Search Results

Results (241)

Search Parameters:

Section: cis
Order results
Results per page
Open AccessArticle
7 Pages, 2,291 KB Download PDF

Indoor monitoring in Public Buildings: workplace wellbeing and energy consumptions. An example of IoT for smart cities application

Advances in Science, Technology and Engineering Systems Journal, Volume 2, Issue 3, Page # 884–890, 2017; DOI: 10.25046/aj0203110
Abstract:

In the recent years LepidaSpa created Sensornet platform for the control of the Emilia-Romagna territory managing heterogeneous environmental sensor networks distributed all over the region. LepidaSpa decided to integrate into Sensornet a brand-new family of sensors measuring indoor environmental parameters inside public buildings, in order to monitor energy consumption on one hand and workers’ wellbeing…

Read More
(This article belongs to the SP3 (Special issue on Recent Advances in Engineering Systems 2017) & Section Information Systems in Computer Science (CIS))
Open AccessArticle
7 Pages, 803 KB Download PDF

Network Intrusion Detection System using Apache Storm

Advances in Science, Technology and Engineering Systems Journal, Volume 2, Issue 3, Page # 812–818, 2017; DOI: 10.25046/aj0203102
Abstract:

Network security implements various strategies for the identification and prevention of security breaches. Network intrusion detection is a critical component of network management for security, quality of service and other purposes. These systems allow early detection of network intrusion and malicious activities; so that the Network Security infrastructure can react to mitigate these threats. Various…

Read More
(This article belongs to the SP3 (Special issue on Recent Advances in Engineering Systems 2017) & Section Information Systems in Computer Science (CIS))
Open AccessArticle
10 Pages, 2,922 KB Download PDF

Designing a Smart Car Parking System (PoC) Prototype Utilizing CCTV Nodes: A vision of an IoT parking system via UCD process

Advances in Science, Technology and Engineering Systems Journal, Volume 2, Issue 3, Page # 755–764, 2017; DOI: 10.25046/aj020396
Abstract:

Using smart parking systems has become very important, and particularly so for metropolitan areas, because of the benefits for drivers in many aspects, such as time, frustration, stress, and anger, in addition to the increased consumption of fuel while searching for a vacant parking space. This paper proposes a review of recent advances in sensing…

Read More
(This article belongs to the SP3 (Special issue on Recent Advances in Engineering Systems 2017) & Section Information Systems in Computer Science (CIS))
Open AccessArticle
11 Pages, 913 KB Download PDF

Data Error Detection and Recovery in Embedded Systems: a Literature Review

Advances in Science, Technology and Engineering Systems Journal, Volume 2, Issue 3, Page # 623–633, 2017; DOI: 10.25046/aj020380
Abstract:

This paper presents a literature review on data flow error detection and recovery techniques in embedded systems. In recent years, embedded systems are being used more and more in an enormous number of applications from small mobile device to big medical devices. At the same time, it is becoming important for embedded developers to make…

Read More
(This article belongs to the SP3 (Special issue on Recent Advances in Engineering Systems 2017) & Section Information Systems in Computer Science (CIS))
Open AccessArticle
7 Pages, 644 KB Download PDF

A comparative between CRISP-DM and SEMMA through the construction of a MODIS repository for studies of land use and cover change

Advances in Science, Technology and Engineering Systems Journal, Volume 2, Issue 3, Page # 598–604, 2017; DOI: 10.25046/aj020376
Abstract:

Among the most popular methodologies for development of data mining projects are CRISP-DM and SEMMA, This research paper explains the reason why it was decided to compare them from a specific case study. Therefore, this document describes in detail each phase, task and activity proposed by each methodology, applying it in the construction of a…

Read More
(This article belongs to the SP3 (Special issue on Recent Advances in Engineering Systems 2017) & Section Information Systems in Computer Science (CIS))
Open AccessArticle
6 Pages, 700 KB Download PDF

Intrusion detection in cloud computing based attack patterns and risk assessment

Advances in Science, Technology and Engineering Systems Journal, Volume 2, Issue 3, Page # 479–484, 2017; DOI: 10.25046/aj020361
Abstract:

This paper is an extension of work originally presented in SYSCO CONF.We extend our previous work by presenting the initial results of the implementation of intrusion detection based on risk assessment on cloud computing. The idea focuses on a novel approach for detecting cyber-attacks on the cloud environment by analyzing attacks pattern using risk assessment…

Read More
(This article belongs to the SP3 (Special issue on Recent Advances in Engineering Systems 2017) & Section Information Systems in Computer Science (CIS))
Open AccessArticle
7 Pages, 1,287 KB Download PDF

Moving Towards Reliability-Centred Management of Energy, Power and Transportation Assets

Advances in Science, Technology and Engineering Systems Journal, Volume 2, Issue 3, Page # 369–375, 2017; DOI: 10.25046/aj020347
Abstract:

Infrastructure Asset Management was first adopted in 1980s for challenges faced by the utilities, road and rail transport systems, mining, process and manufacturing industries in asset life cycle value optimization. International standards ISO 55000 and PAS 55 were subsequently developed to provide a basis for a structured methodology in the development of Asset Management System.…

Read More
(This article belongs to the SP3 (Special issue on Recent Advances in Engineering Systems 2017) & Section Information Systems in Computer Science (CIS))
Open AccessArticle
19 Pages, 1,686 KB Download PDF

A Computationally Intelligent Approach to the Detection of Wormhole Attacks in Wireless Sensor Networks

Advances in Science, Technology and Engineering Systems Journal, Volume 2, Issue 3, Page # 302–320, 2017; DOI: 10.25046/aj020340
Abstract:

A wormhole attack is one of the most critical and challenging security threats for wireless sensor networks because of its nature and ability to perform concealed malicious activities. This paper proposes an innovative wormhole detection scheme to detect wormhole attacks using computational intelligence and an artificial neural network (ANN). Most wormhole detection schemes reported in…

Read More
(This article belongs to the SP3 (Special issue on Recent Advances in Engineering Systems 2017) & Section Information Systems in Computer Science (CIS))
Open AccessArticle
14 Pages, 714 KB Download PDF

Validity and efficiency of conformal anomaly detection on big distributed data

Advances in Science, Technology and Engineering Systems Journal, Volume 2, Issue 3, Page # 254–267, 2017; DOI: 10.25046/aj020335
Abstract:

Conformal Prediction is a recently developed framework for reliable confident predictions. In this work we discuss its possible application to big data coming from different, possibly heterogeneous data sources. On example of anomaly detection problem, we study the question of saving validity of Conformal Prediction in this case. We show that the straight forward averaging…

Read More
(This article belongs to the SP3 (Special issue on Recent Advances in Engineering Systems 2017) & Section Information Systems in Computer Science (CIS))
Open AccessArticle
7 Pages, 702 KB Download PDF

Toward Confirming a Framework for Securing the Virtual Machine Image in Cloud Computing

Advances in Science, Technology and Engineering Systems Journal, Volume 2, Issue 4, Page # 44–50, 2017; DOI: 10.25046/aj020406
Abstract:

The concept of cloud computing has arisen thanks to academic work in the fields of utility computing, distributed computing, virtualisation, and web services. By using cloud computing, which can be accessed from anywhere, newly-launched businesses can minimise their start-up costs. Among the most important notions when it comes to the construction of cloud computing is…

Read More
(This article belongs to Section Information Systems in Computer Science (CIS))
Open AccessArticle
12 Pages, 1,419 KB Download PDF

Methodology for Management of Information Security in Industrial Control Systems: A Proof of Concept aligned with Enterprise Objectives.

Advances in Science, Technology and Engineering Systems Journal, Volume 2, Issue 3, Page # 88–99, 2017; DOI: 10.25046/aj020313
Abstract:

This article is an extended version of the study presented at the IEEE Ecuador Technical Chapters Meeting (ETCM)-2016. At that time, a methodological proposal was designed, implemented, and applied in a group of industrial plants for the management of the information security of the Industrial control systems (ICS). The present study displays an adaptation and…

Read More
(This article belongs to the SP3 (Special issue on Recent Advances in Engineering Systems 2017) & Section Information Systems in Computer Science (CIS))
Open AccessArticle
8 Pages, 817 KB Download PDF

Internet of Things: An Evolution of Development and Research area topics

Advances in Science, Technology and Engineering Systems Journal, Volume 2, Issue 1, Page # 240–247, 2017; DOI: 10.25046/aj020129
Abstract:

Internet of Things (IoT) is a hot topic in the Europe Union (EU). In the year of 2015 the EU established an Alliance of Internet of Things Innovation (AIOTI) and this alliance included the IoT European Research Cluster (IERC) on the Internet of Things in the work group 01. IERC was established in 2007 and…

Read More
(This article belongs to the SP2 (Special Issue on Computer Systems, Information Technology, Electrical and Electronics Engineering 2017) & Section Information Systems in Computer Science (CIS))
Open AccessArticle
5 Pages, 877 KB Download PDF

Implementation a Secure Electronic Medical Records Exchange System Based on S/MIME

Advances in Science, Technology and Engineering Systems Journal, Volume 2, Issue 1, Page # 172–176, 2017; DOI: 10.25046/aj020120
Abstract:

The exchange of electronic medical records can reduce the preservation and the use of papers of medical records for management issues. The sharing of electronic medical records has been effective in Taiwan. Now days, enterprises are sharing their electronic medical records through the Exchange Center of EMR under the Virtual Private Network but slightly less…

Read More
(This article belongs to the SP2 (Special Issue on Computer Systems, Information Technology, Electrical and Electronics Engineering 2017) & Section Information Systems in Computer Science (CIS))
Open AccessArticle
10 Pages, 702 KB Download PDF

Management of Health Information in Malawi: Role of Technology

Advances in Science, Technology and Engineering Systems Journal, Volume 2, Issue 1, Page # 157–166, 2017; DOI: 10.25046/aj020118
Abstract:

This paper is an extended version of the conference paper presented at IST Africa Week Conference 2016 and it discusses in detail the existing technology gaps using DHIS2 (District Health Information System 2.0) as an example, and how Geographic Information System (GIS) and mobile application, as specific examples of technology, can enhance health management information…

Read More
(This article belongs to the SP2 (Special Issue on Computer Systems, Information Technology, Electrical and Electronics Engineering 2017) & Section Information Systems in Computer Science (CIS))
Open AccessArticle
5 Pages, 4,635 KB Download PDF

Adaptive Intelligent Systems applied to two-wheeled robot and the effect of different terrains on performance

Advances in Science, Technology and Engineering Systems Journal, Volume 2, Issue 1, Page # 1–5, 2017; DOI: 10.25046/aj020101
Abstract:

This work discuss two different intelligent controllers: Online Neuro Fuzzy Controller (ONFC) and Proportional-Integral-Derivative Neural Network (PID-NN). They were applied to maintain the equilibrium and to control the position of a two-wheeled robot prototype. Experiments were carried out to investigate the equilibrium control and movement of the two-wheeled robot first on flat terrain, then in…

Read More
(This article belongs to the SP2 (Special Issue on Computer Systems, Information Technology, Electrical and Electronics Engineering 2017) & Section Information Systems in Computer Science (CIS))
Open AccessArticle
7 Pages, 1,288 KB Download PDF

FenceBook a Geofencing based Advertisements Application Using Android

Advances in Science, Technology and Engineering Systems Journal, Volume 1, Issue 5, Page # 27–33, 2016; DOI: 10.25046/aj010506
Abstract:

Geo-fencing (geofencing) is a great feature in a software program that uses Global Positioning System (GPS) or radio frequency identification (RFID) to define the geographical boundaries feature. Actually geofence is a virtual barrier. Geofencing is an innovative technology, an online marketplace for proactive contextual services that allows users to easily find interesting services, can easily…

Read More
(This article belongs to the Special issue on Recent Advances in Electrical and Electronics Engineering 2016 & Section Information Systems in Computer Science (CIS))
1 8 9 10

Journal Menu

Journal Browser


Special Issues

Special Issue on Digital Frontiers of Entrepreneurship: Integrating AI, Gender Equity, and Sustainable Futures
Guest Editors: Dr. Muhammad Nawaz Tunio, Dr. Aamir Rashid, Dr. Imamuddin Khoso
Deadline: 30 May 2026

Special Issue on Sustainable Technologies for a Resilient Future
Guest Editors: Dr. Debasis Mitra, Dr. Sourav Chattaraj, Dr. Addisu Assefa
Deadline: 30 April 2026