88168-34-8.
- M. Vanhoef, F. Piessens, „Key Reinstallation Attacks: Forcing Nonce Reuse in WPA2” [Online article]. 2017 [cit. 2019-01-5].
- J. R. Bunker, Terrorist and insurgent unmanned aerial vehicles: use, potentials, and military implications. Carlisle, Pennsylvania: US Army war college press, 2005.
- Russian Drone With Thermite Grenade Blows Up a Billion Dollars of Ukrainian Ammo. Popularmechanic [online]. 2017, 27. 7. 2017, [cit. 2020-08-13]. Dostupné z: https://www.popularmechanics.com/military/weapons/news/a27511/russia-drone-thermite-grenade-ukraine-ammo/.
- Donbas: Russian militants use drone to attack Ukrainian positions. 112UA [online]. 1. 6. 2020, [cit. 2020-08-13]. Dostupné z: https://112.international/conflict-in-eastern-ukraine/donbas-russian-militants-use-drone-to-attack-ukrainian-positions-51819.html
- J. Ivan, K. Šilinger, L. Potužák. “Target acquisition systems suitability assessment based on joint fires observer mission criteria determination”. In: Madani K., Gusikhin O. ICINCO 2018 – Proceedings of the 15th International Conference on Informatics in Control, Automation and Robotics. Portugal: SciTePress, 2018, roč. 1, p. 397-404. ISBN 978-989-758-321-6.
- B. Čermák, R. Hegyi, L. Potužák,, M. Kalina, “Bojové použití dělostřelectva”, Military publication Pub-35-14-01, TRAIDOC Vyškov, 2013.
- J. Ivan, ““Situační značky a zkratky pro dělostřelectvo: (vojenská symbolika a taktické značky pro dělostřelectvo dle APP-6)”. University of Defence in Brno. ISBN 978-80-7582-122-5.
- M. Bláha, K. Šilinger, “Application support for topographical-geodetic issues for tactical and technical control of artillery fire”. In: International Journal of Circuits, Systems and Signal Processing, 2018, (12), 48-57. ISSN 1998-4464.
- IVAN, Jan and Jan POTUŽÁK, Jiří ŠOTNAR. Dělostřelecká rekognoskace pro zabezpečení činnosti autonomních zabezpečení činnosti autonomních zbraňových systémů a základní požadavky na rekognoskační jednotky. Vojenské rozhledy. 2019, 28 (4), 063-077. ISSN 1210-3292 (print), 2336-2995 (on-line). Available at: www.vojenskerozhledy.cz.
- KARBER, Phillip A. Lessons Learned from the Russo-Ukrainian War: Personal Observations [online]. 8 July 2015. Available at: https://www.researchgate.net/publication/316122469_Karber_RUS-UKR_War_Lessons_Learned.
- Hanan Hassan Ali Adlan, Elsadig Ahmed Mohamed Babiker, "Efficient Pattern Recognition Resource Utilization Neural Network ", Advances in Science, Technology and Engineering Systems Journal, vol. 11, no. 1, pp. 44–50, 2026. doi: 10.25046/aj110105
- Kohinur Parvin, Eshat Ahmad Shuvo, Wali Ashraf Khan, Sakibul Alam Adib, Tahmina Akter Eiti, Mohammad Shovon, Shoeb Akter Nafiz, "Computationally Efficient Explainable AI Framework for Skin Cancer Detection", Advances in Science, Technology and Engineering Systems Journal, vol. 11, no. 1, pp. 11–24, 2026. doi: 10.25046/aj110102
- David Degbor, Haiping Xu, Pratiksha Singh, Shannon Gibbs, Donghui Yan, "StradNet: Automated Structural Adaptation for Efficient Deep Neural Network Design", Advances in Science, Technology and Engineering Systems Journal, vol. 10, no. 6, pp. 29–41, 2025. doi: 10.25046/aj100603
- Jenna Snead, Nisa Soltani, Mia Wang, Joe Carson, Bailey Williamson, Kevin Gainey, Stanley McAfee, Qian Zhang, "3D Facial Feature Tracking with Multimodal Depth Fusion", Advances in Science, Technology and Engineering Systems Journal, vol. 10, no. 5, pp. 11–19, 2025. doi: 10.25046/aj100502
- Surapol Vorapatratorn, Nontawat Thongsibsong, "AI-Based Photography Assessment System using Convolutional Neural Networks", Advances in Science, Technology and Engineering Systems Journal, vol. 10, no. 2, pp. 28–34, 2025. doi: 10.25046/aj100203
- Abhishek Shrestha, Jürgen Großmann, "On Adversarial Robustness of Quantized Neural Networks Against Direct Attacks", Advances in Science, Technology and Engineering Systems Journal, vol. 9, no. 6, pp. 30–46, 2024. doi: 10.25046/aj090604
- Win Pa Pa San, Myo Khaing, "Advanced Fall Analysis for Elderly Monitoring Using Feature Fusion and CNN-LSTM: A Multi-Camera Approach", Advances in Science, Technology and Engineering Systems Journal, vol. 9, no. 6, pp. 12–20, 2024. doi: 10.25046/aj090602
- Toya Acharya, Annamalai Annamalai, Mohamed F Chouikha, "Enhancing the Network Anomaly Detection using CNN-Bidirectional LSTM Hybrid Model and Sampling Strategies for Imbalanced Network Traffic Data", Advances in Science, Technology and Engineering Systems Journal, vol. 9, no. 1, pp. 67–78, 2024. doi: 10.25046/aj090107
- Afrodite Papagiannopoulou, Chrissanthi Angeli, "Social Media Text Summarization: A Survey Towards a Transformer-based System Design", Advances in Science, Technology and Engineering Systems Journal, vol. 8, no. 6, pp. 26–36, 2023. doi: 10.25046/aj080604
- Kitipoth Wasayangkool, Kanabadee Srisomboon, Chatree Mahatthanajatuphat, Wilaiporn Lee, "Accuracy Improvement-Based Wireless Sensor Estimation Technique with Machine Learning Algorithms for Volume Estimation on the Sealed Box", Advances in Science, Technology and Engineering Systems Journal, vol. 8, no. 3, pp. 108–117, 2023. doi: 10.25046/aj080313
- Mario Cuomo, Federica Massimi, Francesco Benedetto, "Detecting CTC Attack in IoMT Communications using Deep Learning Approach", Advances in Science, Technology and Engineering Systems Journal, vol. 8, no. 2, pp. 130–138, 2023. doi: 10.25046/aj080215
- Temsamani Khallouk Yassine, Achchab Said, Laouami Lamia, Faridi Mohammed, "Hybrid Discriminant Neural Networks for Performance Job Prediction", Advances in Science, Technology and Engineering Systems Journal, vol. 8, no. 2, pp. 116–122, 2023. doi: 10.25046/aj080213
- Anh-Thu Mai, Duc-Huy Nguyen, Thanh-Tin Dang, "Transfer and Ensemble Learning in Real-time Accurate Age and Age-group Estimation", Advances in Science, Technology and Engineering Systems Journal, vol. 7, no. 6, pp. 262–268, 2022. doi: 10.25046/aj070630
- Brahim Zraibi, Mohamed Mansouri, Salah Eddine Loukili, Said Ben Alla, "Hybrid Neural Network Method for Predicting the SOH and RUL of Lithium-Ion Batteries", Advances in Science, Technology and Engineering Systems Journal, vol. 7, no. 5, pp. 193–198, 2022. doi: 10.25046/aj070520
- Nosiri Onyebuchi Chikezie, Umanah Cyril Femi, Okechukwu Olivia Ozioma, Ajayi Emmanuel Oluwatomisin, Akwiwu-Uzoma Chukwuebuka, Njoku Elvis Onyekachi, Gbenga Christopher Kalejaiye, "BER Performance Evaluation Using Deep Learning Algorithm for Joint Source Channel Coding in Wireless Networks", Advances in Science, Technology and Engineering Systems Journal, vol. 7, no. 4, pp. 127–139, 2022. doi: 10.25046/aj070417
- Jayan Kant Duggal, Mohamed El-Sharkawy, "High Performance SqueezeNext: Real time deployment on Bluebox 2.0 by NXP", Advances in Science, Technology and Engineering Systems Journal, vol. 7, no. 3, pp. 70–81, 2022. doi: 10.25046/aj070308
- Hanae Naoum, Sidi Mohamed Benslimane, Mounir Boukadoum, "Encompassing Chaos in Brain-inspired Neural Network Models for Substance Identification and Breast Cancer Detection", Advances in Science, Technology and Engineering Systems Journal, vol. 7, no. 3, pp. 32–43, 2022. doi: 10.25046/aj070304
- Idir Boulfrifi, Mohamed Lahraichi, Khalid Housni, "Video Risk Detection and Localization using Bidirectional LSTM Autoencoder and Faster R-CNN", Advances in Science, Technology and Engineering Systems Journal, vol. 6, no. 6, pp. 145–150, 2021. doi: 10.25046/aj060619
- Giuseppe Spampinato, Arcangelo Ranieri Bruna, Ivana Guarneri, Davide Giacalone, "Neural Network for 2D Range Scanner Navigation System", Advances in Science, Technology and Engineering Systems Journal, vol. 6, no. 5, pp. 348–355, 2021. doi: 10.25046/aj060539
- Seok-Jun Bu, Hae-Jung Kim, "Ensemble Learning of Deep URL Features based on Convolutional Neural Network for Phishing Attack Detection", Advances in Science, Technology and Engineering Systems Journal, vol. 6, no. 5, pp. 291–296, 2021. doi: 10.25046/aj060532
- Osaretin Eboya, Julia Binti Juremi, "iDRP Framework: An Intelligent Malware Exploration Framework for Big Data and Internet of Things (IoT) Ecosystem", Advances in Science, Technology and Engineering Systems Journal, vol. 6, no. 5, pp. 185–202, 2021. doi: 10.25046/aj060521
- Radwan Qasrawi, Stephanny VicunaPolo, Diala Abu Al-Halawa, Sameh Hallaq, Ziad Abdeen, "Predicting School Children Academic Performance Using Machine Learning Techniques", Advances in Science, Technology and Engineering Systems Journal, vol. 6, no. 5, pp. 08–15, 2021. doi: 10.25046/aj060502
- Fatima-Ezzahra Lagrari, Youssfi Elkettani, "Traditional and Deep Learning Approaches for Sentiment Analysis: A Survey", Advances in Science, Technology and Engineering Systems Journal, vol. 6, no. 5, pp. 01–07, 2021. doi: 10.25046/aj060501
- Liang Chen, Mo-How Herman Shen, "A New Topology Optimization Approach by Physics-Informed Deep Learning Process", Advances in Science, Technology and Engineering Systems Journal, vol. 6, no. 4, pp. 233–240, 2021. doi: 10.25046/aj060427
- Saichon Sinsomboonthong, "Efficiency Comparison in Prediction of Normalization with Data Mining Classification", Advances in Science, Technology and Engineering Systems Journal, vol. 6, no. 4, pp. 130–137, 2021. doi: 10.25046/aj060415
- Valerii Dmitrienko, Serhii Leonov, Aleksandr Zakovorotniy, "New Neural Networks for the Affinity Functions of Binary Images with Binary and Bipolar Components Determining", Advances in Science, Technology and Engineering Systems Journal, vol. 6, no. 4, pp. 91–99, 2021. doi: 10.25046/aj060411
- Anjali Banga, Pradeep Kumar Bhatia, "Optimized Component based Selection using LSTM Model by Integrating Hybrid MVO-PSO Soft Computing Technique", Advances in Science, Technology and Engineering Systems Journal, vol. 6, no. 4, pp. 62–71, 2021. doi: 10.25046/aj060408
- Kwun-Ping Lai, Jackie Chun-Sing Ho, Wai Lam, "Exploiting Domain-Aware Aspect Similarity for Multi-Source Cross-Domain Sentiment Classification", Advances in Science, Technology and Engineering Systems Journal, vol. 6, no. 4, pp. 01–12, 2021. doi: 10.25046/aj060401
- Svetlana Segarceanu, George Suciu, Inge Gavăt, "Environmental Acoustics Modelling Techniques for Forest Monitoring", Advances in Science, Technology and Engineering Systems Journal, vol. 6, no. 3, pp. 15–26, 2021. doi: 10.25046/aj060303
- Bakhtyar Ahmed Mohammed, Muzhir Shaban Al-Ani, "Follow-up and Diagnose COVID-19 Using Deep Learning Technique", Advances in Science, Technology and Engineering Systems Journal, vol. 6, no. 2, pp. 971–976, 2021. doi: 10.25046/aj0602111
- Showkat Ahmad Dar, S Palanivel, "Performance Evaluation of Convolutional Neural Networks (CNNs) And VGG on Real Time Face Recognition System", Advances in Science, Technology and Engineering Systems Journal, vol. 6, no. 2, pp. 956–964, 2021. doi: 10.25046/aj0602109
- Kenza Aitelkadi, Hicham Outmghoust, Salahddine laarab, Kaltoum Moumayiz, Imane Sebari, "Detection and Counting of Fruit Trees from RGB UAV Images by Convolutional Neural Networks Approach", Advances in Science, Technology and Engineering Systems Journal, vol. 6, no. 2, pp. 887–893, 2021. doi: 10.25046/aj0602101
- Binghan Li, Yindong Hua, Mi Lu, "Advanced Multiple Linear Regression Based Dark Channel Prior Applied on Dehazing Image and Generating Synthetic Haze", Advances in Science, Technology and Engineering Systems Journal, vol. 6, no. 2, pp. 790–800, 2021. doi: 10.25046/aj060291
- Abraham Adiputra Wijaya, Inten Yasmina, Amalia Zahra, "Indonesian Music Emotion Recognition Based on Audio with Deep Learning Approach", Advances in Science, Technology and Engineering Systems Journal, vol. 6, no. 2, pp. 716–721, 2021. doi: 10.25046/aj060283
- Shahnaj Parvin, Liton Jude Rozario, Md. Ezharul Islam, "Vehicle Number Plate Detection and Recognition Techniques: A Review", Advances in Science, Technology and Engineering Systems Journal, vol. 6, no. 2, pp. 423–438, 2021. doi: 10.25046/aj060249
- Md. Ashfaqul Islam, Maisha Hasnin, Nayeem Iftakhar, Md. Mushfiqur Rahman, "Super Resolution Based Underwater Image Enhancement by Illumination Adjustment and Color Correction with Fusion Technique", Advances in Science, Technology and Engineering Systems Journal, vol. 6, no. 2, pp. 36–42, 2021. doi: 10.25046/aj060205
- Byeongwoo Kim, Jongkyu Lee, "Fault Diagnosis and Noise Robustness Comparison of Rotating Machinery using CWT and CNN", Advances in Science, Technology and Engineering Systems Journal, vol. 6, no. 1, pp. 1279–1285, 2021. doi: 10.25046/aj0601146
- Basavaraj Madagouda, R. Sumathi, "Artificial Neural Network Approach using Mobile Agent for Localization in Wireless Sensor Networks", Advances in Science, Technology and Engineering Systems Journal, vol. 6, no. 1, pp. 1137–1144, 2021. doi: 10.25046/aj0601127
- Alisson Steffens Henrique, Anita Maria da Rocha Fernandes, Rodrigo Lyra, Valderi Reis Quietinho Leithardt, Sérgio D. Correia, Paul Crocker, Rudimar Luis Scaranto Dazzi, "Classifying Garments from Fashion-MNIST Dataset Through CNNs", Advances in Science, Technology and Engineering Systems Journal, vol. 6, no. 1, pp. 989–994, 2021. doi: 10.25046/aj0601109
- Reem Bayari, Ameur Bensefia, "Text Mining Techniques for Cyberbullying Detection: State of the Art", Advances in Science, Technology and Engineering Systems Journal, vol. 6, no. 1, pp. 783–790, 2021. doi: 10.25046/aj060187
- Imane Jebli, Fatima-Zahra Belouadha, Mohammed Issam Kabbaj, Amine Tilioua, "Deep Learning based Models for Solar Energy Prediction", Advances in Science, Technology and Engineering Systems Journal, vol. 6, no. 1, pp. 349–355, 2021. doi: 10.25046/aj060140
- Karamath Ateeq, Manas Ranjan Pradhan, Beenu Mago, "Elasticity Based Med-Cloud Recommendation System for Diabetic Prediction in Cloud Computing Environment", Advances in Science, Technology and Engineering Systems Journal, vol. 5, no. 6, pp. 1618–1633, 2020. doi: 10.25046/aj0506193
- Revanna Sidamma Kavitha, Uppara Eranna, Mahendra Nanjappa Giriprasad, "A Computational Modelling and Algorithmic Design Approach of Digital Watermarking in Deep Neural Networks", Advances in Science, Technology and Engineering Systems Journal, vol. 5, no. 6, pp. 1560–1568, 2020. doi: 10.25046/aj0506187
- Majdouline Meddad, Chouaib Moujahdi, Mounia Mikram, Mohammed Rziza, "Optimization of Multi-user Face Identification Systems in Big Data Environments", Advances in Science, Technology and Engineering Systems Journal, vol. 5, no. 6, pp. 762–767, 2020. doi: 10.25046/aj050691
- Zdenko Balaž, Krystian Wawrzynek, "Cognitive Cybernetics in the Foresight of Globalitarianism", Advances in Science, Technology and Engineering Systems Journal, vol. 5, no. 6, pp. 718–723, 2020. doi: 10.25046/aj050686
- Yohei Yamauchi, Mitsuyuki Saito, "Adaptive Identification Method of Vehicle Model for Autonomous Driving Robust to Environmental Disturbances", Advances in Science, Technology and Engineering Systems Journal, vol. 5, no. 6, pp. 710–717, 2020. doi: 10.25046/aj050685
- Marcel Nicola, Marian Duță, Maria-Cristina Nițu, Ancuța-Mihaela Aciu, Claudiu-Ionel Nicola, "Improved System Based on ANFIS for Determining the Degree of Polymerization", Advances in Science, Technology and Engineering Systems Journal, vol. 5, no. 6, pp. 664–675, 2020. doi: 10.25046/aj050680
- Khalid Chennoufi, Mohammed Ferfra, "Fast and Efficient Maximum Power Point Tracking Controller for Photovoltaic Modules", Advances in Science, Technology and Engineering Systems Journal, vol. 5, no. 6, pp. 606–612, 2020. doi: 10.25046/aj050674
- Kin Yun Lum, Yeh Huann Goh, Yi Bin Lee, "American Sign Language Recognition Based on MobileNetV2", Advances in Science, Technology and Engineering Systems Journal, vol. 5, no. 6, pp. 481–488, 2020. doi: 10.25046/aj050657
- Gede Putra Kusuma, Jonathan, Andreas Pangestu Lim, "Emotion Recognition on FER-2013 Face Images Using Fine-Tuned VGG-16", Advances in Science, Technology and Engineering Systems Journal, vol. 5, no. 6, pp. 315–322, 2020. doi: 10.25046/aj050638
- Lubna Abdelkareim Gabralla, "Dense Deep Neural Network Architecture for Keystroke Dynamics Authentication in Mobile Phone", Advances in Science, Technology and Engineering Systems Journal, vol. 5, no. 6, pp. 307–314, 2020. doi: 10.25046/aj050637
- Kailerk Treetipsounthorn, Thanisorn Sriudomporn, Gridsada Phanomchoeng, Christian Dengler, Setha Panngum, Sunhapos Chantranuwathana, Ali Zemouche, "Vehicle Rollover Detection in Tripped and Untripped Rollovers using Recurrent Neural Networks", Advances in Science, Technology and Engineering Systems Journal, vol. 5, no. 6, pp. 228–238, 2020. doi: 10.25046/aj050627
- Andrea Generosi, Silvia Ceccacci, Samuele Faggiano, Luca Giraldi, Maura Mengoni, "A Toolkit for the Automatic Analysis of Human Behavior in HCI Applications in the Wild", Advances in Science, Technology and Engineering Systems Journal, vol. 5, no. 6, pp. 185–192, 2020. doi: 10.25046/aj050622
- Fei Gao, Jiangjiang Liu, "Effective Segmented Face Recognition (SFR) for IoT", Advances in Science, Technology and Engineering Systems Journal, vol. 5, no. 6, pp. 36–44, 2020. doi: 10.25046/aj050605
- Sherif H. ElGohary, Aya Lithy, Shefaa Khamis, Aya Ali, Aya Alaa el-din, Hager Abd El-Azim, "Interactive Virtual Rehabilitation for Aphasic Arabic-Speaking Patients", Advances in Science, Technology and Engineering Systems Journal, vol. 5, no. 5, pp. 1225–1232, 2020. doi: 10.25046/aj0505148
- Daniyar Nurseitov, Kairat Bostanbekov, Maksat Kanatov, Anel Alimova, Abdelrahman Abdallah, Galymzhan Abdimanap, "Classification of Handwritten Names of Cities and Handwritten Text Recognition using Various Deep Learning Models", Advances in Science, Technology and Engineering Systems Journal, vol. 5, no. 5, pp. 934–943, 2020. doi: 10.25046/aj0505114
- Zahra Jafari, Saman Rajebi, Siyamak Haghipour, "Using the Neural Network to Diagnose the Severity of Heart Disease in Patients Using General Specifications and ECG Signals Received from the Patients", Advances in Science, Technology and Engineering Systems Journal, vol. 5, no. 5, pp. 882–892, 2020. doi: 10.25046/aj0505108
- Gökalp Çınarer, Bülent Gürsel Emiroğlu, Recep Sinan Arslan, Ahmet Haşim Yurttakal, "Brain Tumor Classification Using Deep Neural Network", Advances in Science, Technology and Engineering Systems Journal, vol. 5, no. 5, pp. 765–769, 2020. doi: 10.25046/aj050593
- Lana Abdulrazaq Abdullah, Muzhir Shaban Al-Ani, "CNN-LSTM Based Model for ECG Arrhythmias and Myocardial Infarction Classification", Advances in Science, Technology and Engineering Systems Journal, vol. 5, no. 5, pp. 601–606, 2020. doi: 10.25046/aj050573
- Chigozie Enyinna Nwankpa, "Advances in Optimisation Algorithms and Techniques for Deep Learning", Advances in Science, Technology and Engineering Systems Journal, vol. 5, no. 5, pp. 563–577, 2020. doi: 10.25046/aj050570
- Hicham Moujahid, Bouchaib Cherradi, Oussama El Gannour, Lhoussain Bahatti, Oumaima Terrada, Soufiane Hamida, "Convolutional Neural Network Based Classification of Patients with Pneumonia using X-ray Lung Images", Advances in Science, Technology and Engineering Systems Journal, vol. 5, no. 5, pp. 167–175, 2020. doi: 10.25046/aj050522
- Mohsine Elkhayati, Youssfi Elkettani, "Towards Directing Convolutional Neural Networks Using Computational Geometry Algorithms: Application to Handwritten Arabic Character Recognition", Advances in Science, Technology and Engineering Systems Journal, vol. 5, no. 5, pp. 137–147, 2020. doi: 10.25046/aj050519
- Nghia Duong-Trung, Luyl-Da Quach, Chi-Ngon Nguyen, "Towards Classification of Shrimp Diseases Using Transferred Convolutional Neural Networks", Advances in Science, Technology and Engineering Systems Journal, vol. 5, no. 4, pp. 724–732, 2020. doi: 10.25046/aj050486
- Adonis Santos, Patricia Angela Abu, Carlos Oppus, Rosula Reyes, "Real-Time Traffic Sign Detection and Recognition System for Assistive Driving", Advances in Science, Technology and Engineering Systems Journal, vol. 5, no. 4, pp. 600–611, 2020. doi: 10.25046/aj050471
- Amar Choudhary, Deependra Pandey, Saurabh Bhardwaj, "Overview of Solar Radiation Estimation Techniques with Development of Solar Radiation Model Using Artificial Neural Network", Advances in Science, Technology and Engineering Systems Journal, vol. 5, no. 4, pp. 589–593, 2020. doi: 10.25046/aj050469
- Mohammed Qbadou, Intissar Salhi, Hanaâ El fazazi, Khalifa Mansouri, Michail Manios, Vassilis Kaburlasos, "Human-Robot Multilingual Verbal Communication – The Ontological knowledge and Learning-based Models", Advances in Science, Technology and Engineering Systems Journal, vol. 5, no. 4, pp. 540–547, 2020. doi: 10.25046/aj050464
- Marco Bindi, Igor Aizenberg, Riccardo Belardi, Francesco Grasso, Antonio Luchetta, Stefano Manetti, Maria Cristina Piccirilli, "Neural Network-Based Fault Diagnosis of Joints in High Voltage Electrical Lines", Advances in Science, Technology and Engineering Systems Journal, vol. 5, no. 4, pp. 488–498, 2020. doi: 10.25046/aj050458
- Deborah Ooi Yee Hui, Syaheerah Lebai Lutfi, Syibrah Naim, Zahid Akhtar, Ahmad Sufril Azlan Mohamed, Kamran Siddique, "The Sound of Trust: Towards Modelling Computational Trust using Voice-only Cues at Zero-Acquaintance", Advances in Science, Technology and Engineering Systems Journal, vol. 5, no. 4, pp. 469–476, 2020. doi: 10.25046/aj050456
- Roberta Avanzato, Francesco Beritelli, "A CNN-based Differential Image Processing Approach for Rainfall Classification", Advances in Science, Technology and Engineering Systems Journal, vol. 5, no. 4, pp. 438–444, 2020. doi: 10.25046/aj050452
- Van-Hung Le, Hung-Cuong Nguyen, "A Survey on 3D Hand Skeleton and Pose Estimation by Convolutional Neural Network", Advances in Science, Technology and Engineering Systems Journal, vol. 5, no. 4, pp. 144–159, 2020. doi: 10.25046/aj050418
- Jesuretnam Josemila Baby, James Rose Jeba, "A Hybrid Approach for Intrusion Detection using Integrated K-Means based ANN with PSO Optimization", Advances in Science, Technology and Engineering Systems Journal, vol. 5, no. 3, pp. 317–323, 2020. doi: 10.25046/aj050341
- Neptali Montañez, Jomari Joseph Barrera, "Automated Abaca Fiber Grade Classification Using Convolution Neural Network (CNN)", Advances in Science, Technology and Engineering Systems Journal, vol. 5, no. 3, pp. 207–213, 2020. doi: 10.25046/aj050327
- Yeji Shin, Youngone Cho, Hyun Wook Kang, Jin-Gu Kang, Jin-Woo Jung, "Neural Network-based Efficient Measurement Method on Upside Down Orientation of a Digital Document", Advances in Science, Technology and Engineering Systems Journal, vol. 5, no. 2, pp. 697–702, 2020. doi: 10.25046/aj050286
- Jan Sikora, David Fojtík, "Classification of Timber Load on Trucks", Advances in Science, Technology and Engineering Systems Journal, vol. 5, no. 2, pp. 683–687, 2020. doi: 10.25046/aj050284
- Ahmed EL Orche, Mohamed Bahaj, "Approach to Combine an Ontology-Based on Payment System with Neural Network for Transaction Fraud Detection", Advances in Science, Technology and Engineering Systems Journal, vol. 5, no. 2, pp. 551–560, 2020. doi: 10.25046/aj050269
- Ola Surakhi, Sami Serhan, Imad Salah, "On the Ensemble of Recurrent Neural Network for Air Pollution Forecasting: Issues and Challenges", Advances in Science, Technology and Engineering Systems Journal, vol. 5, no. 2, pp. 512–526, 2020. doi: 10.25046/aj050265
- Bokyoon Na, Geoffrey C Fox, "Object Classifications by Image Super-Resolution Preprocessing for Convolutional Neural Networks", Advances in Science, Technology and Engineering Systems Journal, vol. 5, no. 2, pp. 476–483, 2020. doi: 10.25046/aj050261
- Jude B. Rola, Cherry Lyn C. Sta. Romana, Larmie S. Feliscuzo, Ivy Fe M. Lopez, Cherry N. Rola, "A Comparative Analysis of ARIMA and Feed-Forward Neural Network Prognostic Model for Bull Services", Advances in Science, Technology and Engineering Systems Journal, vol. 5, no. 2, pp. 411–418, 2020. doi: 10.25046/aj050253
- Halima Begum, Muhammed Mazharul Islam, "A Study on the Effects of Combining Different Features for the Recognition of Handwritten Bangla Characters", Advances in Science, Technology and Engineering Systems Journal, vol. 5, no. 2, pp. 197–203, 2020. doi: 10.25046/aj050225
- Lenin G. Falconi, Maria Perez, Wilbert G. Aguilar, Aura Conci, "Transfer Learning and Fine Tuning in Breast Mammogram Abnormalities Classification on CBIS-DDSM Database", Advances in Science, Technology and Engineering Systems Journal, vol. 5, no. 2, pp. 154–165, 2020. doi: 10.25046/aj050220
- Daihui Li, Chengxu Ma, Shangyou Zeng, "Design of Efficient Convolutional Neural Module Based on An Improved Module", Advances in Science, Technology and Engineering Systems Journal, vol. 5, no. 1, pp. 340–345, 2020. doi: 10.25046/aj050143
- Audrey Huong, Xavier Ngu, "Skin Tissue Oxygen Saturation Prediction: A Comparison Study of Artificial Intelligence Techniques", Advances in Science, Technology and Engineering Systems Journal, vol. 5, no. 1, pp. 334–339, 2020. doi: 10.25046/aj050142
- Farah Nadia Ibrahim, Zalhan Mohd Zin, Norazlin Ibrahim, "Eye Feature Extraction with Calibration Model using Viola-Jones and Neural Network Algorithms", Advances in Science, Technology and Engineering Systems Journal, vol. 4, no. 6, pp. 208–215, 2019. doi: 10.25046/aj040627
- Ivan P. Yamshchikov, Alexey Tikhonov, "Learning Literary Style End-to-end with Artificial Neural Networks", Advances in Science, Technology and Engineering Systems Journal, vol. 4, no. 6, pp. 115–125, 2019. doi: 10.25046/aj040614
- Michael Santacroce, Daniel Koranek, Rashmi Jha, "Detecting Malicious Assembly using Convolutional, Recurrent Neural Networks", Advances in Science, Technology and Engineering Systems Journal, vol. 4, no. 5, pp. 46–52, 2019. doi: 10.25046/aj040506
- M. Monica Subashini, Abhinav Deshpande, Ramani Kannan, "Study and Implementation of Various Image De-Noising Methods for Traffic Sign Board Recognition", Advances in Science, Technology and Engineering Systems Journal, vol. 4, no. 4, pp. 545–560, 2019. doi: 10.25046/aj040466
- Mohamad Faiz Ahmad, Syed Sahal Nazli Alhady, Ooi Zhu Oon, Wan Amir Fuad Wajdi Othman, Aeizaal Azman Abdul Wahab, Ahmad Afiq Muhammad Zahir, "Embedded Artificial Neural Network FPGA Controlled Cart", Advances in Science, Technology and Engineering Systems Journal, vol. 4, no. 4, pp. 509–516, 2019. doi: 10.25046/aj040461
- Alimam Mohammed Karim, Alimam Mohammed Abdellah, Seghuiouer Hamid, "Long-term Traffic Flow Forecasting Based on an Artificial Neural Network", Advances in Science, Technology and Engineering Systems Journal, vol. 4, no. 4, pp. 323–327, 2019. doi: 10.25046/aj040441
- Priyamvada Chandel, Tripta Thakur, "Smart Meter Data Analysis for Electricity Theft Detection using Neural Networks", Advances in Science, Technology and Engineering Systems Journal, vol. 4, no. 4, pp. 161–168, 2019. doi: 10.25046/aj040420
- Ajees Arimbassery Pareed, Sumam Mary Idicula, "A Relation Extraction System for Indian Languages", Advances in Science, Technology and Engineering Systems Journal, vol. 4, no. 2, pp. 65–69, 2019. doi: 10.25046/aj040208
- Eralda Gjika, Aurora Ferrja, Arbesa Kamberi, "A Study on the Efficiency of Hybrid Models in Forecasting Precipitations and Water Inflow Albania Case Study", Advances in Science, Technology and Engineering Systems Journal, vol. 4, no. 1, pp. 302–310, 2019. doi: 10.25046/aj040129
- Samuel Oludare Bamgbose, Xiangfang Li, Lijun Qian, "Trajectory Tracking Control Optimization with Neural Network for Autonomous Vehicles", Advances in Science, Technology and Engineering Systems Journal, vol. 4, no. 1, pp. 217–224, 2019. doi: 10.25046/aj040121
- Bok Gyu Han, Hyeon Seok Yang, Ho Gyeong Lee, Young Shik Moon, "Low Contrast Image Enhancement Using Convolutional Neural Network with Simple Reflection Model", Advances in Science, Technology and Engineering Systems Journal, vol. 4, no. 1, pp. 159–164, 2019. doi: 10.25046/aj040115
- Ali I. Hammoodi, Mariofanna Milanova, Haider Raad, "Elliptical Printed Dipole Antenna Design using ANN Based on Levenberg–Marquardt Algorithm", Advances in Science, Technology and Engineering Systems Journal, vol. 3, no. 5, pp. 394–397, 2018. doi: 10.25046/aj030545
- Margaret Lech, Melissa Stolar, Robert Bolia, Michael Skinner, "Amplitude-Frequency Analysis of Emotional Speech Using Transfer Learning and Classification of Spectrogram Images", Advances in Science, Technology and Engineering Systems Journal, vol. 3, no. 4, pp. 363–371, 2018. doi: 10.25046/aj030437
- Alaa Hamza Omran, Yaser Muhammad Abid, "Design of smart chess board that can predict the next position based on FPGA", Advances in Science, Technology and Engineering Systems Journal, vol. 3, no. 4, pp. 193–200, 2018. doi: 10.25046/aj030417
- Rasel Ahmmed, Md. Asadur Rahman, Md. Foisal Hossain, "An Advanced Algorithm Combining SVM and ANN Classifiers to Categorize Tumor with Position from Brain MRI Images", Advances in Science, Technology and Engineering Systems Journal, vol. 3, no. 2, pp. 40–48, 2018. doi: 10.25046/aj030205
- An-Ting Cheng, Chun-Yen Chen, Bo-Cheng Lai, Che-Huai Lin, "Software and Hardware Enhancement of Convolutional Neural Networks on GPGPUs", Advances in Science, Technology and Engineering Systems Journal, vol. 3, no. 2, pp. 28–39, 2018. doi: 10.25046/aj030204
- Sougata Sheet, Anupam Ghosh, Sudhindu Bikash Mandal, "Cancer Mediating Genes Recognition using Multilayer Perceptron Model- An Application on Human Leukemia", Advances in Science, Technology and Engineering Systems Journal, vol. 3, no. 2, pp. 8–20, 2018. doi: 10.25046/aj030202
- Eleni Bougioukou, Nikolaos Toulgaridis, Maria Varsamou, Theodore Antonakopoulos, "Hardware Acceleration on Cloud Services: The use of Restricted Boltzmann Machines on Handwritten Digits Recognition", Advances in Science, Technology and Engineering Systems Journal, vol. 3, no. 1, pp. 483–495, 2018. doi: 10.25046/aj030159