Search Results

Results (349)

Search Parameters:

Section: csi
Order results
Results per page
Open AccessArticle
4 Pages, 566 KB Download PDF

Combination of Caesar Cipher Modification with Transposition Cipher

Advances in Science, Technology and Engineering Systems Journal, Volume 2, Issue 5, Page # 22–25, 2017; DOI: 10.25046/aj020504
Abstract:

The caesar cipher modification will be combine with the transposition cipher, it would be three times encryption on this experiment that is caesar modification at first then the generated ciphertext will be encrypted with transposition, and last, the result from transposition will be encrypted again with the second caesar modification, similarly at the decryption but…

Read More
(This article belongs to Section Interdisciplinary Applications of Computer Science (CSI))
Open AccessArticle
9 Pages, 1,303 KB Download PDF

Collaborative Encryption Algorithm Between Vigenere Cipher, Rotation of Matrix (ROM), and One Time Pad (OTP) Algoritma

Advances in Science, Technology and Engineering Systems Journal, Volume 2, Issue 5, Page # 13–21, 2017; DOI: 10.25046/aj020503
Abstract:

Cryptography is still developing today. Classical cryptography is still in great demand for research and development. Some of them are Vigenere Cipher and One Time Pad (OTP) Algorithm. Vigenere Cipher is known as the alphabet table used to encrypt messages. While OTP is often used because it is still difficult to solve. Currently there are…

Read More
(This article belongs to Section Interdisciplinary Applications of Computer Science (CSI))
Open AccessArticle
7 Pages, 827 KB Download PDF

Modification of Symmetric Cryptography with Combining Affine Chiper and Caesar Chiper which Dynamic Nature in Matrix of Chiper Transposition by Applying Flow Pattern in the Planting Rice

Advances in Science, Technology and Engineering Systems Journal, Volume 2, Issue 5, Page # 6–12, 2017; DOI: 10.25046/aj020502
Abstract:

Classical cryptography is a way of disguising the news done by the people when there was no computer. The goal is to protect information by way of encoding. This paper describes a modification of classical algorithms to make cryptanalis difficult to steal undisclosed messages. There are three types of classical algorithms that are combined affine…

Read More
(This article belongs to Section Interdisciplinary Applications of Computer Science (CSI))
Open AccessArticle
5 Pages, 234 KB Download PDF

Three-Pass Protocol Implementation in Vigenere Cipher Classic Cryptography Algorithm with Keystream Generator Modification

Advances in Science, Technology and Engineering Systems Journal, Volume 2, Issue 5, Page # 1–5, 2017; DOI: 10.25046/aj020501
Abstract:

Vigenere Cipher is one of the classic cryptographic algorithms and included into symmetric key cryptography algorithm, where to encryption and decryption process use the same key. Vigenere Cipher has the disadvantage that if key length is not equal to the length of the plaintext, then the key will be repeated until equal to the plaintext…

Read More
(This article belongs to Section Interdisciplinary Applications of Computer Science (CSI))
Open AccessArticle
8 Pages, 1,323 KB Download PDF

Augmented Reality Prototype HUD for Passenger Infotainment in a Vehicular Environment

Advances in Science, Technology and Engineering Systems Journal, Volume 2, Issue 3, Page # 634–641, 2017; DOI: 10.25046/aj020381
Abstract:

The paper presents a prototype Head Up Display interface which acts as an interactive infotainment system for rear seat younger passengers, aiming to minimize driver distraction. The interface employs an Augmented Reality medium that utilizes the external scenery as a background for two platform games explicitly designed for this system. Additionally, the system provides AR…

Read More
(This article belongs to the SP3 (Special issue on Recent Advances in Engineering Systems 2017) & Section Interdisciplinary Applications of Computer Science (CSI))
Open AccessArticle
11 Pages, 1,481 KB Download PDF

FAG – a management support tool with BI techniques to assist teachers in the virtual learning environment Moodle

Advances in Science, Technology and Engineering Systems Journal, Volume 2, Issue 3, Page # 587–597, 2017; DOI: 10.25046/aj020375
Abstract:

One of the great challenges in distance-learning is to follow the actions of the teachers/tutors and also the actions of students during the process of teaching and learning. This article presents the FAG Tool integrated with the LMS Moodle was developed to help managers of the Distance Education environment to monitor the actions of teachers/tutors…

Read More
(This article belongs to the SP3 (Special issue on Recent Advances in Engineering Systems 2017) & Section Interdisciplinary Applications of Computer Science (CSI))
Open AccessArticle
9 Pages, 5,165 KB Download PDF

Semantic-less Breach Detection of Polymorphic Malware in Federated Cloud

Advances in Science, Technology and Engineering Systems Journal, Volume 2, Issue 3, Page # 553–561, 2017; DOI: 10.25046/aj020371
Abstract:

Cloud computing is one of the largest emerging utility services that is expected to grow enormously over the next decade. Many organizations are moving into hybrid cloud/hosted computing models. Single cloud service provider introduces cost and environmental challenges. Also, multi-cloud solution implemented by the Cloud tenant is suboptimal as it requires expensive adaptation costs. Cloud…

Read More
(This article belongs to the SP3 (Special issue on Recent Advances in Engineering Systems 2017) & Section Interdisciplinary Applications of Computer Science (CSI))
Open AccessArticle
8 Pages, 778 KB Download PDF

Multi-Domain Virtual Network Embedding with Coordinated Link Mapping

Advances in Science, Technology and Engineering Systems Journal, Volume 2, Issue 3, Page # 545–552, 2017; DOI: 10.25046/aj020370
Abstract:

Network Virtualization, which allows the co-existence of various logical networks on shared physical infrastructure, has become popular in recent years. The optimal mapping of virtual resource to physical resource is a major issue in network virtualization. This problem, called virtual network embedding (VNE), has been well explored in the context of one physical domain, which…

Read More
(This article belongs to the SP3 (Special issue on Recent Advances in Engineering Systems 2017) & Section Interdisciplinary Applications of Computer Science (CSI))
Open AccessArticle
5 Pages, 368 KB Download PDF

An Encryption Key for Secure Authentication: The Dynamic Solution

Advances in Science, Technology and Engineering Systems Journal, Volume 2, Issue 3, Page # 540–544, 2017; DOI: 10.25046/aj020369
Abstract:

In modern day technology, the Information Society is at risk. Passwords are a multi-user computer systems usual first line of defence against intrusion. A password may be textual with any combination of alphanumeric characters or biometric or 3-D. But no authentication protocol is fully secured against todays hackers as all of them are Static in…

Read More
(This article belongs to the SP3 (Special issue on Recent Advances in Engineering Systems 2017) & Section Interdisciplinary Applications of Computer Science (CSI))
Open AccessArticle
12 Pages, 1,830 KB Download PDF

Modelization of cognition, activity and motivation as indicators for Interactive Learning Environment

Advances in Science, Technology and Engineering Systems Journal, Volume 2, Issue 3, Page # 520–531, 2017; DOI: 10.25046/aj020367
Abstract:

In Interactive Learning Environment (ILE), the cognitive activity and behavior of learners are the center of the researchers’ concerns. The improvement of learning through combining these axes as a structure of indicators for well-designed learning environment, encloses the measurement of the educational activity as a part of the learning process. In this paper, we propose…

Read More
(This article belongs to the SP3 (Special issue on Recent Advances in Engineering Systems 2017) & Section Interdisciplinary Applications of Computer Science (CSI))
Open AccessArticle
9 Pages, 1,289 KB Download PDF

Image Segmentation Using Fuzzy Inference System on YCbCr Color Model

Advances in Science, Technology and Engineering Systems Journal, Volume 2, Issue 3, Page # 460–468, 2017; DOI: 10.25046/aj020359
Abstract:

This paper This paper presents a reliable method for image segmentation using a fuzzy inference system. The Fuzzy Membership function is applied on the YCbCr color space. Triangular membership functions are used in the input of the fuzzy system, Mamdani type fuzzy inference system is applied and for the output universe, singleton-type functions are used;…

Read More
(This article belongs to the SP3 (Special issue on Recent Advances in Engineering Systems 2017) & Section Interdisciplinary Applications of Computer Science (CSI))
Open AccessArticle
11 Pages, 1,022 KB Download PDF

Verifying the Detection Results of Impersonation Attacks in Service Clouds

Advances in Science, Technology and Engineering Systems Journal, Volume 2, Issue 3, Page # 449–459, 2017; DOI: 10.25046/aj020358
Abstract:

A web service impersonation is a class of attacks in which an attacker poses as or assumes the identity of a legitimate service to maliciously utilize that service’s privileges. Providing security for interacting cloud services requires more than user authentication with passwords or digital certificates and confidentiality in data transmission. In this paper, we focus…

Read More
(This article belongs to the SP3 (Special issue on Recent Advances in Engineering Systems 2017) & Section Interdisciplinary Applications of Computer Science (CSI))
Open AccessArticle
11 Pages, 1,478 KB Download PDF

The Model of Adaptive Learning Objects for virtual environments instanced by the competencies

Advances in Science, Technology and Engineering Systems Journal, Volume 2, Issue 3, Page # 345–355, 2017; DOI: 10.25046/aj020344
Abstract:

This article presents the instantiation of the Model of Adaptation of Learning Objects (MALO) developed in previous works, using the competencies to be developed in a given educational context. MALO has been developed for virtual environments based on an extension of the LOM standard. The model specifies modularly and independently two categories of rules, of…

Read More
(This article belongs to the SP3 (Special issue on Recent Advances in Engineering Systems 2017) & Section Interdisciplinary Applications of Computer Science (CSI))
Open AccessArticle
6 Pages, 1,103 KB Download PDF

Real Time Advanced Clustering System

Advances in Science, Technology and Engineering Systems Journal, Volume 2, Issue 3, Page # 321–326, 2017; DOI: 10.25046/aj020341
Abstract:

This paper describes a system to gather information from a stationary camera to identify moving objects. The proposed solution makes only use of motion vectors between adjacent frames, obtained from any algorithm. Starting from them, the system is able to retrieve clusters of moving objects in a scene acquired by an image sensor device. Since…

Read More
(This article belongs to the SP3 (Special issue on Recent Advances in Engineering Systems 2017) & Section Interdisciplinary Applications of Computer Science (CSI))
Open AccessArticle
11 Pages, 656 KB Download PDF

Solving the Capacitated Network Design Problem in Two Steps

Advances in Science, Technology and Engineering Systems Journal, Volume 2, Issue 3, Page # 291–301, 2017; DOI: 10.25046/aj020339
Abstract:

In this paper, we propose a two steps-based algorithm to solve the modular link version of the Capacitated Network Design Problem (CNDP) which consists to determine the optimal network that guarantees the routing of a set of commodities. In our proposition, CNDP is divided into two sub-problems: Network Design problem (NDP) and Network Loading Problem…

Read More
(This article belongs to the SP3 (Special issue on Recent Advances in Engineering Systems 2017) & Section Interdisciplinary Applications of Computer Science (CSI))
Open AccessArticle
7 Pages, 6,945 KB Download PDF

Gestural Interaction for Virtual Reality Environments through Data Gloves

Advances in Science, Technology and Engineering Systems Journal, Volume 2, Issue 3, Page # 284–290, 2017; DOI: 10.25046/aj020338
Abstract:

In virtual environments, virtual hand interactions play a key role in interactivity and realism allowing to perform fine motions. Data glove is widely used in Virtual Reality (VR) and through simulating a human hands natural anatomy (Avatar’s hands) in its appearance and motion is possible to interact with the environment and virtual objects. Recently, hand…

Read More
(This article belongs to the SP3 (Special issue on Recent Advances in Engineering Systems 2017) & Section Interdisciplinary Applications of Computer Science (CSI))
Open AccessArticle
7 Pages, 1,258 KB Download PDF

A security approach based on honeypots: Protecting Online Social network from malicious profiles

Advances in Science, Technology and Engineering Systems Journal, Volume 2, Issue 3, Page # 198–204, 2017; DOI: 10.25046/aj020326
Abstract:

In the recent years, the fast development and the exponential utilization of social networks have prompted an expansion of social Computing. In social networks users are interconnected by edges or links, where Facebook, twitter, LinkedIn are most popular social networks websites. Due to the growing popularity of these sites they serve as a target for…

Read More
(This article belongs to the SP3 (Special issue on Recent Advances in Engineering Systems 2017) & Section Interdisciplinary Applications of Computer Science (CSI))
Open AccessArticle
5 Pages, 1,002 KB Download PDF

Assessment of the usefulness and appeal of stigma-stop by psychology students: a serious game designed to reduce the stigma of mental illness

Advances in Science, Technology and Engineering Systems Journal, Volume 2, Issue 3, Page # 186–190, 2017; DOI: 10.25046/aj020324
Abstract:

The present work describes the first serious game designed to reduce the stigma among students towards mental health problems. The game is called Stigma-Stop, and it features characters who suffer from various mental disorders. Players are provided with information about different mental illnesses, and they are presented with several options on how to act when…

Read More
(This article belongs to the SP3 (Special issue on Recent Advances in Engineering Systems 2017) & Section Interdisciplinary Applications of Computer Science (CSI))
Open AccessArticle
10 Pages, 1,434 KB Download PDF

GPSR+Predict: An Enhancement for GPSR to Make Smart Routing Decision by Anticipating Movement of Vehicles in VANETs

Advances in Science, Technology and Engineering Systems Journal, Volume 2, Issue 3, Page # 137–146, 2017; DOI: 10.25046/aj020318
Abstract:

Vehicular ad-hoc networks (VANETs) are still more challenging to overcome even if they have been widely studied during the last decades. The routing mechanism is the essentially relevant issue in this field. Indeed, it must strictly to be adapted to specific and unique characteristics such as the high mobility of the vehicles, the dynamic nature…

Read More
(This article belongs to the SP3 (Special issue on Recent Advances in Engineering Systems 2017) & Section Interdisciplinary Applications of Computer Science (CSI))
Open AccessArticle
12 Pages, 1,778 KB Download PDF

ADOxx Modelling Method Conceptualization Environment

Advances in Science, Technology and Engineering Systems Journal, Volume 2, Issue 3, Page # 125–136, 2017; DOI: 10.25046/aj020317
Abstract:

The importance of Modelling Methods Engineering is equally rising with the importance of domain specific languages (DSL) and individual modelling approaches. In order to capture the relevant semantic primitives for a particular domain, it is necessary to involve both, (a) domain experts, who identify relevant concepts as well as (b) method engineers who compose a…

Read More
(This article belongs to the SP3 (Special issue on Recent Advances in Engineering Systems 2017) & Section Interdisciplinary Applications of Computer Science (CSI))
Open AccessArticle
5 Pages, 743 KB Download PDF

Paper Improving Rule Based Stemmers to Solve Some Special Cases of Arabic Language

Advances in Science, Technology and Engineering Systems Journal, Volume 2, Issue 3, Page # 111–115, 2017; DOI: 10.25046/aj020315
Abstract:

Analysis of Arabic language has become a necessity because of its big evolution; we propose in this paper a rule based extraction method of Arabic text to solve some weaknesses founded on previous research works. Our approach is divided on preprocessing phase, on which we proceed to the tokenization of the text, and formatting it…

Read More
(This article belongs to the SP3 (Special issue on Recent Advances in Engineering Systems 2017) & Section Interdisciplinary Applications of Computer Science (CSI))
Open AccessArticle
11 Pages, 847 KB Download PDF

Dependence-Based Segmentation Approach for Detecting Morpheme Boundaries

Advances in Science, Technology and Engineering Systems Journal, Volume 2, Issue 3, Page # 100–110, 2017; DOI: 10.25046/aj020314
Abstract:

The unsupervised morphology processing in the emerging mutant languages has the advantage over the human/supervised processing of being more agiler. The main drawback is, however, their accuracy. This article describes an unsupervised morphemes identification approach based on an intuitive and formal definition of event dependence. The input is no more than a plain text of…

Read More
(This article belongs to the SP3 (Special issue on Recent Advances in Engineering Systems 2017) & Section Interdisciplinary Applications of Computer Science (CSI))
Open AccessArticle
6 Pages, 1,350 KB Download PDF

Computer Aided Medical Diagnosis for the Treatment of Sexually Transmitted Disease (Gonorrhea)

Advances in Science, Technology and Engineering Systems Journal, Volume 2, Issue 2, Page # 30–35, 2017; DOI: 10.25046/aj020205
Abstract:

The World Health Organization (WHO) report on the circumstances of clinical facilities in developing countries indicates that, there is considerable efficient delivery of medical services to the rural inhabitants where the services are available, these services are very expensive and not affordable to the average citizen. This has risen inadequacies such as prolonged suffering and…

Read More
(This article belongs to Section Interdisciplinary Applications of Computer Science (CSI))
Open AccessArticle
7 Pages, 1,038 KB Download PDF

How Effective is Using Lip Movement for Japanese Utterance Training

Advances in Science, Technology and Engineering Systems Journal, Volume 2, Issue 1, Page # 227–233, 2017; DOI: 10.25046/aj020127
Abstract:

Lip movements have long been the subject of research. There are many methods of lip movement recognition, such as the calculation of the amount of movement compared to a matching face pattern. In a previous study, we investigated utterance recognition based on the power spectrum by focusing on lip movements, which is one aspect of…

Read More
(This article belongs to the SP2 (Special Issue on Computer Systems, Information Technology, Electrical and Electronics Engineering 2017) & Section Interdisciplinary Applications of Computer Science (CSI))
1 12 13 14

Journal Menu

Journal Browser


Special Issues

Special Issue on Digital Frontiers of Entrepreneurship: Integrating AI, Gender Equity, and Sustainable Futures
Guest Editors: Dr. Muhammad Nawaz Tunio, Dr. Aamir Rashid, Dr. Imamuddin Khoso
Deadline: 30 May 2026

Special Issue on Sustainable Technologies for a Resilient Future
Guest Editors: Dr. Debasis Mitra, Dr. Sourav Chattaraj, Dr. Addisu Assefa
Deadline: 30 April 2026