Search Results

Results (32)

Search Parameters:

Keyword: Integrity
Order results
Results per page
Open AccessArticle
12 Pages, 1,497 KB Download PDF

Prototype to Mitigate the Risks, Vulnerabilities and Threats of Information to Ensure Data Integrity

Advances in Science, Technology and Engineering Systems Journal, Volume 7, Issue 6, Page # 139–150, 2022; DOI: 10.25046/aj070614
Abstract:

The constant evolution of Information and Communication Technologies, Internet, access to different free software, among others; they generate problems in the management of information security in companies; to mitigate risks, vulnerabilities, and information threats, an alternative was presented considering that information security systems are the basis for decision-making at the government, strategic, tactical, and operational…

Read More
(This article belongs to Section Information Systems in Computer Science (CIS))
Open AccessArticle
6 Pages, 1,518 KB Download PDF

Impact of Crosstalk on Signal Integrity of TSVs in 3D Integrated Circuits

Advances in Science, Technology and Engineering Systems Journal, Volume 3, Issue 1, Page # 109–114, 2018; DOI: 10.25046/aj030113
Abstract:

Through-Silicon-Vias (TSVs) are utilized for high density 3D integration, which induce crosstalk problems and impact signal integrity. This paper focuses on TSV crosstalk characterization in 3D integrated circuits, where several TSV physical and environmental configurations are investigated. In particular, this work shows a detailed study on the influence of signal-ground TSV locations, distances and their…

Read More
(This article belongs to the SP4 (Special issue on Advancement in Engineering Technology 2017-18) & Section Electronic Engineering (EEE))
Open AccessArticle
10 Pages, 1,323 KB Download PDF

A Novel Approach to Sensor and Actuator Integrity Monitoring and Fault Magnitude Reconstruction

Advances in Science, Technology and Engineering Systems Journal, Volume 2, Issue 3, Page # 1748–1757, 2017; DOI: 10.25046/aj0203214
Abstract:

This paper proposes a novel approach to sensor and actuator integrity monitoring in a dynamic system. Multiple sensor and actuator faults can be detected. Furthermore, faulty sensors and actuators are isolated by contribution analysis. Most importantly, fault magnitudes can be correctly estimated and failed sensors or actuators outputs can be reconstructed. The proposed approach is…

Read More
(This article belongs to the SP3 (Special issue on Recent Advances in Engineering Systems 2017) & Section Automation & Control Systems (ACS))
Open AccessArticle
11 Pages, 1,545 KB Download PDF

Multi Level Integrity Management in LTE/LTE-A Networks

Advances in Science, Technology and Engineering Systems Journal, Volume 2, Issue 3, Page # 658–668, 2017; DOI: 10.25046/aj020384
Abstract:

The sector of telecommunications is experiencing a large growth and rapid change in developing applications due to the variety of technologies, to increase the number of users and to arrival services varied from the high demand of the service quality such as streaming, web navigation. In this regard, the 3rd Generation Partnership Project (3GPP) organization…

Read More
(This article belongs to the SP3 (Special issue on Recent Advances in Engineering Systems 2017) & Section Telecommunications (TEL))
Open AccessArticle
12 Pages, 1,302 KB Download PDF

Federated Learning with Differential Privacy and Blockchain for Security and Privacy in IoMT A Theoretical Comparison and Review

Advances in Science, Technology and Engineering Systems Journal, Volume 10, Issue 6, Page # 65–76, 2025; DOI: 10.25046/aj100606
Abstract:

The growing integration of the Internet of Medical Things (IoMT) into healthcare has amplified the need for secure and privacy-preserving artificial intelligence. Federated Learning (FL) has emerged as a pivotal paradigm for decentralized medical data processing; however, it still faces challenges concerning data confidentiality, trust management, and scalability. This review presents an extended theoretical comparison…

Read More
(This article belongs to the SP19 (Special Issue on Innovation in Computing, Engineering Science & Technology 2025-26) & Section Artificial Intelligence in Computer Science (CAI))
Open AccessArticle
12 Pages, 1,016 KB Download PDF

Enhancing the Network Anomaly Detection using CNN-Bidirectional LSTM Hybrid Model and Sampling Strategies for Imbalanced Network Traffic Data

Advances in Science, Technology and Engineering Systems Journal, Volume 9, Issue 1, Page # 67–78, 2024; DOI: 10.25046/aj090107
Abstract:

The cybercriminal utilized the skills and freely available tools to breach the networks of internet-connected devices by exploiting confidentiality, integrity, and availability. Network anomaly detection is crucial for ensuring the security of information resources. Detecting abnormal network behavior poses challenges because of the extensive data, imbalanced attack class nature, and the abundance of features in…

Read More
(This article belongs to the SP16 (Special Issue on Computing, Engineering and Multidisciplinary Sciences 2024) & Section Cybernetics in Computer Science (CCY))
Open AccessArticle
11 Pages, 1,143 KB Download PDF

Optimizing the Performance of Network Anomaly Detection Using Bidirectional Long Short-Term Memory (Bi-LSTM) and Over-sampling for Imbalance Network Traffic Data

Advances in Science, Technology and Engineering Systems Journal, Volume 8, Issue 6, Page # 144–154, 2023; DOI: 10.25046/aj080614
Abstract:

Cybercriminal exploits integrity, confidentiality, and availability of information resources. Cyberattacks are typically invisible to the naked eye, even though they target a wide range of our digital assets, such as internet-connected smart devices, computers, and networking devices. Implementing network anomaly detection proves to be an effective method for identifying these malicious activities. The traditional anomaly…

Read More
(This article belongs to the SP15 (Special Issue on Innovation in Computing, Engineering Science & Technology 2023) & Section Cybernetics in Computer Science (CCY))
Open AccessArticle
9 Pages, 3,409 KB Download PDF

Detecting CTC Attack in IoMT Communications using Deep Learning Approach

Advances in Science, Technology and Engineering Systems Journal, Volume 8, Issue 2, Page # 130–138, 2023; DOI: 10.25046/aj080215
Abstract:

Cyber security is based on different principles such as confidentiality and integrity of transmitted data. One of the main methods to send confidential messages is to use a shared secret to encrypt and decrypt them. Even if the amortized computational complexity of the hashing functions is Ο(1), there are several situations when it is not…

Read More
(This article belongs to the SP14 (Special Issue on Computing, Engineering and Multidisciplinary Sciences 2022-23) & Section Hardware & Architecture in Computer Science (CHA))
Open AccessArticle
6 Pages, 2,622 KB Download PDF

Operating Systems Vulnerability – An Examination of Windows 10, macOS, and Ubuntu from 2015 to 2021

Advances in Science, Technology and Engineering Systems Journal, Volume 7, Issue 6, Page # 230–235, 2022; DOI: 10.25046/aj070625
Abstract:

This study investigated the vulnerabilities of three operating systems: Windows 10, macOS, and Ubuntu. The analysis of secondary data obtained from the CVE and NVD databases for the study period demonstrates varying OS vulnerability. Quantitative assessment of the vulnerability (using the vulnerability score) for the investigated operating systems found consistent results in the security vulnerability…

Read More
(This article belongs to Section Information Systems in Computer Science (CIS))
Open AccessArticle
10 Pages, 1,243 KB Download PDF

A Scheduling Algorithm with RTiK+ for MIL-STD-1553B Based on Windows for Real-Time Operation System

Advances in Science, Technology and Engineering Systems Journal, Volume 6, Issue 4, Page # 385–394, 2021; DOI: 10.25046/aj060443
Abstract:

In devices using Windows operating system based on x86 system, the real-time performance is not guaranteed by Windows. It is because Windows is not a real-time operating system. Users who develop applications in such a Windows environment generally use commercial solutions such as the RTX or the INtime to provide real-time performance to the system.…

Read More
(This article belongs to the SP11 (Special Issue on Innovation in Computing, Engineering Science & Technology 2021) & Section Software Engineering in Computer Science (CSE))
Open AccessArticle
7 Pages, 848 KB Download PDF

Node-Node Data Exchange in IoT Devices Using Twofish and DHE

Advances in Science, Technology and Engineering Systems Journal, Volume 6, Issue 2, Page # 622–628, 2021; DOI: 10.25046/aj060271
Abstract:

Internet of Things provides the support for devices, people and things to collaborate in collecting, analyzing and sharing sensitive information from one device onto the other through the internet. The internet of things is thriving largely due to access, connectivity, artificial intelligence and machine learning approaches that it supports. The stability and enhanced speed of…

Read More
(This article belongs to the SP10 (Special Issue on Multidisciplinary Sciences and Engineering 2020-21) & Section Information Systems in Computer Science (CIS))
Open AccessArticle
11 Pages, 1,157 KB Download PDF

Development and Improvement of Web Services Selections using Immigrants Scheme of Multi-Objective Genetic Algorithm

Advances in Science, Technology and Engineering Systems Journal, Volume 6, Issue 2, Page # 412–422, 2021; DOI: 10.25046/aj060248
Abstract:

Quality of service is a significant part of formulating a composing of web services to satisfy the user’s request, especially when several services exist and have been implemented in the same field and functionality. The selection process of web services among many options can be taken based on the quality of service considerations, fitness parameters,…

Read More
(This article belongs to Section Information Systems in Computer Science (CIS))
Open AccessArticle
14 Pages, 872 KB Download PDF

Challenges in IoT Technology Adoption into Information System Security Management of Smart Cities: A Review

Advances in Science, Technology and Engineering Systems Journal, Volume 6, Issue 2, Page # 99–112, 2021; DOI: 10.25046/aj060213
Abstract:

Sustainable urban development and utilization of Internet of Things (IoT) technology is driving cities globally to evolve into Smart Cities (SC). The power of IoT services and applications will enable public agencies to provide personalized services to the citizens and inevitably improves their much-needed quality of life. However, although the use of IoT technology proves…

Read More
(This article belongs to the SP10 (Special Issue on Multidisciplinary Sciences and Engineering 2020-21) & Section Information Systems in Computer Science (CIS))
Open AccessArticle
7 Pages, 898 KB Download PDF

Using a safety PLC to Implement the Safety Function

Advances in Science, Technology and Engineering Systems Journal, Volume 6, Issue 1, Page # 1072–1078, 2021; DOI: 10.25046/aj0601119
Abstract:

Nowadays almost every PLC manufacturer offer a so-called safety PLC. It is a specific category of PLC, which in recent years have become a commonly used means of performing safety functions, especially in industrial applications. In this area of specific applications, a maximum of SIL 3 is normally required. However, the guaranteed safety features of…

Read More
(This article belongs to the SP10 (Special Issue on Multidisciplinary Sciences and Engineering 2020-21) & Section Industrial Engineering (EID))
Open AccessArticle
7 Pages, 953 KB Download PDF

A Novel Blockchain-Based Authentication and Access Control Model for Smart Environment

Advances in Science, Technology and Engineering Systems Journal, Volume 6, Issue 1, Page # 651–657, 2021; DOI: 10.25046/aj060171
Abstract:

With the increase of smart factories and smart cities following the recent 4th industrial revolution, internal user authentication and authorization have become an important issue. The user authentication model using the server-client structure has a problem of forgery of the access history caused by the log manipulation of the administrator and unclearness of the responsibility.…

Read More
(This article belongs to the SP10 (Special Issue on Multidisciplinary Sciences and Engineering 2020-21) & Section Interdisciplinary Applications of Computer Science (CSI))
Open AccessArticle
6 Pages, 1,433 KB Download PDF

Education Value Chain Model for Examination, Grading, and Evaluation Process in Higher Education based on Blockchain Technology

Advances in Science, Technology and Engineering Systems Journal, Volume 5, Issue 6, Page # 1698–1703, 2020; DOI: 10.25046/aj0506202
Abstract:

Blockchain is a solution to improve data integrity and minimize data manipulation. Blockchain technology can be used in student examination management in universities. The process of managing student examination produces some information that can be stored in a blockchain database such as information about the lecturer as the exam creator, exam proctor, student attendance, student…

Read More
(This article belongs to Section Information Systems in Computer Science (CIS))
Open AccessArticle
11 Pages, 2,283 KB Download PDF

A Survey and an IoT Cybersecurity Recommendation for Public and Private Hospitals in Ecuador

Advances in Science, Technology and Engineering Systems Journal, Volume 5, Issue 3, Page # 518–528, 2020; DOI: 10.25046/aj050364
Abstract:

It was analyzed the reference information on Cybersecurity architectures, models, standards, evaluations, mechanisms, and procedures applied to IoT domains, and public and private health area. The problem is the lack of proposals for IoT Cybersecurity in public and private hospitals to minimize random failures, ensure the privacy of personal data of patients, avoid the paralysis…

Read More
(This article belongs to Section Interdisciplinary Applications of Computer Science (CSI))
Open AccessArticle
11 Pages, 959 KB Download PDF

Securing Hybrid SDN-based Geographic Routing Protocol using a Distributed Trust Model

Advances in Science, Technology and Engineering Systems Journal, Volume 5, Issue 2, Page # 567–577, 2020; DOI: 10.25046/aj050271
Abstract:

In this paper, the vulnerabilities and the security attacks against vehicular networks, SDN architecture and some security solutions for SDVN are studied. Secondly, a complete and improved version of the secure HSDN-GRA routing protocol based on a distributed trust model is proposed where public keys of the vehicles are managed in a distributed way. Besides,…

Read More
(This article belongs to the SP8 (Special Issue on Multidisciplinary Sciences and Engineering 2019-20) & Section Information Systems in Computer Science (CIS))
Open AccessArticle
8 Pages, 671 KB Download PDF

Analysis of Information Security for a Voting Process for Sectional Governments in Ecuador

Advances in Science, Technology and Engineering Systems Journal, Volume 4, Issue 5, Page # 352–359, 2019; DOI: 10.25046/aj040546
Abstract:

Knowing about different events in several Latin American countries, as well as in Ecuador, in relation to data alteration, in the different sectional voting processes, it has been necessary to carry out a security analysis provided by the systems of choice in the different sectional governments of the country. The objective of this study is…

Read More
(This article belongs to Section Information Systems in Computer Science (CIS))
Open AccessArticle
8 Pages, 725 KB Download PDF

Proposal for a Security Model for a Popular Voting System Process in Latin America

Advances in Science, Technology and Engineering Systems Journal, Volume 4, Issue 5, Page # 53–60, 2019; DOI: 10.25046/aj040507
Abstract:

In Latin America, there is a need for better security systems in different national or sectional votes, which is why this study was carried out, to show a proposal for a security model that helps to obtain better results and to this purpose has been selected information on the database for different Latin American countries,…

Read More
(This article belongs to Section Information Systems in Computer Science (CIS))
Open AccessArticle
8 Pages, 696 KB Download PDF

Prototype of a Security Architecture for a System of Electronic Voting for the Ecuador

Advances in Science, Technology and Engineering Systems Journal, Volume 4, Issue 4, Page # 292–299, 2019; DOI: 10.25046/aj040437
Abstract:

To be able to perform a better voting system, it is important to go to ICT and its various platforms designed for electoral purposes, which are being used in several countries in Latin America. In Ecuador are being used digital mechanisms during the process, but with certain errors and he is being considered to implement…

Read More
(This article belongs to Section Information Systems in Computer Science (CIS))
Open AccessArticle
11 Pages, 812 KB Download PDF

An Approach to Vulnerabilities, Threats and Risk in Voting Systems for Popular Elections in Latin America

Advances in Science, Technology and Engineering Systems Journal, Volume 4, Issue 3, Page # 106–116, 2019; DOI: 10.25046/aj040315
Abstract:

The problems in information security regarding vulnerabilities, threats and risks in voting systems for popular election in Latin America and the world persist; because in most of the countries of the world there is no maturity in democracy and defined policies; the problems of confidentiality, integrity and authenticity in the electoral processes can be evidenced.…

Read More
(This article belongs to Section Information Systems in Computer Science (CIS))
Open AccessArticle
13 Pages, 811 KB Download PDF

Computer Security as an Engineering Practice: A System Engineering Discussion

Advances in Science, Technology and Engineering Systems Journal, Volume 4, Issue 2, Page # 357–369, 2019; DOI: 10.25046/aj040245
Abstract:

We examine design principles from more than 20 years of experience in the implementation and protection of mission critical flight systems used by the Mission Design and Navigation Section at NASA’s Jet Propulsion Laboratory. Spacecraft navigation has rigorous requirements for completeness and accuracy, often under critical and uncompromising time pressure. Fault tolerant and robust design…

Read More
(This article belongs to the SP7 (Special Issue on Advancement in Engineering and Computer Science 2019) & Section Interdisciplinary Applications of Computer Science (CSI))
Open AccessArticle
5 Pages, 1,030 KB Download PDF

Scientific Principles behind 2017 World Universiade of Safety Lantern and Torch

Advances in Science, Technology and Engineering Systems Journal, Volume 3, Issue 4, Page # 21–25, 2018; DOI: 10.25046/aj030403
Abstract:

The torch relay for the 2017 Taipei Summer Universiade started June. The innovative torch design was altered and tested, follow-up production successfully. For preventing weather effect, the head of the torch embedded with a unique airflow structure that allowed the sacred flame to pass the wind and rain tests. The safety lantern displays a 3D…

Read More
(This article belongs to the SP5 (Special Issue on Multidisciplinary Sciences and Engineering 2018) & Section Energy & Fuels (ENF))
Open AccessArticle
10 Pages, 924 KB Download PDF

Mission-Critical Systems Design Framework

Advances in Science, Technology and Engineering Systems Journal, Volume 3, Issue 2, Page # 128–137, 2018; DOI: 10.25046/aj030215
Abstract:

Safety-critical systems are well documented and standardized (e.g. IEC 61508, RTCA DO-178B) within system design cycles. However in Defence and Security, systems that are critical to the success of a Mission are not defined within the literature nor are there any guidelines in defining criticality in their design or operational capabilities. When it comes to…

Read More
(This article belongs to the SP4 (Special issue on Advancement in Engineering Technology 2017-18) & Section Information Systems in Computer Science (CIS))

Journal Menu

Journal Browser


Special Issues

Special Issue on Digital Frontiers of Entrepreneurship: Integrating AI, Gender Equity, and Sustainable Futures
Guest Editors: Dr. Muhammad Nawaz Tunio, Dr. Aamir Rashid, Dr. Imamuddin Khoso
Deadline: 30 May 2026

Special Issue on Sustainable Technologies for a Resilient Future
Guest Editors: Dr. Debasis Mitra, Dr. Sourav Chattaraj, Dr. Addisu Assefa
Deadline: 30 April 2026